Monday, January 27, 2020

Automation in insurance underwriting processes

Automation in insurance underwriting processes Abstract Underwriting is one of the important processes in insurance operations. The applicants information, including various kinds of medical information, must be evaluated before the insurance company can decide to accept the application. These activities are usually supported by process automation facility. However, the support of exception handling mechanism and the monitoring of turnaround time in those process automation solutions are usually inadequate. This results in a low efficiency of the underwriting operations or even loss of business opportunities. To address the problem, this paper presents an Alert-enhanced Underwriting System (AUS), which handles the exception events and monitors the turnaround time with the concept of alerts. We further illustrate how Web services facilitate workflow integration and process communications. 1. Introduction Life insurance provides protection against the economic loss caused by the death of the person whose life is insured [1]. Because of its popularity, it is a business where many insurance companies allocate many resources in order to gain more market share. A life insurance policy defines the terms and conditions for the prospective client, particularly the situations under which the insurance company promises to pay a benefit upon death [2]. Since life insurance products can provide a stable cash inflow for an insurance company, there is a trend that insurance companies market various life products, such as investment-linked life products, savings life products and critical illness protection, in order to attract more customers with different needs. Although life insurance business can generate financial benefits to the insurance company, the company still needs to bear financial responsibility to pay the insured under some agreed conditions, e.g., the insured dies during a specified period. The insurance will face the consequence of financial loss if the company accepts prospective clients, who present extremely high risks and when some of these insured persons die soon after policy issuance. High quality processes are necessary to assess the degree of risks associated with each application of life insurance. Underwriting (which is also known as new business) is a process of assessing and classifying the degree of risk represented by a prospective client and making a decision to accept or decline the insured. The world of electronic collaboration is developing rapidly, introducing new technology and new ways of collaboration. The success of collaboration often depends on the ability of a corporation not only to make sure that their applications are dynamic, but also to maintain a high degree of interoperability with collaboration partners. In this paper, we present an Alert-enhanced Underwriting System (AUS) as a collaboration platform for streamlining the workflow of insurance underwriting processes. AUS makes use of an Event-Condition-Action (ECA) collaboration model [13] to manage event handling, process integration, and alert/exception management for the process flow of the underwriting operations. The rest of the paper is organized as follows. Section 2 discusses some related work and background requirements. Section 3 describes system design and implementation for our AUS. Section 4 concludes our paper with our continue research work that look forwards to possible enhancements. 2. Background and Related Work Electronic Data Interchange (EDI) essentially defined the technology of electronic collaboration in the past. However, EDI is an expensive solution, due to its high cost of network infrastructure and system integration. In addition, security issues of EDI also limited corporations from directly accessing the computing resources of its trading partners, which used firewall-unfriendly protocols. Therefore, developers start to find other technologies which have a low cost, flexible software solution that allows corporations to build new applications in response to changing business needs while adhering to a defined electronic business standard [10]. Recently, numerous vendors have offered solutions to support both XML (eXtensible Markup Language) and EDI formats for collaboration. One of the solutions is the transformation of information between companies: XML-to-EDI. Transformation is critical to an edge integration strategy that brings together B2B collaboration and enterprise application at the boundary of an enterprise in order to enable the back-end connectivity and workflow required to support a complete business process [11]. In the XML world, e-Business XML (ebXML) [12] is a modular suite of specifications which are initiatively designed for electronic interoperability. The strength of the ebXML architecture is that it provides a framework for electronic business collaboration. The architecture enables businesses to work together to specify business process, discover one another, negotiate collaboration agreements, and execute business processes. However, although ebXML implementations are already being announced, the rate of deployment of ebXML is not quickly accelerated. Many companies are taking a wait-and-see approach until ebXML becomes a mainstream in the market. 2.1. Key Processes and Integration Figure 1 illustrates a typical underwriting process, which usually consists of the following four key activities: Performing field underwriting, Reviewing the application for insurance, Gathering additional information to make a sound decision, and Making an underwriting decision on the case [3] However, before a new case is sent to an underwriter for processing, there are other activities involved: Packing application forms and other documents from the agent Initial premium payment through the cashier entry system Data entry of new application in a branch or zone office Scanning documents into images for workflow processing Quality Check (QC) and Indexing on the scanned documents Release of the validated and scanned documents images into workflow engine for further processing In the traditional way of performing the activities 1 to 5 without any automation processes, it incurs high cost in human resource, storage cost, and paper work, together with a high turnaround time. That means it causes the underwriter to spend a long time to handle a new application. This affects the insurance companys reputation and may further induces financial losses or even legal penalties. With the advent of information technology, most of the above activities are linked together to streamline the workflow for processing a new business, starting from receiving documents from an agent, ending at the underwriter getting the case from workflow system and issuing new policy if