Monday, January 27, 2020
Automated Accounting Information Systems Accounting Essay
Automated Accounting Information Systems Accounting Essay 2.1 Computer Auditing 2.1.1 The introduction of automated Accounting Information Systems In earlier times, when all accounting information was processed and recorded in financial statements manually, it was relatively easier for the auditor to observe the audit trail as all evidence was produced in a manual/physical format. At that time, Information Systems (IS) were only a small integrated part of the accounting system which only automated minor parts of the accounting process, such as payroll processing. Figure 2.1, as suggested by Arnold and Sutton (2001), illustrates the evolution of the relationship between accounting and information systems throughout the last four decades. AccountingFigure 2.1 Evolution of AIS Information SystemsTIME LINE 1970s Information Systems Accounting AIS 00 Information Systems Accounting 2010s Over time, accounting and information systems started to integrate as more accounting tasks were becoming automated. In fact, Arnold and Sutton (2001) state that the fundamental underlying driver of evolution is simply that accounting no longer drives the information system; rather the information system drives accounting. As depicted in Figure 2.1, Information Systems have nowadays become an integral part of many companies. The Accounting Information System (AIS) is a small part of the whole Information System of an organisation, and as organisations continue to increase their reliance on computer technology to process, record and report financial information, auditors will undoubtedly have to rely on new information technology techniques in the conduct of their audits (Hunton, Bryant and Bagranoff, 2004). Through the evolution of AISs, the traditional audit evidence was being replaced by electronic evidence (Rezaee and Reinstein, 1998). The American Institute of Certified Public Accountants (AICPA) in Auditing Procedures Study The Information Technology Age: Evidential Matter (1997) defines electronic evidence as information transmitted, processed, maintained, or accessed by electronic means and used by an auditor to evaluate financial statement assertions. The concept of electronic evidence created new challenges to the modern auditor as the traditional audit trail could no longer be observed (Bierstaker, et al., 2001). This required auditors to consider the use of computer audit techniques in order to be able to carry out audit tests on electronic evidence (Mancuso, 1997). The use of such new techniques will eventually improve the effectiveness and efficiency of the audit as auditors will be free from carrying out many traditional routine audit tasks and instead the auditor can foc us more on higher level tasks, such as understanding the clients business risk (Rezaee, Elam and Sharbatoghlie, 2001). 2.1.2 Auditing Around to Auditing With the Computer With the introduction of computer technology, auditors did not have the extensive knowledge to use computers to enhance the efficiency and effectiveness of the audit. Initially, auditors regarded the computer as a black box and audit around the computer (Watne and Turney, 2002). This consists in the auditor observing inputs into the system and the relative outputs and checking for mutual consistency (Hall, 2004). When using this method no attempt is made to establish and evaluate existence of controls. Auditing around the computer is only relevant when automated systems applications are relatively simple and straightforward (supported with up-to date documentation on how the system works); and when the audit trail is easy to observe (Cerullo and Cerullo, 2003). The increased reliance on computers for accounting by organisations created the need for auditors to understand and assess the controls that were in place in computer systems (Watne and Turney, 2002). Ignoring such computer controls would hinder the ability of the auditor to assess the effectiveness and robustness of the clients internal controls. Auditors could no longer audit around the computer, but instead a new approach, auditing through the computer, was being used. Hall (2004) defines auditing through the computer as: à ¢Ã¢â ¬Ã ¦the ability to trace transaction paths from input to output through all parts of the system-manual and automated. The flow of data must be verified as it moves through the system, and the contents of machine readable files must be examined. Internal controls are tested as they operate on the data. The black box is gone. The auditing through the computer approach is suitable for testing controls in complex Information Technology (IT) systems (as suggested in SAS No. 94 The Effect of Information Technology on the Auditors Consideration of Internal Control in a Financial Statement Audit). The motive behind auditing through the computer is to be able to understand and assess the robustness and operating effectiveness of the computer controls within a system. According to Cerullo and Cerullo (2003), this approach is based on the assumption that if controls are adequately developed into the system, then errors are unlikely to slip by undetected, and thus outputs from the system can reasonably be accepted as reliable. Moreover, Hall (2004) suggests that the current trend is towards auditing with the computer, that is, instead of being treated as a black box, the computer is actually used as a tool to access, review and extract files and data from the clients AIS. This approach helps auditors to improve the efficiency and effectiveness of the audit as the computers speed and reliability can be used to review large volumes of data. However, the last two approaches highlight the need for auditors to have an extensive knowledge of computers in order to be able to assess the integrity of the clients computer system or to use the computer as a tool to carry out the audit. 