Tuesday, December 31, 2019
Women in Sports Essay example - 938 Words
Women in Sports Historical evidence proves that women have been involved in sports since fourth century BC; but were not necessarily given the approval to participate. Many restrictions were enforced to keep women out of these male activities and were continually reinforced until the twentieth century. Women entering the world of sports were aware that they were placing themselves into a male dominated field. With their entrance into the sporting world, these women have opened themselves up to many different criticisms and to the possibility of exploitation within the media and from male authority figures. Women in sports are constantly striving for equality where hegemonic masculinity inâ⬠¦show more contentâ⬠¦One issue faced by female athletes in their chosen sport, is the perception they lack physical capabilities and the issues surrounding this myth. Before the 1920ââ¬â¢s women were only allowed to participate in sports that required little to no physical activity (Simri 40-48). Wom en at a young age were taught that their bodies are physically weaker than males. As a result, women would not use their bodies to their full capability in fear of being socially ostracized or causing bodily harm to themselves. Thus, perpetuating the false notion that they were inherently weaker than male athletes. These ideas of female frailty emerged during the beginning of the twentieth century and are only now being proven wrong. Physicians and physical therapists have proven that there is very little difference in physical ability between female and male athletes given equal training. Many women have begun to realize their natural abilities and have started to take part in more physical demanding sports. However, there is still the lingering impression that women cannot produce the aggression that certain sports require. This notion is popular among women as well as men (Dowling). The mediaââ¬â¢s depiction of female sporting events, also have a direct impact on the success of female athletes and their selected sport. The general media, consisting of photographers, editorsShow MoreRelatedWomen and Sports1522 Words à |à 7 PagesLiterature Thesis There is a definite correlation between the economics of professional womenà ¡Ã ¦s sports and their ultimate success. As most success in sport leagues, teams and associations are measured by longevity, win/loss records, and most importantly, revenue, the footprint of female competition at the professional level has not been paramount at any point in our history. Professional womenà ¡Ã ¦s athletics is characterized by an economic model and a level of acceptance amongst the massesRead More Women in Sports and Sports Broadcasting Essay584 Words à |à 3 PagesWomen in Sports and Sports Broadcasting Before I conducted this media analysis about women in sports and sport broadcasting, I hypothesized the obvious - that more male sports would be in the media, and that there would be more male sports broadcasters as well. Through my observations I did find that the sports arena and sports broadcasting sphere are male dominated. However, I also found that although there are not many stories about women, there has been a steady progression and magazinesRead MoreWomen and Sport Essay1116 Words à |à 5 PagesWomen and Sport Turn on your TV screen and thereââ¬â¢s a high probability that a sports game will be on at one channel. Unless itââ¬â¢s a special sports channel such as ââ¬Ësky sportsââ¬â¢ etc. you will easily realise it is men playing the relevant sport. Ever wondered why? Why arenââ¬â¢t womenââ¬â¢s sports as amazingly popular as the large market of menââ¬â¢s sports? Millions are spent on menââ¬â¢s sports and men sportsââ¬â¢ propaganda but why arenââ¬â¢t womenââ¬â¢s sports as popular? They are physically andRead MoreWomen Discrimination In Sports1572 Words à |à 7 PagesDiscrimination in Women Sports Women have always been the minority in todayââ¬â¢s world whether thatââ¬â¢s in the work force or even in sports. Title IX a act that was made by the United States Congress in 1972 that said that no one should be denied to play, receive financial aid, or discrimination to any education program or activity that pertains to only one sex. (Senne 1) This act was a step towards more female participation and less discrimination, but those stereotypes most of society believes in stillRead More Women and Sports Essay912 Words à |à 4 PagesWomen and Sports As it becomes increasingly acceptable for women to be athletic in American culture, a new question arises: in which sports should women be allowed to participate? From a physiological standpoint, it has been scientifically proven that female bodies do not differ significantly enough from male bodies to prevent them from participation in any male sports. This division between male and female sports clearly stems from age-old, socially constructed norms of femininity and masculinityRead MoreThe Future of Women in Sports1080 Words à |à 5 PagesThe Future of Women in Sports As the year 2010 has arrived, the problem of the portrayal of women in sports no longer lies in their fight for equality and opportunity, but in fighting off the competition with men. It is no longer an issue of women not being taken seriously or being looked down upon if they decide to be athletes, but that men want to take part in competition with women in sports. This film thus focuses on the struggles that the male protagonist faces in trying to compete withRead MoreEssay on Women in Sports961 Words à |à 4 PagesWomen in Sports Challenges appear to be part of the human experience. In the course of history, very little has come easily. The progress that women have made in sport in the United States over the course of the last 100 years seems remarkable for the amount achieved in so little time. In relation to the other advances made in this century, including mens sport, that achievement dims. While women have made great advances, they havent, in comparison, come that far. It would appear, from theRead MoreThe Role Of Women In Sports1541 Words à |à 7 PagesWomen have always been the minority in the world even today: that is in the work force or even in sports. Title IX, an act that was made by the United States Congress in 1972, said that no one should be denied to play, receive financial aid, or discriminate to any education program or activity that pertains to only one sex (Senne 1). This act was a step towards improving female participation and lessening discrimination, but the stereotypes that most of society believes in still exist. This is oneRead MoreEssay on Women in Sports707 Words à |à 3 PagesWomen in Sports In the last one hundred years women have made tremendous inroads in many facets of life. Of that there can be little doubt. Women may now hold jobs, own property and participate in professional sports. Today women can compete in sports, once a vestige of male domination; there is now room for women in that arena. But even today women in sports are not portrayed in the same light as their male counterparts. To a large degree this is because of todays cultural ideal of women.Read More Women and Sports Essays3142 Words à |à 13 Pagesyears for women to gain a semblance of equality in sports. Throughout history, women have been both excluded from playing sports and discriminated against in sports. Menââ¬â¢s sports have always dominated the college athletic field, but women were finally given a fighting chance after Title IX was passed. Title IX, among other things, requires scholarships to be equally proportioned between men and womenââ¬â¢s sports. Although this was a huge gain f or women, gender inequality still exists in sports today. An
Monday, December 23, 2019
Bullying And Its Effects On Children - 1413 Words
Introduction Bullying is considered to be aggressive behavior that is repeated or has the potential to be repeated, over a period of time. The actions of bullying can include spreading rumors, making threats, verbally or physically attacking someone, or purposely isolating someone from a group. As children attempt to make sense of traumatic events, new behavioral problems can stem from re-experienced occurrences. Some children affected may disassociate themselves from the situations and absorb themselves in behaviors that generate negative attention. Many bullies themselves have experienced difficulties within their own lifestyles. Bullying can stem from existing problems or challenges from home such as divorced parents, violent episodes inside the home, foster care, drug abuse or sexual abuse. Unfortunately, sometimes leading to catastrophic or disastrous outcomes. Bullying Bullying has increased over the years, and studies have shown that boys tend to become bullies more often rather than girls. Males are more likely to use physical abuse and violence as a form of bullying, whereas, females resort to indirect, relational aggression and peer victimization. Students that become victims of bullying result to having low self-esteem, depression, and loneliness. A bully will typically find a victim that looks weak, passive, and unpopular. This way they will not have anyone to stand up for them or challenge them. The desire to have power and control is more appeasing to aShow MoreRelatedThe Effects of Bullying on Children1344 Words à |à 5 Pages Bullying in schools is believed to be a normal part of school life, however, when people begin to have this mentality, they forget that bullying is physically and psychologically harmful to both the bully and the victim, therefore, bullying must be eradicated from schools by raising awareness and increasing supervision. The act of bullying or the fear of being bullied underlies almost everything kids do these days. No longer can students leave the gossip and self-doubt at school and go home forRead MoreBullying And Its Effects On Children1476 Words à |à 6 Pagesseveral decades, bullying has spread significantly. It has been present all over the world for as long as people can remember. And when technology was released, it created new ways for people to communicate, which made bullying become even worse than before. Adults, teenagers, and children that are all the same are being bullied. Bullying can take form in many different ways, as well as it can affect the victim, and peopl e are also able to stop the behavior. THE TYPES OF BULLYING A bullying victim canRead MoreBullying And Its Effects On Children1181 Words à |à 5 PagesBullying is unwanted behavior that causes a child to feel isolated and alone. In order for an act to be considered bullying the act has to be, or be able to be repeated multiple times. Bullying can be done verbally by teasing, name-calling, taunting or inappropriate sexual comments directed at someone to purposefully upset them. Bullying can be done socially by isolating students on purpose, telling other students not to play with them, spreading rumors about students or attempting to embarrassRead MoreBullying And Its Effect On Children1528 Words à |à 7 PagesIntroduction Bullying can happen anywhere and to anyone whether it is online or in person. It can happen at school, in your neighborhood, or while your on-line. ââ¬Å"Bullying is when someone is being hurt by words or by actions on purpose.â⬠ââ¬Å"Cyberbullying is using technology - internet, email, cell phones, social media, pictures - to hurt or harm someone.â⬠It can have a major effect on the bully and the victim both. But, bullying is not just name calling, it is also teasing, spreading rumors, leavingRead MoreBullying And Its Effect On Children1366 Words à |à 6 Pagescausing this behavior. Primary school is an especially tough time for our young ones. If educators are really looking to put an end to bullying, they have to attack it from the root of the problem (Linder-Altman). What a child is wearing will not get them bullied, it depends on the bully. Making uniforms mandatory in efforts to decrease bullying, only teaches our children that the only way to be accepted is by conforming which is not what we should be pushing for. Itââ¬â¢s important to attack the problemRead MoreBullying And Its Effect On Children1533 Words à |à 7 PagesBullying can happen anywhere and to anyone whether it is online or in person. It can happen at school, in your neighborhood, or while your on-line. ââ¬Å"Bullying is when someone is being hurt by words or by actions on purpose.â⬠ââ¬Å"Cyberbullying is using technology - internet, email, cell phones, social media, pictures - to hurt or harm someone.â⬠It can have a major effect on the bully and the victim both. But, bullying is not just name calling, it is also teasing, spreading rumors, leaving someone outRead MoreBullying And Its Effects On Children864 Words à |à 4 PagesKerianna Rimmer Have you ever been bullied? Have you ever bullied someone? Bullying has become a huge issue. It is occurring all across the world. There are a few different types of bullying, which I will be discussing. First, bullying is unwanted, aggressive behavior among children. The behavior is repeated, or has the potential of being repeated. Both kids who bully and are bullied may have serious, lasting problems. Bullying is a form of behavior in which someone repeatedly and intentionally causesRead MoreBullying And Its Effects On Children1990 Words à |à 8 Pagesmore than 160,000 children miss school out of fear of being bullied, according to National Education Association estimates. Bullying takes many forms, ranging from the seemingly innocuous name-calling to the more harmful cyberbullying to severe physical violence. It happens everywhere, at all times to the most vulnerable of kids, especially those who are obese, gay or have a disability. And besides the physical, emotional and psychological tolls it imposes on victims, bullying produces adverse socioeconomicRead MoreBullying And Its Effect On Children1144 Words à |à 5 PagesBullying is found in elementary, middle, and high school all around the world. School bullying occurs at similar rates such as cultures, countries and educational settings. It can take many direct and indirect forms, like physical violence, name calling, taunting, teasing, horrible rumors, and social exclusion. Since the late 90ââ¬â¢s, several school shootings committed by the victims of the school bullying have brought media attention to the issue. First, bullying depends upon imbalance of power,Read MoreBullying And Its Effect On Children1072 Words à |à 5 PagesThere are many non-violent ways in which a Christian should respond to any type of bullying. These can include physical bullying, social bullying, cyberbullying and many more. Bullying is the act of intentionally harming others through harassment, assault or manipulation. Source A is an example of how a student had been bullied in grade school. When they got to a bigger school called Junior High, they had less chance to interact. One day that student had come to the cafeteria where the other student
Sunday, December 15, 2019
Comparison Of Methods Of Research Education Essay Free Essays
string(39) " reappraisal from one instance survey\." In this chapter the writer attempts to discourse the research methods required in the context of survey and besides warrant its usage and restrictions. This survey was undertaken to analyze the impact of mega-events and the promotional schemes undertaken to shift a finish ââ¬Ës touristry industry. While carry oning this research it was indispensable that a methodological analysis be chosen to outdo suit the survey. We will write a custom essay sample on Comparison Of Methods Of Research Education Essay or any similar topic only for you Order Now Harmonizing to Howard and Sharp ( 1996 ) , the pick of research methods is considered to be an built-in portion of any research undertaking, which greatly influences the consequences obtained. Since the purpose of the thesis is to show the importance of mega-events and the demand to be after for these events, more self-generated and flexible attack was required to develop the apprehension of Sydney ââ¬Ës image in the touristry industry. Second, the informations had to be gathered from different beginnings, both primary and secondary, to to the full understand the phenomenon. Finally, the writer besides attempts to offer practical value and thoughts which could be utile in this issue. Based on these considerations, the research was conducted utilizing qualitative research design. Qualitative research allows the topics being studied to give much ââ¬Ëricher ââ¬Ë replies to inquiries put to them by the research worker, and may give valuable penetrations which might hold been missed by any other method. It besides provides valuable information to certain research inquiries in its ain right. Robson et al. , in 1992 stated qualitative research to be ââ¬ËA wide-ranging trade embracing many different attacks, and can run from big, time-consuming Government/Social research contracts to pre-testing of consumer advertisement ââ¬Ë ( Chisnall, 2001, P195 ) . Harmonizing to Chisnall, the kernel of qualitative research is that it diagnostic ; it seeks to detect what may account for certain sorts of behaviors like trade name trueness. Qualitative research normally has no measurings or statistics but uses words, descriptions and quotation marks to research significance. Qualitative methods aim to do sense of, or construe, phenomena in footings of the significances people bring to them Qualitative research may specify preliminary inquiries which can so be addressed in quantitative surveies ( Greenhalgh A ; Taylor, 1997 ) One of the cardinal differences between qualitative and quantitative research is that qualitative research attempts to generalise comparatively simple information by executing statistical analyses, whereas qualitative research attempts to larn about a complex phenomenon by seeking penetration. In simple words quantitative research replies ââ¬Ëhow many ââ¬Ë of a inquiry whereas qualitative research replies ââ¬Ëwhy ââ¬Ë of a inquiry. Quantitative research begins with an thought ( hypothesis ) , which is converted into informations through measurings and this at the terminal helps the research worker to pull decisions. Qualitative research, in contrast, begins with an purpose to research a peculiar country, collects ââ¬Å" informations â⬠( observations and interviews ) , and generates thoughts. The strength of the quantitative attack lies in its dependability ( repeatability ) -that is, the same measurings should give the same consequences clip after clip. The strengt h of qualitative research lies in cogency ( intimacy to the truth ) -that is, good qualitative research, utilizing a choice of informations aggregation methods, truly should touch the nucleus of what is traveling on instead than merely planing the surface ( Greenhalgh A ; Taylor, 1997 ) . Of the assorted methods of qualitative research, instance survey was found to the best suitable attack for this thesis. In most of the researches undertaken, if the research involves ââ¬Ëhow and why inquiries, they are more explanatory and likely to take to the usage of instance surveies. This is because instance survey trades with the operational links necessitating to be traced over clip, instead than mere frequences or incidences. For illustration, if one wanted to analyze how a community successfully thwarted a proposed main road ( lupo et Al, 1971, cited by Yin, 1994 ) , it is less likely to trust on a study