Free Essay

Ethics Protocol

In:

Submitted By paulbou
Words 1622
Pages 7
[pic]

Summary Protocol Form (SPF)
University Human Research Ethics Committee
[pic]Office of Research – Ethics and Compliance Unit: GM 1000 – 514.848.2424 ex. 2425

Important

Approval of a Summary Protocol Form (SPF) must be issued by the applicable Human Research Ethics Committee prior to beginning any research involving human participants.

The University Human Research Ethics Committee (UHREC) reviews all Faculty and Staff research, as well as some student research (in cases where the research involves more than minimal risk - please see below).

Research funds cannot be released until appropriate certification has been obtained.

For faculty and staff research

Please submit one signed copy of this form to the UHREC c/o the Research Ethics and Compliance Unit, GM-1000. Please allow one month for the UHREC to complete the review.

Electronic signatures will be accepted via e-mail at ethics@alcor.concordia.ca

For graduate or undergraduate student research

• If your project is included in your supervising faculty member’s SPF, no new SPF is required.

• Departmental Research Ethics Committees are responsible for reviewing all student research, including graduate thesis research, where the risk is less than minimal. In Departments where an ethics committee has not been established, please contact the Research Ethics and Compliance Unit.

• In cases where the student research is more than minimal risk (i.e. the research involves participants under the age of 18yrs, participants with diminished capacity, participants from vulnerable populations or participants from First Nations), an SPF must be submitted to the UHREC, c/o the Research Ethics and Compliance Unit, GM-1000, by the Course Instructor/Supervisor on the student’s behalf.

Instructions

This document is a form-fillable word document. Please open in Microsoft Word, and tab through the sections, clicking on checkboxes and typing your responses. The form will expand to fit your text. Handwritten forms will not be accepted. If you have technical difficulties with this document, you may type your responses and submit them on another sheet. Incomplete or omitted responses may cause delays in the processing of your protocol.

|Does your research involve |
| |
| |Participants under the age of 18 years? |
| |Participant with diminished mental or physical capacity? |
| |Aboriginal peoples? |
| |Vulnerable groups (refugees, prisoners, victims of violence, etc. )? |

1. Submission Information

Please provide the requested contact information in the table below:

|Please check ONE of the boxes below : |
| |
| |This application is for a new protocol. |
| | |
| |This application is a modification or an update of an existing protocol: |
| |Previous protocol number (s): |

2. Contact Information

Please provide the requested contact information in the table below:

|Principal Investigator/ |Department |Internal Address |Phone |E-mail |
|Instructor | | |Number | |
|(must be Concordia faculty or | | | | |
|staff member) | | | | |
| | | | | |
|Co-Investigators / Collaborators |University / Department |E-mail |
| | | |
|Research Assistants |Department / Program |E-mail |
| | | |

3. Project and Funding Sources

|Project Title: | |

In the table below, please list all existing internal and external sources of research funding, and associated information, which will be used to support this project. Please include anticipated start and finish dates for the project(s). Note that for awarded grants, the grant number is REQUIRED. If a grant is an application only, list APPLIED instead.

|Funding Source |Project Title |Grant Number |Award Period |
| | | |Start |End |
| | | | | |
| | | | | |
| | | | | |
| | | | | |
| | | | | |

4. Brief Description of Research or Activity

Please provide a brief overall description of the project or research activity. Include a description of the benefits which are likely to be derived from the project. Do not submit your thesis proposal or grant application.

5. Scholarly Review / Merit

Has this research been funded by a peer-reviewed granting agency (e.g. CIHR, FQRSC, Hexagram)?

| |
| |Yes |Agency: | |
| |No |If your research is beyond minimal risk, please complete and attach the Scholarly Review Form |
| | | |

6. Research Participants

a) Please describe the group of people who will participate in this project.

b) Please describe in detail how participants will be recruited to participate. Please attach to this protocol draft versions of any recruitment advertising, letters, etcetera which will be used.

c) Please describe in detail how participants will be treated throughout the course of the research project. Include a summary of research procedures, and information regarding the training of researchers and assistants. Include sample interview questions, draft questionnaires, etcetera, as appropriate.