2.1.3 Objective of an Audit in an IT Environment Nonetheless, whether an audit is carried out in an IT environment or not, the objective of the audit remains the same, that is, as expressed by International Federation of Accountants (IFAC) in ISA 200 Overall Objectives of the Independent Auditor and the conduct of an audit in accordance with International Standards on Auditing: To obtain reasonable assurance about whether the financial statements as a whole are free from material misstatement, whether due to fraud or error, thereby enabling the auditor to express an opinion on whether the financial statements are prepared, in all material respects, in accordance with an applicable financial reporting framework The auditor must be able to obtain sufficient and appropriate evidence in order to reduce audit risk to an acceptable low level. In doing so, the auditor would be in a position to express an opinion whether the financial statements prepared by the client give a true and fair view. It is thus fundamental for the auditor to assess the clients IT environment and plan adequately (with the support of standards and guidelines) on whether the use of Computer-Assisted Audit Techniques (CAATs) will be required to gather sufficient appropriate evidence during the audit. 2.1.4 Audit of Public Interest Entities CAATs are commonly used when auditing clients which carry-out all their operations online, such as Online Gaming companies, and when auditing large clients which rely on large and complex IT systems. Examples of the latter could be listed companies, financial institutions and insurance companies, all of which fall under the definition of Public Interest Entities (PIEs). The definition of PIEs varies across countries, but the core element is always the same. In fact, the revised 8th Directive provides with a core definition of PIEs, but it also permits the designation of other entities as PIEs by member states as they deem adequate (based on meeting a number of criteria). The definition is as follows: Entities governed by the law of a Member State whose transferable securities are admitted to trading on a regulated market of any Member Stateà ¢Ã¢â ¬Ã ¦, credit institutions à ¢Ã¢â ¬Ã ¦ and insurance undertakingsà ¢Ã¢â ¬Ã ¦. Member States may also designate other entities as public interest entities, for instance entities that are of significant public relevance because of the nature of their business, their size or the number of their employees. In light of the definition set out by the revised 8th Directive, examples of Maltese PIEs are listed companies, financial institutions, insurance companies, large not for profit entities, and some publicly owned entities; all having a wide range of stakeholders. Due to the public stake in the performance of PIEs, the auditors role and responsibilities in giving an opinion on the financial statements of such entities becomes more important. In fact, the majority of PIEs in Malta are audited by the Big Four audit firms as these firms have the extensive knowledge and resources to carry-out audits of PIEs efficiently and effectively. Big Four Audit firms use CAATs to improve audit efficiency as it allows auditors to perform previous manual routine tasks quickly and efficiently (Zhao et al. 2004). Furthermore, Big Four Audit firms can use CAATs to improve audit effectiveness as more information can be obtained on controls within AISs of the client, and in certain cases 100 percent of the population can be tested (Braun and Davis, 2003). 2.2 Computer Assisted Auditing Techniques (CAATs) 2.2.1 Standards and Guidelines Due to the aforementioned increased reliance on IT systems by clients, new auditing standards and guidelines were needed to provide support and guidance to auditors. With relevance to this study, there are three important standards/guidelines that provide guidance to auditors when carrying-out an audit within an IT environment. SAS No. 94 The Effect of Information Technology on the Auditors Consideration of Internal Control in a Financial Statement Audit provides appropriate guidance to auditors on how to adequately understand and assess the computer controls within an organisation. SAS No. 94 goes on to clarify what the auditor should know in order to be able to understand the automated and manual procedures an entity uses to prepare its financial statements and related disclosures (Yang and Guan, 2004). Furthermore, this auditing standard emphasises on the need to use Computer-Assisted Auditing Techniques (CAATs) to test automated controls, especially in complex IT environments (Cerullo and Cerullo, 2003). ISACA Guideline No. 3 Use Of Computer-Assisted Audit Techniques (CAATs) provide guidelines to auditors on how CAATs can be effectively applied, specifically by providing detailed steps in planning the use of CAATs; performing the work; documenting and reporting. Another standard, SAS No. 99 [should I refer to ISA 240 instead?] Consideration of Fraud in a Financial Statement Audit provides guidance to auditors on how to identify risks of material misstatements whether due to error or fraud. SAS No. 99 also recognises the importance of CAATs in the consideration of fraud, as this standard suggests that in cases where the client relies heavily on computer systems, the auditor should make use of CAATs to detect patterns of fraud. Furthermore, this audit standard highlights the importance of identifying the possibility of management override of controls. 2.2.2 Application of CAATs in Financial Auditing During a study carried out in Sweden by Temesgen (2005) on the Determinants for effective application of software in CAATs it was found that the most used type of CAATs by the big four audit firms in Sweden are CAATs used for simplification of monotonous tasks, such as Microsoft Office and other off-the shelf audit software packages. On the other hand, this study identified that the most effective CAATs such as Test Data, Integrated Test Facility, Parallel Simulation and other experts systems, which would have been more effective in observing electronic audit trails, are less utilised. CAATs can aid the auditor in performing various audit procedures especially when adopting the audit through the computer and audit with the computer approaches. Depending on the requirements of the audit, the auditor can choose to use CAATs to perform specific audit tasks such as drawing a sample, comparing balances between accounting periods, reviewing transactions for fraudulent patterns, testing applications controls, and performing tests of detail. 