Wednesday, February 26, 2020
Urban Planning and decision-making in Dubai Essay
Urban Planning and decision-making in Dubai - Essay Example n of this paper that the biggest concerns Dubai seems to have at this point are: 1) sustainability 2) cultural considerations 3) labor relations and 4) traffic. Sustainability is an issue that can best be judged from a future point. The cultural considerations are also elements that are being worked out in many ways. So labor and transport issues become the central themes of this paper. The biggest complaint to date is traffic problems. The planning of roads seems to have lost its way. This, in contrast to the other planning elements, seems a small problem but it is becoming more and more of an issue as Dubai becomes popular and established as an international city. What role does the public play in the decision-making process during the development of Dubai? To what extent did the government maintain a monopoly over these decisions? How active of a role did the private sector play in the urbanization of the city? How has globalization affected the decision-making process? A review of Leonie Sandercockââ¬â¢s ââ¬Å"Toward Cosmopolisâ⬠shows that Sandercock writes about the cultural pluralism of planning theory in a way that is highly idealistic (Blanco 1998). She is said to discuss her social project in a political and economic vacuum, failing to address the underlying causes of the social problems. Cosmopolis is, for Sandercock, ââ¬Å"a common civic culture which has embraced the social project of tolerance, alterity, and inclusionâ⬠(Blanco 1998). Sandercock states that there are three forces that create the major cultural politics of difference: migration and multiculturalism, postcolonialism, and the age of women and minorities. She believes that the history of planning has supported segregation and discrimination. These are major forces at work in Dubaiââ¬â¢s planning. A perceived threat of marginalization (Aarts 1999) by less developed countries has often led to their full interaction with the world economy, before they may be ready. Aart feels that
Sunday, February 9, 2020
Technological and Economic Factors Affecting Business Environment Essay
Technological and Economic Factors Affecting Business Environment - Essay Example This paper will investigate the changing business environment of the travel industry over the last five years. It will further examine the technological and economic factors that affect the airline industry in UK. Technological Factor The first business in travel and tourism to embrace technological innovation is the airlines industry (Buhalis, 2004, p.1). Dale, et al. (2006, p.4) indicated in his book the early technology adopted by the air travel. Viewdata system was the first technology that connects ââ¬Å"tour operators and travel agencies via terminals.â⬠It grants travel agents to book flights based on the preferences of their customers. In the 1950s, they develop the Computer Reservation System (CRS) to make direct bookings via the system. With the development of Global Distribution System (GDS), travel agents across the globe can access the available flight and seats for travellers. The timeline of technological innovation of the airline industry shows of their early im provements. Therefore, by the year 2005, the airline industry has developed its own booking system to gain competitive advantage. Capoccitti, et al. (2010) indicate the operations improvement of the airline industry by using technology in managing the CO2 emission. The concern of stakeholders, which affects UK travellers, is on reducing the gases that harm the earthââ¬â¢s atmosphere. ... Currently, the travellers can utilise their mobile phone to check-in via the internet, which adds customersââ¬â¢ experience (Boyle, 2011). Hence, innovation and technological advancement are critical to the viability of the airline industry in the new global business environment. Impact of Technology The development of technology increases the competition among the airlines industry because it changes the processing method, the information dissemination, and communication process. With the evolution of technology, the business environment is rapidly changing, which tightens competition. According to Khosrowpour (2003, p.237), airline companies compete with travel agents to obtain a high market share because they refer other airline companies with available flight to customers. Furthermore, Doganis (2006, p.197) states that information technology aids companies in their distribution system and revenue management. The effective forecasting method of most companies is due to the impr ovement of technology, which allows them to predict sales based on the available seats. Hence, it stimulates other companies to adopt technology because it benefits both customers and companies. Moreover, the demand of customers changes. They want fast and accessible service, which motivates companies to improve services. Aside from accessibility, technology is essential for companies that cut cost or expenses. Economic Factor According to the Civil Aviation Authority (2008, pp.1-6), the decline of the traffic growth in UK commenced in the year 2005. This was affected by the 2001 bombings in the United States that instilled fear for most travellers. The security was stabilised to guarantee the safety of leisure and business travellers. Furthermore,
Thursday, January 30, 2020
Comparative Research on Cross-Cultural Families Essay Example for Free
