Free Essay

Document

In:

Submitted By khongonyowa
Words 1750
Pages 7
ASSESSING IMPACT OF DRUG THEFT IN THE HEALTH CARE SERVICE: A CASE
OF BLANTYRE
CHAPTER ONE
1.1

INTRODUCTION
Different authors have defined drug theft differently depending on the context in which they are discussing. Drug theft could be summarized as:
“The act of stealing drugs and selling them or using them for other benefits instead of the core purpose of helping the needy (poor) Malawians.”
Recently, there have been a lot of cases of drugs stolen from public hospitals in Malawi

and other neighboring countries which are either sold in Malawi or outside the country. Some of the drugs are being sold in Tanzania, Mozambique or even overseas. Of late, it has been noted that the county referral hospitals, health centers and dispensaries are the worst hit. Additionally, there are some unscrupulous medical workers in our country who are smuggling drugs from public hospitals to Tanzania through the boarders. In Summary, Once sold, the drugs are then stocked in private clinics. They are mainly sold in Tarime District of Mara Province across the border in
Tanzania. Medicines leave the stores as soon as they arrive.
Drugs stolen from public hospitals in our country are now finding their way into Tanzania.
Unscrupulous medical workers are smuggling the drugs through the border point before selling them to Tanzanian traders. Once sold, the drugs, according to Nation investigations, are then stocked in private clinics, in Tarime District of Mara Province across the border in Tanzania. The theft of drugs and mosquito nets has plunged the county health sector into a crisis due to consistent shortages. In a nut shell, Medicines leave the stores as soon as they arrive and the county referral hospital, health centers and dispensaries are the worst hit.
This chapter discusses the drug theft in the health care service and the impact it has on patients (Malawians). The chapter will highlight some of the possible effects which could result from drug theft in the healthcare service. It will also enlighten what has been happening in public hospitals briefly, give some of the interventions made and changes which have been encountered to solve the problem of drug theft. The chapter will focus on how the drug theft has impacted
Page | 1

Malawian patients health and well-being and bring in the gap as to why there is need to conduct this research.
Additionally, the chapter will acknowledge notable changes which have happened in the country as it will present some of the achievements made so far in public hospitals to deal with the current problem. The problem statement and objectives will really focus on the concerned
Malawian patients who have been affected by this drug theft in the health care service (hospitals).
Furthermore, the chapter will specify the meaning of drug theft in Malawi and give a brief overview of the public hospitals.
The chapter is organized into different sections; background information, Problem statement, Purpose of the study, significant of the study, general objective as well as Specific objectives, and chapter summary. It is assumed that an understanding of these categories will enable the researcher to fully understand the gap that is there due to the drug theft in the health care service on the patients. The researcher understands that the environment and experiences can affect heath, social behavior and well-being of the patients. (Cohen &Manion, 1981)
This study aims at assessing the impacts of drug theft in the healthcare service on patient’s health and well-being. Considering the current cases of drug theft in Malawi and other countries, one may wonder how drug theft in the healthcare service affects the health and well-being of
Malawian patients. Among other things, the chapter will answer some of the following questions:
What are the patient’s views in regard to this development, and how are they coping? How do they source money to buy medicine, now that most hospitals do not have drugs due to drug theft? Does this act of drug theft affect patient’s health and well-being? Have some of the patients who were sent back or told to buy drugs in pharmacies or private hospitals died or survived? Is there drug theft in the Malawian healthcare service? Who is involved in this malpractice? How is the drug theft occurring in the healthcare service? Who are mostly affected by this malpractice? Why is this malpractice done in the healthcare service? How can the whole malpractice be stopped or reduced?
These are some of the questions which the study seeks to answer.

Page | 2

1.5 PURPOSE OF THE STUDY
In the proposed study, which will adopt a mixed method, I will assess the impact of drug theft in the healthcare service in Malawi on the patient’s health and well-being. Specifically, the study aims to:
(a) investigate the challenges that the patients are facing due to the act of stealing drugs in
Malawian public hospitals (b) Analyze if drug theft has led to poor health, well-being and class deaths of the patients; (c) This study will further relate the drug theft in public hospitals and patient’s well-being and explore how the drug theft has impacted perceptions of Malawians in public hospitals (Blantyre). Additionally, the researcher understands that the affected patient’s will have different perspectives towards this development hence another purpose will be to (d) analyze different perspectives of patients on the drug theft. Furthermore, the study will (e) identify some of the coping strategies for the patients and (f) evaluate how they source resources(money) to buy drugs in pharmacies or private hospitals for their health and well-being.
1.6 OBJECTIVES
1.6.1 General objective
To assess the impacts of drug theft in the healthcare service to patient’s health and well-being in
Malawi.
1.6.2 Specific objectives
i.