2.2.2.1 Sampling and Tests of Detail When using CAATs the auditor has the ability to test large volumes of transactions, more than he would have had he done the same process manually. This is one of the advantages of using CAATs. Using the computers speed, reliability, accuracy and robustness the auditor can perform repetitive tasks efficiently and effectively. Additionally, CAATs can also be used to draw samples representing the population and to carry out tests of detail, such as recalculation of discounts on invoices or recalculation of overtime allowances 2.2.2.2 Analytical Procedures ISA 520 Analytical Procedures defines analytical procedures as evaluations of financial information through analysis of plausible relationships among both financial and non-financial data. Furthermore, according to Wilson and Colbert (1991), analytical procedures involve drawing conclusions based on expected amounts calculated by the auditor. In performing such procedures, CAATs can be useful especially when reviewing complex data. These automated techniques are set to compare figures between accounting periods and possibly identify inconsistencies. 2.2.2.3 Test of General and Application Controls CAATs can also aid in testing general and application controls. As required in the audit through the computer approach, such computer aided techniques are used to assess the reliability of internal controls within computerised systems (Watne and Turney, 2002). For this to be successful the auditor must first understand how the clients system works, and then various CAATs can be applied to test the operating effectiveness of the clients system controls. 2.2.2.4 Fraud Detection Recent fraud scandals such as the cases of Enron and Worldcom, increased the importance given to performing audit procedures with the objective to identify fraudulent activities. As organisations use computer technology to process information, weak computerised internal controls or the lack thereof would increase the risk of fraud occurring through computer assisted means (Coderre, 2000). In fact, SAS No. 99 Consideration of Fraud in a Financial Statement Audit proposes the use of CAATs for identifying fraudulent transactions and management override of controls. Digital Analysis is one type of CAAT with the specific purpose to identify fraudulent transactions (Hall 2004). This approach is used to identify inconsistencies in digits based on statistical properties through the use of Benfords Law. Additionally, according to Coderre (2000), as auditors develop a more systematic knowledge of fraudulent patterns within organisation, they can create a fraud profile which identifies the main fraud areas and patterns. This could then function as a template and be used when auditing different organisations. 2.3 Types of Computer Assisted Auditing Techniques CAATs are often divided into two categories, that is, CAATs used by the auditor to review and extract data (auditing with the computer); and CAATs used for testing the controls within computerised AISs of clients (auditing through the computer). 2.3.1 Reviewing and Extracting Data Files Compared with the techniques used for testing controls within AISs, CAATs used for reviewing and extracting data may require relatively less computer knowledge to use. Auditors may use these techniques to review and extract transaction and standing data in order to use it to perform substantive tests or test of controls. Two types of CAATs generally falling in this category are the Data File Interrogation and Embedded Audit Module techniques. 2.3.1.1 Data File Interrogation Data File Interrogation is about using the computer as a tool to review large volumes of data (Auditnet, 2003). With the use of computer software, the auditor can use the computers speed and reliability to perform tasks such as searching for missing or duplicate transactions; and comparing the contents of two files and printing a report containing the results with exceptions and/or record matches. Data File Interrogation can also be used to extract representative samples of data from the population to be used at a later stage in the audit. 2.3.1.2 Embedded Audit Module (EAM) As the name suggests, an Embedded Audit Module is a programmed module embedded in the clients computer system to review and capture data based on predetermined criteria set-out by the auditor (Auditnet, 2003). Transactions are examined as they are inputted in the system. The objective of the EAM is to capture those transactions which fall under the parameters set-out by the auditor. These transactions are then copied and stored in an audit log file for subsequent review from the auditor. The transactions which are captured by the EAM can then be used by the auditor to perform substantive tests. One the advantages of using Embedded Audit Modules is that it provides the auditor with data which is captured throughout the audit period and thus reduce the time and amount of work the auditor must do to identify transactions to be used for substantive testing at a later stage. On the other hand, one major limitation of EAM is that it cannot be easily added to the clients system once it is operational and thus this technique is more useful when the clients system is still in the design stage (Auditnet, 2003). 2.3.2 Testing Controls within Accounting Information Systems In contrast to the first category of techniques discussed above, there are CAATs which the auditor uses to audit through the computer. According to Braun and Davis (2003) these CAATs are used by auditors to examine the internal logic of the application. This means that the objective of such techniques is to assess the integrity and operational effectiveness of the controls within the clients computerised system. Three techniques are commonly used in the audit through the computer approach and these are Test Data, Integrated Test Facility (ITF), and Parallel Simulation. 