Thursday, January 23, 2020

Breast Cancer Essay -- Diseases Medical Medicine Essays

Breast Cancer Chromosome 17 and BRCA1 Among the most common diseases affecting the female population, breast cancer develops in one of every eight American women. This means that almost 200,000 women suffer from the disease each year. Doctors would advise women to take necessary precautions, such as routine surveillance, in order to ensure a life without obtaining this disease prior to understanding any genetic linkage of breast cancer. Although many external factors contribute to breast cancer, current investigations reveal that five to ten percent of these cases may be attributed to genetic inheritance (Lynch, 1999). This knowledge, an ingenious finding by Mary-Claire King in 1990, linked breast cancer to the long-arm of chromosome 17 (Biesecker, 1997). Since the discovery of possible genetic linkage, doctors have been able to delineate those individuals who are most prone to the disorder, and immediately, these women begin to act in accordance with doctor’s suggestions to reduce their risk (Rosenthal et. al., 1 999). Mary-Claire King not only determined that breast cancer was a genetic disorder, her findings also suggest that the mutation of gene BRCA1 (Breast Cancer one) is responsible for most inherited breast cancer. Further investigations pointed to another gene, BRCA2, as also contributing to genetic inheritance. Unlike BRCA1, BRCA2 is found on chromosome 13. Researchers have found that 90% of all inherited cases of breast cancer may be due to mutations of these individual genes (Lynch et. al., 1999). The BRCA1 gene has the locus designation, 17q21, and is responsible for this autosomal dominant syndrome (Merajver et. al., 1995). This tumor suppressor gene, contains 23 exons, each ranging from 41 to 311 bas... ...counseling in hereditary breast cancer. Cancer Genet. Cytogenet 1999(109): 91-98. Merajver, S.D., Frank, T.S., Xu, J, et. al. Germline BRCA1 mutations and loss of the wild-type allele in tumors from families with early onset breast and ovarian cancer. Clin. Can. Res. May 1995 (1): 539-544. Miki, Y., Swensen, J., Shattuck-Eidens, D., et. al. A strong candidate for the breast and ovarian cancer susceptibility gene BRCA1. Science. Oct. 1994(266): 66-71. Puget, N., Stoppa-Lyonnet, D., Sinilnikova, OM., Pages, S., Lynch, HT., Lenoir, G.M. and Mazoyer, S. Screening for germ-line rearrangements and regulatory mutations in BRCA1 led to the identification of four new deletions. Cancer Research. Jan. 15, 1999 (59): 455-461. Rosenthal, T.C., and Puck, Stirling M. Screening for genetic risk of breast cancer. American Family Physician. Jan 1999 (59): 99-104.

Wednesday, January 15, 2020

Checkpoint Jsbmha and Hipaa Case Study

Checkpoint: JSBMHA and HIPAA Case Study Phoebe Edwards Carrie Cooper 4/18/13 1. How does HIPPA serve to protect patient rights? A patient’s health information can be shared with doctors and hospitals for treatment and care. The information can also be shared with family members who the patient has given permission to access the patient’s records. HIPPA’s guidelines make clear exactly what information about patients is protected. Called PHI, this information includes anything that would identify a patient, from name, Social Security numbers and addresses to broader identifiers like race, age and home state.Information about the person’s health care needs or medical history is also considered PHI. HIPPA guidelines dictate that this information cannot be shared except in particular instances, including when the individual patient requests their own personal information, or when privacy investigation by the Department of Health and Human Services requires it. 2. What areas of the JSBMHA did HIPAA compliance impact? HIPPA has a great impact on the patients’ rights, all areas of the JSBMHA is affected by these two individuals. It affected the patients, and put the agency in an awkward position.It affected the grandmother which she can make others aware about what happened and this could affect the agency negatively. People who are involved with the agency could make people feel uncomfortable about giving them any information. And this mean any information is not safe at JSBMHA, and the trust has been violated. 3. What actions should the JSBMHA director take about the HIPAA violation? I think that both of them should get suspended, this is a serious violation. They have put JSBMHA in a very bad situation and have lost the trust of the family.Jim know better ,because he has been with JSBMHA for a long time, longer then Betty, he should have told her that she should have not be talking about these clients outside of the office. I think that Jim should get fired because he know ‘s better, after being at the JSMHA for 20 years is a long time to be with JSMHA and it is more than enough time to know and understand the rules. Jim was supposed to be an example to Betty, someone who Betty can learn from. JSMHA should fired Jim and Betty because Jim did not tell about the HIPAA rules.