approved. Some benefits accrued to the business for automating the entire underwriting processes: Improvement of the service quality (such as turnaround time) Reduce of the risk of losing submitted documents during delivery Transfer of applications to the next step of the process immediately Better control of risk management such that some cases (i.e., excess of coverage limit) can only be approved by senior underwriters The key integration of the processes between the agents and the underwriters are as follows. Images and Data Transfer Process This activity is an automated process and does not involve any manual operation unless the sub-system is down or errors / inconsistency occurred during the transfer. The purpose of this process is to transfer the scanned images and indexed data from a branch or zone office to the central office for importing into the workflow system. If the network linkage between a branch or zone office and the central office is a private connection (i.e., leased line), the operation is just a simple transfer of document images into the file server in the central office with an XML file including all the indexed data. If the network connection between both sides is public (i.e., the Internet) and it is not a Virtual Private Network (VPN) connection, then the interactions require other security measures as described in later sections. Import Robot and Workflow Engine They are located at the central office of an insurance company. The engine waits for the image files and XML data to be uploaded from the branch or zone office and verify the XML data integrity with the appropriate XML Schema. The imported document images and indexed data are installed into the existing workflow routing engine for case assignment to appropriate underwriters for further case approval. 2.2. Requirements Overview of Stakeholders In automated underwriting processes architecture, a workflow engine (e.g., eistream [9]) is deployed at the central office. This engine can efficiently route job assignments to appropriate underwriters. The processing performed with the workflow engine is usually referred to as post-processing of the workflow. There are many pre-processing activities, which must be completed before those new insurance applications can be imported into the workflow engine for further underwriting. Figure 2 depicts a use case diagram of the underwriting process. The key stakeholders involved are discussed as follows. Agent He/she is an authorized representative to sell insurance products on behalf of an insurance company. The agents have the responsibilities to perform a simple check first by gathering initial information about prospective clients and screening applications who have requested coverage [4]. They have to gather required documents (such as health certificate) from the prospective client in order to speed up the underwriting process. Email access or Internet portal are the prompt means for agents to communicate with an insurance company. Cashier Entry For a new application of life insurance, the prospect client is required to pay the initial premium in the form of cash or check. The amount of premium is also dependent on the payment mode of the proposed policy. The agent has to submit the initial premium with the application. The cashier entry will collect the initial premium and put a premium receipt record in a Premium Collection System. The Cashier Entry also files the application forms and documents for data entry. Data Entry A user in branch/zone office enters the information recorded on the application form, such as the policy owner information, proposed insured information or medical information, etc., into the underwriting front-end input system. Scanning Officer When a scanning officer receives the documents, including application form, from an agent, he/she will try to sort and classify the documents into different document types (such as health certificates, identity proofs), and then scan them into images for auditable backup as well as indexing and quality check (QC). The application form is scanned just for auditable backup because the data has already been entered. Index and QC Officer After the submitted documents have been scanned into images, the index and QC officers (it may involve two individuals) will try to index the fields on several regions of a scanned image and save the indexed data into the database, so that the indexed data can be adhered with the corresponding images and imported into the workflow system. If the index officer discovers that the image quality of scanned document is not good, the document must be rescanned until the image quality of the document is acceptable for indexing. Underwriter An underwriter is assigned with a case (new or pending case) by the workflow engine. The underwriter carries out an assessment process by considering the submitted documentations, medical information, other personal factors like age, driving history, tobacco use, career nature, and financial factors of the potential client, etc. Then, the underwriter will determine whether the application is approved, pended for additional proofs or documentation, counter-offered to the applicant, or rejected. 2.3. Alert and Exception Handling Although most of the activities starting from submitting documents in branch or zone office to the back-end underwriting processes are automated, there are still many events, both business-oriented and technology-oriented, must be handled in order to streamline and speed up the entire underwriting process. Exceptions are events that can drive not only reactions performed by business parties [6], but also information exchanged within an organization, across physical boundaries (e.g., departments located in different geographical areas) or within (e.g., underwriting department and printing service department located in the same building) individual organizational boundary. In order to handle the exceptions and monitor the exception handling process, (especially those important and / or with urgency requirements), Chiu et al. [6] proposed the use of alerts to model and implement this. The key differences between alerts and exceptions are that alerts represents messages sent to a target, usually with time and urgency constraints, and that alerts are monitored and tracked. That means, to handle an exception, an Alert Management System (AMS) sends an alert message to a handler (human or system) and keeps track of the process until the handling job is finished. In this application, the main objective of applying alerts is the concern about the turnaround time in the insurance application process. Some key exceptions and alerts generated by the main stakeholders are listed as follows. Agent Cancellation of an insurance application can trigger an alert to the central office so that the workflow