Comparative Research on Cross-Cultural Families Essay 1. Reference or bibliographic entry of your selected article in APA style (see example in the first assignment guidelines): Toro-Morn, M., Sprecher, S. (2003). A cross-cultural comparison of mate preferences among university students; the united states vs. the peoples republic of china (PRC). Journal of Comparative Family Studies, 34(2), 151-170. 2. What are the aims and/or research questions of the study? The research of the cross-cultural study aims their question at comparing mate preferences of young adults in the Peopleââ¬â¢s Republic of China and those young adults of the United States. This study correlates to the research done in 1998 by Goodwin, which examine the political and economic structure in a particular culture and the effect it had on relationships, in particular mate preferences. 3. What concepts or ideas did the authors want to study? How were they defined in the study? Read through the literature background or the introduction part. The article states the researchers have three concepts they wish to obtain from the study. One, within each culture analyzes gender variation in mate preferences. Second, differentiate the two cultures in which they are satisfied with gender differences in mate preferences. Third, differentiate the two cultures of the significance of diverse partner characteristics. The concepts were outlined and explain through a questionnaire to 648 university students in the United States and 735 university students in the Peopleââ¬â¢s Republic of China. The United States questionnaire contained 422 females, 219 males, and 7 did not specify their gender. The Peopleââ¬â¢s Republic of China questionnaire contained 343 females, 352 males, and 40 did not specify their gender. The questionnaire contained a section called ââ¬Å"Traits Desired in a Mate.â⬠Through the results, researchers could determine which traits were least and most important. Also the differences and similarities within each culture, including the mate preferences of women versus males within each culture. 4. Describe the participants of the study. Since you are supposed to choose an article of a cross-cultural study on families, the participants for this study should have different cultural backgrounds. What are these cultural backgrounds? What are the demographics of the participants? This study contained two different participants, our very own young adults from the United States and young adults from the Peopleââ¬â¢s Republic of China. In the late 1970s, The Peopleââ¬â¢s Republic of China began having social and economic reforms. Not only did they began having reforms, but these reforms stimulated the growth of social science research. Which as a result, allowed researchers to research the mate preferences of young adults in the Peopleââ¬â¢s Republic of China. The Peopleââ¬â¢s Republic of China is recognize as the largest country in the world. Thus, having an immense population. These people live in a country were social and historical forces play an important role in their expectations of their potential partner. In addition they live in a country were government enforces family polices. This study contain people who were currently in a university; thus their age would range from eighteen to twenty three. 5. What is the authorsââ¬â¢ methodology? How did the authors collect their data? What are the measurements or research tools that they used? The authorââ¬â¢s methodology is based on a method, a procedure, measurements of the procedure, and results. The author collected their data by a questionnaire given to university students in the United States and the Peopleââ¬â¢s Republic of China. The measurements the researchers used were in a section on the questionnaire called ââ¬Å"Traits Desired in a Mateâ⬠which determine what characteristics they found important in a potential mate. 6. What kind of analytical procedures did the authors use? Describe each as to how they can answer the research questions or achieve the aims of the study. The author uses three types of analytical procedures. They first gather their research by determining which of the twenty-five traits were most and least favored overall. They put this data into a table, whichà portrays the importance rating for the total sample. Secondly, they compared the similarities and differences within each culture. As a result, they are able compare each culture traits that hold high or low importance and see if any of them are the same. Third, they compare the mate preferences for women and men in each culture. 7. What are their general findings and conclusions? The study concluded that participants would rather have a mate who is honest, kind, healthy, and have an energetic personality. Researchers found that participants felt that intrinsic personality traits were more important then status characteristics. Males were more entranced with attractiveness as a role in finding their mate. Well women in both culture were looking for men with earning potential and wealth. The major difference between the United States and Chinese cultures was the importance of having children to both parties. As you could imagine, it was important to the American culture and was fairly unimportant to the Chinese counterparts. 8. After the findings and conclusions, what recommendations were made by the researchers? I donââ¬â¢t know if there were recommendations made as much as thoughts for the future. The researchers though that the past has shaped both countries enough that what they look for in a potential mate will stay true. These differences between the two countries should still hold true, disregarding the fact that the Untied States culture is widely accepted in China. If anything they came to the conclusion that Chinaââ¬â¢s one-child policy has a major effect on how the Chinese look for a mate. 9. What learning did you gain from this assignment or from reading this kind of a paper? I definitely enjoyed reading this particular article because it compared the United States culture (which is the country I lived in) to another culture, the Peopleââ¬â¢s Republic of China. Through the researchers questionnaire, I was able to see the comparisons between the two cultures in their mateà preferences. I felt it was interesting to see how important social and economic factors are in other cultures.