Tuesday, January 7, 2020

Venus Figurines as Early Human Sculptural Art

A Venus figurine (with or without the capital V) is the rather informal name given to a type of figural art produced by humans between about 35,000 and 9,000 years ago. While the stereotypical Venus figurine is a small carved statue of a voluptuous female with large body parts and no head or face to speak of, those carvings are considered part of a larger cadre of portable art plaques and two- and three-dimensional carvings of men, children, and animals as well as women in all stages of life. Key Takeaways: Venus Figurines A Venus figurine is the informal name for a type of statuette made during the Upper Paleolithic figurines, between 35,000–9,000 years ago.  Over 200 have been found in the northern hemisphere across Europe and Asia, made of clay, stone, ivory, and bone.  Figurines are not limited to voluptuous women but include non-voluptuous women, men, children, and animals. Scholars suggest they may have been ritual figures, or good luck totems, or sex toys, or portraits or even self-portraits of specific shamans.   Venus Figurine Variety Over 200 of these statuettes have been found, made of clay, ivory, bone, antler, or carved stone. They were all found at sites left behind by hunter-gatherer societies of the European and Asian late Pleistocene (or Upper Paleolithic) periods during the last gasp of the last Ice Age, the Gravettian, Solutrean, and Aurignacian periods. Their remarkable variety—and yet persistence—within this 25,000 year period continues to amaze researchers. The Venus and Modern Human Nature One of the reasons youre reading this may be because images of the physicality of women are an important part of modern human cultures. Whether your specific modern culture permits the exposure of the female form or not, the uninhibited depiction of women with large breasts and detailed genitals seen in ancient art is nearly irresistible to all of us. Nowell and Chang (2014) compiled a list of modern-day attitudes reflected in the media (and scholarly literature). This list is derived from their study, and it includes five points that we should keep in mind when considering Venus figurines in general. Venus figurines were not necessarily made by men for menMen are not the only ones aroused by visual stimuliOnly some of the figurines are femaleThe figurines that are female have considerable variation in size and body shapeWe dont know that Paleolithic systems necessarily recognized only two gendersWe dont know that being unclothed was necessarily erotic in Paleolithic periods We simply cannot know for certain what was in the minds of Paleolithic people or who made the figurines and why. Consider the Context Nowell and Chang suggest instead that we should consider the figurines separately, within their archaeological context (burials, ritual pits, refuse areas, living areas, etc.), and compare them to other artwork rather than as a separate category of erotica or fertility art or ritual. The details that we seem to focus on—big breasts and explicit genitals—obscure the finer elements of the art for a lot of us. One notable exception is a paper by Soffer and colleagues (2002), who examined the evidence for the use of netted fabrics drawn as clothing features on the figurines. Another non-sex-charged study is by Canadian archaeologist Alison Tripp (2016), who looked at examples of Gravettian-era figurines and suggested similarities in the central Asian group indicate some kind