system can change the application status (if it has been imported into workflow engine) into pending status and no more human resource will be wasted on this application. The application will ultimately be cancelled after the cancellation form is scanned and imported into the workflow system. The AMS can therefore make sure that the case is closed within a reasonable time limit. Cashier Entry An alert can be generated when the agent submits an initial premium payment for the new applicant but only part of initial premium has been settled. The alert can notify the central office underwriter to solve the application case if the case has been pended for the reason of insufficient premium. Scanning Officer Exceptions can be generated if the agent submits unknown type of documents or forms. If the workflow automation system does not know how to handle the unknown type documents or forms, then unknown document alert can notify the corresponding agent about this issue and urge him/her to fix this within a certain period. Index and QC Officer A Document Rescan alert can be generated to the scanning officer if the index officer finds the document image quality is too poor to be indexed. A QC officer can also generate a Reindex alert if he/she found that an index officer did not correctly index the fields on document images. QC officer can also trigger Document Rescan alert if he/she found the quality of document image is unacceptable even the index officer has accepted the quality of document image. Underwriter An Insufficient Initial Premium alert can be generated so that the agent can be notified that the initial premium must be settled before the policy can be issued even all the underwriting checks are passed for the case. This situation may occur when the client paid the initial premium with check but the check could not be cleared. On the other hand, exceptions and alerts can be generated by automated processes, such as the following: Images and Data Transfer Process A Transfer exception can be triggered if the transfer process of images and XML data to the central office file server is not completed or failed/aborted at some points (because of the stability of network connection). An alert can then notify the MIS staff in the branch or zone office to investigate the root cause of transfer failure and resume the transfer process as soon as possible. An alert can be triggered after the transfer process of the branch or zone office is completed successfully, so that the import robot resided on the workflow engine can start the data verification process and import the images and data into workflow system. This helps to shorten the total time for processing of new applications and monitor pending cases. Import Robot and Workflow Engine A Data Inconsistency alert is sent to the agent if the import robot checks that the XML data uploaded from the branch or zone office contains inconsistency after validating with XML schema. This alert urges the agent to repeat or fix the images and data upload process. Workflow Engine An Application Pending alert is triggered to the agent who submitted an application for his/her client when the underwriter changes the new application status to pending because additional documentation is required. This alert urges the agent to contact its customer for the relevant documents before he receives an official document request letter from the insurance company, as applicants may need time to present documents, like health certificates or financial statements issued by banks. 2.4. Relationship management requirements Alerts and exceptions are not only dedicated to handling abnormal or unexpected events. These can be used to enhance the relationship between insurance company and potential customers (B2C). For example: Applicants can be notified by email with the progress of its life insurance application. On the other hand, the agent can contact his applicants promptly after he receives an acknowledgement email. Reminder alerts can be sent to the agent in the form of SMS to remind him/her to contact his/her applicant to collect required additional documents to process a pending application. This helps reduce the risk of insurance application being cancelled after an application has been pending for some time. This is because the customer may not know that insurance company requests more additional documents from him in case the agent does not contact him. This also reduces the chance of giving a negative image to the potential customers of poor services. 3. System Design and Implementation In this section, we present the system design and implementation for our AUS, which includes the system architecture, various system components, Web services security, and an example scenario. 3.1. System Architecture Figure 3 shows the overall system architecture for our AUS. We add on top of the existing enterprise information systems four main components in the backend AUS: Web Services Agent, Message Server, Alert Management System (AMS), and Event-Condition-Action (ECA) rules database that defines the actions to be triggered under some predefined conditions. We discuss the functionalities of these components in the following subsections. One of the main problems in the current process automation is the effectiveness of communication among different stakeholders and systems involved in the entire process of underwriting. Based on the above discussions, we design an AUS based on exceptions and alerts as the unifying communication platform within the entire underwriting processes. On this platform, we choose to use Web Services with SOAP protocol for the communication and Message Server (such as Microsoft MSMQ [8]) for the underlying message (exceptions and alerts) processing. The reasons why we choose Web services with SOAP protocol in our platform are as follows: Web services can be invoked over the Internet or intranet, within or outside the firewall. For example, some processes like document scanning or image indexing may be located in the central office or outsourced to other service providers. Less development time is required to deploy Web service features from existing application, especially with the tools and libraries provided. It supports synchronous (RPC) and asynchronous messaging. SOAP has been implemented on many different hardware and software platforms. SOAP can be protected under the Web Service security [7] standard. 