To analyse different perceptions of patients on the current increases in drug theft in the healthcare service.

ii.

Assess the challenges and survival strategies for the patients in both rural and urban areas.

iii.

To explore the possible ways of minimizing the negative effects of drug theft on patients in the public healthcare service

1.7 SIGNIFICANCE OF THE STUDY
The study will deepen the understanding of the researcher on the issue of drug theft on
Malawian patients/ citizens This is because, through reading a lot of literature, the researcher will be able to understand what has been happening over the years, interventions made to solve some of the challenges faced by public hospitals in Malawi and the changes which have been made to
Page | 3

solve some of the problems faced. The researcher will appreciate the role of government in helping public hospitals and will have deep understanding of how, when and why there was need to conduct this study. Additionally, since the researcher will get data from different stakeholders especially the patients, it will assist them to have a better understanding of this issue and make possible coping strategies if any. The study will bring to light the effects of government policies on the standards and quality of healthcare service delivery in Malawi and how such policies advance the achievement of the long terms goals of the public hospitals and the welfare of the patients in those hospitals.
The outcome of this study may also assist patients in monitoring the welfare of their children/relatives who are sick and will help them understand what they are going through. In addition , the study will add up new literature as different stakeholders of these public hospitals like the patients, guardians, community, and interested one’s can have new information which will not have been available if this study was not conducted. This is because since the drug theft started a very long time ago, it has also increased rapidly over the years and there have been few literature available. The study will give prospective individuals a starting point to research on as they could be able to assess impacts drug theft on patients or guardians who visit the public healthcare service, community and general public. The researcher could not tackle all the areas or concerned people and hence this study will guide prospective researchers by highlighting key research areas.
1.7 LIMITATIONS
A research like any other undertaking has several limitations which makes it difficult to achieve some of the research objectives. One of the limitations of this study is Time. The time allocated to do this research is insufficient to collect all the necessary data required to make comprehensive conclusions so to solve this problem the researcher need to plan properly depending on the available time. Additionally, the researcher need to use a small sample so as to save time, hence the study will only focus at BLANTYRE. Also, since only a small sample (The
BLANTYRE) will be used, there will be varying conclusions made depending on the inadequate time to reach out to all public hospitals in Malawi. The findings from this study are limited to study sample from which data will be gathered. The results from this study will be limited to geography and will make it difficult to ascertain transferability to the larger Malawian population or to all
Page | 4

public hospitals (Creswell, 2002). Another limitation to the study is that data gathered includes a limited amount of variables. However, in selecting a selected number of variables, the study aims to obtain data that is reflective of the richness and depth of Malawian public hospitals. Limitations related to time means that data collected during this study will provide a snapshot of how drug theft in public/government hospitals was examined and understood. As a survey is a self-response questionnaire the data will depend on patients’ candidness and authenticity as well as their personal views/perceptions, which may be impacted by the researcher’s presence. Lastly, researcher bias may serve as a limitation to the study. As a current university student at the participating research site, the researcher has been influenced by the values and attitudes of the research site and students/stakeholders who attend, therefore, she must monitor her personal bias and feelings towards participants in this study. To ensure for objectivity during the quantitative portion of the study, survey data gathered will be coded to identify any identifying information. To avoid bias during the qualitative portions of the study, procedures to verify trustworthiness and authenticity will be employed. More detailed explanation of how objectivity and avoiding researcher bias will be provided in the methodology section of this study. Page | 5