social interaction among them. That interaction is also reflected in similarities in site layouts, lithic inventories, and material culture. The Oldest Venus The oldest Venus found to date was recovered from the Aurignacian levels of Hohle Fels in southwestern Germany, in the lowest-most Aurignacian layer, made between 35,000–40,000 cal BP. The Hohle Fels carved ivory art collection included four figurines: a horses head, a half-lion/half-human being, a water bird, and a woman. The female figurine was in six fragments, but when the fragments were reassembled they were revealed to be the nearly complete sculpture of a voluptuous woman (her left arm is missing) and in place of her head is a ring, enabling the object to be worn as a pendant. Function and Meaning Theories about the function of Venus figurines abound in the literature. Different scholars have argued that the figurines might have been used as emblems for membership in a goddess religion, teaching materials for children, votive images, good luck totems during childbirth, and even sex toys for men. The images themselves have also been interpreted in many ways. Different scholars suggest they were realistic images of what women looked like 30,000 years ago, or ancient ideals of beauty, or fertility symbols, or portrait images of specific priestesses or ancestors. Who Made Them? A statistical analysis of the waist to hip ratio for 29 of the figurines was conducted by Tripp and Schmidt (2013), who found that there was considerable regional variation. Magdalenian statuettes were much curvier than the others, but also more abstract. Tripp and Schmidt conclude that although it could be argued that Paleolithic males preferred heavier set and less curvy females, there is no evidence to identify the gender of the persons who made the objects or who used them. However, American art historian LeRoy McDermott has suggested that the figurines may have been self-portraits made by women, arguing that the body parts were exaggerated because if an artist dont have a mirror, her body is  distorted from her viewpoint. Venus Examples Russia: Malta, Avdeevo, New Avdeevo, Kostenki I, Kohtylevo, Zaraysk, Gagarino, EliseevichiFrance: Laussel, Brassempouy, Lespugue, Abri Murat, Gare de CouzeAustria: WillendorfSwitzerland: MonruzGermany: Hohle Fels, Gà ¶nnersdorf, MonreposItaly: Balzi Rossi, Barma GrandeCzech Republic: Dolni Vestonice, Moravany, Pekà ¡rnaPoland: Wilczyce, Petrkovice, PavlovGreece: Avaritsa Selected Sources Dixson, Alan F., and Barnaby J. Dixson. Venus Figurines of the European Paleolithic: Symbols of Fertility or Attractiveness? Journal of Anthropology 2011.569120 (2011).  Formicola, Vincenzo, and Brigitte M. Holt. Tall Guys and Fat Ladies: Grimaldis Upper Paleolithic Burials and Figurines in an Historical Perspective. Journal of Anthropological Sciences 93 (2015): 71–88.  McDermott, LeRoy. Self-Representation in Upper Paleolithic Female Figurines. Current Anthropology 37.2 (1996): 227–75.  Nowell, April, and Melanie L. Chang. Science, the Media, and Interpretations of Upper Paleolithic Figurines. American Anthropologist 116.3 (2014): 562–77.  Soffer, Olga, James M. Adovasio, and D. C. Hyland. The Venus Figurines: Textiles, Basketry, Gender, and Status in the Upper Paleolithic. Current Anthropology 41.4 (2000): 511–37.  Tripp, A. J., and N. E. Schmidt. Analyzing Fertility and Attraction in the Paleolithic: The Venus Figurines. Archaeology, Ethnolog y and Anthropology of Eurasia 41.2 (2013): 54–60.