3.2. Web Services Agent In our system, Web services technology is chosen to support the communication between the AUS backend systems and other front-end, sub-systems in branches and zone offices, as well as external agents and clients. The Web Services Agent transforms the incoming messages, which are in the form of XML data embedded in SOAP (Simple Object Access Protocol) [14], into native message formats that can be sent into the queues of the central message server. The Web Services Agent also transforms the alerts and exceptions from the form of native message format into the XML/SOAP format and uses HTTP protocol to send the XML message to the branch/zone offices systems through respective Web services. A sample SOAP messages from a client system is shown in Figure 4. This message describes the indexed data and images to be uploaded to the file server in the insurance headquarter after scanning operations have been performed on the submitted documents in branch and zone offices. Figure 5 shows a response message from the AUS that describes an alert from the Transfer Module in a branch or zone office and notifies the MIS staff to handle the exception. 3.3. Message Server The message server comprises of application queues and system queues and the server manages the received data (i.e., incoming XML/SOAP messages, internal MSMQ messages from other enterprise systems, and alert messages from the AMS and routes the messages to the target (subscribed) parties. For example, when the Transfer Module sends a Web service message to the AUS, the message is put into two waiting queues: one for the Import Robot and another for the AMS (so that the AMS can monitor the progress of the Import Robot). When the Import Robot has verified the integrity of uploaded data and images, it sends a message to inform the AMS of job completion, or a Data Inconsistency alert in case of data inconsistency. These messages triggers events so that the AMS issues new alert/exception messages upon on the conditions in the event repository database to related parties for further actions (as discussed in Section 2.3) based on the ECA rules defined by the administrators. The reasons why we choose the Message Server as a core component in managing data communication are as follows: Most of the message servers support Web service functionality. Message servers support guaranteed message delivery. Asynchronous message communication as well as publish-and-subscribe can be supported. 3.4. Alert Management System (AMS) The main role of the AMS is to manage the alerts. It also captures the events and exceptions (i.e., MSMQ native message format) submitted by other parties. Alerts are generated based on the ECA rules specified in database to the appropriate parties. It further transforms the alerts into a MSMQ message and put it on the waiting queue for Web Services Agent for the delivery. Further details of the mechanism of the AMS, including descriptions of the ECA rules, can be found in our earlier paper [6]. We apply the same AMS module except that we include a message server component to further increase the messaging reliability. 3.5. Example Scenario In this subsection, we use a scenario to illustrate the system flow in our AUS. Figure 6 depicts the process flow for this scenario. First, a Scan Station prepares a XML data file which contains the policy number and other indexed data for the scanned documents. When the XML file is ready, the Transfer Module uploads the XML file and document image files into the central file server. Upon completion, the Transfer Module generates a SOAP message, which details the uploaded data to Web Services Agent in order to notify the Import Robot to verify the integrity of uploaded data and images. After the verification, the Import Robot generates the verification result event and the AMS captures the data uploaded event from the Transfer Module together with the event generated by the Import Robot, and returns the appropriate events back to the Scan Station and Scan Officer based on ECA rules processing. 3.6. Web Service Security Web services integrate applications inside and outside the organization. However, distributed computing always has a challenging set of security issues. Identities and messages are two of the greatest security challenges brought on by Web services. Web services transport potential unknown entities into your organization and messages are transported from one place to another place through an unsecured channel, the Internet. Therefore, actions must be taken to safeguard the information exchanged among the authenticated parties. XML Encryption and XML Signature are used to address the protection of sensitive data and the identification of identity of data sender respectively [15]. Figure 7 shows an unprotected SOAP message that contains payment information for an insurance policy. Figure 8 shows how encrypted messages and signature are put in a SOAP envelop. The element block contains the encrypted form of payment information. The element contains the XML signature for payment data. In general, a shared key must be provided so that receiver of the messages can decrypt the protected data. However, it is a bad idea to include the key in the SOAP message (i.e., the element block) because unauthorized parties could just get the key and decrypt the protected data. AgreementMethod is a protocol for safely communicating a secret key. This key agreement protocol, like the SSL secret key agreement protocol, is used to generate the encryption key along with the key material necessary to repeat the encryption key generation on the recipients side [15]. 4. Discussion and Summary Process automation by integrating existing enterprise information systems with workflow software has proved to increase the staff productivity, thus turns out to generate more business values in terms of more revenue and less expenditure. However, if the process flow within a business workflow from one step to next step is not smoothly executed (e.g., failure of transferring complete XML data to workflow engine and servers but no further resend action is done), then the next step may not be able to proceed until the problem is detected and fixed. This kind of situations significantly wastes human resource and time and should are not expected to occur in automated processes. Therefore, by integrating the AUS with the existing workflow infra-structures can bring the workflow automation into full play because the errors or unexpected events can be detected and relevant parties or processes are notified with alerts to rectify the problems. The following tangible benefits can be achieved with the AUS, mainly through the enhanced monitoring and tracking through the AMS with a service-oriented architecture. For example, the turnaround time taken to rescan documents, which have been identified as poorly scanned, is shortened. If the scanning officer is not notified properly, the poorly scanned document will probably be rescanned after the scanning officer triggers to print out a report on listing those document rescan requests, thus resulting in longer processing time in some cases. This benefit is also applicable to the process of Document Reindex for the index