7. Informed Consent

a) Please describe how you will obtain informed consent from your participants. A copy of your written consent form or your oral consent script must be attached to this protocol. Please note: written consent forms must follow the format of the sample consent form template provided for you at the Ethics and Compliance webpage

b) In some cultural traditions, individualized consent as implied above may not be appropriate, or additional consent (e.g. group consent; consent from community leaders) may be required. If this is the case with your sample population, please describe the appropriate format of consent and how you will obtain it.

8. Deception and Freedom to Discontinue

a) Please describe the nature of any deception, and provide a rationale regarding why it must be used in your protocol. Is deception absolutely necessary for your research design? Please note that deception includes, but is not limited to, the following: deliberate presentation of false information; suppression of material information; selection of information designed to mislead; selective disclosure of information.

b) How will participants be informed that they are free to discontinue at any time? Will the nature of the project place any limitations on this freedom (e.g. documentary film)?

9. Risks and Benefits

a) Please identify any foreseeable risks or potential harms to participants. This includes low-level risk or any form of discomfort resulting from the research procedure. When appropriate, indicate arrangements that have been made to ascertain that subjects are in “healthy” enough condition to undergo the intended research procedures. Include any “withdrawal” criteria.

b) Please indicate how the risks identified above will be minimized. Also, if a potential risk or harm should be realized, what action will be taken? Please attach any available list of referral resources, if applicable.

c) Is there a likelihood of a particular sort of “heinous discovery” with your project (e.g. disclosure of child abuse; discovery of an unknown illness or condition; etcetera)? If so, how will such a discovery be handled?

10. Data Access and Storage

a) Please describe what access research participants will have to study results, and any debriefing information that will be provided to participants post-participation.

b) Please describe the path of your data from collection to storage to its eventual archiving or disposal. Include specific details on short and long-term storage (format and location), who will have access, and final destination (including archiving, or any other disposal or destruction methods).

11. Confidentiality of Results

Please identify what access you, as a researcher, will have to your participant(s) identity(ies):

| |Fully Anonymous |Researcher will not be able to identify who participated at all. Demographic |
| | |information collected will be insufficient to identify individuals. |
| |Anonymous results, but identify |The participation of individuals will be tracked (e.g. to provide course |
| |who participated |credit, chance for prize, etc) but it would be impossible for collected data to|
| | |be linked to individuals. |
| |Pseudonym |Data collected will be linked to an individual who will only be identified by a|
| | |fictitious name / code. The researcher will not know the “real” identity of |
| | |the participant. |
| |Confidential |Researcher will know “real” identity of participant, but this identity will not|
| | |be disclosed. |
| |Disclosed |Researcher will know and will reveal “real” identity of participants in results|
| | |/ published material. |
| |Participant Choice |Participant will have the option of choosing which level of disclosure they |
| | |wish for their “real” identity. |
| |Other (please describe) | |

a) If your sample group is a particularly vulnerable population, in which the revelation of their identity could be particularly sensitive, please describe any special measures that you will take to respect the wishes of your participants regarding the disclosure of their identity.

b) In some research traditions (e.g. action research, research of a socio-political nature) there can be concerns about giving participant groups a “voice”. This is especially the case with groups that have been oppressed or whose views have been suppressed in their cultural location. If these concerns are relevant for your participant group, please describe how you will address them in your project.

12. Additional Comments

a) Bearing in mind the ethical guidelines of your academic and/or professional association, please comment on any other ethical concerns which may arise in the conduct of this protocol (e.g. responsibility to subjects beyond the purposes of this study).

b) If you have feedback about this form, please provide it here.

13. Signature and Declaration

Following approval from the UHREC, a protocol number will be assigned. This number must be used when giving any follow-up information or when requesting modifications to this protocol.