Similar Documents

Free Essay

Document

...Travel Document I-131 Prepared for Ragnagnewende Jean De Dieu SALAMBERE Last Printed On 03/17/2015 24/7 Customer Care Hotline: 1-800-814-1555 or email us at cs@us-immigration.com and we'll respond within 24 hours Next Steps 1. Read and Follow the Application Filing Instructions. 2. Sign and Date Your Printed Application. 3. Prepare Supporting Documents, as Instructed.* 4. Prepare Filing Fee, if Necessary.* 5. Attach Supporting Documents and Payment. 6. Photocopy Your Signed Application, Supporting Documents and Payment, and Keep the Copies for Your Records. 7. Send Your Original Signed Application, Supporting Documents, and Payment to USCIS (Formerly the INS) at the Address Listed in the Filing Instructions. 8. Do Not Send This Cover Page or Your Filing Instructions. *You may or may not have to send photographs, supporting documents, or a filing fee. Your Forms Filing Instructions will specify everything that is required. www.us-immigration.com 1 of 11 DO NOT SEND THIS COVER PAGE TO USCIS Guiding You Through Citizenship, Green Card and Visas Applications Congratulations, Ragnagnewende! you have reached the final stage of the application process! Following are step-by-step instructions for completing your application and submitting it to U.S. Citizenship and Immigration Services (USCIS). These instructions have been customized for you based on the answers you gave on your questionnaire. Note: Be sure to make a copy of your final application and supporting documents before...

Words: 4995 - Pages: 20

Premium Essay

Document Retention

...Record Keeping has been around for a long time now. Depending on the laws that governed us, we are requiring to maintain records. A good document retention policy could last up to seven years. A litigation hold is basically keeping all records pertaining to the case, or until the case is over. Depending on the records at hand, state and federal laws require organizations to maintain records. During litigation hold notice a good checklist to follow, is a good idea. A document retention policy basically establishes a policy that keeps records of documents and files for a certain amount of period, so that a court can examine a business practices over a time period. Courts and juries don’t have little tolerance for organizations that don’t maintain their records. They often give penalized corporations for keeping their records, by handing out big fines. A document retention policy is established after a litigation hold is given to an organization. Depending on the litigation hold certain documents must be maintain in order to prevent penalties. So if the litigation hold is pertaining to a HIPPA violation at a college, the college must maintain all records to include, emails, documents, faculty involvements, telephone conversations, backup tapes, hard drives, flash drives and etc. The policy has to be clear and understanding to faculty. The files must be in preserved in original format, and cannot be altered at any time. The Sarbanes-Oxley Act of 2002 was passed through the senate...

Words: 1153 - Pages: 5

Premium Essay

Scribd Upload a Document Search Documents

...Scribd Upload a Document Search Documents Explore Documents Books - Fiction Books - Non-fiction Health & Medicine Brochures/Catalogs Government Docs How-To Guides/Manuals Magazines/Newspapers Recipes/Menus School Work + all categories Featured Recent People Authors Students Researchers Publishers Government & Nonprofits Businesses Musicians Artists & Designers Teachers + all categories Most Followed Popular Sign Up | Log In Your Browser is Outdated Because you are not using a modern browser you will not have access to all of Scribd's features. Please consider upgrating to a modern browser: Close This Message Five Paragraph EssayI have never read a story like The Unicorn in the Garden and it definitely it was one of the beststories I have ever read. At the end of the story you don't know if the man really saw an unicorn or made it up so his wife would call the police. It really doesn't matter if he saw the unicorn or made it upthe point is that he gained what he wanted he got rid of his wife.The story also teaches a lesson, every little bad thing you do to someone can backfire twice ashard. The woman had called the police and the psychiatrist in the most meanest intention because shewanted to get rid of him, she did not love him after all. So what the man did was that he gave her of her own medicine, when the police asked if he saw an unicorn he replied using the same words that she hadused previously when he told her that there...

Words: 1015 - Pages: 5

Premium Essay

Business Documents Nvq

...1.1 Describe different types of business documents that may be produced and the format to be followed for each. Business cards: These are used to give the customer information on how to contact the company. These can be electronically formatted in Word and then formatted on card when printed. Fax Document: Another type of document used in business is a Fax document; these are very useful in business and are the fastest ways to transmit documents. These are in paper format, either in colour or black and white. Agenda: Agendas tell you what is going to take place. They help people get organised so that they know exactly what they should do and what is going to happen. These are in paper format when taken to meetings, and can be distributed electronically....