officers. Moreover, the AUS helps maintain data integrity in uploading data into the centralized file server. If the XML data is inconsistent and the import robot still proceeds to import the inconsistent data into workflow engine, it will result in unexpected or serious consequences. The consequences may be a delay in processing applications or even a wrongly underwritten insurance application that could put financial risk to insurance company. On the other hand, more attributes can be added to measure staff performance. Since the alerts generated to officers and agents are monitored by the AMS, the time spent on handling the exceptions and alerts can be calculated based on the time recorded in database. For example, if a scanning officer receives a document rescan alert, then he must rescan the requested documents and relevant records within the document update time. The performance is logged into database and reports for staff can include this kind of attributes to measure the staff performance. So, the workload on investigating problems related to the entire operation flow can be reduced as detailed information about the problems can be found from the exceptions and alerts well managed by the AMS of the AUS. In addition, the following intangible benefit can be achieved with the AUS. Customer satisfaction can be improved. The document processing and flow are smoothly controlled and executed. This can shorten the entire processing time for new case applications and thus result in issuing and sending policy to policy owner within a shorter period of time. This can enhance the insurance companys professional image as well because the short processing time of new insurance application can impress its customers and improve the customers confidence in insurance company. This might led to more business opportunities in the future. This paper has presented an overview of underwriting process in an insurance company and the automated facilities incorporated into the underwriting process to drive the entire underwriting. A Web-service based alert-enhanced underwriting system has been presented in this paper to overcome most of the existing problems of the underwriting process workflow implementation. We expect this approach is suitable to other business processes that involve human approval together with the need for maintaining documents for auditing and legal purposes, such as loan and credit card approval. After finishing the AUS platform prototype, we shall then proceed to study the benefits of adopting the platform in existing workflow infra-structures in the insurance companys perspective through questionnaires to collect user feedback. Although the proposed platform obviously facilitates the handling of most problems or events in the process flow of underwriting, there are still some unexpected events that are hardly to be detected or tracked. Further studies should be carried out on this topic. Future works include the extension of AUS platform to support artificial intelligence in handling the exception events as well as agent-based assistance to internal staff and external users. We are also interested in empirical measurements of the improvement of staff performance and customer satisfaction. References Miriam Orsina, Gene Stone, Insurance Company Operations (2nd Ed), pp.3, LOMA, 1999 Harriett E. Jones, Dani L. Long, Principles of Insurance: Life, Health and Annuities (2nd Ed), pp. 8, LOMA, 1999 Jane Lightcap Brown, Kristen L. Falk, Insurance Administration, (2nd Ed), pp. 22, LOMA, 2002 Jane Lightcap Brown, Kristen L. Falk, Insurance Administration, (2nd Ed), pp. 67, LOMA, 2002 Miriam Orsina, Gene Stone, Insurance Company Operations (2nd Ed), pp.243

Sunday, January 19, 2020

Compare the two nineteenth century horror stories Essay

Compare the two nineteenth century horror stories, ‘The Black Cat’ and ‘The Tell-Tale Heart’ by Edgar Allan Poe, showing how Poe uses a range of techniques to make his stories dramatic and effective. ‘The Black Cat’ and ‘The Tell-Tale Heart’ are two of the earliest horror stories ever written; they were written in the 1840’s by the American author Edgar Allan Poe. Poe was born in Boston Massachusetts in 1809. He tragically died in 1849 following a life of alcohol and drugs. ‘The Black Cat’ tells us about a man who is in a condemned cell. He is on death row and reflecting on his life and the reason behind the situation he is in. He tells the reader about his love for animals and how he married early in life. His wife allowed him to buy a black cat who never left his master’s side. However, the narrator tells how he became an alcoholic and started to mistreat his wife and pets. On returning home one night he seized the cat and in fright the cat had bitten him. This made him angry and therefore he cut out one of the cat’s eyes. A few days later he took the cat, slipped a noose around its neck and hung it from a limb of a tree. That night the house burnt down and engraved on the wall was the figure of a cat. Later on in the story the narrator tells us of how he found a cat that closely resembled the one he had killed. The cat would never leave his side which started to make him hate the creature. He was walking down the steps of the cellar one day with his wife when the cat followed and sent him headlong down the steps. In fury he picked up an axe and aimed a blow at the cat. His wife tried to stop him so he buried the axe into her brain. He buried the body in the wall of the cellar. The police found the body as the man become cocky and tapped on the wall where he had buried his wife, there was a wailing sound and the police uncovered the body with the cat on the corpses head. ‘The Tell-Tale Heart’ tells us about a man who has been accused of being mad. He looked after an old man who had a ‘vulture eye’. His eye was a pale blue and had a film over it. Whenever the eye fell upon the narrator, it made his blood run cold. Therefore he decided to kill the old man. In the week before he killed him the narrator tells us about how he crept into the old man’s bedroom every night at midnight, trying to find the right moment to kill him. On the eighth night the old man became aware that someone was in his room. The narrator says how he could hear the man’s heart beating in his chest and was frightened that the neighbours would hear it. He ran into the room; seized the man out of his bed and pulled the bed on top of him. He then took the planks from the flooring of the bedroom and placed the body there. Once he had replaced the floorboards the police arrived saying that a neighbour had heard a shriek and they wished to search the property. He led them towards the old man’s bedroom and placed some chairs out for them on the exact spot of the body. He began to make typical chat with the officers but could hear the heart of the old man beating louder and louder until it drew the narrator mad and he confessed to the murder. Both stories have typical features of a modern horror story – blood, murder, the murders conscience and supernatural aspects. However, the structure of the stories differ. ‘The Black Cat’ is a longer story and is more detailed. It includes more background description. â€Å"I was especially fond of animals, and was indulged by my parents with a great variety of pets.