Monday, December 30, 2019

Oracle Employ And Manipulate Users And Roles - 1253 Words

Oracle DBAs employ and manipulate users and roles, as well as various other objects on a daily basis. They do not belong to a schema similar to other objects, including profiles and tablespaces. Users and roles access schema objects like tables, views, synonyms, and indexes. Even novice DBAs possess a reasonable awareness of working with tables including querying, updating, reading, and deleting data from them. Because tables can easily expand in row numbers, performance will inevitably suffer. An adept DBA should retain a fundamental expertise of indexes to alleviate these performance issues. Much like the index of a book, a database index speeds up table searches by adopting pointers to rows of data in contrast to performing full table scans to locate a minute amount of data. An index is a data structure (most commonly a B- tree) that stores the values for a specific column in a table. The B-tree index is the prevailing index and takes advantage of an efficient algorithm for searching columns of high cardinality. This type of search is performed in logarithmic time which exponentially decreases the time to execute a search. Fig 2 illustrates a B-tree index and how it provides more granular levels of information at each level. An index is constructed on the last name column of a table. Oracle uses ‘Miller’ as the root node and divides any last names that are alphabetically less than Miller on the left child node and any last names greater on the right side. The next levelShow MoreRelatedEvolution of Oracle Time Machine: FlashBack Essay901 Words   |  4 Pag esof Oracle Time Machine: FlashBack â€Å"It’s gone by mistake†. We human beings are tend to make mistakes. But what happens when this mistake committed by database user. Is there any simple recycle bin concept or simple time travelling concept The answer is YES, there is. Sometimes it’s just simple a query or some data cleansing methods used by the users or data librarians, whatever may the cause be, data-loss is a very common phenomenon. Backup and recovery methods are provided by the Oracle databaseRead MoreAssignment 2 Database Management Systems1167 Words   |  5 PagesAssignment-2 Database Management Systems General Database Concepts 1. Describe the types of facility you would expect to be provided in a multi-user DBMS. Data Storage, Retrieval and Update. A User-Accessible Catalog. Transaction Support. Concurrency Control Services. Recovery Services. Authorization Services. Support for Data Communication. Integrity Services. Services to Promote Data Independence. Utility Services. 2Read MoreThe Importance Of My Colleagues And Managers2047 Words   |  9 PagesI would like to acknowledge the role of my colleagues and managers who extended their guidance and help whenever required for the my project during the internship. I am very thankful to my guide Rajasekhar Patibandla for his invaluable advice during my Summer Internship. I am thankful to Steve Ginter for his guidance and friendly support during my stay at the client location. I am also very greatful to Jasvir Singh ( for great cooperation and help esp. in the core stage of the project), Sri HarshaRead MoreRole of Human Resource Information System in Banking Industry of Developing Countries2276 Words   |  10 PagesRole of Human Resource Information System in Banking Industry of Developing Countries Dr. Harman Preet Singh Assistant Professor, PGDAV College University of Delhi, Delhi, India hpsingh@pgdav.du.ac.in Dr. Sunita Jindal Associate Professor, giBS GGS IP University, Delhi, India sunitajindal@gmail.com Sekh Abdul Samim Sr. Relationship Manager, IIPM Bhubaneswar, India samim20_cet@yahoo.co.in Abstract- The deployment of Human Resource Information System (HRIS) in banking is the fruit of development ofRead MoreEngro Foods Erp System7882 Words   |  32 PagesERP System 15 System Selection 16 The Acquisition System 16 Equipment 16 System Software 17 Application Software 17 External Consulting 18 Internal Work 18 Oracle 11 18 Working of Oracle 11 19 Data Mining 19 The Test Environment for Oracle 11i and the Issues of Testing 20 Average Memory Used By the Oracle E-Business Suite 20 SAP 21 Maximo  Inventory amp; Purchasing Training Workshop 22 Who should attend? 22 Agenda 23 Duration 24 Body 24 1st Interview 25 2ndRead MoreInformation Systems Decision Making Course2111 Words   |  9 Pageseconomic growth and network systems have expanded proportionally. Despite the fact that the company has infused much of its resources for an efficient and effective network, its security efforts have failed to match in comparison. The organizations, Oracle servers and the email system largely depend on the effectiveness and stability of the network system. Which in case of a network glitch of some sort the organization’s overall performance stands to be affected. This in its self could result in networkRead MoreThe Current State Of Our Cybersecurity Infrastructure2731 Words   |  11 Pagesenforcement. This policy paper will briefly discuss the current state of our cybersecurity infrastructure. The terms of malicious traffic, liability and its forms will defined, key components will be introduced, the roles that the Internet Service Provider (ISP), software producer, end user, operating systems developer play in this process will be examined and key legislation will be mentioned. These key factors and research herein, help to supply that the liability should lie with the Internet ServiceRead MoreMba Project Report Erp Implemetaion12267 Words   |  50 Pages | | Version: 1.0 TABLE OF CONTENTS Introduction to ERP 5 Advantages of ERP 9 Disadvantages of ERP 10 ERP Packages Feature Comparison 12 Microsoft 28 Oracle 28 PeopleSoft 29 SAP 29 Siebel 29 Return on investments for ERP 30 Working out the Myths of ERP in the Initial stage 30 Proper Implementation and Finance 30 Strict Adherence to Changes 31 ERP System Selection MethodologyRead MoreInformation As An Asset Can Not Be Overemphasized1988 Words   |  8 PagesShowing Snort Architecture (Truica-victor, 2013) Data Sniffer. Raw network traffic firstly is collected by the Data Sniffer and sent over to for the further processing. Decoder Decoders and Preprocessors work hand in hand. Decoding often takes the role of determining which protocols are contained in the packet. The Decoder then saves the information gathered together with the location of the payload in the packet and the size of the payload for further processing by the Preprocessor and DetectionRead MoreData Base Management System13582 Words   |  55 Pagesdatabase management software package is a helpful tool in such a situation. Any organization, bank, manufacturing company, hospital, university, requires huge amount of data in some or the other form. All such organizations needs to collect data, manipulate them and store them for future use. All such type of organizations requires data for number of purposes like; 1. Preparing sales report , 2. Forecasting sales, 3. Preparing accounts reports, 4. Getting medical histories of patients