or scrutiny of the records and might be better off making a instance survey. Harmonizing to Yin ( 1994, P13 ) : A Case Study is an empirical enquiry that investigates a modern-day phenomenon within its real-life context, particularly when the boundaries between phenomenon and context are non clearly apparent. Harmonizing to Schramm ( 1971 ) , the kernel of a instance survey, the cardinal inclination among all types of instances survey, is that it tries to light a determination or a set of determinations: why they were taken, how they were implemented, and with what consequences ( cited in Yin,1994, P12 ) . Harmonizing to Stake ( 1994, P236 ) , a instance survey is non a methodological pick, but a pick of object to be studied. As a signifier of research, instance survey is defined by the involvement in single instances and non by the methods of enquiry used. For the writer to accomplish the purpose of this thesis, a instance survey attack was utilized. this was achieved by making a instance survey on the Sydney 2000 Olympics. The ground behind taking the Sydney 2000 Games in peculiar is due to the congratulations Australia received from the universe ââ¬Ës touristry and featuring leaders for its attack to maximizing the touristry chances presented with Sydney ââ¬Ës theatrical production of the 2000 Olympic Games. The president of the International Olympic Committee ( IOC ) , Juan Antonio Samaranch, said the Olympic games had helped get the better of perceptual experiences that Australia was excessively far off for a vacation. It provided a sporting and cultural phase for all of the continents and boosted touristry in Australia. The type of instance survey used was explanatory instance survey as bing theory was used in order for the research to understand the planning and schemes used by Sydney for the games to advance it as a finish . Restrictions of the Case Study Approach Case surveies can be both descriptive and explanatory and are therefore considered a good attack for transporting out qualitative research. However, there are besides a few restrictions of the method attached to its usage. Yin ( 1994 ) states that instance survey ââ¬Ës findings can be generalised to theoretical propositions but non to recite frequences. Thus it is difficult to do general reappraisal from one instance survey. You read "Comparison Of Methods Of Research Education Essay" in category "Essay examples" Yin provinces ââ¬Å" possibly the greatest concern about the usage of instances is the deficiency of cogency of the instance study research â⬠( Yin, 1994, P10 ) . There ever remains a hazard of excessively much informations being gathered which may non be of existent relevancy to the survey. Case survey informations is time-consuming to roll up, and even more time-consuming to analyze. Hence, there is a reluctance to fund such a research if undertaken on a big grad uated table. A Yet cutting corners on either of these aspects is likely to earnestly weaken the value and credibleness of any findings produced. As yin ( 1994 ) pointed out instance surveies most frequently do non impart themselves to numerical representation. Hence the in deciding grounds and colored findings may act upon the waies of the findings and the decisions. Looking at both the strengths and failings of the instance survey method, and to obtain a clear apprehension of the instance, the writer besides collected informations utilizing primary research informations aggregation methods. This was done to obtain balanced descriptive and explanatory information for the research supported by grounds of informations collected through primary research. Primary Research Primary research is research used to roll up informations for a specific undertaking. Primary research involves really traveling out to the field and carry oning some type of study or fact finding probe among the existent people. Primary informations are normally gathered by the research worker via studies, experiments or observation methods. However, interviews and questionnaires are most popular and normally used methods of primary informations aggregation. The information therefore collected may be qualitative ( in the signifier of words ) or quantitative ( in the signifier of figure ) . Primary research was used in this undertaking to place the cardinal schemes of Sydney 2000 Games and the impact of these schemes on Australia ââ¬Ës touristry. Primary research was one of the most hard facets of this thesis. To roll up primary informations, the research worker used questionnaire technique to finish this thesis. The research worker explains below the different option techniques that were considered to roll up informations before zeroing down on the questionnaire technique. Interviews Veal ( 2006 ) is of the sentiment that interviews are likely the lone manner of obtaining a realistic image of the manner people view the topic of research. Howard and Sharp ( 1993, P139 ) suggest that most scientists would see the interview as supplying higher quality information that is free from bias than many other methods available to them. Types of interviews range from a to the full formal structured interview to an informal unstructured interview and semi-structured interviews. Structured interview A to the full structured interview is when the research worker has drafted a elaborate questionnaire. The inquiries are asked as per their order for every interview so as to follow a common form and guarantee that all the subjects have been covered. This method is like utilizing a questionnaire but by being face-to-face with the interviewee and there is besides a range of some personal interaction. However, due to a stiff construction and the form of inquiry that the interviewer follows, the interviewee has less range to set forth extra information. Unstructured interview An unstructured interview is based on a more flexible and adaptable attack. In simple words it is a little more than a conversation. In this method the research worker refrains from seeking to construction the interview. The interview keeps the conversation unfastened in order to derive more information. This method besides follows a fixed lineation but is non driven by prepared inquiries. There is a range for interview to spread out the issues or supply information of related issues as there is no limitation on the type of information provided. Semi-structure Interview This type of interview provides a balance between the other two signifiers of interview. It is basically conducted with the interviewee possessing and following a list of inquiries but at the same clip gives the interviewee the chance to show positions freely. A major advantage of this type of interview is its adaptability. Veal ( 2006 ) suggests that the usage of a checklist is more practical than to the full elaborate inquiries as the latter can disrupt the flow of interviewThere is a possibility that the interviewee might touch upon an of import and untapped facet of the researched issue and may alter the class of research in order to look into them. Bryman ( 2001, P313 ) suggests, ââ¬Å" qualitative semi-structured questioning tends to be flexible, reacting to the way in which interviewees take the interview and possibly seting the accent in the research as a consequence of important issues that emerge in the class of interviews. â⬠Interviews may be conducted face-to-face, via telephone or mail questionnaires. The method in which the interviews can be conducted depends on assorted factors like budget and clip. The research worker was in England to make the research between December and May, but the interviewees were from Sydney. Thus, sing the clip and budget restraint, the research worker used e-mail questionnaires as a method of carry oning the research. the research worker contacted the respondents via mail saying the intent of thesis and the method that will be followed to roll up informations. After a positive answer from the respondents, a questionnaire was prepared and was e-mailed to the research workers. Over a period of 5months from January 2010 to may 2010 assorted e-mail were exchanged back and Forth to roll up as much information as possible. The respondents were besides happy to give entree to assorted studies and paperss sing the subject researched. The type of inquiries that were usages were non-directive and unfastened to let more latitude for response, generalized and probed to do the respondents experience more comfy to talk freely. Questionnaires Questionnaires are a popular agencies of roll uping informations. They are utile when the research is to be undertaken on a big graduated table. They can be easy posted e-mailed and faxed and hence, have a broad geographic coverage. They are peculiarly utile when the respondents are willing to supply information but want to keep their namelessness at the same clip. Unlike other research methods, the respondent is non interrupted by the research instrument. Questionnaires reduceA interviewer biasA because there is unvarying inquiry presentation ( Jahoda, et al. , 1962 ) However, it may be hard to obtain a good response rate as frequently there is no strong motive for the respondents to react. It could be a delayed and a boring method when the research worker has to wait for the responses to be returned. One of the chief drawbacks of this method is that there is no control over who completes the questionnaire. Furthermore, respondent can read all inquiries beforehand and so make up one ââ¬â¢s mind whether to finish or non. For illustration, possibly because it is excessively long, excessively complex, uninteresting, or excessively personal. They do non give the respondents the freedom to set forth their positions and sentiments on the subject researched. Hence, it is hazardous and non wholly fruitful to utilize this method on its ain for informations aggregation. Recording Recording is a technique in which the research worker uses a tape recording equipment to enter the informations to be gathered. One of the of import things to retrieve in this method is that recording equipments can be used by the research worker merely if the interviewee/respondents agree to its usage. Gillham ( 2000 ) justifies the usage of tape-recorder as a method strongly recommended if the interviewee agrees. This helps the research to maintain a word by word history of the information the interviewee provides so as non to lose out any of import information. although it is said that the interviewee might experience uncomfortable with the usage of tape recording equipment, taping the interview aids the hearing procedure and provides an indifferent record of responses. Harmonizing to Gill and Johnson ( 1991 ) , in contrast to observe pickings, after a few proceedingss of taping, respondents become unaware of the recording equipment. However, one of the most of import grounds for the research non following this technique is due to the boring, time-consuming and dearly-won techniques of transcripiting the information recorded. Furthermore, Some people are really self-aware in forepart of cameras or audio recording equipments. Recording the session may make a barrier between you and them, and do them less blunt than they would otherwise be. Sampling Roll uping informations is clip devouring and expensive, even for comparatively little sums of informations. Hence, it is extremely improbable that a complete population will be investigated. Because of the clip and cost elements the sum of informations you collect will be limited it is really of import to take a little sample to roll up the information from. Harmonizing to Fink ( 1995, P1 ) ââ¬Ëthe best sample is representative, or a theoretical account, of the population ââ¬Ë . A right taken sample of an appropriate size will give consequences that can be applied to the population as a whole. Due to the characteristic and nature of this research, the writer chose to concentrate on the sentiments of the people who were in any manner involved with the 2000 Games. These were people in cardinal places from the Australian Tourism Commission, Tourism New South Wales and the Sydney Olympic Park Authority. The respondents were encouraged to talk as much, or every bit small as they wi shed bout the issue. One individual from the Australian Tourism Commission, two from Tourism NSW and one from the SOPA were interviewed. Besides in order to derive penetration on the research subject from an academic point of view, a A professor in the school of leisure, athletics and touristry at the University of Technology was besides interviewed. The research worker is of the sentiment that the respondents have provided the thesis with sufficient qualitative information to pull decision and the signifier recommendations. Not merely did the respondents respond to the inquiries e-mailed to them but they were really accessible and flexible in their attack and provided the research worker with a figure of of import paperss and studies which proved to be truly of import for the research. As the subject that the writer has undertaken to research is an event which has occurred in the yesteryear, there is already huge and utile stuff available through assorted beginnings like, journal articles, newspapers, media and cyberspace which can turn out every bit of import to the thesis. At this phase the usage of primary research methods is limited and the research had to utilize assorted beginnings of informations. This is called secondary research. Restrictions of primary research Primary research is considered to be one of the most widespread and effectual ways of garnering reliable informations. However, there are a figure of possible jobs and restrictions to utilizing primary research as a exclusive method of informations aggregation. The most of import job faced by the research worker was of clip money and distance. the research worker was based in Sheffield during the clip of this thesis and the respondents were from Sydney, hence, the research worker found it really expensive to really go to Sydney to carry on the interviews in individual and had to therefore usage alternate methods. Furthermore, clip restraint was another job the research worker faced. The research worker besides had troubles in contacting and acquiring the right people for garnering the information from. Sometimes it was non possible to speak to the right people and this created troubles in making a program for informations aggregation. And in conclusion, the research worker ain deficiency of experience in be aftering the research and the inquiries as good. If the inquiries did non cover all the of import issues, if they were non good phrased or if the research did non win to obtain the right replies and relevant informations, so the research would non supply qualitative informations and the research worker would hold to get down the whole procedure once more from abrasion. In malice of all these jobs, the research worker managed to garner the relevant information required. The contacts were obtained from an extended hunt and the respondents were besides really helpful and accessible and provided with a huge sum of informations to the research which proved really utile for the thesis. Secondary Research Secondary research occurs when a undertaking requires a drumhead or aggregation of bing informations. As opposed to primary research informations, secondary research informations already exist. in simple words, Secondary research is where you use information that other people have gathered through primary research. Normally, secondary research is used in order to place what earlier research workers have done and it besides helps to supply countries of possible probe which would be interesting and valuable. It helps to place possible spreads or logical extensions between old and bing work. . Sometimes secondary research is required in the preliminary phases of research to find what is known already and what new informations are required, or to organize research design. Harmonizing to HHHHHH Howard and crisp ( 1996 ) , secondary research means to seek for information that is given by other research workers and published in some signifier that is already accessible. The secondary beginnings could include old research studies, newspaper, magazine and journal content, and authorities and NGO statistics. In order to acquire a elaborate apprehension of the research issue information was gathered from newspaper articles, diaries and books which were available at the Sheffield Hallam university library. Besides on-line diary articles, intelligence web sites and computing machine database was besides used to garner information. The bing literature enabled the research worker to place any repeating issues or subjects. The books and diary articles, in peculiar, helped the research worker to make a background for theoretical cognition. Media Events like the Olympic games are a universe phenomenon and are therefore captured by the universe media. These events attract a batch of promotion from the imperativeness. For this ground, newspapers, magazines and telecasting were of great significance to the research, non merely because they provided with tonss of up-to-date information but besides because they contained interviews, and articles with different attacks on the research topic. These interviews provided information on how the games were perceived by the locals, the promotional schemes adopted. Books and Diaries Books and diaries in general are considered to be a good beginning of information in any research. They are utile in peculiar to organize the theoretical background of the research. The diaries contain documents written by pervious research worker on the researched subject. They form a background for research and are besides utile in taking any irrelevant points or issues in the bing research worker and frailty versa. In this research besides, the research worker has made extended usage of book and diaries in every phase and chapter of the thesis. It helped the research worker to acquire a good apprehension of the subject. These were readily accessible at the Sheffield Hallam university library. Computer Data Base ( Internet ) Harmonizing to Howard and Sharp ( 1996 ) , computing machine database is a beginning of considerable importance. There are a figure ofA hunt enginesA that can be utile in seeking the cyberspace, The cyberspace has the advantage that it is easy to entree, it has tonss of information, and it is sometimes the most up-to-date beginning of information.A Databases for merchandises and services are available online. These databases like EMRALD are maintained by dedicated international organic structures and are besides developed straight by universities and other research establishments. The subject of this thesis is an event which occurred in the yesteryear ; hence, the electronic database was of huge aid for this thesis in peculiar. The research worker used Emerald and Google Scholar to entree online articles and documents of trade diaries. Handiness to the information was reasonably easy. However, due to the huge sum of relevant and irrelevant informations available online it was necessary to be critical of the cogency of any information available online. Restrictions of secondary research In malice of the easy handiness and the sum of informations available through these secondary resources, there are some restrictions to this signifier of research as good. The most of