† This quote shows that ‘The Black Cat’ tells us about the background of the narrator since he was a young boy. ‘The Tell-Tale Heart’ is more concise and includes some very detailed sections but less background. â€Å"Presently, I heart a slight groan, and I knew it was the groan of mortal terror. It was not a groan of pain or of grief — Oh no! It was a low stifled sound that arises from the bottom of the soul when overcharged with awe.† This quote shows that ‘The Tell-Tale Heart’ has some very detailed sections as the narrator goes into depth about the noise that the old man made. The two narrators have various things in common; they both tell the story in first person and use eyes as an important feature in the story. In the opening paragraph both narrators also say that they have been accused of madness but deny the accusation. â€Å"Mad indeed would I be to expect it, In a case where my very senses reject their own evidence. Yet, mad am I not.† This quote from ‘The Black Cat’ supports my point that the narrator has been accused of being mad but denies it. â€Å"But why WILL you say that I am mad?† This quote from ‘The Tell-Tale Heart’ also supports my point as it is from the opening paragraph of the story and the narrator is asking why he is being accused of being mad. The significant differences between the two narrators are; ‘The Black Cat’ gives a more in-depth background about his life before the present day whereas ‘The Tell-Tale Heart’ goes straight into the present. ‘The Black Cat’ is also set in different rooms of the house and other areas where as ‘The Tell-Tale Heart’ is set in just one room. The relationship between the readier is also different. ‘The Black Cat’ is wrote as if the narrator is writing a letter whereas ‘The Tell-Tale Heart’ is wrote as if the narrator is actually speaking to the reader. â€Å"For the most wild, yet most homely narrative which I am about to pen.† These words suggest to me that ‘The Black Cat’ tells the story as if he is writing a letter. â€Å"How then am I mad?† This rhetorical question shows that the narrator tells the story as if he is actually talking to the reader. The two narrators in the story get caught as they become too over confident about the hiding place of their victims. They both lead the police to the place that the bodies are buried. Sound is also a major part in the reason for the two narrators getting caught. Poe uses a range of visual and sound techniques to make the stories dramatic and effectible. In both stories sound plays a major part in the narrator’s getting caught. â€Å"Then quickly swelling into one long, loud and continuous scream, utterly anomalous and inhuman.† This quote from ‘The Black Cat’ suggests to me that the points I have made are correct. The sound makes the story more dramatic and suspicious. It also leads the police to the corpse. â€Å"But the beating of the heart grew louder, LOUDER! I thought the heart must burst.† This quote also suggests to me that the beating of the heart made the murderer go mad and confess. It also adds an eerie effect to the story. Poe also uses visual description in the stories. â€Å"The corpse, already greatly decayed and clotted with gore, stood erect before the eyes of the spectators. Upon its head, with red extended mouth and solitary eyes of fire†¦Ã¢â‚¬  This phrase of writing from ‘The Black Cat’ goes into great visual detail about the corpse which makes it a lot easier to picture the story in your head. The amount of description sets the scene very effectively and makes the reader feel like there telling the story from their own personal experience. The use of evil words such as ‘greatly decayed’ and ‘clotted with gore’ also emphasise the fear and terror of the story. Poe uses a range of imagery in the stories; including alliteration, similes, metaphors, onomatopoeias, and rhetorical questions. These all make the stories dramatic and keep the reader interested. In ‘The Tell-Tale Heart’ Edgar Allan Poe uses a lot of onomatopoeia and metaphors. â€Å"my blood ran cold† This quote proves the point that Poe uses metaphors in this story. â€Å"Like the thread of a spider† This also proves that Poe uses Similes in this story. Both of these enhance the story as they make it more dramatic and effective. In ‘The Black Cat’ Edgar Allan Poe uses a lot of alliteration, metaphors and personification. â€Å"My tenderness of heart† This quote is particularly important as later on in the story the narrators heart is the complete opposite from tender. â€Å"Grew with my growth† This quote from the story shows alliteration. By using both of these quotes the writer is making the story more effective as he is making it more interesting to read. He is also encourage interpretation from the reader and helping them to feel the emotion of the characters. Poe also uses language devices to make the stories dramatic and effective. These include rhythm, repetition, and rhetorical questions. In ‘The Tell-Tale Heart’. Edgar Allan Poe uses a large amount of rhetorical questions. â€Å"How then am I mad?† This is effective in the story as it involves the reader. It does so by encouraging the reader to reflect upon the question and therefore get involved more with the story. Poe also uses repetition. â€Å"He had found all in vain. All in vain; because Death, in approaching him†¦.† The repetitive phrase all in vain, tells us of the narrators joy at the old mans terror. He also uses a capital ‘D’ in death. This infers he is using death as a name, suggesting that the old man is death. In ‘The Black Cat’ Poe uses plenty of rhythm and repetition. â€Å"Have terrified — Have tortured — Have destroyed me.† In this quote Edgar Allan Poe has repeated the word ‘have’. He has used a rhythm by pausing at the end of each word and the dashes indicate an intensity of emotions. He has also used evil words such a ‘terrified’ and ‘tortured’ which again emphasise the fear and terror of the story. This makes the story more dramatic. In both stories Poe also uses capital letters to emphasise words this gives an immediate dramatic impact. In conclusion, Poe uses a range of techniques to make his stories dramatic and effective, many of these are still used by horror writers today. Although ‘The Black Cat’ and ‘The Tell-Tale Heart’ are similar in numerous ways, Poe uses different techniques in each one to make the stories effective in their own particular way.