Wednesday, January 22, 2020
Self-Inflicted Diseases :: Free Essays
Self-Inflicted Diseases Self-inflicted diseases are those in which a person's health is damaged by their own decisions and behaviour. These can be such things like smoking, alcohol, sunbathing, eating large quantities of fatty food. Also deliberate self-harm such as attempted suicide is classed as self-inflicted as it can cause major damage to body organs. Those who start smoking at a young age are highly likely to become addicted to nicotine. Smoking leads to a risk of developing mental and physical disease. This includes lung cancer, coronary heart disease and death through a stroke. Smoking also increases the chances of blood clotting. Nicotine also increases blood pressure and heart rate and thus the body's demand for oxygen, but carbon monoxide reduces the blood's ability to carry it. [IMAGE] Obesity can be self-inflicted by the following: à · Eating too many calories à · Lack of physical exercise à · Environmental factors à · Cultural factors à · Metabolism factors Obesity can cause heart disease, high blood pressure, diabetes, hernias, varicose veins and gallstones. Surgical operations are more risky for a patient with obesity because the amount of fat surrounding vital organs. [IMAGE] Self-Inflicted Sunbathing Sunbathing can cause blistering of the skin and increases the risk of developing skin cancer. This is self-inflicted if people do not take the precaution of sun cream, when in a hot climate. Heroin use [IMAGE] Heroin abuse can result in collapsed veins, bacterial infections of the blood vessels and heart valves, abscesses, other soft-tissue infections, and liver or kidney disease. Heroin is a self-inflicted disease because it is impossible to judge the purity of street heroin and death is caused through an overdose. Suicide Suicide is ranked the 10th most common form of death. There are around 40,000 suicides per year. [IMAGE] [IMAGE] Suicide is committed due to depressions, family or pet bereavement, divorce, social isolation or psychiatric illnesses. Suicide is self-inflicted because the person attempts to take his/her own life.