2.3.2.1 Test Data When using the Test Data method, the auditor conducts testing of the clients system by inputting simulated test transactions into the system. The facility to design the test data gives the auditor the ability to decide what to and not to test. These test transactions are processed by the system and then the auditor compares the processed results with expected output. Any differences between the processed results and the expected results by the auditor could indicate a logic or control problem within the clients system (Braun and Davis, 2003). On the other hand, if no exceptions occur between the processed results and the expected results, then the auditor can reasonably assume that the systems controls operate effectively under normal circumstances. As suggested by Watne and Turney (2002), the objective of performing substantive testing with test data is to determine the accuracy of that computer processing for which a test record is submitted. Furthermore, test data can also be used to test the error detection capabilities of the system and to test the accuracy of reports produced by such system. The test data approach is commonly used by auditors as it requires limited computer knowledge and it is relatively easier to use when compared to other CAATs. Additionally it provides the auditor with an understanding of how the system operates (Auditnet, 2003). On the other hand, when creating the test data transactions the auditor may not be allowing for specific circumstances that may occur when the system is live and may lead the auditor making wrong assumptions on the integrity of the clients system controls. 2.3.2.2 Integrated Test Facility (ITF) Watne and Turney (2002) define Integrated Test Facility as a technique whereby the auditor creates simulated transactions, intermixes the transactions with a clients actual transactions, waits for the processing of the intermixed transactions, and then analyses the processing of the simulated transactions. Figure 2.2, as depicted by Auditnet in its Monograph Series Principles of Computer Assisted Audit Techniques (2003), illustrates the in-built testing facility/module which can be used for audit testing. The process is the same as that for the test data approach. The difference between the two methods is that in the test data approach the auditor uses a copy of the clients system to input the test transactions. On the other hand, when using the ITF method, the auditor actually inputs the test transactions in the clients system when running live under normal circumstances. As depicted in Figure 2.2, the system then processes the clients actual data intermixed with the auditors test data. Output is then separated again into client output and test output. The test output is compared with the auditors expected results and any deviations from the expected results are highlighted. Thus, this provides the auditor with a more accurate observation of controls within the system. Figure 2.2 Integrated Test Facility The advantages that ITF has on test data are that it allows the auditor to make unscheduled regular testing on the system when its live, and it provides live evidence on the operation effectiveness and integrity of the clients system. However, when using this method, auditors should give particular attention to identifying and removing the test transactions from the clients records once the audit testing is complete as this may hinder the integrity of the clients system. 2.3.2.3 Parallel Simulation Similar to the Test Data approach and ITF, parallel simulation is used to test the integrity and operating effectiveness of the clients application (Hunton, Bryant and Bagranoff, 2004). Figure 2.3 illustrates the process in using parallel simulation as depicted by Auditnet (2003). Watne and Turney (2002) define parallel simulation as the construction of a processing system for an accounting application and the processing of actual data through both the clients program and the auditors program. In simpler terms, the auditor designs an application which simulates the clients application. The simulated application should contain the appropriate controls that the auditor is expected to find in the clients application. Actual data (transactions occurring from the normal day-to-day running of the clients business) is then inputted in both the clients and simulation applications. The auditor then compares the output produced by the simulated application with that produced by the clients application. Figure 2.3 Parallel Simulation Assuming that the simulation application contains all the appropriate controls, then output from the simulation application should match with output from the clients application. If there are differences between the outputs produced by the two systems, then the auditor may infer that the input, processing and output controls within the clients application are not operating effectively. As the ITF technique, parallel simulation enables the auditor to test the clients system under normal operations. Furthermore it enables the auditor to use live data in testing controls unlike with the Test Data approach and ITF where test transactions are used. On the other hand, this technique requires extensive computer knowledge to be able to design a simulation application. Additionally, the cost for developing the simulation application can be relatively high (Watne and Turney, 2002) As discussed in this chapter, CAATs provide means of improving the efficiency and effectiveness of the audit. However, as correctly stated by Brazina and Leauby (2004) CAATs are not a substitute for auditor judgement. It is crucial for auditors to use guidelines (such as ISACA Guideline No. 3) in order to plan the use of such techniques during the audit as lack of planning will eventually hinder the benefits derived from the use of CAATs. Particular considerations should also be given to the IT knowledge and experience of the audit team; the access available to the clients computer systems; and the impracticability of performing manual tests when auditing complex automated systems.