Saturday, December 21, 2019

Writing Is The Painting Of The Voice ( Penny, 2013 )

Voltaire once said, â€Å"writing is the painting of the voice (Penny, 2013).† That was over 300 years ago, and this has still not changed. Writers and authors use words to express the art that is in their minds. In my future career, I want to be able to have complete authority over what I contribute to my chosen career and the world around me. I also want to be able to express myself. Writing is something that I have always enjoyed doing. Writing is personal and therapeutic, and it is also something I have authority over. I chose to research a career in writing because to make a career out of contributing my thoughts to others in a form of writing would be ideal to me. Although often overlooked, the career of a writer or author is an essential asset to the artistic world. They produce raw creativity and unique storylines behind many forms of entertainment that are included in our day-to-day lives. To better understand the career of a writer or author, one should take a look a t the basics, location, work environments, wages, benefits, required education and skills, outlook and a personal reflection from someone who has researched the career. Writers and authors are individuals who make a career out of utilizing their superb writing skills to communicate ideas and information to others. To do this, writers use various media forms including: magazines, newspapers, online publications and books. There are many duties and responsibilities that go along with this career. As mentioned

Friday, December 13, 2019

Analysis of Nutrition News Free Essays

â€Å"Boosting Key Milk Nutrients May Help Lower Type 2 Diabetes Risk† – ScienceDaily The report (ScienceDaily screen 1) mainly focused on the important contributions of vitamin D, calcium and magnesium in risk prevention for diabetes; most especially the type 2 diabetes. (qtd in ScienceDaily, screen 1) The language used is fairly comprehensive with the use of familiar words and with only a few technical terms. The author’s understanding of the previously reported findings is sufficient to allow him or to allow her to thoroughly explain the findings of the studies presented. We will write a custom essay sample on Analysis of Nutrition News or any similar topic only for you Order Now In both studies conducted by Pittas et al. and Larsson et al., meta-analyses approaches were conducted to obtain the results. (qtd in ScienceDaily, screen 1) Studies performed were mainly based on American diet, therefore similar studies may be conducted to evaluate whether these findings apply for other racial and ethnic populations. These information would really be useful for individuals who have diabetes or are at risk of developing diabetes; as well as the general population for the promotion of health and prevention of disease. However, to a reader without extensive nutritional background, results of this study may be misleading. The report may mislead by giving the reader the notion that drinking milk alone will be prevention enough against diabetes. Other preventive measures for diabetes should have been included in the report to avoid misinterpretation. Reference: ScienceDaily. â€Å"Boosting Key Milk Nutrients May Help Lower Type 2 Diabetes Risk†. (13 July 2007). 16 July 2007 http://www.sciencedaily.com/releases/2007/07/ 070711001452.htm. How to cite Analysis of Nutrition News, Essay examples