The UHREC will request annual status reports for all protocols, one year after the last approval date. Modification requests can be submitted as required, by submitting to the UHREC a memo describing any changes, and an updated copy of this document.

I hereby declare that this Summary Protocol Form accurately describes the research project or scholarly activity that I plan to conduct. Should I wish to add elements to my research program or make changes, I will edit this document accordingly and submit it to the University Human Research Ethics Committee for Approval.

ALL activity conducted in relation to this project will be in compliance with:

• The Tri Council Policy Statement: Ethical Conduct for Research Involving Human Subjects http://www.pre.ethics.gc.ca/pdf/eng/tcps2/TCPS_2_FINAL_Web.pdf

• The Concordia University Code of Ethics: Guidelines for Ethical Actions

Signature of Principal Investigator:________________________________________

Date: ____________________________
Note that SPF’s with electronic signatures will be accepted via e-mail

Similar Documents

Premium Essay

Three Major Costs

...list of new features, which will require personnel to be trained to ensure daily operations are in compliance with future audits. Included in this will be a defined list of network protocol measures, which each employee will be trained. In relation to network protocol will also be security measures, which will serve as the company standard to support compliance for Sarbanes-Oxley requirements. Finally, the newly implemented Fast action response team will need to be knowledgeable in the inspection requirements of Sarbanes-Oxley requirements. Testing The second major cost of the proposed information system will be testing, which will have to be coordinated from several locations. One of the features of the new information will be automatic network enumeration, which will scan remote pc throughout the network. Technicians will require time properly to evaluate the new network and capacity. Second, is the issue of system compatibility between the old and new system components. The testing process will be time sensitive and in some instances may require parts of the older network to be placed on stand –by. Response team The third major cost of the newly proposed information system is the response team. The response team is primarily designed to counter security threats and enforce network protocol in compliance with Sarbanes-Oxley audits. This team will need to be readily available throughout the entire project. The costs of this team are a combination of the training, and man-hours...

Words: 310 - Pages: 2

Free Essay

Idnp Week 2

...IDNP:Part 2 NTC/362 06/29/2015 Importance of Communication Protocols Communications protocols are a very important communication capability. Communications protocols allow two systems or more to communicate effectively and to pass data over a network and between different communication devices. Communication protocols allows for the process of breaking data down into tiny packets that are the encrypted and signed by the sending device. Each of these packets are sent individually to cut down on errors. If any errors occur, instead of resending the whole line of data it is only necessary to send that specific packet to complete the transfer. Communications protocols also allow you to have secure and private communications when transferring data. Each packet we previously discussed has a header imbedded in its data that signifies where it is going. It will then only open on the device it has been addressed to. Also if someone were to intercept one of your packages it is still not the whole transfer since all the data is sent separately in smaller packages and they wouldn’t receive the full data transfer. There are many different kinds of protocols that govern how computers interact with each other through the internet and govern how they communicate most effectively. Common communication protocols include everything from how the data is secure to how the packets are structured and sent. Identifying Protocols/Network Architecture The links of communication and how they...

Words: 932 - Pages: 4

Premium Essay

Nt1310 Unit 3 Assignment

...Communication Protocols Communication is defined as the exchanging of information or news. Protocol, for all intents and purposes, means an official way or agreed upon procedure or standards to accomplish a task. In this case, it would be rules to help transmit data. In networking, there are various protocols needed to make transmission of data easier. In today’s fast paced environment, the standards of information sharing are increasing exponentially. Adhering to the standards are also becoming more important than before. Design Kudler Fine Foods is dedicated to ensuring that the customer information in their possession remains secure from unapproved access. Securing their network is one of the highest priorities for Kudler. Since the new enterprise network will be integrating a wide area network to connect all the sites, which will have their own individual wireless local networks. Choosing the correct communication protocol stack is vital to the security and availability of both the WAN and WLAN network. In...