Sunday, January 19, 2020
Healthy Lifestyle Final Research Report
Life SLEEP AND HEALTHY LIFESTYLE 1 Sleep and Healthy Lifestyle National University of Singapore Undergraduates Profile Jiexuan Wang SM2 Group 1 National University of Singapore SLEEP AND HEALTHY LIFESTYLE 2 Sleep and Healthy Lifestyle National University of Singapore Undergraduates Profile Sleeping, along with other healthy life habits has arisen awareness in recent years. As will be stated later, the majority of university undergraduates rarely took healthy living seriously.University students have long been known, as claimed by Dement (1997), to burn the midnight oil and maintain an unhealthy lifestyle, which could be potentially hazardous to their health condition. Apart from dozing off in the class, sleeping deprivation and poor sleeping quality led to many long-term effects on the health conditions. Recently, we conducted a survey among the National University of Singapore (NUS) undergraduates to explore their knowledge of healthy lifestyle and sleeping habits (see Appendix A In terview Questions).The research mainly covered the concept of a healthy lifestyle, the sleeping hours and rituals. The aim of this paper is to reveal the general sleeping and healthy lifestyle conditions among NUS undergraduates and to revoke awareness on the healthy lifestyle and sleeping issue. Methodology The primary evidence was collected from our interviews, and several related materials were analyzed as subsidiary resources. We conducted face-to-face interviews and recorded down the responds from respondents. Six faculties were involved in the research, including Faculty of Science, Faculty of Art and SocialSLEEP AND HEALTHY LIFESTYLE 3 Science, Faculty of Engineering, Faculty of Business, School of computing and School of design and environment. Because of the limitation of the research method, we have only covered 96 respondents in our research. Results and Discussion This research covers the concept of a healthy lifestyle, sleeping deprivation and other related perspectives . The result is to some extent in accordance with our expectation, but some of the problems of sleeping disorders and deprivation have grabbed our attention. This section will discuss these topics in detail.Healthy lifestyle concept The concept of a healthy lifestyle may vary according to different people. From the research, it is clear that sleep, nutrition and exercise are major contributing factors, with some of the respondents emphasizing the importance of scheduled and balanced lifestyle. However, they could only give an idea of the concept without knowing further about this topic. The following Figure 1 presents an idea of the respondentsââ¬â¢ understanding of healthy lifestyle. 71 4 5 5 6 4 8 1 1 80 60 40 20 0 42 51 Figure 1 Healthy lifestyle Concept of NUS undergraduates number of espondents SLEEP AND HEALTHY LIFESTYLE 4 Sleeping hours Scientists accentuate the importance of length of sleep, suggesting a six to eight hours of sleep every night. Insufficient sleep may lead to diminishing productivity, tendency to make mistakes and most dangerously, unintended sleep. Figure 2 shows the sleeping hours among the respondents. The percentage of sleep deprivation among NUS undergraduates is sobering. 18 out of 95 respondents stated that they have less than 6 hours of sleep each day, and as one of the respondents added, ââ¬Å"There were many students dozing off during lectures. In addition, some of the respondents gave details of the sleeping time at night, ranging from eleven oââ¬â¢clock to two or three oââ¬â¢clock in the morning, and even shockingly, four or five in the morning when there is no lecture in the morning. However, noting that our biological rhythms work just the other way around, the sleeping habits of the majority of undergraduates are unhealthy. Reports (Fredrik, 2007) indicated that the period of 11 oââ¬â¢clock in the evening to 3 oââ¬â¢clock in the morning is when the body goes through a detoxification process and any time be tween 5 oââ¬â¢clock to 7 oââ¬â¢clock in the morning is suitable for defecation process. 