Saturday, January 11, 2020

Dunlap V. Tennessee Valley Authority Essay

What were the legal issues in this case? In the case of Dunlap VS Tennessee Valley Authority, the legal issue that was presented was discrimination, disparate treatment and disparate impact. According to the EEOC, race discrimination involves treating someone (an applicant or employee) unfavorably because he/she is of a certain race or because of personal characteristics associated with race (such as hair texture, skin color, or certain facial features). Color discrimination involves treating someone unfavorably because of skin color complexion. The Title VII of the Civil Rights Act of 1964 protects workers from discrimination, and when it comes to the case, discrimination was seen in many ways. For starters, when it came to the interviewing process, there were 5 white officials and 1 black which showed that the room was not balance. Next, when it came to the scoring, he received lower scores than the whites. The next issue that showed discrimination was when it came to the attendance record of the workers. Two of the workers who were Caucasian, had the same attendance as Dunlap, and they received a better ranking. Also, Dunlap had a perfect safety record and received a score of a 4; while a white applicant who was at the job for eleven, had 2 accidents within those years and received a score of 6. Dunlap was not the only African American to have problems with TVA when it came to discrimination as well. The suit that was brought against TVA was for discrimination under disparate impact and treatment. Disparate impact theory requires the plaintiff to demonstrate that the facility falls harshly on one group than another; disparate treatment requires the plaintiff to demonstrate that an employer has treated some people badly because of the race, age, gender or any other discrimination factor (Walsh, 2010). The district court found many filings along with the fact that Dunlap had been subjected to discrimination under both disparate treatment, concluding that TVA’s subjective hiring processes permitted racial bias against both Dunlap and other black applicants (Walsh, 2010). According to the text subjective criteria is assessing candidates that are not uniform and clearly specified, and when it came to Dunlap and the facts that were presented subjective hiring was conducted. The Appeals Court affirmed the disparate treatment claim, reversed the disparate impact claim, and affirmed the district court’s award of damages and fees to Mr. Dunlap (Walsh, 2010) Explain why the plaintiff’s disparate (adverse) impact claim fail? The reason that disparate impact failed is because when it comes discriminatory actions in this theory, proof is not required. The disparate impact theory requires a plaintiff to demonstrate that an apparently neutral employment practice affects one group more harshly than another and that the practice is not justified by business necessity. A prima face case is established when the plaintiff identifies a specific employment practice to be challenged; and through relevant statistical analysis proves that the challenged practice has an adverse impact on a protected group. When it comes to the case, discrimination was seen, but never affects more than one class. Glass ceiling in the book is referred to artificial barriers based on attitudinal or organizational bias that prevent qualified individuals from advancing in there organization to upper management. The reason that glass ceiling is seen is because when it comes to the interviewing process, there was only 1 black interviewer. Then when it came to the recruits, even if there work effort was poor and they were white, there scores was higher than the African Americans. But because discrimination is a fact that is null and void in this theory and because discrimination doesn’t matter, that’s why it failed. The only criteria Mr. Dunlap could prove was that the interview process had been manipulated to exclude African-American candidates, and how the scoring was different for blacks and whites. So in the essence in this theory, it was a challenge to prove it because Dunlap only had his interview Explain why the plaintiff’s disparate treatment claim succeed? The reason disparate treatment was successful was because it requires a plaintiff to demonstrate that an employer has treated some people less favorably than others because of their race, color, religion, sex or national origin. The first fact was the manipulating of the score. In this case, Dunlap was able to prove that the matrix process was pretext for discrimination. After the district court did some investigation, they found that some of sheets had been changed more than 70 times, and there was no reason what so ever for the change. Dunlap said the matrix score was manipulated to keep him out of the top ten applicants. Another reason it was a success was because William Parchman, an African-American with thirty years of experience as a boilermaker that was also rejected. He played a vital role in the suit because of the problems he encountered to become employed with TVA. He provided testimony hat he had a history of being rejected for jobs and promotions at the company. He also stated that the only reason got the boilermaker position was after he filed a complaint with the EEOC. Other facts that showed discrimination was evidence before the district court when it came to the weight given to the interview and how it was changed, questions in the interv iew was not evaluated objectively, and the scores were altered to produce a racially biased result. Bottom line is that when it comes to discrimination, it was proven in several ways, and the district court committed no error in finding disparate treatment. The court saw how discrimination was seen from different people, and Dunlap was not the only worker that felt that way. What should the TVA have done differently with regard to interviewing and selecting candidates for these jobs? When it comes to interviewing candidates, what’s should of been done differently is looking at the applicants work history thoroughly. The first thing that should have been looked at first is education. When workers have education, they are better qualified because they will know how to think outside if the box. If an applicant didn’t have the education, then TVP sould look at experience as well as work performance. When looking at experience, factors that should  be viewed are supervisory experience along with performance and safety in the workplace. In the interviewing process, things that could have been different is interviewing with one interviewer at a time. Also the questions could have been different for each interviewer so that everyone was not following the same pattern. All of the scores would be the same, but the questions would be different and give the best candidates for the job. Another thing that could have been different is having a manager present in the room to grab and check the papers when the interview is finish. By a manager being there to verifying the score, there is not chance that manipulating could happen with the scoring. If this type of approach would have been used, the selecting process would have been different because no interviewer or candidate would have the same response. But the scores would show the real qualified applicants, and they would deserve the promotion. Nothing would be bias and scores could not be altered.