import is the inquiry on the quality and relevancy of the available informations. Data available through these resources is of the work and researches done in yesteryear and might non be up-to-date information. There are besides several contrasting informations available online which make it more hard for the research worker to critically analyze the information and rely n his inherent aptitudes with respects to the usage of this information. This can sometimes take to irrelevant information being included in the research and the research might besides lose its path. Many times a research worker finds that research that appears assuring is in fact a ââ¬Å" teaser â⬠released by the research provider. This frequently occurs when a little part of a survey is disclosed, frequently for free, but the f ull study, which is frequently expensive, is needed to derive the full value of the survey. Keeping all these facets in head, the research worker has tried her best to utilize the most recent publications and articles from books, diaries and magazines in order to cover all the facets of the subject researched. The research worker tried to look for the most up-to-date information available. Datas Analysis Sum uping and analyzing the information was one of the most hard parts of the thesis. Harmonizing to Veal ( 2006 ) the research worker is faced with practical jobs of how to pull off the pile on interview notes and transcripts. There are many different types of qualitative informations analysis methods. The type of analysis used depends on the information collected, the purpose of research and the clip and fundss available. For the informations to be analysed, it must be put in simple words which can be easy analyzed. This might be in the signifier of transcripts from the interview, notes and replies from the open-ended questionnaires and the journals and diaries maintained by the research worker. When multiple instance surveies are used to roll up the information and where the research worker has to happen and analyze recurrent subjects in each survey the research worker can utilize thematic analysis. However, where the focal point is on secondary stuff in general and media analysis in peculiar, content analysis method is used. Contented analysis is a technique that has applications in touristry research ( Finn et al, 2000, P135 ) . It is a technique that is applied to non-statistical informations and allows analysing it in a systematic manner. A Using this method the research worker surveies the transcripts in item and assigns codifications ( figure or words ) , to specific characters within the text.. The research worker may already hold a list of classs or she may read through each transcript and allow the classs emerge from the information. This type of analysis can be used for open-ended inquiries which have been added to questionnaires in big quantitative studies, there fore enabling the research worker to quantify the replies. This is farther supported by Finn, who states that content analysis is a quantitative agencies of analysing qualitative informations ( Finn et al. , 2000, P134 ) . Decision The chapter has discussed the informations aggregation procedure and methods used by the research worker to garner information. In order to garner the most relevant and appropriate information, the research worker has made usage of both primary and secondary methods of research. This has helped the research worker to cover all the of import facet and to derive both practical and theoretical cognition. The research was completed in a period of four months. The following chapter take a expression at the consequences and analysis of the information gathered. How to cite Comparison Of Methods Of Research Education Essay, Essay examples
Friday, December 6, 2019
Sphere By Michael Crichton Essay Research Paper free essay sample
Sphere By Michael Crichton Essay, Research Paper The Sphere by Michael Crichton Writer # 8217 ; s sentiment If up until now I have been stating about each book that it was the best book I have of all time read, I was lying # 8230 ; because compared with this book they all come down to nil. For four yearss I have been reading non halt all 370, or so, pages and that # 8217 ; s a first for me in English or Hebrew. Highly recommended to all si-fi fans out-there. The Plot I find it difficult to distill the secret plan of 370 pages to merely a few pages, nevertheless, I will seek my best. It all starts in mid-ocean, a group of scientists, each a specializer in his field, is sent down sea to look into a unusual determination. The undertaking is classified # 8212 ; top secret no information must flux in or out. It turns out that the u. We will write a custom essay sample on Sphere By Michael Crichton Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page s naval forces had stumbled on to a unusual trade of some kind. The navy believes that it is a infinite # 8212 ; trade non of earthly beginning, as the engineering used to build the trade is yet unknown to worlds. The group, as it turns out, is a portion of a undertaking that Norman ( the psychologist in the group ) was assigned to, old ages before by the ground forces, in instance of first contact with foreign existences. They are now out to carry through their mission with great uncertainnesss. Throughout the book Crichton raises some really interesting inquiry about the possible brush with foreign existences. Questions like how is it possible to pass on with a being that might be four dimensional and has a wholly different construct of the existence. Or what if the foreign breaths nitrile or some other toxicant gas and might unwittingly kill worlds non understanding the construct of Life. Back in the narrative our heroes travel aboard the ship and to their astonishment they find English encoding that suggest that its beginning is earthly. They eventually figure out that the ship is likely from the hereafter and that due to a malfunction something happened to it and it got back in clip to our clip and Er a. In the ship they find futuristic appliances and among all the common human-made material they see, they find a strange sphere which with no uncertainty is alien-made. They theorize what it is and what is its intent and how to open it, but they can non open it in any manner. Until the mathematician succeeds in opening it. He goes in and the sphere stopping points behind him. They subsequently find him lying on the floor disoriented and baffled, but still they do non cognize how to open it. It seems that the mathematician forgot how he had opened it. Soon after that incident unusual things start to happened. Suddenly the ocean floor that was wholly dead is covered with plantation, proms and lobsters begin to deluge the H2O with no ground and so vanish. And so the elephantine calamari onslaughts start and people from the under H2O installing start to decease. As the secret plan continues Beth the animal scientist figures out how to open the domain and goes in. She besides comes out confused and does non retrieve a thing. Through deductive logical thinking they figure out that the things that are go oning to them are really the merchandise of their the ideas. But by the clip they figure that out merely three of them are left alive. And because of the tremendous powers given to them they get paranoid and non good balanced and that creates greater jobs. In the terminal they escape the under-sea installing and caput back up. The thing that bothered most the mathematician is that despite the fact that they found the ship from the hereafter, they did non happen any grounds that the people who built it had seen something like it before. Which meant, that the ship was likely neer discovered in the yesteryear. Which meant that they likely all died before acquiring word on the ship. And he could non calculate out how that could go on. They eventually deduce that if they all combine powers and utilize them in order to bury what they saw and alter the physical grounds excessively, it could reply that paradox. And of class they do that and they live merrily of all time after. Bibliography # 8230 ; ..
Friday, November 29, 2019
Mandatory Reporting free essay sample
The mandatory reporting law is a great law that is in need of major revisions. The role of the doctor has been clear and distinct in my life. I have always looked at my doctor as a person who assists me with health issues. But somewhere down the line, the role of the doctor has changed. Doctors are taking on the decision making of the patient. In a recent bill that was passed, practitioners are required to report any physical injury that is due to firearm, assault, or abusive conduct. This law is called, ââ¬Å"The Mandatory Reporting Lawâ⬠, in which it aids victims of domestic violence. We will write a custom essay sample on Mandatory Reporting or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page However the word ââ¬Å"aidâ⬠has speculated through many people in examining this law. Mandatory Reporting has become a big controversial topic, in which people are investigating the pros and cons. To understand the pros and cons of the Mandatory Reporting law it is important to address the historical and social relevance of domestic violence. Domestic violence has been an ongoing problem for centuries. Historically men would have power over their wives. Women would be beaten for not having the dinner made or not taking part in sexual activities. Domestic violence was very common, in which the man would usually be the batterer and the woman would be the victim. Taking into consideration that women had no rights or power, they were subject to the abuse, society treated spousal abuse as a normal way of lifeââ¬âdomestic violence was not seen as a crime. According to Dr. Mitizi Krocker (Roan, 1996) many practitioners and police felt that it was not their job to assist in domestic violence situation. As years went by, women were starting to gain rights. Women started talking about their abuse and finding the courage to leave. As a result, resources were developing for victims of domestic abuse. A resource that was developed was the Mandatory Reporting Law. The Mandatory Reporting Law stemmed out of the ideologies of society not caring or taking domestic violence seriously. There were too many batterers getting off the hook and or not being caught. The Mandatory Reporting law would assist in building a stronger case for victims and creating a method for batterers to be prosecuted. Mandatory Reporting was introduced by Jackie Speier (Assemblywoman) in the O. J. Simpson era. In 1994, as Americans tuned into the O. J. Simpson case, domestic violence was becoming an interesting subject. People were eager to find out if Nicole Simpson (a battered wife killed) would be found justice. When the verdict was reached, domestic violence was confirmed as an insignificant matter. Unfortunately, O. J. Simpson was released and dropped of charges because of the lack of evidence in the defense of Nicole. Mandatory Reporting has been a tool that can help in the defense of a victim. Many victims are abused and never tell anyone and or visit a practitioner. As a result, when the victim appears in court they usually have no solid proof on the accusers side. With the help of Mandatory Reporting, practitioner are required to document and make a police report, in which hard core evidence is produced. Kramer (one of the victims in Smith article) suggests that mandatory reporting is an excellent resourceââ¬âwomen that are victims of domestic violence are forced to report. She further explains that women who have come into hospitals have altered the truth about their injuries. Mandatory Reporting will confirm that these women will be taken care of, in regards to the batterer being confronted. Mandatory Reporting is available at any licensed doctor who performs medical services to the victim. The practitioner is automatically required to assist in domestic abuse cases. The question to be raised is what happens when victims do not want to be reported? Under the law practitioners are not required to inform the patient of the reporting. Victims are reported rather than agree or disagree to the terms. The doctor is obligated to report any suspicious behavior leading to domestic violence. As a result, Mandatory Reporting is being utilized frequently. However, many victims are catching on to the law, in which they are steering away from their doctors. Victims are afraid of the action that the law might take. The law is utilized daily to victims who come into the hospital with an injury. Practitioners who fail to report can result in a misdemeanor charge and or fine. Mandatory Reporting has the intended benefit. Critics have mentioned that Mandatory Reporting was designed to catch the battered and not worry about the well being of the victim. The intended effect has been accomplished through evidence; there has been an increase in prosecuting the batterer. However, an unintentional effect has been the decline in women going to their doctors for medical assistance. Immigrant women have really declined in seeking medical attention because they are scared to be removed from America. There has not been any evidence that has proven that mandatory reporting is beneficial to the victimââ¬â¢s safety. Beverly Upton states, ââ¬Å"In some counties, officers show up at the victims home and arrests the batterer upon receiving the report from the practitioner this can increase danger for the woman. The law did not take into consideration the danger that some victims would encounter, when their spouse would be released from jail. Many batterers will leave jail, angry at their spouse for reporting the abuse. As a result, victims would be severely beaten. The victim would be afraid to seek medical attention again. Lynn Smith explains how many women are going to shelters for medical attention. Another unintended effect is that in some cases doctors are put into an awkward position, where they are faced to report something that their patient asked them not to do. The law is relevant but not accessible to marginalize populations. What the law brings to victims in a sense of loss freedomââ¬ânot being able to make decisions about their personal wellbeing. The worst thing that could happen to a person is to take their freedom away from them. When people realize that their freedom is limited, few people will conform. Victims should have the right and support to keep their injuries confidential. A third party should not be involved in a situation, where the victim has refused the service. Adults are being treated as if they have no voice in regards to their life. Mandatory Reporting is not accessible to the marginalized population because it does not take into consideration all of the effects of the law. Mandatory Reporting is an excellent resource; however there are some things that could be modified. According to the Association of Womenââ¬â¢s Health Obstetric and Neonatal Nurses (n. d. , p. 1), mandatory reporting should not be modeled from child abuse lawsââ¬âthese victims are adults who are capable to make decisions for themselves. I believe that victims should be able to have the right to decide whether they would like to report their injury or not. Practitioners do not know the circumstances of the particular family. Who gives them the right to decide on a familyââ¬â¢s wellbeing? In some cases there are children involved. What happens to a child if they see one of their parentââ¬â¢s arrested? How will the child cope with not having a father or mother around? The law also does not take into the consideration of finances. If a family depends on one another for financial support, how will the family cope with a missing income? These are all question that should have been taken into consideration when the law was written. Beverly Upton suggests that there is a need for a change in the language if we would like to keep the law active. The language of the law is not formatted for victims to feel safe on reporting to their doctors on medical situations. The whole notion of doctors composing a report because of suspicion has also been a red flag. The word ââ¬Å"suspectâ⬠is not accurate enough for me, because speculation can be wrong. A woman could have encountered a black eye because she was hit with a baseball. What does the doctor do, if there is a false report made? How will a family cope with a false arrest on a member of the family? I project that a victim must admit to being abused before the practitioner takes any additional steps. If the practitioner believes that the victims injuries were related to domestic abuse, the Practitioner should offer a class or counseling for the victim. As Lynn Smith (1995) states, ââ¬Å"it is unfortunate that law requiring reporting came before the one requiring training. â⬠Doctors should be required to take part in training, where they are taught to address and understand domestic violence to a patient. Practitioners should be able to recommend proper support when a victim is under abuse. In some cases, reporting their alleged abuse to the police is detrimental to the victim and or their family. The Mandatory Reporting Law has benefited and hindered victims of domestic violence. I agree with Beverly Upton, that there should be a change in language. The law is a good attempt to cracking down on domestic violence, but it leaves out the importance of the situation; which is to protect the victim. Mandatory Reporting should not be a tool to capture batterers, but a tool to assist and support victims. Jackie Speier must have kept in mind the safety of the victim. In writing a law, one must take into consideration all of the possibilities that may occur. The law benefits the victims that want to escape from their batterer, but it does not assist victims who are still in denial about their abuse. Many victims have trouble realizing that they are in a bad situation. Victims might feel that their abuse is caused by their behavior, or some might be victims of abuse for years in which they see nothing wrong with it. Before a judgment is called about a victimââ¬â¢s situation, there must be a full analysis of their circumstances. One must have a good insight on her life, before making judgment. There are too many risks that can take into place, if the right choice for the victim is not made. Mandatory Reporting becomes a controversial topic because there is a conflict with the purpose of the situation; some people believe that the end to domestic violence is capturing the batterer, as the opposing view would believe that the end to domestic violence is to remove the victim out of the situation in the best interest of the victim. The key to eliminating domestic violence is taking into consideration that everyoneââ¬â¢s situation is different. There might be a need to call the police and have a batterer arrested in some situations in which the victim feels that he/she has had enough. In other cases the victim might not want to leave, in which counseling would be implemented to get him/her in the mind frame to leave their situation. Domestic violence is a sticky subject, in where it varies from place to place. Mandatory Reporting will not encompass all of the needs for victims of domestic violence; instead it will serve as an aid to a certain population. Until Mandatory Reporting is modified, the law will remain controversial in attempts to addressing domestic violence.