0 60 40 20 0 below 6 sleeping hours 6 to 8 above 8 18 5 72 Figure 2 Sleeping Hours among Undergraduates in NUS SLEEP AND HEALTHY LIFESTYLE 5 Sleeping Rituals Sleeping rituals could affect the sleeping efficiency and quality of sleep. Figure 3 illustrates the major sleeping rituals among the NUS undergraduates. One major factor is eating. Eating before bedtime has been a long-discussed topics among scientists. It is a two-edged sword, for sleep-benefit drinks such as a cup of warm milk can improve the efficiency of sleep while most snacks taken before bedtime are well known to be weight gaining.Interviews with respondents reveal that most of them will choose to eat before bedtime if they are hungry. However, burning the midnight oil easily contributes to bedtime eating habit. Besides, scientists claim that eating within three hours before bedtime is unhealthy (Taft, 2012). The research also reveals that the second most favorable activity before bedtime is to exercise, which was proved to be beneficial to the improvement of sleeping quality, as stated in (Wooten, 2007).Among other common sleeping rituals, recreations like movie watching may cause an excitement before sleeping time and resulted in sleeping disorder. number of respondents Exercising Chatting Set Alarm Shower Go Out Listening to Music Reading 25 12 12 9 37 1 1 3 2 1 16 15 15 19 Figure 3 Things NUS Undergraduates Do before Sleep SLEEP AND HEALTHY LIFESTYLE 6 Conclusion The research reveals that the majority of undergraduates have a relevantly clear concept of a healthy lifestyle and that the sleeping pattern of the majority of undergraduates is reasonably healthy.The overall results from each faculty were mostly the same (see Appendix B). However, when it comes to sleeping hours and sleeping rituals, much can be done to improve the quality and efficiency of sleep, in order to avoid impaired performances and unintended sleep during daytime. The significance of the study of sleeping patterns is obvious, for it reveals the healthy condition of undergraduates and possibly revokes awareness of sleeping issue among NUS undergraduates. (846 words) SLEEP AND HEALTHY LIFESTYLE 7 References Fredrik, P. (2007). When is the Best Time to Sleep?.Retrieved November 30, 2012 from http://www. ineedmotivation. com/blog/2007/10/when-is-the-best-time-to-sleep/ Taft, W. (2012). Stop eating three hours before bed. Retrieved November 30, 2012 from http://willtaft. com/eat-at-least-3-hours-before-going-to-sleep/ Dement, W. (1997). Sleepless at Stanford. In What all undergraduates should know about how their sleeping lives affect their waking lives. Retrieved November 30, 2012 from Stanford University, Center of Excellence for the Diagnosis and Treatment of Sleep Disorders Web site: http://www. stanford. du/~dement/sleepless. html Wooten, V. D. (2007). Discovery Health: ââ¬Å"How to Fall Asleepâ⬠. Retri eved November 30, 2012 from http://health. howstuffworks. com/mental-health/sleep/basics/how-to-fall-asle ep. htm SLEEP AND HEALTHY LIFESTYLE 8 Appendix A Interview Questions 1. What is your concept of a healthy lifestyle? 2. What do you think are the factors that represent a healthy lifestyle? 3. Do you think that sleep is essential in maintaining a healthy lifestyle? Why? 4. How much sleep do you normally have? Is it any different during examinations? 5. Do you have any leeping ritual-à ? a series of actions that you usually carry out-à ? before going to sleep? How long does it take you to do this? 6. Do you eat before bedtime? A. What food/drink helps you to sleep? How does it help you to sleep? B. What food/drink prevents you to sleep? How does it prevent you to sleep? 7. Do you exercise before bedtime? What type of exercise do you do? How long does it take you to do this? 8. What other activities do you do before sleeping? Do/does these/this help or prevent you to sleep? SL EEP AND HEALTHY LIFESTYLE 9 Appendix B Research Data (Original)
Saturday, January 11, 2020
Bridgeton Industries: Automotive Component and Fabrication Plant Essay
In 1985, Bridgeton Industries, a major supplier to Big-Three domestic automobile manufacturers, is facing a competitive environment with advent of foreign competition and rising gasoline prices, leading to shrinking pool of production contracts. Bridgeton reacts by closing ACF diesel engine plant and hiring strategic consulting firm to classify their products on competitive position. Based on analysis, Bridgeton outsourced oil pans and muffler exhaust (classified as Class 3) and introduced programs, such as lowering time required to change dies, to improve product, quality and productivity. However, despite of these measures, manifolds were downgraded from Class II to Class III in 1990 model year budget. Now, Bridgeton faces the challenge to decide if manifolds be outsourced and, more importantly, what more to do (in terms of strategy) to keep the business? Bridgetonââ¬â¢s Organization: â⬠¢ Cost System: It comprises of materials, direct labor and overhead. Per Exhibit 2, during period 1987-90, the overhead rates have increased as shown below; especially after outsourcing in 1988. With outsourcing, the overhead cost have not reduced at