Tuesday, January 14, 2020
LAN and Network Mangements
Imagine yourself as a network administrator, responsible for a 2000 user network. This network reaches from California to New York, and some branches over seas. In this situation, anything can, and usually does go wrong, but it would be your job as a system administrator to resolve the problem with it arises as quickly as possible. The last thing you would want is for your boss to call you up, asking why you havenâ⬠t done anything to fix the 2 major systems that have been down for several hours. How do you explain to him that you didnâ⬠t even know about it? Would you even want to tell him that? So now, picture yourself in the same situation, only this time, you were using a network monitoring program. Sitting in front of a large screen displaying a map of the world, leaning back gently in your chair. A gentle warning tone sounds, and looking at your display, you see that California is now glowing a soft red in color, in place of the green glow just moments before. You select the state of California, and it zooms in for a closer look. You see a network diagram overview of all the computers your company has within California. Two systems are flashing, with an X on top of them indicating that they are experiencing problems. Tagging the two systems, you press enter, and with a flash, the screen displays all the statitics of the two systems, including anything they might have in common causing the problem. Seeing that both systems are linked to the same card of a network switch, you pick up the phone and give that branch office a call, notifying them not only that they have a problem, but how to fix it as well. Early in the days of computers, a central computer (called a mainframe) was connected to a bunch of dumb terminals using a standard copper wire. Not much thought was put into how this was done because there was only one way to do it: they ere either connected, or they werenâ⬠t. Figure 1 shows a diagram of these early systems. If something went wrong with this type of system, it was fairly easy to troubleshoot, the blame almost always fell on the mainframe system. Shortly after the introduction of Personal Computers (PC), came Local Area Networks (LANS), forever changing the way in which we look at networked systems. LANS originally consisted of just PCâ⬠s connected into groups of computers, but soon after, there came a need to connect those individual LANS together forming what is known as a Wide Area Network, or WAN, the result was a complex connection of omputers joined together using various types of interfaces and protocols. Figure 2 shows a modern day WAN. Last year, a survey of Fortune 500 companies showed that 15% of their total computer budget, 1. 6 Million dollars, was spent on network management (Rose, 115). Because of this, much attention has focused on two families of network management protocols: The Simple Network Management Protocol (SNMP), which comes from a de facto standards based background of TCP/IP communication, and the Common Management Information Protocol (CMIP), which derives from a de jure standards-based background associated with the Open Systems Interconnection (OSI) (Fisher, 183). In this report I will cover advantages and disadvantages of both Common Management Information Protocol (CMIP) and Simple Network Management Protocol (SNMP). , as well as discuss a new protocol for the future. I will also give some good reasons supporting why I believe that SNMP is a protocol that all network SNMP is a protocol that enables a management station to configure, monitor, and receive trap (alarm) messages from network devices. (Feit, 12). It is formally specified in a series of related Request for Comment (RFC) documents, listed here. The first protocol developed was the Simple Network Management Protocol (SNMP). It was commonly considered to be a quickly designed ââ¬Å"band-aidâ⬠solution to internetwork management difficulties while other, larger and better protocols were being designed. (Miller, 46). However, no better choice became available, and SNMP soon became the network management protocol of choice. It works very simply (as the name suggests): it exchanges network packets through messages (known as protocol data units (PDU)). The PDU contains variables that have both titles and values. There are five types of PDUâ⬠s which SNMP uses to onitor a network: two deal with reading terminal data, two with setting terminal data, and one called the trap, used for monitoring network events, such as terminal start-ups By far the largest advantage of SNMP over CMIP is that its design is simple, so it is as easy to use on a small network as well as on a large one, with ease of setup, and lack of stress on system resources. Also, the simple design makes it simple for the user to program system variables that they would like to monitor. Another major advantage to SNMP is that is in wide use today around the world. Because of itâ⬠s evelopment during a time when no other protocol of this type existed, it became very popular, and is a built in protocol supported by most major vendors of networking hardware, such as hubs, bridges, and routers, as well as majoring operating systems. It has even been put to use inside the Coca-Cola machines at Stanford University, in Palo Alto, California (Borsook, 48). Because of SNMPâ⬠s smaller size, it has even been implemented in such devices as toasters, compact disc players, and battery-operated barking dogs. In the 1990 Interop show, John Romkey, vice president of engineering or Epilogue, demonstrated that through an SNMP program running on a PC, you could control a standard toaster through a network (Miller, 57). SNMP is by no means a perfect network manager. But because of itâ⬠s simple design, these flaws can be fixed. The first problem realized by most companies is that there are some rather large security problems related with SNMP. Any decent hacker can easily access SNMP information, giving them any information about the network, and also the ability to potentially shut down systems on the network. The latest version of SNMP, called SNMPv2, has added some security measures that were left out