Monday, November 25, 2019
buy custom Business Environment essay
buy custom Business Environment essay A price maker is a company or an individual in a market that has the power to influence the price of a certain good due to monopoly or the high quality of their product. Price makers usually do not have competitors, and if they have their products are more valued. A price taker is usually a company or an individual who does not have any influence in the market price of the goods. Most investors are usually price takers, as they have to accept the price set in the market in order to sell their products. Price takers contrasts with price makers. Roles of competitive dynamics within the context of strategic business planning Competitive dynamics is the study of how companies take actions in a market in order to gain profits or improve their products or services. These actions usually affect the industry in different ways, as companies tend to compete. One of the most pivotal roles in competitive dynamics is usually to gain profits. Companies in a monopolistic market tend to strategize to make profits just like the market leader. Profits made by the market leader usually motivate the other companies to take action, which can be termed as creative destruction. Secondly, companies will usually want to introduce a new product in a firm in order to keep the competition. When one company tends to be running he market, the others may have to introduce a new product to create competition. This new product will create curiosity among the buyers who will want to try it thus creating competition for the old product. Considerations to be made in a highly competitive environment where firms are price takers Firstly, the supply and demand of a product should be considered in a market environment, which has many price takers. Supply and demand usually determine the profit that the firm would make at the long run. An individual or a firm should not risk joining a price takers business environment that has low demand. Inflation entails the general rising of price of products in a business environment. A rise in price will always affect the purchasing power of products by the buyers. In a price takers business environment, this may be tricky and; thus, should be genuinely considered. Lastly, market policy should also be put into consideration. It is somewhat risky businesswise being a price taker. Considering this, a person should study the policies put into place before venturing into a price taker market. Considerations to be made in a highly competitive market environment where firms are price makers Firstly, the demand of the product should be considered. In aa market that has price takers, it is usually hard to convince the buyers why they should buy your product on whatever price you have set. The price makers should have the persuasive power in order to gain more customers in the market. Secondly, branding is usually an essential thing to be considered. The high competition calls for a unique branding so that you can appeal to a larger audience. In addition to branding, price makers environment needs a firm to consider high marketing of a product and create product features. Furthermore, an individual or a firm has to learn about the market needs. At some point, some market environments can be certainly resistant to change or introduction of a new product. Price makers should always consider if the buyers may need a change or not. Lastly, factoring the gross profit is essential. Gross comprises of the resulting money excluding the production cost. In a highly competitive market with price makers, one may also experience high losses due to lack of consideration of the gross margin. In conclusion, it is more advised to be your own price maker rather than the price so that you can set price anywhere on the demand curve. Various points should be considered in environments that comprise of price makers and price takers. Such include the market policy, inflation, and branding. Buy custom Business Environment essay
Thursday, November 21, 2019
Methodology chapter in my dissertation Essay Example | Topics and Well Written Essays - 500 words
Methodology chapter in my dissertation - Essay Example Interpretivism denotes a research method that lays importance on deductive reasoning and is thus in contrast to positivism. For the deductive reasoning process, the researcher interprets data keeping in mind the context and meaning of the observed phenomenon, and hence is a qualitative process (Carson et al., 2001; Denzin & Lincoln, 2003). Pragmatism denotes an attitude that reflects efficiency and utility (Thayer, 2011). The researcher interprets the data in a manner that serves his purpose best. In this sense, it can be said that pragmatism combines both qualitative and quantitative aspects of data collection and interpretation. Investment decision in the selected chemical companies is to be based on a analysis of the data of each firm at micro-level, in the macro-context of the chemical industry. It entails both quantitative and qualitative analysis. Hence, the Researcher is choosing the pragmatism methodology for this
Wednesday, November 20, 2019
Assess the presidency of George Washington and John Adams in terms of Essay
Assess the presidency of George Washington and John Adams in terms of domestic and foreign policy, as well as the challenges they faced when they became president - Essay Example s plan, which had far reaching impacts how the national debt, excise taxes, protective tariffs on imports, and as far the management of the national purse, national bank, was to be handled (Ferling (a)11-23). Washington was a unifying factor and rallied the nation towards avoiding war, a fact that destabilized the strength of the nation regarding foreign relations. His first major challenge touched on his conduct with reference to Jayââ¬â¢s Treaty, signed with England-a treaty that infuriated the public leaving a trail of questions to the extent to which United States would be an influencing agent in international affairs. Nevertheless, putting into practice the Hamiltonââ¬â¢s plan strengthened economic prospects domestically. He did quell the Whiskey Rebellion, which was sparked off by the levying of excise taxes, reminding people that federal concerns superseded local thoughts in the new republic. Generally, Washingtonââ¬â¢s tenure was a success as he steered the young nat ion through a delicate beginning (Ferling (b) 55). Reeling under the influence and successes of predecessor Washington, John Adams assumed power promising to modernize the US economy through promotion of education as well as keeping peace with foreign powers. However, his tenures ran into trouble with factions supporting US-British alliance and those sympathetic of France in a war that began in 1793 between the two neighbors. Stymied by a congress controlled much by his opposes, Adams stood his ground, devoting his best to the development of his country (Ferling (b) 87). Wearing Washingtonââ¬â¢s shoes, he knew too well the unpreparedness of his nation to fight outside wars. As such he sacrificed his popularity to settle ââ¬Å"quasi-warâ⬠with France through his son Quincy Adams (Grant 71). His best remembered as a diplomat who contributed immensely in shaping Americas foreign policy in line with ardent nationalist policies tailored towards Americaââ¬â¢s republican values. His administration upheld and
Monday, November 18, 2019
Renal transplants Research Paper Example | Topics and Well Written Essays - 750 words
Renal transplants - Research Paper Example During this time, approximately one third of potential living donors are unable to donate to their potential recipients due to ABO or antigen incompatibility. Kidney paired donation (KPD) and kidney list donation (KLD) were the alternative options for candidates with incompatible donor (McKay, 2010, 103). The first KPD transplant was performed on South Korea in 1991. The United States performed its first KPD transplant in 2000 in Rhode Island Hospital while the first KLD occurred in England in 2001 (McKay, 2010, 104). The kidney is the most commonly transplanted organ in the world with more than 160,000 persons in the United States living with a transplanted kidney by the end of 2008 (Shoskes, 2011, 154). But despite this number, persons needing kidney transplantation still increases and a relative scarcity in terms of resource arise. A complete array of information about kidney transplantation was included in the databases of U.S. Renal Database System (USRDS), Scientific Registry o f Renal Transplants Recipients (SRTR), United Network for Organ Sharing (UNOS), and Collaborative Transplant Study (Shoskes, 2011, 154). Procedures Before a patient undergo kidney transplantation, a series of laboratory tests and procedures are needed to perform and complete. Matching is the key tool is successful transplantation. The donorââ¬â¢s organ should match the recipientââ¬â¢s body in terms of ABO and antigen incompatibility to avoid risks of rejection. The patient with end-stage renal disease may choose from treatments such as peritoneal dialysis, hemodialysis, or transplantation. Transplantation is done if the patient wants the treatment or if according to disease severity, requires the transplantation procedure. The surgical team involves the pre-emptive living donor (LD) transplantation to minimize pre-operation transplant list and maximize operative choices. The LD transplantation decreases the risk of acute tubular necrosis due to ischemia, increases potential fo r matching, and offers opportunity to initiate and optimize immunosuppressive therapy, thereby reducing acute rejection episodes (McKay, 2010, 17). Background regarding the quality of the donorââ¬â¢s organ was predetermined and positive outcome was expected. Then, the transplant team prepares the patient for the procedure. However, if the patient has superior vena cava syndrome due to an AV graft in the previous hemodialysis, a different procedure is done by the nephrologists and cardiologists. The organ transplantation is divided into five separate procedures (McKay, 2010, 18) and discussed as follows: 1) Preparation ââ¬â the surgeon discuss to the patient the surgical procedure. General anesthesia is introduced after and intraoperative measures are implemented. 2) Exposure ââ¬â after prepping and draping, incision is made in the right or left lower quadrant. 3) Vascular Anastomoses ââ¬â venous anastomoses first and arterial anastomoses must be last to avoid complica tions of bleeding and thrombosis. The kidney is chilled and topical iced is used liberally. Clamp is placed in the renal vein. 4) Ureteral anastomoses ââ¬â is the preferred method to establish urologic continuity 5) Closing ââ¬â wound/skin closure and measures to prevent complications. After completion of all the procedures in kidney transplantation, the patient is placed in the recovery area and post-operative interventions are applied. Health providers monitor for rejection signs post-operative
Saturday, November 16, 2019
Literature Review on Breast Cancer Research
Literature Review on Breast Cancer Research Aashiyana Vadsariya Introduction à Evaluation is a process of reviewing of any programme, project or policy, its design and results. The main objective of doing evaluation is to measure the effectiveness of the programme or policy, its impact and sustainability. Evaluation helps to solve the problem as well as to build the knowledge and it enhances the decision making process and thus evaluation is an important part of quality improvement (The Health Foundation, 2015). There are different types of evaluation such as formative evaluation, outcome evaluation, process evaluation, impact evaluation and economic evaluation which can be conducted to ensure programme activities. Moreover, vigorous evaluation provides not only about intervention that is worked but it also describes why and how that allows an individual to discover new interventions in healthcare settings. Additionally, it involves ethical approval, collection and analysis of data (Centre for Disease Control and Prevention, 2015). Background of the study According to Ministry of Health (2015), Breast cancer is the third most common cancer in New Zealand. It causes more than 600 deaths every year. Breast cancer is most common over the age of 50 and risk of developing breast cancer increases as age increases. Approximate 80% of women are over 50 years of age who died because of breast cancer. There are 8 cases diagnosed with breast cancer every day, out of them 1 will be Maori and pacific women who are at higher risk of dying from breast cancer. Maori women are more likely to develop breast cancer about 33% than non-Maori women (The New Zealand Breast Cancer Foundation, 2013). National Breast Cancer Foundation describes certain risk factors which increases the chance of developing cancer such as age, gender, positive family history, personal health history and genetic factors. Ministry of Health have started the programme called Breast Cancer Screen Aotearoa to fight against breast cancer by providing free breast screening to the women aged 45-69 years of age. The main objective of this programme is to reduce number of deaths from breast cancer by providing them regular screening (National Screening Unit, 2014). This paper will critically evaluate five (5) research papers of breast cancer that were published worldwide focusing on their significance, methodology and quality and will analyse the four (4) audit and evaluation processes and approaches such as outcome, process, impact, economic evaluation from the evaluated breast cancer research papers. Economic evaluation of the breast cancer screening programme in the Basque Country: retrospective cost-effectiveness and budget impact analysis. This study evaluated the breast cancer early detection programme in Basque country in relation to cost effectiveness and budget impact from 1996 to 2011. The researcher has used population level and single cohort analysis methodology. Annual costs were taken into consideration for budget impact analysis. The results of this study showed that total cost of breast cancer screening program was 1,127 million euros and 6.7 million QALYs over the lifetime of the target population, bringing about a pickup of 8,666 QALYs for an extra cost of 36.4 million euros (Arrospide, Rue Van Ravesteyn et al., 2016). The researcher has finally summed up that the breast screening programme ran in Basque country was cost effective and as per determined budget impact. This study contributes to measure cost effectiveness of this breast cancer screening programme and evaluate its budget in order to decide the future of this programme. A review of breast cancer awareness among women in India: Cancer literate or awareness deficit? This study was conducted to assess the level of awareness about risk factors leads to breast cancer in Indian women and healthcare professionals through literature review. The researcher used bibliographic databases such as MEDLINE, SCOPUS, Cochrane database of systematic reviews and Cumulative Index to Nursing and Allied Health. The findings of the research suggested that total 7066 number of women between ages of 15-70 years reflected different level of awareness on risk factors such as family history (13-58%), obesity (11-50%) and reproductive history around 1-88% (Gupta, Shridhar Dhillon, 2015). Low cancer literacy on risk factors of breast cancer among Indian women and healthcare professional noted during research process irrespective of their socio-economic status and education was (Gupta, Shridhar Dhillon, 2015). This study contributes to aware the nation about programmes and to improve the cancer literacy rate in India by engaging various stakeholders of society and health system. National Breast Cancer Screening Programme, Singapore: Evaluation of participation and performance indicators. The researcher evaluated participation rates and performance indicators in the National Breast Cancer screening programme in Singapore during this study. This study involved the use of retrospective evaluation approach by using the BSS system and the Singapore Cancer Registry data on women aged 40-69 screened in period of 2002-2009. The results showed that participation rate was more than 10% since 2005 and performance indicators (such as screen detection rates, small tumour detection rates, recall rates, accuracy and interval cancer rates were improved from 2002-2006 to 2007-2009 (Loy, Molinar Chow, 2015). This study indicated that there is room for improvement in participation rate in breast cancer screening in Singapore by providing screening packages, reducing screening cost and targeting underserved populations. This study contributes to improve the participation rate of breast cancer screening programme for the effectiveness of the BreastScreen Singapore by providing training opportunities to the healthcare professionals. Impact of mammographic screening on ethnic and socioeconomic inequities in breast cancer stage at diagnosis and survival in New Zealand: a cohort study. This study was conducted to determine the impact of differences in rates of mammographic screening on inequities in cancer stage at diagnosis and survival between Maori and Pakeha women. The researcher used Waikato Breast Cancer Register and the National Screening Database to compare the data for diagnosis and survival between screen detected and non screen detected breast cancer by socio-economic status and ethnicity. The results indicated that there were lower rate of screen detected cancer in Maori women and also they had lower 10 year breast cancer survival rate as compared to Pakeha women (46.5% vs. 73.2%) (Seneviratne, Campbell Scott, et al., 2015). The study determined that lower rate of screening detected breast cancer was the important reason for lower rate of survival for Maori women in comparison to European women. This study contributes to assess the screening rates, to improve the survival for Maori women and to reduce inequity for the breast cancer survival among Maori and New Zealand European women. An ongoing case-control study to evaluate the NHS breast screening programme This research was carried out to evaluate the national breast screening programme in England. This study estimated the effects of the national breast screening programme in regards to breast cancer incidence, mortality and over-diagnosis of breast cancer. The researcher has used quantitative methodology and retrospective case control study to describe the policy on mammographic screening. The findings suggested that there is decrease in incidence by screening, excess risk of disease in screened ages from 47-54 years and potential deficit in risk seen between the ages of 65-69 years up to 15 years of screening (Massat, Sasieni Parmar et al., 2013). This research concluded that case control evaluation strategy relates the clinical endpoints to the screening