same rate as labor cost, leading to higher costs for the remaining products such as manifolds. Thereby, outsourcing manifolds shall lead to higher cost for the remaining products such as fuel tanks and doors and shall push them down to Class III. â⬠¢ Revenue and Profit: Outsourcing manifolds will reduce cost; however, the sales will be reduced even more, since Bridgetonââ¬â¢s highest revenue is from Manifolds, which account for 41% ($93,120/$226,542) of their total sales in 1990, leading to lower profit. Business Market: With higher efficiency standards, demand for stainless steel manifolds such as those produced at ACF could be increased dramatically and so, probably, would their selling prices. This will lead higher revenue and profits from sales of manifolds (if not outsourced); assuming no significant increase in the cost (material). Therefore, outsourcing Class III manifolds (per Consulting Firmââ¬â¢s recommendation) shall not be advantage for the ACF plant. Clearly, reduction in plant production volume and high overhead cost has caused ACF plant to be less cost competitive. Recommendations: Following are the recommendation to utilize ACF plant resources efficiently and thus, improve overhead rates for existing products: â⬠¢ Increase technology capability, thereby, increasing production of existing products â⬠¢ Use Activity Based Costing (ABC) to actually analyze the individual cost incurred for these products and opportunity for its reduction â⬠¢ Initiate reforms in manufacturing and admin processà â⬠¢ Sell un-used outdated machinery that are causing big depreciation and insurance cost â⬠¢ Promote cost-cutting but preserving quality â⬠¢ Set budgets and review them on a weekly, monthly and yearly basis. Through this we can utilize overhead expenses more efficiently and allocate it amongst current products to be cost competitive and keep the pricing within reasonable limits, helping us to maintain our profitability and market shares.
Thursday, January 2, 2020
William Golding s Lord Of The Flies Essay - 1911 Words
In the past one hundred years, multiple events have led to people questioning the basis of human nature. The World Wars, 9/11, the Atomic bombing of Nagasaki and Hiroshima, and the Vietnam War are all just a few instances that challenged the perception of the extent to which humans have the capacity to maliciously and savagely harm one another. William Goldingââ¬â¢s Lord of the Flies serves as a perfect fictional example of such questioning. Set on an island during World War II, a group of British schoolchildren become stranded on an island and therefore manage to ââ¬Å"escapeâ⬠the savage war-time conditions at home. However, it quickly becomes evident that savagery abounds on the island as well. Famous and somewhat nihilistic thinker Friedrich Nietzsche would have had insightful analysis regarding the interactions in Goldingââ¬â¢s Lord of the Flies, in particular with regard to some of the boysââ¬â¢ desire to obtain power, the assertion of different moralities onto t he boysââ¬â¢ lives, and the power struggles that highlight the tale. One aspect of the Lord of the Flies which Nietzsche would have valuable insight into would be the boys desire to obtain power once they are stranded on the island. After being stranded, there is a power vacuum such that is rarely present in the real world. In this power vacuum, a few of the boys show immediate desire for power. The boys that wish to be the chief of the group are Jack, Ralph, and Piggy. Jack is described as ââ¬Å"the most obvious leader,â⬠in Piggyââ¬â¢sShow MoreRelatedWilliam Golding s Lord Of The Flies1263 Words à |à 6 PagesResearch Paper: Lord of the Flies William Golding, the author of Lord of The Flies, included adults for only a brief time throughout the novel, playing only a minor role at the end. The absence of adults exemplifies how children require the structure and guidance that only parents can provide, symbolically, how nations newly freed from the British Empireââ¬â¢s control would be better off under English colonial power to survive and maintain order before deteriorating into anarchy. The adults of theRead MoreWilliam Golding s Lord Of The Flies752 Words à |à 4 Pagespossible, so a five year old who teases others to Adolf Hitler would be classified as perpetrators of evil. Lord of the Flies is a fictional story about a group of British boys who get stranded on island. The author of the novel Lord of the Flies, William Golding, showcases Zimbardoââ¬â¢s ideas in his story. Zimbardo did not form his theory Through the character development of Jack and Roger, Golding illustrates the intensity of evil when one is impacted by situational forces. Before Ralph and Piggy unifiesRead MoreWilliam Golding s Lord Of The Flies1869 Words à |à 8 PagesEssay Outline ââ¬â Unit 11 Introductory paragraph: Topic Sentence (includes the book title and author) The novel Lord of the flies by William Golding is a type of literature that revolves around an anti-war theme. Main Points that will be discussed in the essay presented in order of weakest to strongest: 1. Lord of the flies was written during WWII and one of the manifestations is the dead man in the parachute presumably a victim of a bombed plane. 