Words: 1036 - Pages: 5

Premium Essay

Nt1310 Unit 3 Assignment 1

...is send by two working stations at a time there occurs collision and it stops transmitting and sends again when it founds the line is idle but it’s not defined till which period or duration it has to wait is called non deterministic protocol. It can be also defined as the system that has the possibility of multiple output for each input so that the output cannot be predict. Example: CSMA/CD Q2 Answer A timer is set, before the timer runs out, a clear to send (CTS) will be received from the access point. Q3 Answer No, for the 5 Ghz protocol have a small transmission distance approximately 30 meters and this frequency has trouble to transmit over floors and walls. If we needed to utilize the IEEE 802.11a we need multiple contact...

Words: 1657 - Pages: 7

Free Essay

Kulder

...format of the data being used. Communications protocols must adhere to the following; the rate of transmission either in baud or bps. The transmission is to be synchronous or asynchronous. Also, the data is to be transmitted in half-duplex or full-duplex mode. Baud transmission is the number of signaling elements that occur each second. At slower speeds, only 1 bit of information is encoded in each electrical change. When saying 1500 baud, it means that 1500 bits are transmitted each second, this is also shown as 1500bps. Communication protocols can also describe the syntax, semantics, and synchronization of analog and digital communications. Communications protocols are implemented in hardware and software. There are thousands of communications protocols that are used everywhere in analog and digital communications. Computer networks cannot exist without them. With KFF, being that the Home Office or Headquarters is located in La Jolla, there is a T3 dedicated line that connects HQ with Del Mar and Encinitas locations. These lines are usually rented at a monthly or yearly rate to connect geographically separate offices for private voice and or data networking. It is also very costly averaging over $3000 USD per month, so most don’t lease these lines. They are also reserved circuits that operate over either copper or fiber optics cables. One of the protocols that should be implemented is the Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the set of rules for...

Words: 838 - Pages: 4

Premium Essay

Tragedy of the Commons

...rational and egoistic individuals who solely seek to maximize their own consumption. It is predicted that there will come a time when the supply of that resource will no longer be able to keep up with the rapidly growing demand. This is where the tragedy comes into the picture. This apathetic and nonchalant consumption will eventually lead to the irreversible depletion and degradation of that particular common resource. To avoid this ultimate tragedy, there is no technical solution that we can possibly adopt. No amount of science or technology can reverse this damage. The only way that we can possibly preclude this destruction is by undergoing a dramatic re-examination and transformation of our conscience and fundamental conceptions of ethics and morality. But the real question is this: Is that even possible? Hardin’s pessimistic parable is widely and almost universally accepted as an all-encompassing, catchall framework in explaining the ecological crisis that currently confronts commonly-held goods such as the earth’s atmosphere, fisheries, grasslands, water, forests, roads and even population growth. However, in this essay, I am going to analyze this tragedy by examining the “common-ness” of the Earth’s atmosphere and the apparent difficulty of having a universally recognized regulatory institution. This is precisely because of the absence of a “world government” and the state of chaotic anarchy among nation-states in the international community. The degradation...

Words: 1143 - Pages: 5

Premium Essay

Climate Changes

...politically in 2010, when the Village of Kivalina was affected by the Gulf Oil Spill accident, and became uninhabitable. According to Saundra Brown Armstrong, a senior United States federal judge, human activity is the major factor increasing global warming. Factors such as greenhouse gas emission, pollution from factory smokestacks, landfills, and oil spills are the main causes that contribute to a potential catastrophe. Even after it was demonstrated that global warming was caused by human activity, the United States remains the only developed country that has not signed the Kyoto Protocol contesting that it would have a ruinous effect on its weak economy. Instead of signing the Kyoto Protocol, the United States Congress opted to create their own Environmental Protection Statues of global warming policy on climate to reduce greenhouse gas emissions, and it had impacted to ethics in business environment and political issue. However, the public opinion has asked for more effective actions and this may soon push the U.S. into a global leadership position on global warming. In conclusion, all of those issues obligated the Environmental Justice to stand in order to protect human being and the environment integrity considering the climate responsibility overall. Global Climate Change Responsibility and Survival Many Inupiat Eskimos living in the Village of Kivalina brought the case that the greenhouse gas emissions of 24 energy companies were significantly...