of SNMP, to combat the 3 largest problems plaguing SNMP: Privacy of Data (to prevent intruders from gaining access to information carried along the network), authentication (to prevent intruders from sending false data across the network), and access control (which restricts access of particular variables to certain users, thus removing the possibility of a user accidentally crashing the network). (Stallings, 213) The largest problem with SNMP, ironically enough, is the same thing that made it great; itâ⬠s simple design. Because it is so simple, the information it deals with is either detailed, nor well organized enough to deal with the growing networks of the This is mainly due to the quick creation of SNMP, because it was never designed to be the network management protocol of the 1990â⬠³s. Like the previous flaw, this one too has been corrected with the new version, SNMPv2. This new version allows for more in-detail specification of variables, including the use of the table data structure for easier data retrieval. Also added are two new PDUâ⬠s that are used to manipulate the tabled objects. In fact, so many new features have been added that the formal pecifications for SNMP have expanded from 36 pages (with v1) to 416 pages with SNMPv2. (Stallings, 153) Some people might say that SNMPv2 has lost the simplicity, but the truth is that the changes were necessary, and could not have been avoided. A management station relies on the agent at a device to retrieve or update the information at the device. The information is viewed as a logical database, called a Management Information Base, or MIB. MIB modules describe MIB variables for a large variety of device types, computer hardware, and software components. The original MIB for Managing a TCP/IP internet (now called MIB-I) was defined in RFC 066 in August of 1988. It was updated in RFC 1156 in May of 1990. The MIB-II version published in RFC 1213 in May of 1991, contained some improvements, and has proved that it can do a good job of meeting basic TCP/IP management needs. MIB-II added many useful variables missing from MIB-I (Feit, 85). MIB files are common variables used not only by SNMP, but CMIP as well. In the late 1980â⬠³s a project began, funded by governments, and large corporations. Common Management Information Protocol (CMIP) was born. Many thought that because of itâ⬠s nearly infinite development budget, that it would quickly become in idespread use, and overthrow SNMP from itâ⬠s throne. Unfortunately, problems with its implementation have delayed its use, and it is now only available in limited form from developers themselves. (SNMP, Part 2 of 2, III. 40. ) CMIP was designed to be better than SNMP in every way by repairing all flaws, and expanding on what was good about it, making it a bigger and more detailed network manager. Itâ⬠s design is similar to SNMP, where PDUâ⬠s are used as variables to monitor the network. CMIP however contains 11 types of PDUâ⬠s (compared to SNMPâ⬠s 5). In CMIP, the variables are seen as very complex and sophisticated data tructures with three attributes. These include: 1) Variable attributes: which represent the variables characteristics (its data 2) variable behaviors: what actions of that variable can be triggered. 3) Notifications: the variable generates an event report whenever a specified event occurs (eg. A terminal shutdown would cause a variable notification As a comparison, SNMP only employs variable properties from one and three above. The biggest feature of the CMIP protocol is that its variables not only relay information to and from the terminal (as in SNMP) , but they can also be used to perform tasks that would be impossible under SNMP. For instance, if a terminal on a network cannot reach the fileserver a pre-determined amount of times, then CMIP can notify appropriate personnel of the event. With SNMP however, a user would have to specifically tell it to keep track of unsuccessful attempts to reach the server, and then what to do when that variable reaches a limit. CMIP therefore results in a more efficient management system, and less work is required from the user to keep updated on the status of the network. CMIP also contains the security measures left out by SNMP. Because of the large development budget, when it becomes available, CMIP ill be widely used by the government, and the corporations that funded it. After reading the above paragraph, you might wonder why, if CMIP is this wonderful, is it not being used already? (after all, it had been in development for nearly 10 years) The answer is that possibly CMIPâ⬠s only major disadvantage, is enough in my opinion to render it useless. CMIP requires about ten times the system resources that are needed for SNMP. In other words, very few systems in the world would able to handle a full implementation on CMIP without undergoing massive network modifications. This disadvantage has no inexpensive fix to it. For that reason, many believe CMIP is doomed to fail. The other flaw in CMIP is that it is very difficult to program. Its complex nature requires so many different variables that only a few skilled programmers are able to use it to itâ⬠s full potential. Considering the above information, one can see that both management systems have their advantages and disadvantages. However the deciding factor between the two, lies with their implementation, for now, it is almost impossible to find a system with the necessary resources to support the CMIP model, even though it is superior to SNMP (v1 and v2) in both design and operation. Many people believe that the growing power of modern systems will soon fit well with CMIP model, and might result in itâ⬠s widespread use, but I believe by the time that day comes, SNMP could very well have adapted itself to become what CMIP currently offers, and more. As weâ⬠ve seen with other products, once a technology achieves critical mass, and a substantial installed base, itâ⬠s quite difficult to convince users to rip it out and start fresh with an new and unproven technology (Borsook, 48). It is then recommend that SNMP be used in a situation where minimial security is needed, and SNMPv2 be used Borsook, Paulina.