history. This study contributes to measure the effectiveness of the national breast screening programme in England, benefits on mortality from and on incidence of invasive primary breast cancer and harms from over-diagnosis. Audit and Evaluation processes Economic evaluation of the breast cancer screening programme in the Basque Country: retrospective cost-effectiveness and budget impact analysis. Economic evaluation is one of the most important forms of evaluation which measures the expenditure and their consequences and also describes about allocation of the resources (Cunningham, 2000). In this research, the researcher has used economic evaluation to measure cost effectiveness of the breast cancer screening programme in the Basque Country from 1996 to 2011. This study was mainly based on budget impact analysis and retrospective cost effectiveness evaluation to determine what resources are being used in programme and their costs as compare to outcomes (Arrospide, Rue Van Ravesteyn et al., 2016). Economic evaluation in this research took a step back and looked objectively in context to appropriate role and use of cost effective analysis in order to determine the outcome of the breast cancer screening programme. This research revealed that the breast screening programme was found to be cost effective within determined budget impact (Arrospide, Rue Van Ravesteyn et al., 2016). A review of breast cancer awareness among women in India: Cancer literate or awareness deficit? Outcome evaluation identifies the effects of the programme in target populations by reviewing effectiveness of programme (Centre of Disease Control and Prevention, 2015).The researcher used outcome evaluation to determine awareness levels of risk factors for breast cancer among women and healthcare professional in India. This outcome evaluation was undertaken through a structured literature review by using bibliographic databases journals (Gupta, Shridhar Dhillon, 2015). The main purpose of this outcome evaluation in this study was to assess the cancer literacy among women in India because of the rising incidence and mortality rates from breast cancer. Furthermore, the researcher concluded that there was a low literacy rate among Indian women regarding risk factors that causes breast cancer through this evaluation study (Gupta, Shridhar Dhillon, 2015). National Breast Cancer Screening Programme, Singapore: Evaluation of participation and performance indicators. Process evaluation was conducted to assess how this breast screening programme is being implemented whereas outcome evaluation was conducted to measure the outcome and effectiveness of this programme (NYS Health Foundation, 2016). The researcher used outcome and process evaluation to evaluate the participation rates and performance indicators in the National Breast Cancer Screening programme in Singapore. Data was collected on women aged 40-69 screened during period of 2002-2009 from the BreastScreen Singapore and Singapore Cancer Registry (Loy, Molinar Chow, 2015). Process and outcome evaluation was helpful to determine the rate of participation and performance indicators, to measure the quality of the programme delivered and to assess the effectiveness of the breast screen Singapore programme. This evaluation allows researcher to examine the performance of this Breast Screen Singapore programme and to recommend further changes if required. Impact of mammographic screening on ethnic and socioeconomic inequities in breast cancer stage at diagnosis and survival in New Zealand: a cohort study. Impact evaluation measures whether the programme is effective in achieving its goal or not. Generally, it identifies long term effects and changes in outcome based on cause and effect analysis (Collins, 2017). The researcher utilised impact evaluation to determine the impact of mammographic screening on ethnic and socio economic inequities in breast cancer stage at diagnosis and survival between Maori and European women. The researcher collected data by using National Screening Database and Waikato Breast cancer Register (Seneviratne, Campbell Scott, et al., 2015). Impact evaluation was carried out to measure the impact of screening programme on ethnic and socio economic inequities for breast cancer survival rate which can be useful for government to take necessary actions and to form policies in healthcare settings to reduce inequalities in health. An ongoing case-control study to evaluate the NHS breast screening programme Process evaluation determines the effectiveness of the programme and how well the programme is working (Community Interventions for Health, 2017). The researcher used process and impact evaluation to evaluate the national breast screening programme in England. Impact evaluation was helpful to identify the impact of breast cancer screening on breast cancer incidence and mortality. Data was gathered by traditional retrospective case control study of deaths and incidences cases of breast cancer in England within 2 years of period during this ongoing evaluation (Massat, Sasieni Parmar et al., 2013). The main purpose of impact evaluation is to see that breast cancer screening programme is working effectively and is doing well than harm. Process evaluation can help to ensure that the breast screening programme continues to deliver the predicted health benefits and potentially improve the programme by assessing the good and bad practices. Evaluative Model The (CIPP) model The CIPP evaluation model is developed by Stufflebeam in 1983 which provides comprehensive framework for the evaluation of the programmes. The CIPP model consists of four components which are context, Input, Process and product evaluation. The CIPP model mainly focuses on improvement of the programme rather than justifying about the programme. The main purpose of this CIPP model is to offer critical and rational basis for the programme decision making by applying different aspects of this evaluation model according to the needs of decision makers and programme activities based on the planning and implementation for the continuous improvement of the programme (Kellaghan Stufflebeam, 2003). The context, input and process evaluation approach are based on formative evaluation whereas product approach is useful for summative evaluation study. The four elements of the evaluation model must be taken into consideration otherwise it could reduce the effectiveness of the project. The context evaluation study can be conducted when a new programme is being planned which helps to identify the program goals and objectives by assessing needs whereas the input evaluation study can be conducted during resource allocation to assess the feasibility or the cost effectiveness of the alternate approaches. It provides systematic approach to programme design and helps the evaluators and experts to develop the programme which is most likely to work better (Frye Hemmer, 2012). Source: Adapted from Stufflebeams CIPP Evaluation Model (1983). Retrieved from http://arcmit01.uncw.edu/jonesi/Evaluation.html The process evaluation helps the evaluators and stakeholders to assess the implementation of the programme and to interpret the outcomes of the programme through document review, observation and participant interview. On the other hand, the product evaluation is similar to outcome evaluation which focuses on assessing the outcomes of the programme including positive or negative, short term or long term outcomes. In general, the CIPP model provides information about improvement of the programme, interpretation of the programme outcomes and information for accountability. However, careful planning is needed while applying this model. This model is useful for retrospective evaluation of a completed programme (Kellaghan Stufflebeam, 2003). This evaluation model can contribute to measure the effectiveness of the breast cancer screening programme run by Ministry of Health in New Zealand. The four elements of the model can be used to improve the programme by identifying the non-compliance of women for the breast screening programme. Auditing and evaluating the breast cancer screening programme helps to know the barriers and promote the awareness regarding breast cancer to provide beast quality care services to the New Zealanders. Furthermore, staying healthier is one of priorities of the Ministry of health. It can be achieved through evaluating the programme and implementing a change accordingly if needed. Conclusion Evaluation research is an essential tool to evaluate the effectiveness of the programme or to know how well the programme is working. Evaluation research helps managers and stakeholders of the organisation to improve the performance of the organisation and to provide the quality care health services. Staff and clients can be encouraged to provide useful feedback about the programme which helps in decision making and policy formation about the programme and thus improving the services provided by organisation. References Arrospide, A., Rue, M., Van Ravesteyn, N. T., Comas, M., Soto-Gordoa, M., Sarriugarte, G., Mar, J. (2016). Economic evaluation of the breast cancer screening programme in the Basque Country: retrospective cost-effectiveness and budget impact analysis. BMC Cancer, 16(1). doi:10.1186/s12885-016- 2386-y Centre for Disease Control and Prevention. (2015). Types of evaluation. Retrieved from https://www.cdc.gov/std/Program/pupestd/Types%20of%20Evaluation.pdf Collins, K.B. (2017). What is Impact Evaluation. Retrieved from http://programs.online.american.edu/online-graduate-certificates/project- monitoring/resource/what-is-impact-evaluation Community Interventions for Health. (2017). Process Evaluation. Retrieved from http://www.oxha.org/cih_manual/index.php/process-evaluation Cunningham, S.J. (2000). Economics: Economic evaluation of healthcare is it important to us? Retrieved from http://www.nature.com/bdj/journal/v188/n5/full/4800444a.html Frye, A. W., Hemmer, P. A. (2012). Program evaluation models and related theories: AMEE Guide No. 67. Medical Teacher, 34(5), e288-e299. doi:10.3109/0142159x.2012.66863 Gupta, A., Shridhar, K., Dhillon, P. (2015). A review of breast cancer awareness among women in India: Cancer literate or awareness deficit? European Journal of Cancer, 51(14), 2058-2066. doi:10.1016/j.ejca.2015.07.008 Kellaghan, T., Stufflebeam, D. L. (2003). International handbook of educational evaluation. Dordrecht: Kluwer Academic Publishers. Retrieved from http://link.springer.com/chapter/10.1007%2F978-94-010-0309-4_4 Loy, E. Y., Molinar, D., Chow, K. Y., Fock, C. (2015). National Breast Cancer Screening Programme, Singapore: Evaluation of participation and performance indicators. Journal of Medical Screening, 22(4), 194-200. doi:10.1177/0969141315589644 Massat, N. J., Sasieni, P. D., Parmar, D., Duffy, S. W. (2013). An ongoing case- control study to evaluate the NHS breast screening programme. BMC Cancer, 13(1). doi:10.1186/1471-2407-13-596 Ministry of Health. (2015). Breast Cancer. Retrieved from http://www.health.govt.nz/your-health/conditions-and-treatments/diseases- and-illnesses/breast-cancer National Screening Unit. (2014). BreastScreen Aotearoa. Retrieved from https://www.nsu.govt.nz/breastscreen-aotearoa/about-breast-screening- programme NYS Health Foundation. (2016). Process Evaluation. Retrieved from http://nyshealthfoundation.org/our-grantees/grantee-resources/process- evaluation Seneviratne, S., Campbell, I., Scott, N., Shirley, R., Lawrenson, R. (2015). Impact of mammographic screening on ethnic and socioeconomic inequities in breast cancer stage at diagnosis and survival in New Zealand: a cohort study. BMC Public Health, 15(1). doi:10.1186/s12889-015-1383-4 The Health Foundation. (2015). Evaluation: what to consider. Retrieved from http://www.health.org.uk/sites/health/files/EvaluationWhatToConsider.pdf The New Zealand Breast Cancer Foundation. (2013). New Zealand Breast Cancer Facts. Retrieved from http://nzbcf.org.nz/BREASTCANCER/Overview/BreastCancerinNZ/Fastfacts.a spx
Wednesday, November 13, 2019
Unions Essay -- essays research papers fc
Michael Paul 099 66 3949 History 316z Trade unionism, industrial unionism, and socialism were the main forms of organized labor in the late nineteenth century early twentieth century, yet rarely did these shifting currents flow in complementary ways that might appeal to the vast majority of struggling workers. The three most important formal organizations were the American Federation of Labor (AFL), the Industrial Workers of the World (IWW) and the Socialist Party of America. All three of these organizations had there own strengths but the many weaknesses and divisions combined with outside influences caused the retardation of their radical, left wing ideas. The American Federation of Labor was founded with the intention of building the class conscioussness and economic power of workers by organizing them on occupational lines. It pursued policies to win short term, concrete, economic gains (Cashman,206.) The AFL was first established as the Federation of Organized Trades and Labor U nions of the United States and Canada from several independent national trade unions in 1881 and it took its definitive form and new name in 1886.The AFL was decentralized and organized as a loose coalition of almost autonomous national unions (Cashman,205.) The advantage to this was that decisions were made in each union where the leaders understood the situation. However, the AFL retreated from its Marxian origins to become a profoundly conservative organization restricted to the ranks of skilled, white males. This restrictive policy was a major flaw of the AFL and kept them from gaining the numbers and strength that it may have attained. These policies came directly from the ideas of the AFLââ¬â¢s longtime leader Samuel Gompers. Gompers believed that labor should accept the existing capitalist economy but try and get a larger share for labor by way of higher wages, shorter hours and better conditions of work. He believed that the idealistic goal of a fundamental economic refor m was an illusion (Cashman,221.) His conservative approach included negotiation and conciliation in labor disputes and in resort to strikes only after other methods had failed. He opposed alliances with political parties and the formation of a labor political party. His prime concern was the status of the skilled worker, which under his leadership attained greater stability than ever before. In concentratin... ...s. By contrast the IWW led by Bill Haywood was the most radical and controversial of all American labor movements. Haywoodââ¬â¢s unconventional methods and uncompromising stands frequently put him at odds with allies and opponents alike. And the Socialist Party of America led by Eugene Debs had potential to improve the lives of workers everywhere but do to internal conflicts was unable to truly make a difference. Had these three organizations been able to play off one another they may have been able to realize their ultimate goals. The AFL containing the skilled workers was the most powerful, the IWW took what the AFL did not want giving the unskilled worker a voice and the Socialist Party went in to politics, using political offices to gain power for the working class. Ultimately because of the different outlooks of these three groups the American labor movement, though it gained some ground, was a loss. Bibliography Works cited Cashman, Sean. America in the age of titans. New York university press, NY ,1988 Laurie, Bruce. Artisans into Workers university of illinois press, illinois 1997 Leuchtenberg, William. The Perils of Prosperity. The university of chicago press, london, 1958
Monday, November 11, 2019
Paper on Summation
Sowmya SUMMATION A Detailed review of Summation SUMMATION Introduction The CT Summation Blaze LG product family helps you efficiently manage case information such as transcripts and documents with the benefits of full-text imaging, PDF support, electronic evidence support and comprehensive production tools. Summation to load and check DII File DII File: A DII file is a specially formatted ASCII text file that can be created within any text editor. The DII file uses a non-delimited, multiple line format. Each record ends with the image filenames themselves. The data from the file is loaded into Summationââ¬â¢s Core Database and establishes the link between the database summaries and the associated images and OCR documents. DII FILE COMPONENTS @T (Image Tag) Required for each DII record. Must be used before any @C tokens for each DII record. Each instance of a line beginning with the @T token causes Summation to create a new database record or overwrite an existing one. If the value that follows the @T line does not match an existing record number in the active table (usually either the STDTABLE or the ETABLE) then a new record with that number is created. If a record with that number already exists, Summation prompts the user to either replace that recordââ¬â¢s existing image information or leave its image information intact. The field normally used to determine a recordââ¬â¢s unique number is either the BEGDOC# field (for the STDTABLE) or the DOCID field (for the ETABLE). This field can be changed via OPTIONS>DEFAULTS>IMAGING>COLUMN TO HOLD IMAGE TAG but it is not recommended. If there is an input template on the databaseââ¬â¢s record number field, then the @T value must conform to the template format. Example: The case database has an input template restricting the BEGDOC# field to the format ââ¬Å"AA000000â⬠(i. e. alpha, alpha, numeric, numeric, numeric, numeric, numeric, numeric). A DII file with the following @T values is loaded: @T RT100556 @T 998113 The first line matches the template format and a new database record with a BEGDOC# value of ââ¬Å"RT100556â⬠would be created. The second line is incorrect, s o no database record for this line would be created and an error message would appear on-screen and also be written to the error log. D (Default Directory) Required for each DII record that has images or OCR to be loaded. The @D token designates the location where the image file(s) for a database record is stored. The data specified after the @D is loaded into the Default Directory (DEFDIR) field of the ImgInfo table. There are 3 different ways to denote the DEFDIR. 1. @I, which refers to the default IMAGES subfolder under the case directory. For example, for a mobile installation, if the case were SMITH V. JONES, ââ¬Å"@Iâ⬠would equal ââ¬Å"C:PROGRAM FILESSUMMATIONCASEDATASMITH V. JONESIMAGES. â⬠2. The full path to the image file(s) location. A UNC, local, or mapped drive letter path is acceptable. For example: @D SERVER1IMAGESSMITH V. JONESVOLUME1DISK1 @D C:IMAGESSMITH V. JONESVOLUME1DISK1 @D Z:IMAGESSMITH V. JONESVOLUME1DISK1 3. @V, which refers to the specific volume label of removable media. NOTE: Users of Summation LG/iBlaze can use UNC paths after the @D to specify a folder containing images. @L (Long Name Entry) Summation 5. 