Thursday, December 5, 2019

Importance of Strategic Information System Answers for Students

Question: Discuss about the Strategic Information System. Answer: Introduction Strategic Information systems are developed for business initiative. They provide competitive advantage to an organization. An organization is made of various components. It is very important that there should be integration, where all departments are linked together. Certainn departments in an organization are not that important and there are certain that are important. One such department, that is important is Accounts department. Accounts department keeps all the records of transactions and all other accounting related operations. Changes in the technology pattern has also affected accounts department. Automation and integration of packages offered requires services and accounting operations by numerous suppliers in the market. Australia has also witnessed this change, presence of providers who provide services and accounting operations to the customers. Organizational Background Online retailing is growing day by day and many organizations in Australia and in other countries who are in this field. They have captured a huge market share and have been satisfying the customers by providing a good quality of services. Woolworths Limited can be taken for example, has retail stores which offers a wide range of products like groceries and many more. Organization structure of Woolworths consists of many levels where the resources are allocated. These are top management, leadership level, operational employees and others. Combination of these resources from different levels is very important for Woolworths to attain its goals (Woolworths 2017). Various aspects of modern organizational structure It is observed that there are several levels in which the resources of Woolworths has been placed. Woolworths can achieve is goals only when all these levels they collaborate. But such integration is currently absent from Woolworths and in order to get an competitive advantage over the other major players in the market Woolworths need have an integration of sysetms and sub-systems within the organization. System Acquisition Method Many system acquisition methods can be applied in Woolworths case. The organization can use custom software and they can also apply the necessary functionalities with the help of commercial software. The best method will be the use and application of Enterprise Resource Planning (ERP) (Yang and Tamir, 2015). ERP will help organization to cope the various issues related to the organizational structure. The process of sales in Woolworths can be divided in four stages The objectives of business are the inputs of the sales process which results in customer satisfaction as an output. There are other sub activities as well that falls in between. Controlling Problems and Frauds It can be seen in the figure of the flowchart above that there are four stages in the sales process comprising of activities and sub activities in each stage. Consequently problems related to monitoring and controlling occur. Tracking manually and managing these activities is not easy due to operational complexity (Ryan 2016). Therefore, automation of system should be used with tactics for better controlling and monitoring in the process of sales. Due to the various activities, frauds occur and malpractices have been observed in information handling and exchange. It is very important for the organizations to avoid situations of fraud. These kind of fraudulent puts the reputation of the organization at risk and also the put the organization at legal battles. Organizations must and they at most times monitor the fraudulent activities that might occur. Implementation and Development Accounts department being the most important department of an organization, is completely operational on paper based records and manual processes for carrying out accounting operations. Change in technology has also affected the accounts department, which has introduced the application of automated systems. There are automated and integrated packages that offers necessary services and accounting operations are offered by many suppliers in the market. A shift and transformation can be seen in the pattern of customer satisfaction. This shift is because of the technology which has brought changes in this area, to fulfill the customer requirements and satisfy them. Before there were no complaints from the end of customers about the long queues and long waiting hours. But now there are too many complaints regarding the long queues( Bonstra 2013). If there is a downtime in system, the customer satisfaction level and customer involvement will fall down. Likewise, the performance of systems has also changed the customer satisfaction and involvement levels (James, 2016). Size of the Market in modern times Size of the market in modern times has changed a lot from the past. It plays a very important role and affects the strategic information system of various organizations. More than 135,000 employees work in 11,000 firms which provide automated and integrated services (Bankwest, 2015). A growth in revenue and profits are expected at 6%, with such a large market share( Afpbb 2015) Market leaders and their competitive advantages Accounting industry capture a large market share and market size. Based on the demands of the customers there are many providers, they have created a goodwill in the market. Reckon is a market leader in the area of accounting package (Majewsky, Wagner and Farlin 2016) . The distinct characteristics of Reckon is given below. Goodwill in the market It ensures the safety of the money invested It gives the ability that can