Monday, January 6, 2020
SINGH Surname Meaning and Origin
The Singh surname derives from the Sanskrit simha, meaning lion. It was originally used by Rajput Hindus and is still a common surname for many North Indian Hindus. Sikhs, as a community, have adopted the name as a suffix to their own name, so youll find it used as a surname by many of the Sikh faith. Surname Originà Indian (Hindu) Alternate Surname Spellings SINH, SING Famous People With the Surname SINGH Milkha Singh - former Indian track and field sprinter known as The Flying SikhBhagat Singh - Indian political activistSadhu Sundarà Singh - Indian Christian missionaryMaharaja Ranjit Singh - founder of the Sikh Empire Where Do People With the SINGH Surname Live? Singh is the 6th most common surname in the world, according to surname distribution data fromà Forebears, used by more than 36 million people. Singh is most commonly found in India, where it ranks 2nd in the nation. It is also especially common in Guyana (2nd), Fiji (4th), Trinidad and Tobago (5th), New Zealand (8th), Canada (32nd), South Africa (32nd), England (43rd), Poland (48th) and Australia (50th). Singh ranks 249th in the United States, where it is most common in New York, New Jersey, and California. Within India, the Singh surname is most commonly found in the Maharashtra region, according toà WorldNames PublicProfiler, followed by Delhi. The surname is also fairly common in New Zealand, including Manakua City, Papakura District and the Western Bay of Plenty District, as well as in the United Kingdom, particularly in the West Midlands. Genealogy Resources for the Surname SINGH Searching for Smiths: Search Strategies for Common SurnamesSearch tips and strategies for researching ancestors with common surnames such as SINGH. Singh Family Crest - Its Not What You ThinkContrary to what you may hear, there is no such thing as a Singh family crest or coat of arms for the Singh surname.à Coats of arms are granted to individuals, not families, and may rightfully be used only by the uninterrupted male-line descendants of the person to whom the coat of arms was originally granted.à The Singh DNA ProjectThe Singh DNA Project is open to all who wish to work together to find their common Singh heritage through DNA testing and sharing of family history information. SINGH Family Genealogy ForumSearch this popular genealogy forum for the Singh surname to find others who might be researching your ancestors, or post your own Singh query. FamilySearch - SINGH GenealogyAccess over 850,000 free historical records and lineage-linked family trees posted for the Singh surname and its variations on this free genealogy website hosted by the Church of Jesus Christ of Latter-day Saints. GeneaNet - Singh RecordsGeneaNet includes archival records, family trees, and other resources for individuals with the Singh surname, with a concentration on records and families from France, Spain, and other European countries. Surname Finder - SINGH Genealogy Family ResourcesFind links to free and commercial resources for the Singh surname. DistantCousin.com - SINGH Genealogy Family HistoryExplore free databases and genealogy links for the last name Singh. The Singh Genealogy and Family Tree PageBrowse family trees and links to genealogical and historical records for individuals with the last name Singh from the website of Genealogy Today. ----------------------- References: Surname Meanings Origins Cottle, Basil.à Penguin Dictionary of Surnames. Baltimore, MD: Penguin Books, 1967. Dorward, David.à Scottish Surnames. Collins Celtic (Pocket edition), 1998. Fucilla, Joseph.à Our Italian Surnames. Genealogical Publishing Company, 2003. Hanks, Patrick and Flavia Hodges.à A Dictionary of Surnames. Oxford University Press, 1989. Hanks, Patrick.à Dictionary of American Family Names. Oxford University Press, 2003. Reaney, P.H.à A Dictionary of English Surnames. Oxford University Press, 1997. Smith, Elsdon C.à American Surnames. Genealogical Publishing Company, 1997.