Words: 1018 - Pages: 5

Free Essay

Review Lab Ite 115

...Review Lab This lab is meant to help you study for your final exam. NOTE!!! This review lab does NOT necessarily include everything that will be on the final exam. You should study your notes, your homework, your quizzes, your projects, and your book in preparation for the final exam. The objectives that are available on the course content summary for each application show you the information that I expected you to learn during the course. Part I. Windows 1. List 5 Common User Interface features that we have seen in all applications that we have studied this semester. Quick access toolbar, help, groups, 2. What is the purpose of an operating system? They run programs, 3. What is the difference between CTRL and SHIFT when selecting multiple files? Control can select multiple files not next to each other, shift selects all files 4. How can I change the appearance of the background of my desktop? Right click on desktop and personalize, or control panel( personalize desktop How do I display a toolbar that is not already visible? Options(advanced Part II. Word 1. What is the difference between a text editor (like Notepad) and a word processor? Notepad doesn’t have graphics, word processor has more formatting 2. What is the difference between insert and overstrike modes? How do you switch between these modes? Insert, the characters move, overstrike 3. List the...

Words: 928 - Pages: 4

Premium Essay

Engineering Ethics Memo

...Gari Components, Inc. TO: Sam McGillicuddy, GCI President DATE: March 22, 2006 SUBJECT: Position on the Kyoto Accords DIST: Martha Smith, GCI Chief Technical Officer FOREWORD: Gari Components, Inc. is well-known to emit quite a large volume of greenhouse gases throughout the course of routine operations. Recently, at a quarterly shareholder meeting, a group of vocal shareholders voiced their opinion on this particular facet of GCI, declaring that they wanted to see the company’s tendency to produce these gases substantially decrease. They also inquired into GCI’s standing on the Kyoto accords, a recent treaty signed by several major world powers advocating the reduction of greenhouse gas emissions. I, a civil engineer for GCI, was asked to inquire into these accords, as well as investigate our company’s ethical responsibilities in this matter. I have researched the matter thoroughly, and have come to several conclusions on these topics. The purpose of this memo is recommend a course of action for GCI in relation to a response to these shareholders for the next quarterly meeting, as well as give a justifiable explanation for these conclusions. SUMMARY: I soon discovered after researching the Kyoto Accord and its related subjects thoroughly that opinions vary widely on the topic. Overall, despite enjoying a fair amount of popularity throughout much of the world, several countries, such as the United States and Australia, have issues...

Words: 1511 - Pages: 7

Premium Essay

The Logistic Company

...The Logistic Company - Case Solution 1. Protagonist a. Satish - night-duty Airport Executive at the Mumbai airport. b. Security guard - Bangalore office. c. Ravi – Responsible for loading on the flight and sending pre-alert. d. Charles - the Asst. Manager Operations, of the Bangalore office. e. Hari - the HR Executive of the Bangalore office. 2. Problem f. Communication gap between the Bangalore office of ABC logistics and Mumbai airport executive. g. Excess booking by other logistic companies and there was no space, so cargo officials of all the airlines refused to accept load. h. Ravi did not intimate the airport executive in Mumbai about the consignment, i.e. they will not be able send the consignment. i. Charles was caught by the night duty patrol cops. 3. Parameters j. Pre-Alert for loaded goods. k. Excess booking by other logistic companies l. Ravi did not intimate 4. Assumptions m. Load will be send every day from Bangalore office to Mumbai via Flight n. If no load is dispatched, information for the same is necessary to be sent Airport Executive at the Mumbai airport o. Ravi is the person in charge for dispatching and sending pre-alert for sending the pre-alert. 5. Various probable solutions p. Information Alert for not loading the goods for XYZ reasons need to be communicated to the Airport Executive at the Mumbai airport. ...