Friday, January 3, 2020

Comparative Study of Various Mediums of Advertising

A Dissertation Report On Comparative study of effectiveness of various Advertising Mediums of Advertising Dissertation report Submitted by: Shefali Walia Enroll no. – A0102208058 Submitted to:- Ms. Varsha Khattri (Project Mentor) [pic] AMITY BUSINESS SCHOOL NOIDA DECLARATION I, hereby declare that this project report is the record of authentic work carried out by me during the 4th Semester of MBA and has not been submitted to any other University or Institute for the award of any degree / diploma etc. Shefali Walia Univ Roll No. A0102208058 ( AMITY UNIVERSITY, NOIDA) Date: Place: Certificate The forgoing project, entitled â€Å"Comparative analysis of effectiveness of different mediums of Advertsing† carried out†¦show more content†¦| |3.7 Outdoor Advertising |30-31 | |3.8 Direct mail Advertising |31-32 | |3.9 Specialty Advertising |32-33 | |Chapter 4 Research Methodology |34-41 | |4.1 Need of the Study |34-35 | |4.2 Objectives of the study |35-36 | |4.3 Research Methodology |36 | |4.4 Research Method : Company Perspective |37- 39 | |4.4.1 Sample Frame |37 |Show MoreRelatedEffectiveness Of Print And Television Advertisements Essay1035 Words   |  5 Pagesâ€Å"Effectiveness of Print and Television advertisements, a Comparative study of the same brands on different media vehicles.† - Ayushee Bhatnagar Abstract In the age where technology has made things easy and convenient there are some things that have become complicated but necessary, same are the case with advertising. For the advertising companies, reaching to their target audience has become a complicated task. A significant shiftRead MoreMarketing Research Topics1249 Words   |  5 Pagesvariables affecting the time spent in dining experience A comparative study on application of advertising through cell phone framework among various types of goods and services Market entry strategy in an emerging market using Country of Origin information Impact of brand awareness on consumer/brand loyalty: A study of packages milk brands Characteristics of customer loyalty: impact of brand image or product characteristics/attributes – A study of packaged milk brands Effect of self-placement of habitualRead MoreKtm Case Study596 Words   |  3 Pages360 STUDY GUIDE †¢ Chapter 13 Understand the definitions and recognize examples of: promotion mass selling advertising publicity sales promotion personal selling Understand the three promotion objectives and be able to recognize examples of when you would use each. Be able to recognize the communication model. What constitutes â€Å"noise†? What are the objectives of a direct response promotion? Understand the difference between a â€Å"push†Read MoreMarketing Systems Of Luxury Brand Essay1143 Words   |  5 PagesExtent OF THE STUDY Today the presence of an association relies on upon its capacity to comprehend the clients and creating and conveying items or administrations as indicated by those requirements. This anticipate indented to discover the brand promoting in design appreal Targets †¢ To learn about Luxury Brand †¢ To learn about Marketing systems of Luxury Brand †¢ To comprehend buyer inclination toward Luxury brand Test SIZE The specialist needs to choose a significant division of theRead MoreTopic: Making Movies Mean More.Introduction. Convincing1371 Words   |  6 PagesCinema has become a dominant medium of Creativity and communication globally. Influence of to be entertained and informed comes to consideration while thinking about a cinema’s Targeted Audience. The word Entertainment here means The Act of diverting, Amusing or Causing someone’s time to pass agreeably, something that occupies the attention agreeably. To make that happen Cinema Marketing is a Multiface venue that’s winning over marketers. Different Mediums of Cinema advertising are used in today’s fastRead MoreA Report On The Ict Industry Essay1345 Words   |  6 PagesThis facilitates the undertaking of comparative analysis. Cross-sectional studies are facilitated as a result. Through the utilization of various toolkits and other data analysis programs, it is possible to come up with necessary descriptive statistics for the company. Despite the fact that the reliability and validity of secondary data are wanting, collecting primary data from the Chinese population would be quite cumbersome. What is more, undertaking the study involves huge financial costs whileRead MoreTelevision Advertisements Impact On Customer s Buying Behavior For The Health Drinks1744 Words   |  7 Pages2015-2020. Growing health awareness and incomes have helped to increase demand for malt-based hot drinks among middle- and upper-class Indians. Wider internet access has helped malt-based hot drinks companies expand their marketing beyond traditional advertising and event sponsorship, to offer nutrition and education tips on their websites. The Indian website for Horlicks, the leading malt-based hot drinks brand in the country, appeals to ambitious parents by offering an Educational Corner that providesRead MoreThe Profile Of The Professionals1416 Words   |  6 Pageswith an undergraduate honours degree or a graduate qualification. So, they belong to lower middle class. Entry Requirements Professionals’ profile in the organisation pretty much elaborates the level of qualifications and experience required for various hierarchy levels. However, interpersonal and communication skills, in addition to computer skills are highly sought after traits. At least a masters but preferably higher degree by research, a generalist postgraduate degree and an honours degree/Read MoreFisher Paykel Healthcare NZ Essay2315 Words   |  10 PagesFPH 10 1. Collaboration between Sales and Marketing 10 2. Managing Market Relationships 10 IV. COMPARATIVE COST ANALYSIS 16 V. CONCLUSION 17 VI. RECOMMENDATIONS 17 VII. REFERENCES 19 VIII. APPENDICES 21 TABLE OF FIGURES Figure 1.1: Four marketing relationship elements linked directly to the scope of the FPH problem at hand TABLE OF TABLES Table 1.1: Comparative cost and ROI of various marketing campaign elements I. EXECUTIVE SUMMARY Fisher Paykel Healthcare sells its coreRead MoreChallenges Of Positioning A Brand2747 Words   |  11 Pagesreference to DTH market in Chennai. Abstract Advertising is a medium through which an individual or organization highlights the USPs and benefits of a product or service to influence the buying behavior of the individuals. It helps to create a positive image of a particular brand in the minds of the customers and prompts them to buy the same The paper presents the insights regarding the challenges and innovative strategies in positioning a brand through advertising .It focuses on relative reach of brands