Saturday, December 28, 2019
Financial Inclusion - 4920 Words
RESEARCH PAPER ON ROLE OF GOVERNMENT IN FINANCIAL INCLUSION Role of Government in financial inclusion Abstract:- This research paper contains the full information about the financial inclusion of the worldââ¬â¢s economic. In this research paper we describe the financial inclusion basic meaning, definitions, scope significance. Now we move towards the second phase which include role of government role of banks in financial inclusion. we also include the reforms that has been done by the government and the other government organizations . We also include the main article that has been given by the differentâ⬠¦show more contentâ⬠¦The bank asked the commercial banks in different regions to start a 100% Financial Inclusion campaign on a pilot basis. As a result of the campaign states or U.T.s like Puducherry, Himachal Pradesh and Kerala have announced 100% financial inclusion in all their districts. Reserve Bank of Indiaââ¬â¢s vision for 2020 is to open nearly 600 million new customers accounts and service them through a variety of channels by leveraging on IT. However, illiteracy and the low income savings and lack of bank branches in rural areas continue to be a road block to financial inclusion in many states. Apart from this there are certain in Current model which is followed. There is inadequate legal and financial structure. India being a mostly agrarian economy hardly has schemes which lend for agriculture. Along with Microfinance we need to focus on Micro insurance too. The scope of financial inclusion The scope of financial inclusion can be expanded in two ways. a) through state-driven intervention by way of statutory enactments ( for instance the US example, the Community Reinvestment Act and making it a statutory right to have bank account in France). b) through voluntary effort by the banking community itself for evolving various strategies to bring within the ambit of the banking sector the large strata of society. When bankers do not give the desired attention to certain areas, the regulators have toShow MoreRelatedFinancial Inclusion in India Essay623 Words à |à 3 PagesFinancial Inclusion in Karnataka Karnataka is the Indiaââ¬â¢s eighth largest State in terms of geographical size accounting for 6.3% of the geographical area (1, 91,791 square km), 5.05% of the total population (6.11 crore) and approximately 5.5% of the GDP of the country. The State has 30 districts and 176 taluks. The literacy rate in the State is 75.6% (male-82.85% and female-68.13%)(Census, 2011). The State ranks seventh in human development index (HDR 2005). The infrastructure development indexRead MoreMicrofinance And Financial Inclusion : Microfinance1305 Words à |à 6 Pages 4. Microfinance and Financial Inclusion: Microfinance programmes are intended to reach poor segments of society as they lack access to formal financial services. It, therefore, holds greater promise to further the agenda of FI as it seeks to reach out to this excluded category of population. India has adopted the Bangladeshââ¬â¢s model in a modified form. The Apex-Bank NABARD started ââ¬ËSHG bank linkage programmeââ¬â¢ during the last decade of by-gone century, is by far the major programme initiative withoutRead Moreââ¬Å"Role of Government in Financial Inclusionâ⬠4322 Words à |à 18 PagesA RESEARCH PAPER ON ââ¬Å"ROLE OF GOVERNMENT IN FINANCIAL INCLUSIONâ⬠Submitted By: Hemali Shah (MPM: 2nd Semester) ABSTRACT: Financial inclusion means a group of people should take part in growth activities and help to increase economic growth of the country. We cannot say that financial growth has been achieved by opening a bank account, granting huge loan to a single person and closing the account. First, many people have to open an account in a bank, save money regularly so that loans to needy peopleRead MoreFinancial Inclusion Of The Jammu And Kashmir State Essay812 Words à |à 4 PagesFinancial inclusion, principally when endorsed