2. Faction among the group which is similar toRead MoreWilliam Golding s Lord Of The Flies1282 Words à |à 6 PagesWilliam Golding, the author of Lord of The Flies, included adults for only a brief time throughout the novel, playing only a minor role at the end. The absence of adults exemplifies how children require the structure and guidance that only parents can provide, this can be seen how nations newly freed from the British Empireââ¬â¢s control would be better off under English colonial power to survive and maintain order before deteriorating into anarchy. The adults of the novel can be seen as the motherRead MoreWilliam Golding s Lord Of The Flies1389 Words à |à 6 PagesA response to Lord Of The Flies Imagine an airplane crash. The heat of flames scorch passengersââ¬â¢ backs in addition to the wind burning their faces. Lucky, this crash was over water and near an island so most passengers survive, with an exception of the airplane staff and the pilot. Even though alive, many are in fits of fear and panic, and others are in shock. After hurried deliberation, a lone member of the group is elected leader in hopes that they will calm the panic, and make the hard, but necessaryRead MoreWilliam Golding s Lord Of The Flies1315 Words à |à 6 PagesWilliam Goldingââ¬â¢s novel Lord of the Flies was set somewhere on the timeline of World War Two, a war between the Axis and the Allies lasting from 1939 until 1945. Although WWII was fought between many countries in the Pacific and Europe, the main contender was Germany, led by Adolf Hitler. Hitler and his followers, the Nazis, changed the lives of everyone when they attempted to strengthen Germany and brought out all the evil and ugli ness in the world. After WWII, nothing would be able to change theRead MoreWilliam Golding s Lord Of The Flies886 Words à |à 4 Pageshow to live their lives not knowing what s right or wrong. Everyone has a different opinion towards different things. Some say gun laws should be banned while some say they want a gun in their house. In Lord of the Flies by William Golding there are clear aspects of leadership shown within the characterization between Jack and Ralph. I m chief, said Ralph, because you chose me. And we were going to keep the fire going. Now you run after food- (Golding 150). There is evident conflict between theRead MoreWilliam Golding s Lord Of The Flies1672 Words à |à 7 Pages The Different Social Cognition of the Similar Stories ââ¬â Synthesis essay of Lord of the Flies Final Project With the development of British culture, the format of Desert Island Literature has an inevitable connection with the geographical and culture heritage of the development of British history. Generally speaking, the setting of such literature is basically around an isolated island which is far from human society. The characters usually follow a primary lifestyle so that illustrate the courageRead MoreWilliam Golding s Lord Of The Flies1745 Words à |à 7 Pages1954 novel, Lord of the Flies by Nobel Prize-winner William Golding is a dystopian allegory indicative of vast aspects of the human condition. Set in the midst of a nuclear war, the text details a group of marooned British school boys as they regress to a primitive state. Free from the rules and structures of civilisation and society, the boys split into factions - some attempting to maintain order and achieve common goals; others seeking anarchy and violence. The novel is based on Goldingââ¬â¢s experienceRead MoreWilliam Golding s Lord Of The Flies1776 Words à |à 8 PagesMaybe the beast is us (Golding 85), in the novel, Lord of the Flies, by author William Golding, Golding uses the entire book as social commentary. The social aspect he focuses on is manââ¬â¢s ability to be evil and destructive. William Golding uses three specific literary devices to convey this idea; characterization, diction and symbolism. Lord of the Flies explains man s capacity for evil which is revealed in his inherent human nature, which he cannot control or ignore. The hidden evil within
Subscribe to:
Posts (Atom)