Words: 1835 - Pages: 8

Free Essay

Online Document Scanning

...internet. The internet revolution has change the way of doing things. This is not the time you should worry that your document will be destroyed by rainwater, fire, termites or even stolen. Our company carries all your document management worries by scanning them and storing them in your preferred online archives. Our company has a wealthy of experience because it is lead by technology gurus, thereby guaranteeing quality and reliable services to all our customers. Scanning large volumes of documents is risky. It therefore requires skills, swift hands and people who are detail oriented, which we guarantee. Our company specializes in document management and document scanning. Our major objective is keeping your records safely and securely online. We transform all your hardcopy documents into online stored texts or digital images that you can access anytime provided you have the internet. We eliminate the need for you and your business to have file cabinets by scanning and storing your documents digitally. Besides scanning and storing your documents as digital images or texts, we also store them in form of DVDs and SFTPs. How we do our job Upon contacting us for our services, we pick your documents and take them to our scanning center. Alternatively, we scan the documents at our customer sites if they prefer it that way. After receiving the first batch of documents, we immediately scan them. The scanned copies are sent to the customer for assessment. Upon the customer’s approval,...

Words: 412 - Pages: 2

Free Essay

Document Based Essay

...Document Based Question Essay Outline Use this 5 paragraph form. Make sure you use all of the documents. Groups for body paragraphs don’t have to be an equal number of documents and documents can be used in more than one group. There must be at least 2 documents in a group. Use the Author’s name immediately followed by document number (i.e.Stearns, #4) for easy reference. 1) Thesis (try to use 1 detailed sentence). Remember to restate the question as a statement, and then use the rule of 3 for your blueprint. Don’t put document numbers in thesis. Watch for questions that are comparative or change over time. 2) Body 1 Thesis (1st of your 3, after body thesis list doc. for group; i.e. #2, 5, 8) POV Statement for document # 2 (Use at least two sentences) 1st sentence include the author (doc#), background, and its meaning. 2nd sentence explain why the author has their point of view or POV) POV Statement for document # 5 (Use at least two sentences) POV Statement for document # 8 (Use at least two sentences) Additional document remember to tell the type of document, who it is from, and why it is needed by tying it back to the thesis) 3) Body 2 Thesis (2nd of your 3, after body thesis list doc. for group; i.e. #1, 9) POV Statement for document # 1 (Use at least two sentences) 1st sentence include the author (doc#), background, and its meaning. 2nd sentence explain why the author has their point of view or POV) POV Statement for document # 9 (Use at least...

Words: 411 - Pages: 2

Free Essay

Document Retention Policy

...Premier Collage | Document Retention Policy | Litigation Hold Notice | | | 8/26/2113 | Table of Contents 1.0 POLICY STATEMENT ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐---‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 4 2.0 PURPOSE ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 4 3.0 APPLICABILITY ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐--‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 5 4.0 DEFINITIONS ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 5 1. Official Records Retention and Disposition Schedules ------------------------------------------------------------- 5 2. File Breaking ------------------------------------------------------------------------------------------------------------------- 5 3. Litigation Hold -----------------------------------------------------------------------------------------------------------------6 4. File Integrity ------------------------------------------------------------------------------------------------------------------- 6 5. File Maintenance ------------------------------------------------------------------------------------------------------------- 6 6. Personally Identifiable Information ------------------------------------------------------------------------------------- 6 7. Confidential Information ----------------------------------...

Words: 4408 - Pages: 18

Free Essay

Checkpoint: Knowing Where You Placed Your Document

...CheckPoint: Knowing Where You Placed Your Document By: Juan C. Williams University of Phoenix- IT 206 Dr. Chris Barrett, PMP 07/28/2011 From my experience, many individuals when saving a document save their documents into any random folder that comes up. Unfortunately this is cause for misplaced documents when trying to locate them at a later date. Thankfully, there are many helpful ways to locate recently saved documents. One step would be to click on the Office button which is located at the top left of your Microsoft Word document, and once the box drops down to the right-side panel will be the top nine recently saved documents. A quick reference would be to click Save and that will take you straight to your default Save designated folder. There are some various ways which have been utilized to lessen the routinely misplaced saved documents which will ultimately make it effortless to locate your recent and/or old files. First, you should create a title for your document, something that you will easily remember in the future to be able to locate it. Now if the document is important, it is best to save it in an accessible file such as your “My Documents” folder or your desktop. One recommendation would be to create a New Folder for example “School” that way you can create a less cluttered work space which will Inevitably help you end up locating files quicker. It is understandable to be in a hurry to save, but, in order to create...