in the wider framework of economic inclusion, it has an ability to uplift financial conditions and improve the standards of lives of the poor and the underprivileged. Financial inclusion has been successful in other countries India is also trying this for all time to achieve this goal. Access to affordable financial services would lead to increasing economic actions and employment opportunities for rural households with a possible multiplier effect onRead MoreRole of Bc/Bf in Financial Inclusion16135 Words à |à 65 PagesROLE OF BUSINESS CORRESPONDENT / BUSINESS FASCILITATOR IN FINANCIAL INCLUSION. A PROJECT REPORT Submitted by VARUN VERMA (2K92A49) PGDM GENERAL In partial fulfillment for the award of the degree Of MASTERS IN BUSINESS ADMINISTRATION [pic] ASIA PACIFIC INSTITUTE OF MANAGEMENT, NEW DELHI (2009-2011) ACKNOLEDGEMENT I wish to express my gratitude to NABARD, Haryana, for giving me an opportunity to be a part of it and enhance my knowledge by granting permission to do my summer projectRead MoreFinancial Inclusion - the Scope and Effect in Indian Economy1862 Words à |à 8 PagesFINANCIAL INCLUSION IN INDIA- IMPACT CHALLENGES Financial inclusion in India ââ¬â The way forward ABSTRACT: The government of India RBI has out with a major initiative towards ensuring the inclusive growth through financial inclusion so that the access of financial service will reach to the mass population. The main theme of this paper is to highlight the requirement of financial inclusion and to estimate the social benefit from these initiatives. As Reserve Bank of India data shows that as manyRead MoreRole Of Commercial Banks On A Part Of Financial Inclusion Programme1598 Words à |à 7 Pagescommercial banks to be performed as part of financial inclusion programme: a) Financial literacy b) Credit counselling c) BC/BF model d) KYC norms e) KCC/GCC f) No-frill accounts financial literacy g) Branch expansion, h) Mobile banking, and i) Other measures. a) Financial literacy: Providing financial literacy is the essential function of financial inclusion, as the main cause for exclusion is the lack knowledge about formal financial system. Financial literacy states to knowledge prerequisite forRead MoreFactors Hindering Financial Inclusion in Uganda: A Case Study of Kamuli District1618 Words à |à 7 PagesFACTORS HINDERING FINANCIAL INCLUSION IN UGANDA: A CASE STUDY OF KAMULI DISTRICT. CHAPTER ONE: INTRODUCTION Background to the Study Ugandaââ¬â¢s Vision 2040 highlights access to finance as one of the barriers among others that are affecting the competitiveness of the economy. Most individuals and firms access credit from informal sources. One of the reasons for the limited access to credit is the low level of domestic savings which affects the ability by institutions to offer long term finance. As suchRead MoreInitiatives For Financial Inclusion Of India2000 Words à |à 8 PagesINITIATIVES FOR FINANCIAL INCLUSION IN INDIA Dr. DilipChellani and Dr. Ramamurthy N Introduction: For the first time, the Eleventh Five Year Plan (2007-12) envisaged inclusive growth as a key objective as well as a strategy for economic development. Financial inclusion (FI) can therefore be very well called as 21st century banking. Its main aim is to extend the banking and financial services to every persons (or class of people), Projects (activities in various sectors) and places/parts (rural/semiRead MoreFinancial Inclusion Through India Post1215 Words à |à 5 PagesFINANCIAL INCLUSION THROUGH INDIA POST Dr. Joji Chandran PhD ABSTRACT India is having the most widely distributed post office system in the world. With 1,55,333 post offices, the India post comes under the Department of Posts which is a part of the Ministry of Communications and Information Technology under the Government of India. The wide distribution network of India post is one important factor that favours india post as a channel for financial inclusion in India. The search of financial
Subscribe to:
Posts (Atom)