integrate the systems and subsystems. Application of latest technology for faster processes (Bankwest 2015) MYOB MYOB is an accounting software and has large market size and share. Based on the customer demand, the providers have taken a hold in the market to offer customized automated accounting software package. The features of MYOB is given below Real-time image can be seen with the help of this softwareOne can easily do Point of salesIt is not dependent on the network issues for better results.Follows the set standards and the policiesProvides excellent scalability and supportability ( MYOB 2016) Xero The back-end processing of Xero is very fast which results in very less time consumption in response. Easy execution of processes and reconciliation of tasks The integration with rest of the systems is very easy (Miller, 2016) Saasu The collaboration with rest of the systems is very easy It has a strong customer base The software provides excellent scalability supportability and adaptability One can find many currency as well as language option (Galliers and Reidner 2014). Intuit QuickBooks It is also an accounting software package, a market leader that provides customized accounting services. The distinct features of Intuit QuickBooks are: A reasonable price is charged from the customers for the services providedTill no there has no issues have been detected with the performance of Intuit QuickBooksThe operations related to data and their management is excellentIt provides free payroll servicesIt has a mobile application as wellThere has never been any incidences of security breaches ( Dwedi et al. 2015) Cost of Accounting Software Packages Type of cost Reckon MYOB Xero Saasu Intuit QuickBooks Basic Package $5 is charged with a period that is valid for one month $50 charged with a period that is valid for one moth $9 is charged with a valid period of one month $15 is charged with a valid period of one month $12 is charged with a valid period of one month. Advanced Package It is based on additional services $99 is charged with the valid period of one month $70 is charged with a valid period of one month $180 is charged with a valid period of one month $21 is charged with a valid period of one month Table of Costs Limitations Many issues and challenges are faced by the users in terms of security while the apps are used There are times, when the net costs are not disclosed by the providers to the customers The providers do not provide system manuals and the relevant documents which makes it difficult for the users to use the application After post-delivery, services are not good( Wali, Sadq and Rashid 2016). References Afpbb, (2016) The Australian Accounting Industry. [online] Afpbb.net.au. Available at: https://www.afpbb.net.au/Resources/TheAustralianAccountingIndustry.aspx [Accessed 25 Apr. 2017]. Bankwest, (2015) Accounting Services Industry Report. 1st ed. [ebook] Bankwest. Available at: https://www.bankwest.com.au/cs/ContentServer%3Fpagename%3DFoundation/CS/Blob/Document%26id%3D1292539844555%26ext%3D.pdf+cd=3hl=enct=clnkgl=in [Accessed 25 Apr. 2017]. Boonstra, A., 2013. How do top managers support strategic information system projects and why do they sometimes withhold this support?.International Journal of Project Management,31(4), pp.498-512. Dwivedi, Y.K., Wastell, D., Laumer, S., Henriksen, H.Z., Myers, M.D., Bunker, D., Elbanna, A., Ravishankar, M.N. and Srivastava, S.C., 2015. Research on information systems failures and successes: Status update and future directions.Information Systems Frontiers,17(1), pp.143-157. Galliers, R.D. and Leidner, D.E., 2014.Strategic information management: challenges and strategies in managing information systems. Routledge. Intuit Quickbooks GoPayment Reviews: App vs Square.environment,548, pp.408-409. James, D. (2016) 7 accounting packages for Australian small businesses compared: including MYOB, QuickBooks Online, Reckon, Xero. [online] BIT. Available at: https://www.bit.com.au/Review/344651,7-accounting-packages-for-australian-small-businesses-compared-including-myob-quickbooks-online-reckon-xero.aspx [Accessed 25 Apr. 2017]. Majewsky, M., Wagner, M. and Farlin, J., 2016. Do you reckon it's normally distributed?.The Science of the total Kelly, M., 2017. Miller, K. (2016) Xero Review 2016 | Reviews, Ratings, Complaints, Comparisons. [online] Merchant Maverick. Available at: https://www.merchantmaverick.com/reviews/xero-review/ [Accessed 25 Apr. 2017]. Myob, (2016) Online Accounting Software for Businesses | MYOB. [online] Myob.com. Available at: https://www.myob.com/au/accounting-software/compare [Accessed 25 Apr. 2017]. Ryan, E. (2016) The Evolution of Accounting Software: Past, Present and Future|. [online] Gaaaccounting.com. Available at: https://www.gaaaccounting.com/the-evolution-of-accounting-software-past-present-and-future/ [Accessed 25 Apr. 2017]. Said, H.M., Latif, R.A. and Ishak, N.K., 2014. Strategic information system and environmental scanning practices in Malaysian hotel organizations.Theory and Practice in Hospitality and Tourism Research, p.83. Wali, A.I., Sadq, Z.M. and Rasheed, J.S., 2016. The Role of Strategic Information System Characteristics on Customer Service Quality (An Empirical Study at Soran and Sardam Private Hospitals in Iraqi Kurdistan Region Erbil City).International Journal of Humanities and Cultural Studies (IJHCS)? ISSN 2356-5926,3(2), pp.1778-1790. Woolworths, (2017). Woolworths Supermarket - Buy Groceries Online. [online] Woolworths Online. Available at: https://www.woolworths.com.au/ [Accessed 25 Apr. 2017]. Yang, Y. and Tamir, G. (2015). Offshore software project management: mapping project success factors. International Journal of Project Organisation and Management, 7(2), p.111.