Words: 288 - Pages: 2

Free Essay

Accounting Source Documents

...AxcIdentify the documents used to record business transactions. When coming to draw up the accounts a business needs documents to extract the figures from and also to evidence those figures, they can be collected from source documents, there are many documents for many transactions and they all have their own purposes and uses. It is also important to understand the difference between a Credit and a Debit entry to fully interpret the source documents. The basic rule of double entry bookkeeping is that for every debit there must always be an equal and corresponding credit. A Credit entry is any money that is entering the account. A Debit entry is any money that is leaving the account. Invoices: The seller of goods or services provides and invoice for the buyer, the invoice will contain the following information: * Addresses – the suppliers, the customers and the delivery address if it is different. * Dates – the order and the delivery date. * Reference – a unique invoice number will be present, together with the customer’s order number. * Description of the goods or services sold. * Value – the total amount that is owed by the customer. * Terms – when the invoice is due for payment and any discount that is available to the customer. The invoice informs the buyer how much is being paid for the goods or services. Credit Notes: Credit notes are sent from the supplier to the customer when an adjustment to the amount is required. This may for example...

Words: 715 - Pages: 3

Free Essay

Document Model Prototypes

...Document Object Model Prototypes, Part 1: Introduction Introduction This article is the first installment of a two-part series that introduces advanced JavaScript techniques in Windows Internet Explorer 8. Web applications have come a long way since the birth of the static Web page. Today, Web developers need improved programming functionality, flexibility, and features to enable them to build the next generation of Web applications. The Internet Explorer Web platform provides many of the features and functionality necessary to build those applications. Where the Web platform's built-in support ends, JavaScript, the principle scripting language used on the Web, is often used to code innovative new features that supplement the Web platform, cater to Web site specific scenarios, normalize differences between browsers, and so on. To further empower Web developers with the programming tools necessary to build new JavaScript scenarios that innovate, extend, and build-upon the Web platform, Internet Explorer 8 offers a collection of features that extend some of JavaScript's advanced functionality into the Document Object Model (DOM). This article provides an overview of JavaScript prototype inheritance and introduces the DOM prototypes feature available in Internet Explorer 8; Part 2 introduces a new type of JavaScript property called an accessor property (or getter/setter property). Prototypes in JavaScript To begin a discussion of DOM prototypes, it is crucial to understand...

Words: 3453 - Pages: 14

Free Essay

Business Case for Documents

...Documentum's CEO, is faced with the challenge of pursuing either a vertical or horizontal marketing strategy to route Documentum towards profitability.   Situation and Business Issues Documentum enjoys a leading role in an emerging and potentially lucrative space. But profiting from this opportunity will require overcoming several immediate hurdles including a limited customer base, formidable competitors and unforeseen development costs.  Key Information, Facts, Assumptions Documentum was founded in June 1990 by Howard Shao and John Newton, seasoned database engineers who aimed to develop a new class of software for automating the management of documents across an enterprise. Following three years of losses, Documentum gains traction by combining an elite management team with $5.8MM of Venture Capitalist funding.    Analysis Enterprise document management (EDM) is a new, paradigm-busting product category with few substitutes. The category growth is small, increasing at a rate of 1%-2% year over year . Competition within the EDM category is low, as no other company was developing the "whole elephant" solution. Profitability was extremely low, given the low number of customers and long lead time to develop and deliver the product solution. The combination of these characteristics wholly describes the EDM category as being in the Introduction Stage of the Category Life Cycle .     With regards to the Mode of Innovation analysis , Documentum is a new product in a new category3. No previous...

Words: 255 - Pages: 2

Premium Essay

The Document Object Model

...Document Object Model May 8, 2011 IT/238 Van Hook The Document Object Model (DOM) is an important part of creating animation and making web pages interactive. The Document Object Model is used with Dynamic HTML to help accomplish the interactive web pages that are used today. “Dynamic HTML(DHTML) refers to a combination of technologies that make Web pages dynamic…a combination of JavaScript, XHTML, CSS, and the Document Object Model” (Gosselin, 2008, pg. 485). The Document object Model is all the HTML that is displayed on a web page from the web browser. Each of the many elements contained in the web page are considered objects and can be controlled and changed by using JavaScript. The Document object Model gives you the ability to change these elements without the web page needed to be reloaded. The HTML DOM can be used to dynamically change the document object and to change and control elements like images, which can themselves be considered the image object. The Document object and the image object both contain methods and properties that can be used to dynamically change the web page. The methods used with the document object are close, open, getElementById, getElementsByName, getElementsByTagName, write and writeIn. The open method creates a new window or a frame. The close method closes the document that was opened with the open method. The getElementById method retrieves an element by the specified ID. The getElementsByName method retrieves an...