21 Legacy Field. @L denotes the long name or description of the image file(s). The @L value is loaded into the LONGNAME field of the ImgInfo Table. This tag is obsolete and unnecessary on modern versions of Summation (1. 0 and higher) as they support long image file names. @C (Column to Link) 3 Optional token. @C is used to load data into specified fields in the userââ¬â¢s document database. This is a useful way to decrease the amount of data entry required for the database users. It is meant for use when the same value is repeated for a group of documents, such as documents that all have the same box number or author. It is not meant to replace regular data entry. For this reason, there is a limit of six (6) @C codes available for each DII record. The syntax for using the @C token is: @C For example, to fill in the ISSUES field of the database with the value ââ¬Å"Mental Health,â⬠the line would read: @C ISSUES Mental Health The @C line(s) should appear underneath the @T line for each database record. For consecutive DII records where these values are the same, you do not need to repeat the @C line. Instead, insert the next @C line in the next DII record where the data changes. To stop entering data in a field, insert a @C line with the field name following by nothing. @I (Image Location as in Case Customize) Used with the @D token. The @I value refers to the image location specified in Case Customize. The @I value is loaded into the DEFDIR field of the ImgInfo table. This location must be a drive letter (or UNC path for LG/iBlaze users) and path that points to the directory where the images are stored. Summation users can select any valid location or use Summationââ¬â¢s default location, the IMAGES subdirectory under the case directory. In either case, the image files must be copied to this location. @V (Volume Label of Removable Media and Any Subdirectories) Used with the @D code. The @V value refers to the volume label of the removable media holding image files. When using a volume label, the program will search a range of drive letters for the specific removable media volume. The range of drive letters to be searched can be specified in OPTIONS>DEFAULTS>IMAGING>DRIVES HOLDING IMAGES. The volume label can be obtained from any drive by using the DIR command at the command prompt or by looking at the drive properties in Windows Explorer/My Computer. When using the command prompt, the volume label will appear at the top of the directory display listing. Since most document images are now stored on either local or network hard drives Summation has provided an option to convert volume labels to directory names for existing database records with @V image paths. By selecting the option box labeled ââ¬Å"Map Volume to Directoryâ⬠under OPTIONS>DEFAULTS>IMAGING the volume name is converted to a directory name. A drive letter or letters matching the location wher e the images are stored must be added in the OPTIONS>DEFAULTS>IMAGING>DRIVES HOLDING IMAGES section. For example: DEFDIR in ImgInfo Table: @VCD_00001:01 Drives Holding Images: DE Program looks in: D: or E: drive for media with a volume label of ââ¬Å"CD_00001. â⬠If it finds matching media, it looks for a directory there named ââ¬Å"001â⬠for whichever image file or files were specified. @Fulltext (Lets the Database Know There is an OCR Document Attached to the Record or Records) Tells Summation that there are OCR documents attached to the record. The filenames must match the names of the images (not including the extension), and they must be located in the same place. Variations: @FULLTEXT DOC ââ¬â One OCR text file exists for each database record. FULLTEXT PAGE ââ¬â One fulltext file exists for each page of the document summary. @FULLTEXT [PAGE or DOC] is placed before the @T line. Similar to the @C token, this statement remains in effect until turned off by using the opposite designation. In other words, if you are using the ââ¬Å"PAGEâ⬠method, turn it off by using @FULLTEXT in the record that does not contain a fulltext file. @O (Where OCR Documents Are if They Are Not in the Image Location) Used when the OCR documents are located someplace other than the image location as specified by the @D line of the DII file. It is placed immediately below the @D line. This token can ONLY be used in conjunction with the ââ¬Å"@FULLTEXT DOCâ⬠tag. The full path to the OCR text document must be included. Example: 5 @FULLTEXT DOC @T AB100001 @D @I @O J:docsscanned 100001. TIF This tells Summation that the fulltext document for record AB100001 is not in the default Images directory (@I) but, instead can be found in J:docsscanned. The file name must still match the image file name. In this case the image file name is 100001. TIF, therefore the OCR text file name should be named 100001. TXT. ; (Comment Lines) Optional code for each DII record. You can make comments in the DII file for your reference. These lines do not affect the DII load. Example: ; After this Semi-colon I can make notes for my current record Image Files Required for each DII record. The last line(s) of each DII record is always the image filename(s). Backslashes in front of the filenames will direct Summation to look for the files at the root of the specified drive however, these can usually be omitted. Iterators Iterators are important optional coding methods. Iterators provide a way to use shorthand for image file names. This allows for less text per DII record, thereby producing a DII file that loads more quickly. If your image files use a number sequence, you can use iterators to indicate a range of numbers, rather than listing each image file separately. Ranges are only valid when the lower number and the higher number are the same number of digits. Files Listed Separately Example: IM00001. TIF IM00002. TIF IM00003. TIF IM00004. TIF IM00005. TIF Files Iterated Example: 6 IM000{1-5}. TIF If iterating records with attached full text (OCR) documents in PAGE format, be careful not to exceed powers of 10 in the iteration. Example: IM0000{01-09}. TIF IM0000{10-99}. TIF IM000{100-999}. TIF The example above will properly load all 999 images and their corresponding OCR full-text documents. This rule applies to the @FULLTEXT PAGE format only. Tokens Used in Summationââ¬â¢s DII File Token @APPLICATION Field Populated APPLICAT @ATTACH ATTCHIDS (Field selected for related attachment Doc IDs in Link Fields defaults) @ATTACHRANGE ATTRANGE Description The application used to view the electronic document. For example: @APPLICATION Word IDs of attached documents. Appending the value allows the DII to populate multiple values in the ATTCHIDS field. For example: @ATTACH EML0001; EML0002 The document number range of all attachments if more than one attachment exists. Each attachment, along with the e-mail message, will be loaded into Summation as its own record. The attachment 7 @ATTMSG @BATESBEG @BATESEND @BCC @C range would be populated with the document number of the first attachment and the last number of the last attachment. For example: @ATTACHRANGE WGH000008 ââ¬â WGH0000010 N/A Relative or full path and file name of the e-mail attachment that is an email message itself. The file will be copied to the MSF folder. The Media field will be populated with the term eMail and the FOLDERID field is coded with the session name assigned during the load of DII. BATESRNG Beginning Bates number, used with @BATESEND. For example: @BATESBEG SGD00001 BATESRNG Ending Bates number, used with @BATESBEG. For example: @BATESEND SGD00055 BCC Anyone sent a blind copy on an e-mail message. For example: @BCC Nick Thomas Optional code used to load data into specified fields in the userââ¬â¢s document database. This helps decrease the amount of data entry required for the database users. It is meant for use when the same value is repeated for a group of documents, such as documents that all have the same box number or author. The syntax of using the @C token is: @C For example, to fill in the ISSUES field of the database with the value Mental Health, the line would read: 8 @C ISSUES Mental Health For consecutive DII records where these values are the same, you do not need to repeat the @C line. Instead, insert the next @C line in the next DII record where the data changes. To stop entering data in a field, insert an @C line with the field name following by nothing. @CC CC @D DEFDIR @DATECREATED DATECRTD @DATERCVD DATERCVD @DATESENT @DATESAVED DATESENT DATESVD Anyone copied on an email message. For example: @CC John Ace Required token for each DII record that has an image associated with it and designates the directory location of the image file(s). The data specified after the @D goes into the Default Directory (DEFDIR) field of the ImgInfo table. There are three dif ferent ways to denote the DEFDIR: 1. @I (to refer to the Case Customize Image Location) 2. The hard coded drive letter and path into the DEFDIR field 3. V (to refer to the specified volume label of the CD-ROM) For example: @D @V CD-101:Box_34 Note: Users of Summation iBlaze/LG can use UNC paths after the @D to specify a folder containing images. The date that the file was created, if applicable. For example: @DATECREATED 01/04/2003 Date that the file was received. For example: @DATERCVD 01/04/2003 Date that the file was sent. For example: @DATESENT 01/04/2003 When the file was saved, if applicable. For example: 10 @DOCID DOCID @EATTACH DOCLINK (Field selected for Linked Documents in Link Fields defaults. ) @EDOC DOCLINK DATESAVED 01/04/2003 Document ID of a full-text document, e-mail message, or electronic document. If the DII includes full-text files, then the DOCID value (instead of the @T value) is used to load and associate ocrBase documents with the appropriate summary. For exa mple: @DOCID EML00017 Relative or full path and file name of the attachment. The file will be copied to the eMail directory and the relative path of the file will be placed in the DOCLINK field. The MEDIA field will be populated with the term Attachment. For example: @EATTACHServerFiles Flood Damages. ls Relative or full path and file name of the electronic document. The file will be copied into the eFiles directory and the relative path of the file will be placed in the DOCLINK field. The MEDIA field will be populated with the term eDoc. For example: @EDOC D:eDocWordDoc. doc 11 @EDOCIDSEP DOCID @EMAIL-BODY BODY @FOLDERNAME FOLDER This token is intended for service bureaus that use their own tracking numbers (for example, TRACK001_Doc001. txt). This token allows Summation to remove the tracking ID (TRACK001) from the file so that it can be replaced with a Summation naming convention. The token uses a onecharacter string a value to indicate the demarcation in the file name. In the example above, the underscore character separates the tracking number from the file name, so the token should be followed by the underscore character. Use this character at the top of the DII file above the individual records. For example: @EDOCIDSEP _ Body of an e-mail message. Must be a string of text contained between @EMAIL-BODY and @EMAIL-END. The @EMAIL-END token must be on its own line. For example: @EMAIL-BODY @EMAIL-END The name of the folder that the e-mail message came from. For example: @FOLDERNAME Conner-Stevens ââ¬â MailboxCStevensInbox 12 @FROM @FULLTEXT FROM From field in an e-mail message. For example: @FROM Kelly Morris Indicates that there are OCR documents attached to the record. The file names must match the names of the images (not including the extension), and they must be located in the same place. Variations: @FULLTEXT DOC ââ¬â One full-text file exists for each database record. @FULLTEXT PAGE ââ¬â One full-text file exists for each page of the document summary. These tokens should be placed before any @T tokens. Similar to the @C token, this statement remains in effect until turned off by using the opposite designation. In other words, if you are using the PAGE method, turn it off by using @FULLTEXT in the record that does not contain a full-text file. The @FULLTEXTDIR token is a partner to the @FULLTEXT token. This token provides more flexibility to both the service bureau and the client when loading a DII file that includes full-text files. The @FULLTEXTDIR token allows the service bureau to specify a directory from which the full-text files will be copied during the load. Therefore, the full-text files do not have to be located in the same directory as the images at the time of load. The @FULLTEXTDIR token gives users the flexibility to load the DII file and full-text without requiring them to copy the fulltext to the network first. An example of the syntax used with the @FULLTEXTDIR token is: @FULLTEXTDIR Vol001Box001ocrFiles The above example shows a relative path, which indicates to Summation that 13 @FULLTEXTDIR @HEADER HEADER @I DEFDIR @INTMSGID INTMSGID it should search for the full-text files in the same location as the DII file that is being loaded and follow any subdirectories in the @FULLTEXTDIR argument. The relative path works whether the DII file is on a network drive or on a CD as a sibling of the Vol001 folder. Just as @FULLTEXT PAGE and @FULLTEXT DOC apply to all subsequent records in the DII file until they are turned off (by adding the token after the last record that includes fulltext), the @FULLTEXTDIR argument applies to all subsequent records in the DII file until it is changed or turned off (by including the token with a blank argument). E-mail header content. The @HEADER-END token must be on its own line. For example: @HEADER @HEADER-END This token is used with the @D token. The @I token refers to the image location specified in Case Customize. This location must be a drive letter (or UNC path for iBlaze/LG users) and path that points to the directory where the images are stored. Summation users can select any valid location or use Summationââ¬â¢s default location, the IMAGES subdirectory under the Case Directory. In either case, the image files must be copied to this location. Internet message ID. For example: 14 @L LONGNAME @INTMSGID This token is optional code and denotes the long name or description of the image file(s). The data after @L goes into the LONGNAME field of the ImgInfo table. Note: This applies to Summation Blaze Version 5. 21 and earlier, and is used in the IMGINGO table. For example: @L Patient History Form @MEDIA MEDIA @MSGID MSGID Populates the Media field with the designated value (for example, eDoc, eMail or Attachment). If the value indicated in the token differs from the Summation default, or an entry exists in the field, then the most recent process wins and an entry is made in the error log. Because of this, use this token with care an only if you have a compelling reason. For example: @MEDIA eDoc E-mail message ID generated by Microsoft Outlook or Lotus Notes. For example: @MSGID 00000000E8324B3A0A80 0F4E954B8AB427196A13 04012000 15 @MULTILINE Any field specified @NOPAGECOUNT DOCID Allows carriage returns and multiple lines of text to populate the specified field. Text must be between @MULTILINE and @MULTILINE-END. The @MULTILINE-END token must be on its own line. For example: @MULTILINE NOTEFIELD Here is the first line. Here is the second line. Here is the last line. @MULTILINE-END For consecutive DII records where these values are the same, you do not need to repeat the @MULTILINE line. Instead, insert the next @MULTILINE line in the next DII record where the data changes. To stop entering data in a field, insert an @MULTILINE line with the field name following by nothing Turns off automatically using a number after a space in the Document ID as the number of pages. Allows Document IDs to contain spaces. Must be entered at the beginning of the DII file and applies to all records for the entire DII file. @NOPAGECOUNT @FULLTEXT page @TGHSPLT 3602 Q00555 @D @I Box011Dir01GHSPLT 3602 Q00555. tif 16 @OCR @OCR-END @O Some service bureaus and clients prefer a different approach to loading full-text than the traditional Summation method of requiring the full-text to be loaded from separate ASCII text files. Some clients prefer including the full-text in the DII file itself. The @OCR and @OCREND tokens give service bureaus the flexibility to include the full-text (including carriage returns) in the DII file. This method of loading full-text significantly improves the speed of the DII load, by eliminating the need for the system to search for and locate each text file and open it to copy the text into the ocrBase. The @OCR-END token must appear on a separate line. Note: When using the @OCR and @OCR-END tokens and including the full-text in the DII file, service bureaus cannot apply page breaks at specific locations in the full-text document. An example of the syntax used with the @OCR and @OCR-END tokens is: @OCR @OCR-END There are two uses for the @O token. This token is used when the full-text documents are located someplace other than the image location as specified by the @D line of the DII file. It tells Summation that there are full-text documents at this location. It is placed immediately below the @D line. There can be only one text file for the record, and it must have the name of the 1st TIFF image with a . TXT extension. The full or relative path to the full-text document must be included. For example: @O J:docsscanned 17 @PARENTID PARENTID (Field selected for Parent ID in Link Fields defaults. ) Parent document ID of an attachment. For example: @PARENTID WGH000003 @PSTCOMMENT @PSTCOMMENT-END Users may want to record information about a . PST file that is loaded into a Summation case. For example, a user may want to identify where a specific . PST file came from and what it relates to (for example, client e-mail messages related to flat space and received on April 26, 2004). The comments are associated with the . PST file designated by the @PSTFILE token that follows. The comments can be viewed from the e-mail and attachment records generated from the . PST file designated in the @PSTFILE token. The @PSTCOMMENT token is used in conjunction with @PSTFILE. It should be followed by the @PSTCOMMENT-END token and must appear before the @PSTFILE token it applies to. The @PSTCOMMENT-END token must appear on its own line. For example: @PSTCOMMENT @PSTCOMMENT-END @PSTFILE EMAIL001Pfranc. pst, Pfranc_04April_2004 Note: The comments will not be written to the Core Database record in Summation, but users can review the comments by right-clicking an e-mail record and selecting the Show PST Info option. 18 @PSTFILE The @PSTFILE token is used to process the . PST file by designating: 1) the location of the . PST file at the time of load, and 2) the unique ID of the . PST file. The path to the . PST file can either be hard-coded or relative to the location of the DII file at the time of load. The unique ID should be the same value assigned by the user to the . PST file when processing using Summationââ¬â¢s eDiscovery Console. If either necessary value is missing, the DII load will record an error and the . PST file that corresponds to the record with the missing information will not be processed. An example of the use of @PSTFILE: @PSTFILE EMAIL001PFranc. st, PFranc_04April_2004 Summation gathers this information but does not process the . PST file until the DII load is complete. The PSTID (the second value) is populated into the PSTID field as designated on the eMail tab in the Defaults dialog box (accessed from the Options menu) in Summation. The PSTID argument assigned by the @PSTFILE token is assigned to the record it appears in and will apply to all subsequent e-mail records. The argument is applied until either the @PSTFILE token is turned off by setting it to a blank argument (such as: @PSTFILE), or the argument changes. The @PSTFILE token can occur multiple times in a single DII file and assign a different argument each time. This allows the service bureau to process multiple . PST files and present the data for all . PST files in a single DII file. For example, a service bureau can process five . PST files and include five instances of @PSTFILE tokens with five different arguments, all in the same DII file. 19 @READ READ @RELATED OTHERIDS (Field selected for Related Document IDs in Link Fields defaults. ) STOREID Notes whether the e-mail message was read. For example: @READ Y The document IDs of related documents. @RELATED WGH000006 @STOREID @SUBJECT SUBJECT The . PST identifier. Should not be used if @PSTFILE is used. For example: @STOREID The subject of an e-mail message. For example: @SUBJECT Town Issues 20 @T IMGTAG This token is required for each DII record and designates the ImageTag. It must be the first item listed for each database record. This data specified after the @T goes into both the Image Tag (IMGTAG) field in the ImgInfo table and the Column to Hold ImageTag in the Document Database. The image tags must be unique values. For this reason, many users choose the document number as the image tag. The image tags establish the link between the document database table and the ImgInfo table. When a user is in a document database record that has a corresponding image file and they want to view the image, Summation looks at the value in the Column to Hold Image Tag field in the database and reads the image file location from the ImgInfo table record with the matching value in the Image Tag field. For example: @T CR00293 1 Note: If there is a template on the Column to Hold Image Tag field of the userââ¬â¢s document database, then the Image Tag must conform to the template format. For example, if the template 21 forces the field to contain a certain number of digits, any image tag values that are comprised of fewer digits must be appropriately zero filled. @TIMERCVD TIMERCVD @TIMESENT TIMESENT @TO @TRANS TO DEPOIDS (Field selected for Transcript Zoom in Link Fields defaults. Time that the e-mail message was received. For example: @TIMERCVD 11:00 a. m. Time that the e-mail message was sent. For example: @TIMESENT 10:59 a. m. To field in an e-mail message. For example: @TO Conner Stevens The transcript description. The value populates the Transcript Zoom field. For example: @TRANS conner stevens v1. txt 22 @V This token is used with the @D token and refers to the volume label of the image location. By using a volume label instead of a drive letter, the user does not have to use the same drive letter designation for their media as had been used by the service bureau. The @V token is used most often with the images that are being burnt onto CD ROMs. Substitute the volume label for the drive letter in the @D line, still including the path leading up to and including the directory in which the images are located. The Summation user must set up the Drives Holding Images in the case Imaging Defaults so that Summation knows on which drive(s) to look for the specified volume(s). The volume label can be obtained from any drive by using the DIR command at the command prompt or by looking at the drive properties in Microsoft Windows Explorer/My Computer. When using the command prompt, the volume label will appear at the top of the directory display listing. Use the Map Volume to Directory option in imaging defaults if your images are on CD-ROM, you have used the @V (volume label) code in your DII file, and the volume label of the CD(s) is also the first subdirectory. Enabling this option tells Summation to map the volume label indicated after the @V in the DEFDIR line of the ImgInfo table to the drive letter(s) set in your Drives Holding Images: @Vol:=>A:vol. Example: DEFDIR in ImgInfo Table: @VCD_00001: Drives Holding Images: D Maps to: D:CD_00001 This option is commonly used when the CDs are stored on a Meridian tower, or 3 when the volumes have been copied to a fixed drive from a CD ROM and t BENEFITS OF USING A DII FILE TO LOAD IMAGE SUMMARY INFORMATION The DII file is a formatted ASCII text file that is used to load large batches of images. The DII file is loaded in Summation from Imaging Defaults, using the Read DII utility. DII data is added to Summations Image Information (ImgInfo) Table and serves as the link between your docum ent database data and the images and/or ocrBase documents. The Image Tag is the unique identifier for each image and/or ocrBase document. When you load the DII file, Summation will alert you if any of the Image Tags (document IDs) already exist in the ImgInfo Table and give you the option to overwrite the existing record(s). When used correctly, a DII file can significantly reduce data entry time. 24 Batch Loading of Image Summary Information The major advantage of using a DII file is the ability to load summary information for thousands of images at a time. The summary information is encoded within the DII file and the summary records for each designated image are automatically updated as the file loads. In this way, thousands of summary records can be updated, giving users easy access to thousands of associated images. Reduced Coding Coding and typing can be reduced by using the @C (Column to Link) designator. @C is meant for use with documents that are categorized into groups and therefore contain repetitive data (not to replace data entry! ). It is meant for use by imaging service bureaus that are supplying you with a DII file before you begin coding, thereby creating new database records. Each record is limited to 6 @C lines. For example, suppose the service bureau is scanning and coding numerous medical records pertaining to various doctors. The records to be scanned are already sorted by doctor, and due to the nature of medical records, they are also sorted by patient. If you want to have fields filled in within the database as linked records are created, the doctor name and patient names need not be entered repeatedly. Summation assumes that the preceding doctor and patient names are to be used again in the current record if no new names are entered. Error Checking Summation will check to see if duplicates of the new records already exist within the Summation database. When a duplicate is encountered, the Summation user is prompted to either overwrite the existing record or ignore the new record. When the program encounters errors with a particular record during loading, they are documented in an error file. The error file is created in the directory of the case where the DII file is being loaded and has the same name as the DII file except with a ââ¬Å". LOGâ⬠extension instead of ââ¬Å". DII. â⬠This error file lists the type of problem and its location (by line number) within the DII file. This log file is written in simple ASCII text format and can be opened with any text editor including Windows Notepad, Wordpad, and Microsoft Word. Example: A DII file named ââ¬Å"DISK1LOAD. DIIâ⬠is loaded into the ââ¬Å"SMITH V. JONESâ⬠case. If errors are encountered during loading, they would be written to a file titled ââ¬Å"DISK1LOAD. LOGâ⬠in the Summation program folder under the CASEDATASMITH V. JONES subfolder. 25 Simultaneous Data Entry and Scanning If users coordinate with either an outside vendor or an internal department to scan their documents, they can begin the work of summarizing the documents while they are being scanned. The customer and the scanning group must coordinate the document numbers and names to be used in advance. ) When scanning is complete, the vendor or scanning department can deliver the scanned image files and/or full-text documents to the customer on any removable media the customerââ¬â¢s system is compatible with. Can replace previous entries for tags There are times when organized coordination of document image tags between you and the imaging service bureau is not possible. In this case, it is easier for you to summarize the documents after receiving the files and matching DII file from the service bureau. When the DII file is loaded, it creates database records as it fills the ImgInfo Table. The only information in such a database record is the image tag. The DII data is loaded into the ImgInfo Table and the Image Tags are loaded in the Column to Hold Image Tag (The field in the document database containing the unique image tags for each image in the case. This is often the field that contains the beginning document number, although it may be a special field created for this purpose. The Column to Hold Image Tag cannot be a multientry field; it must be an integer, text or note type field. field of the database table. It is also possible to have additional fields filled in as the linked records are being created. These are linked through the use of the optional @C designator. STARTING WITH SUMMATION Starting A New Case To begin loading evidence into a case, you must start a new case that does not contain information. To start a new case: 1. From the Case menu, select New. 26 2. Assign a name to your case and click OK. 3. When prompted click Yes to assign a password to your case or No to create a case that is not password protected. BACKING UP AND RESTORING DATABASES Both the Core Database and the Notes Database should be backed up regularly to protect against loss of data in the event of database corruption. If you are operating on a network, you may still wish to create an independent backup of these two key components. After backing up the Notes and Core Databases, you should consider running additional utilities to keep the databases ââ¬Å"tuned upâ⬠. To Backup the Core and Notes Databases: 27 1. Click once on the case name in the Case Explorer window so that it is selected. 2. Access the Backup utility by: ? Opening the CASE menu and electing Tools OR ? Right-clicking on Core Database in the Case Explorer and selecting Core Database Utilities Select Backup Databaseâ⬠¦ The backup window opens with both the Database and the Notes database options checked. Leave both options checked. Click on Backup. You will be advised when the databases have been successfully backed up. Click OK. LOADING IMAGES WIT H A DII FILE A DII (Document Image Information) file is a text file formatted to batch load summaries with images into a Summation database. Loading database summaries and image information using a DII file is more efficient. Preliminary Steps To help ensure the successful load of images using a DII file, the following steps should be taken prior to loading: ? Open the case into which you want to load the images. ? Back up your database. (From the Case menu, select Tools, Backup Database, and Backup. ) ? Verify the location that Summation has designated for images for this case (the @I value for this case). (From the Case menu, select Customize to open 28 the Case Directory Customization dialog box. ) Note the value in the Image Location field. The default value for this field is a single folder name (such as IMAGES). If the Image Location field contains a folder or folders without a drive letter, then this location is relative to the path in the Case Directory field. However, if the field contains a drive letter followed by a path, then this is the absolute value of Summationââ¬â¢s image path for this case. Most of the time, the Image Location is relative to the Case Directory path. To verify the complete path, simply connect the Image Location value to the end of the Case Directory path. You may want to copy and paste these values to a Notepad document to keep track of them. Example: ? Case Directory field ââ¬â :PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASE ? Image Location field ââ¬â IMAGES ? Complete image path ââ¬â C:PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGES The image path is the location that Summation has designated for the images for this case (the @I value for this case. ) ? Verify the images path in the DII file by opening a text editor and locating the image path after the @D token. Example: Sample DII-01 shows the following value: @D @I @D is the default directory of the image files. I is a value that works in conjunction with the @D token to load the image path into Summationââ¬â¢s database. Using the previous case image path example, the @D line would be converted by Summation as C:PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGES @I is used to specify the image location. Alternatively, @V or a hardcoded path can be used to designate the Images directory. This tutorial assumes that the DII file is using @I, since that is the most common syntax. The image path can be extended by appending additional subdirectories after the @I value. Example: @D @I estdata1 29 Continuing with the previous example, this @D line would be converted by Summation as C:PROGRAM FILESSUMMATIONBLAZECASEDATAMY NEW CASEIMAGESTESTDATA1 @V Designations. Reading about @V is only necessary if your DII file uses the @V value to designate the image path. If your DII file uses the @I value, skip ahead Step 5. The @V value is a legacy format designation that allows Summation to locate and display image files stored on removable media (such as CD-ROM, DVD, etc. ) by volume name (the disc label). Vendors will typically supply two versions of a DII file: one that uses the @I value and one that uses @V. In almost all cases the preferred version to load is @I. Hard-Coded Path Designations. Reading this section is only necessary if your DII file uses a complete path including computer name or drive letter to designate the image path. If your DII file uses the @I value, skip ahead to Step 5. Summation will accept a complete path value following the @D token, but in order for Summation to display the document images, this path must be valid from the workstation accessing the case in question. Example: @D R:IMAGESDISC101 If a workstation accessing the case in which this DII file was loaded did not have an ââ¬Å"R:â⬠drive correctly mapped to the image file location attempting to view the image(s) would fail. ? Copy the images to the correct directory. ? Before copying IMAGES directory structure, merge all the OCRââ¬â¢s . txt files with the corresponding tiffs. To copy the images: 1. Open Windows Explorer (right-click Start and select Explore) and note the image path you verified in Step 3. NOTE: You can browse to this path quickly by copying and pasting the path from Step 3 into the Address field and pressing Enter. This is the directory that you will copy the images to. 2. Browse to the images that need to be loaded. These images might arrive to you on a CD, a DVD, or an external hard drive. In any case, browse to the images and prepare to copy them to the image location on your computerââ¬â¢s hard drive. 3. Copy the images from the CD, DVD, or external hard drive to the images location. 30 NOTE: It's important to copy the correct folder and subfolders. Verify this first by copying the first directory after the @I token in Step 4 above. Example: (A) @I value from the DII file: @I estdata1 (B) Folder to copy from the CD: D: estdata After verifying the correct folder containing images, copy it to the image path from Step 3 above. After the folders containing images have been copied to the correct image path directory, you are ready to load the DII file. This will populate Summation's database and will allow you to view and manage these images through the Summation interface. Loading the DII File 1. From the Options menu, select Defaults, and click the Imaging tab. 2. Verify the Column to Hold Image Tag. If you are currently using the standard form/table (STDTABLE), the Column to Hold Image Tag field should be set to BEGDOC#. If you are currently using the e-form/table (ETABLE), the Column to Hold Image tag field should be set to DOCID. NOTE: Documents are added or updated by a DII file based on the values in the field selected in the Column to Hold Image Tag. If a value listed after the @T token does not exist in this field for any record, a new record with this value is created. If the value does not exist, then this record's image information is updated. Click OK to save your settings. From the Options menu, select Defaults, and click the Imaging tab, and click Load DII File button. Browse to and select the DII file, and click Open. Click OK. The DII file is loaded into Summation's database and your images can now be viewed and managed through the Summation interface. 3. 4. 5. 6. CHECKING DII FIELDS 1. Right-click on core database in case explorer. 2. Select ââ¬Å"set view to openâ⬠option, and check for Column view, Form view, Image viewer, ocrBase viewer and eDocs viewer. Select required view in ââ¬Å"View in focus when openedâ⬠window and click ok. 3. Right click on core database and open. 31 . Dialog box appears as below opening in all the formats that are checked in the step 2. 5. Select column view by clicking on that label. 32 6. Before editing anything, change the database to edit mode from display mode. ( right-click on the column and check edit option). 7. Double click on the fields label. 8. You will find a small field list table containing a ll the available fields. 33 9. Double click on any field to bring it to view or to hide it from the view. This way we can add or remove required fields and can check whether all the fields have generated correctly in the loaded dii file. 10. Once all the required fields are selected, right click on any of the label and check display to come back to display mode. 11. Click on eDocs, Image, ocrBase or form in the lower toolbar to view in the respective format. ADDING FIELDS TO DATABASE 1. Fields are added through the Form Editor. To access the Form Editor, select ââ¬Å"Options ââ¬â> Utilitiesâ⬠, then select the ââ¬Å"Create or Modify Forms â⬠options. This will launch a separate window called the Form Editor. Now you will want to decide where you want your new field to reside. 34 Figure: Form editor 2. You may need to reorganize the form to fit the custom field. The Form may be resizable just like any window, by dragging the cursor near the corners to bring into view the resize cursor (the thin black line with arrows on either end). Click and drag to resize the form if necessary. 