Words: 685 - Pages: 3

Premium Essay

Scanning Documents Into Pdf Files

...Scanning documents into PDF files If you have a scanner, you can easily convert paper documents to searchable PDF files for distribution, review, archival, or use as interactive forms. 1. Scan the document. First, make sure your scanner is connected to your computer and installed correctly. Then, in Adobe® Acrobat®, choose File > Create > PDF From Scanner. (In Microsoft® Windows®, choose a document preset, such as Black & White Document or Color Image, or choose Custom Scan.) Choose Create > PDF From Scanner to scan a document. If you’re not using a document preset, select scanning options, and then click Scan. Depending on your scanner, you may see other dialog boxes with additional options. Tip: If you’re using Windows and a WIA driver is installed for your scanner, just press the Scan button on your printer, and then choose Adobe Acrobat from the list of registered applications that appears on your computer. Select the scanner in the Acrobat Scan dialog box, and select a document preset or Custom Scan. You’ll be prompted after each page is scanned. To scan another page, select Scan More Pages, and click OK. When you’re finished, click Scan Is Complete, and click OK. 2. Optimize a scanned PDF file. Sometimes scanned PDF files contain more data than you need. To optimize a scanned PDF file, removing unnecessary data and reducing the file size, choose View > Tools > Document Processing, then choose Optimize Scanned PDF from the Tools Pane. Select the options...

Words: 519 - Pages: 3

Free Essay

The Guide for Writing Word Documents

...The Guide for Writing Word Documents in Microsoft Word for EasyChair Publication Andrei Voronkov1 and Kryštof Hoder1 1 University of Manchester, Manchester, U.K. andrei@voronkov.com, hoderk@cs.man.ac.uk Abstract In order to ease the lives of authors, editors, and trees, we present a manual and an example of the use of Microsoft Word and similar tools for creating documents for EasyChair-based electronic and on-paper publishing of workshop and conference proceedings. 1 Introduction The styles and parameters of this guide are designed for compliance with the requirements for publication in the EasyChair conference system (Voronkov, 2004), and are also applicable to the Procedia publications series by Elsevier Science. EasyChair is a free conference management system that is flexible, easy to use, and has many features to make it suitable for various conference models. It is currently probably the most commonly used conference management system (Voronkov, 2004). The use of EasyChair and this style for creating Procedia volumes is a pilot project between Elsevier Science and EasyChair. EasyChair publications accept documents written either in LaTeX or using a docx document format, which can be produced by Microsoft Word or LibreOffice. This guide explains how to produce the docx format in Microsoft Word. To achieve high quality of volumes, both LaTeX and Word documents should have the same layout and similar styles. This guide is provided for the users of Microsoft Word...

Words: 1834 - Pages: 8

Free Essay

Micro Strategies’ Document Management Solutions for Regional Banks

...Micro Strategies’ Document Management Solutions for Regional Banks meet the unique requirements and challenges of the Banking Industry. Regional Banks continue to look for ways to cost effectively process inbound paper and electronic documents. These firms are also looking to manage the access, control, and use of documents created and stored within numerous repositories throughout their organization. Regional Banking industry trends, including consolidations and the desire to centralize operational functions, have forced many financial institutions to seek ways to reign in the costs and inefficiencies associated with disparate document processes. Micro Strategies provides customers with the insight, industry awareness, and technical expertise necessary to design and implement efficient document processing solutions for all types of simple and complex business workflows specific to regional banks. Whether the system is to be used to address a single departmental need or as a firm-wide content management platform – addressing both individual line of business (LOB) requirements and document management needs across the organization – Micro Strategies offers targeted and scalable solutions built on industry leading technology. Reduce cost of operations with improved document processing Increase efficiency allowing less staff to manage increasing number of documents Faster processing of customer documents for new account openings Improve customer service with greater...

Words: 600 - Pages: 3