3. A light line around fields denotes a frame grouping of selected fields on the form. To resize the frame, click your cursor on the line until small black squares surround the frame, then click and drag them. 4. On the small floating toolbar, click on the button denoted with an ââ¬Ëab'. 5. Click on the form where you want to place the new field. A small dialog box will open, listing the currently available fields in the selected form. 6. Click on the ââ¬Å"Newâ⬠button to create a new field. 7. Assign a name and data type to the new field. 35 A field NAME must not contain any special characters or spaces, and must be less than 8 characters long, because Summation references the field name internally. The field label may be customized to the users preference. 8. Once you have assigned a name and label, you need to select a data type. It is important to put some thought into selecting a field data type, since you cannot change the data type on a field once it has been created. If you are unsure of which data type to assign to your field, click on the radio button next to each option to view a brief description in the bottom portion of the dialog box. 9. Click ââ¬Å"Create New Columnâ⬠. When prompted that the column was created successfully, click ââ¬Å"OKâ⬠. 10. Click â⬠Closeâ⬠to return to the Field List dialog. If you should need to create multiple fields follow steps 7 through 9 until all fields have been created. 11. The new field should be one of the choices and will be selected by default. Click ââ¬Å"OKâ⬠to select the new field and place it on the form. To adjust the field's position on the form, click and drag it to a different location. To adjust the field label and the field box individually, click anywhere on the form to unselect them. Then click back on the item you want to resize or reposition. 12. When you have successfully created, sized and positioned all custom fields, click on the ââ¬Å"Saveâ⬠icon in the toolbars. If your database contains data in it, you will be prompted to copy data to new table structure, click ââ¬Å"OKâ⬠. 13. Close the Form Editor by selecting ââ¬Å"Exitâ⬠from the ââ¬Å"Fileâ⬠menu. 14. Click ââ¬Å"Closeâ⬠to close the Utilities dialog. To Load ocrBase Documents Using the Load Full-Text Documents Dialog: 36 Double-click on ocrBase in Case Explorer OR select ocrBase from the VIEW menu. Make sure ocrBase is in the active view. 1. From the FILE menu, select Load ocrBase Documents. 2. Select the Choose Files tab. 3. The default directory shown is the current case directory or the last directory selected using the Browse button. If the documents are located in another directory, click on Browse to navigate to that folder. 4. Select the files you want to load using any of the following techniques: ? Hold Ctrl and click on the document files one at a time ? Hold Shift, click on the first document file, then click on the last document file ? Click on the first document file, then hold the left mouse button down as you drag to the last document file you wish to load ? Select the Select All option to load all document files in the files window ? To cancel the selection of a file, click on the filename again 5. If you want Summation to verify the document numbers against any templates associated with the Column to Hold Image Tag field (BEGDOC# or other field, as needed), leave Check Templates selected. If you do not want the document numbers verified against any existing templates, clear the Check Templates selection. 6. Select one of the options in the Document ID (BEGDOC#) section: ? Ask Me (default): During the loading process, you will be prompted to enter a Document ID number for each document file being loaded. ? Use Filename: The document filename will be used during the loading process as the Document ID. 7. Click Load Documents. Summation loads the documents into the ocrBase. SEARCHING (Before doing any kind of search, make sure Core Database box is checked in case explorer) 37 . Check on the core Database in the case explorer. 2. Open the database in the column view. 3. Double click on ââ¬Å"Searchesâ⬠under the Core Database Views in case explorer. 38 4. Core Database Query dialog box appears. 5. Select the required field in ââ¬Å"Search one of these Fieldsâ⬠. Click on ââ¬Å"More fields Choicesâ⬠to choose from more number of fields. Double click on the required field and see that Query appears on the query box below. 6. Same way give the required values in the section 2 & 3. 7. Execute the query. For example, Consider searching for docDates. Steps: 1. Click on docDate box under ââ¬Å"Search one of these fieldsâ⬠(section1). 2. Scroll down on the drop down list, ââ¬Å"in this mannerâ⬠(section2) section and select the required field. 3. Enter the date in ââ¬Å"For this valueâ⬠(section3). 4. Full Query appears on the query box. 39 5. Click Ok to execute the query. 6. All the documents that match with the query will be listed. 7. To retrieve back all the documents, Go to Search-;Retrieve all summaries. QUICK SEARCH USING CASE EXPLORER When you use the Case Explorer to search the Core Database, the results appear in the Search Results format. The search results can be printed in the stacked format directly from the Search Results View. To Quick Search using the Case Explorer 1. Make the Case Explorer window the focus. 2. Click the check boxes next to the components you wish to search (e. g. Core Database, Transcripts, Transcript Notes, ocrBase). ? ? ? ? ? Core Database Transcript Notes eDocs & eMail ocrBase Notes ocrBase 40 ? Chronology of Events ? People ? Pleadings 4. Click in the Quick Search box. Depending on what combination of case elements you have selected, the Search dialog appears. Here you can change your search results Sort Order and/or specify running a Standard or HotFacts only search. 4. Type the search term or phrase in the white Quick Search box. You can use wildcards and compound operators (AND/OR connectors) in your search. ? Multi-character wildcard = an asterisk (*) ? Single-character wildcard = a question mark (? ) ? AND connector = & or AND (there must be spaces between the AND and the words) ? OR connector = (a backwards slash usually located above the Enter key on your keyboard) or OR (there must be spaces between the OR and the words) ? You can also use Intelli-Parse if you wish to conduct field-specific searches Click the Search button to run the search. The search results will appear in a new Search Results window. COMPOUND SEARCHES CONNECTORS IN THE DATABASE: 41 Connectors make it easy to search for document summaries where varying conditions are to be used, for example, to find document summaries where a name is in a summary field and where a certain type of document is involved. Connectors can also widen the search to include summaries of several sorts; such as, summaries concerning documents dated in the current year or any documents mentioning the defendant. As a general rule, using the connector AND narrow the search, while using the connector OR widens the search. Up to 10 connectors can be used in a search of the document summaries. Search Connectors Connector AND Definition A summary contains both values Summaries contain either of the values Example DOCDATE EQ 5/15/90 AND DOCTYPE OR DOCDATE EQ 6/15/90 OR DOCDATE EQ 7/12/90 AND NOT This excludes a NAME EQ ââ¬Å"Smith, J. â⬠AND NOT DOCTYPE EQ summary that Memo meets the connected value This requests NAME EQ ââ¬Å"Smith, J. â⬠OR NOT DOCTYPE EQ OR NOT 42 ocument summaries where the Name equals ââ¬Å"Smith, J. â⬠or the Doctype field does not equal Memo Memo You can create a more complex Quick Search by combining search clauses. To narrow the search, use the AND connector, designated by the ampersand (&). To broaden the search, connect your search clauses using the backslash () to represent the OR connector. You may use a total of ten clauses (i. e. , any combination of up to nine AND and/or OR connectors). Use parentheses to denote precedence or relationships between clauses within the search phrase. Sample ââ¬ËOR' Search: bill presley Sample ââ¬ËAND' Search: fire & terminate It makes no difference whether or not you put spaces between the words and the connectors. DRILL DOWN SEARCHING If you're reviewing a transcript on screen and come across a term of interest, you can search for other occurrences of that term without losing your focus by using Summation's Drill Down Searching function. Simply highlight the term of interest, right mouse click, and select ââ¬Å"Search for ââ¬Ëterm'â⬠from the menu that appears. Summation will take you to the next occurrence of the term. 43 How to Run a Drill Down Search 1. Open a transcript. 2. Right click on the text for which you want to search. 3. From the right click context menu that appears, select ââ¬Å"Search for ââ¬Ëtext'. â⬠Summation goes to the next occurrence of the term in the open transcript USING WILDCARDS IN SEARCHES Searches in Summation are done on a whole-word basis: a search for agree will find just that, not words including ââ¬Å"agreeâ⬠like ââ¬Å"agreement. â⬠Sometimes you need to search for more than just whole words. To accomplish this Summation Blaze supports wildcards in searches. The asterisk (*) designates a wildcard, which can represent any portion of a word. Using wildcards widens the field of possible hits generated by the search. Wildcards are used to find all words that have your search phrase embedded within them. If you run a Quick Search for TERM*, the search is expanded to encompass any word with ââ¬Å"termâ⬠as the base, for example, ââ¬Å"term,â⬠ââ¬Å"terminate,â⬠ââ¬Å"termination,â⬠etc. Your placement of the asterisk (either preceding or following the word, or embedded within letters) determines the hits that result. You can use wildcards in any type of search within Summation. 44 Type This agree [no wildcard needed] agree* *gree *agree* To Find AGREE Words beginning with AGREE-, such as agreement or agreeable Words ending with -GREE, such as disagree, pedigree Words with -AGREE- as the root, such as disagreement Words beginning with A- and ending with -EEP, such as asleep a*eep USING SEARCH CONNECTORS The Summation system provides you with means to perform both simple and complex searches. You can search all fields in the document database (using the Quick Search Box) or select specific fields to search (using the Full Boolean Search dialog). This Tutorial walks you through setting up and performing both simple and complex searches. When you enter a search term or phrase in the Quick Search box, Summation conducts an Anytext search and searches for the specified text in all fields in all summaries in the database. If you want to refine your search to multiple terms and/or phrases, then you can use ââ¬Å"connectorsâ⬠. You can further refine your search to specific fields in the database, by performing a Full Boolean search (as opposed to a search from Quick Search box). The available connectors in Summation are AND, OR, AND NOT, and OR NOT. You can connect up to ten search clauses in one Boolean search using nine connectors. The Full Boolean search provides a list of operators specific to each field, which you can use (in conjunction with connectors) to further refine your search to terms in designated database fields. Search Connectors Using An Anytext Search 1. Launch Summation. 45 2. Open the Core Database, by double-clicking on its corresponding item in the Case Explorer tree. 3. Put the focus on the Form or Column View, by clicking on the respective view. 4. Type a search term in the Quick Search Box (the field above the Core Database view with the phrase Enter Search Phrase populated in it). 5. Link words or phrases with a connector to search on multiple terms or phrases. (For example, Smith AND taxes OR court. ) Note: A space must lead and follow each connector. The connectors should always be in capital letters. 6. Repeat steps 2 and 3 until you complete entering all desired search terms/phrases and connectors. Note: If you search string includes more than 5 terms, you may find it more efficient to use the Full Boolean search setup dialog. 7. Click the Search button on the Toolbar, to the left of the Quick Search Box, to process the search. Searching Using The Full Boolean Dialog Box 1. Launch Summation. . Open the Core Database, by double-clicking on its corresponding item in the Case Explorer tree. 3. Put the focus on the Form or Column View, by clicking on the respective view. 4. Click the Boolean button in the Toolbar. 5. In Section 1 of the Full Boolean dialog, choose the Anytext icon (or other default icon) or choose ââ¬Å"More Field Choicesâ⬠to select fields from the active table. 6. In Section 2 of the Full Boolean dialog, use the default connector (e. g. contains) or select a connector from the drop-down list. 7. In Section 3 of the Full Boolean dialog, type the search term or phrase you want to search on. 6 8. Click the Connector button to add another search string (field, connector and term/phrase). 9. Repeat Steps 2 through 5 until all search strings have been entered. 10. Click the Display Results button to process the search. Using HotFacts with ocrBase just as u can identify a transcript note, a core database record or an ocrbase note as a hot fact, you can also use the hotfact ââ¬Å"flagâ⬠to identify key ocrbase documents in your case. to mark an ocrbase document as a hotfact: ? Click on the ? Click on the so that it becomes again to unmark the document. SEARCHING HOTFACTS You can search only database records flagged as HotFacts when you check the Document Database folder at the Case Folder ââ¬â Main Window. The Search Document DB dialog appears, consisting of 2 sections: Sort Order and Search Type. The first 2 Sort Order field options are Date (DOCDATE) and Issue (ISSUES). The third sort order field option is taken from the first field set in your Sort Order tab, found under the Query tab in the document database. If there is no sort order set there, the third option will read ââ¬Å"Unsorted Doc DBâ⬠. The Search Type section determines what set of document database summaries you want to search. To search all HotFacts, select Only HotFacts and then Everyoneââ¬â¢s. To search only your own HotFacts, select Only HotFacts and then My HotFacts. 47 Searching Document Database Records Flagged as HotFacts 1. From the Case Folder ââ¬â Main Window, check the Document Database folder. 2. The Search Document DB dialog appears. 3. In the Sort Order section, select the field by which you want to sort your search results. You can choose Date, Issue, or the first field you have selected in your Document Database Sort Order. 4. In the Search Type section, select the record set in which you want to search: only HotFacts (all HotFacts), or My HotFacts. . Type the phrase for which you want to search into the Quick Search Box on the toolbar. 6. Click on the search binoculars to display the Search Results. SEARCHING CASE OUTLINES ââ¬Å"You can search the case outline. For example, in the figure below, you see a search for ââ¬Ëdamage,' showing the first hit found in the Case Outline: th e word ââ¬Ëdamages. ââ¬Ë Because the search algorithm here provides for a simple string search, it will find any phrase containing the same characters (e. g. a search for ââ¬Ëdamage' will find ââ¬Ëdamaged' ââ¬Ëdamages' and ââ¬Ëdamaged'. Subsequent hits can be found by clicking again on the OK button. Summation indicates the line with the hit by outlining it in black. â⬠48 FILTERED FUZZY SEARCHING The Fuzzy Search is a variation on the Quick Search that allows you to search for a specific word and words spelled similarly to it. This tool can be used in a variety of circumstances, for example when working with documents that have been processed by optical character recognition software, since certain characters are often mistaken for similarly-shaped ones during that process. You can also use the fuzzy search to look for words that may have been misspelled, or for words with British spellings (such as ââ¬Å"flavourâ⬠and ââ¬Å"flavorâ⬠). The Fuzzy Search finds near-matches to your search requirements. It is available for searching your transcripts and/or full text (ocrBase) documents. When used to search transcripts and/or full text documents from the Case Folder ââ¬â Main Window, the words found are displayed in a list of approximate matches. Filtered fuzzy searching lets you search transcripts and/or ocrBase documents for nearmatches of a single word, without having to wade through numerous false 49 positives. This allows you to select only the words in which you are interested and run another search by clicking on the Search button. A standard search for these words is then launched, displaying the hits in the regular Search Results Window, from which you can print them, write them to file, mark them as HotFacts, or drag them into the Case Organizer. The List of Approximate Matches for a Filtered Fuzzy Search 1. From the Case Folder ââ¬â Main Window, check the ocrBase and/or transcript folders you wish to search. 2. Enter the term for which you want to search into the Quick Search Box. 3. Click the Fuzzy Search button on the toolbar. 50 4. A list of approximate matches appears, with the original word(s) preselected. To narrow your search, enter a higher percentage similar and click on Refind. To broaden your search, enter a lower % similar, and click on Refind. (You can select percentages between 65% and 99%. ) 5. When you're satisfied with your list of matches, select the ones for which you wish to search by clicking on them; choose all words by clicking on Select ALL words. (You can deselect words by clicking on them. ) 6. Click the Search button. Your hits are displayed in the Search Results Window. SORTING By default, contents of fields are sorted in standard A to Z, 0 to 9 sequence. You can designate descending sort (Turn this option on from the Sort Order tab of the Query page of the Document Database folder. This option forces the contents of the field to be sorted in reverse order, Z to A and 9 to 0. Ascending sort order is the default when a field is included in the sort order) using the Sort Order tab of the Document Database folder. You can also have your note hits sorted in reverse-chronological order. 1. Open the database in column view. 2. Right-Click on the column label, Click sort by ââ¬Å"labelâ⬠option. 51 To change the default order: ? Double-click on icon on the toolbar. ? Check the box in the ââ¬Å"Sort byâ⬠table. Give OK. 52 Conclusion This concludes the detailed discussion with reference to the application of Summation to facilitate the QC process. While there are more uses and applications of Summation in EDD these have been omitted to focus the reference of the context under discussion. If you have any queries / suggestion please feel free to contact me at [emailà protected] net. In case you need specific detailed references please feel free to use the links below: References: http://www. summation. com/Support/tutorials. aspx http://info. summation. com/products/pdfs/ http://support. summation. com/knowbase/technotes 53
Subscribe to:
Posts (Atom)