Words: 412 - Pages: 2

Premium Essay

Network Analyst

...conferences calls and video meetings and the routers has advance encryption measures for security thus providing higher scalability which enables WAN link security and VPN services. The network engineer monitors the server on a daily basis and provides security updates and patches on the weekend along with the Database Admin personal. The network structure of the company is very important because every system runs on it. The data that the company has stored on its servers is very sensitive, so there need for communication protocols. There are numerous communicating devices and when these different devices want to communicate, they must use a language which is understandable among these devices. Communication Protocols are rules and regulation (language) these devices use to share data and information. As these protocols base on standards, every device on the network follows these rules. So communication is possible only due to protocols. A few protocols that have been implemented within the company are the direction of information flow, data formats for data exchange, detection of transmission errors and loss of information. There are many other that...

Words: 689 - Pages: 3

Premium Essay

Computer Cthics

...------------------------------------------------- Computer Ethics Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. For example, while it is easy to duplicate copyrighted electronic (or digital) content, computer ethics would suggest that it is wrong to do so without the author's approval. And while it may be possible to access someone's personal information on a computer system, computer ethics would advise that such an action is unethical. As technology advances, computers continue to have a greater impact on society. Therefore, computer ethics promotes the discussion of how much influence computers should have in areas such as artificial intelligence and human communication. As the world of computers evolves, computer ethics continues to create ethical standards that address new issues raised by new technologies. Computer Ethics is a part of practical philosophy which deals with how computing professionals should make decisions regarding professional and social conduct.[1] Margaret Anne Pierce, a professor in the Department of Mathematics and Computers at Georgia Southern University has categorized the ethical decisions related to computer technology and usage into 3 primary influences: ...

Words: 3631 - Pages: 15

Premium Essay

Mikshake Case

...tumor iv. Mike Jones – Management Professor & Planning consultant; friend of Al’s & Bob’s II. Major Issues i. Eastern Dairy Company • Poor business processes & planning; there is an overall lack of quality assurance (QA) systems. This lack of quality control & management is a business process that needs to be addressed by Eastern Dairy Company. • They are also lacking policies & procedures (process issue) in regards to Health & Safety protocols. • They have poor inventory management practices & controls – maggots should not be infesting their inventory & this needs to be addressed. • Poor organizational structure; they have no true supervisor that is qualified & certified to effectively manage the night shift crew; no training process. ii. Paul and George • There is an overall lack of ethics & social responsibility to his community by Paul Burnham. II. Analysis One of the major issues in this case is Eastern Dairy Company itself; their lack of business processes, a competent management team, and poor ethics have led to major issues. In regards to their management team & organizational structure, there is no qualified team leader leading the night shift. Paul Burnham has “unofficially” taken over the role as PM team lead, however he is not qualified to do so. He does not exhibit the necessary social responsibility & ethical virtues necessary to be an effective leader in this role due to his lack of experience & social responsibility. Furthermore...

Words: 610 - Pages: 3

Premium Essay

Business Environment

...Task 1 Introduction In this task I choose Hanoi Milk Company for an example of private company and Vinamilk Company for an example of state owned enterprise company. I will describe them about the size, legal status, level of activity as well as discussing about their SMART factors. I will also apply Balance Score Card for both of them in order to explain the different between the private and public sector. Major finding To beginning with a stated owned enterprise company, Hanoi Milk Join Stock Company is a private company which is set up in February 2nd, 2001. They produce and sell milk and products made from milk. They also sell material, and other products for the food processing industry, etc. In this report I want to mention about their main activities is selling milk products include fresh milk and yoghurt. After ten years existence and development, Hanoimilk has reached a lot of achievement and awards such as certificate of ISO, HACCP, gold cup of Vietnam company joined to WTO, etc. Hanoimilk is one of the most famous companies about milk producing of Vietnam. However, follow their public website and their financial statements; Hanoi Milk has a middle size business with a small number of staff. In 2010, Hanoimilk has 385 staffs but until 2011, this company decrease the number of staff to 329 employees – fail 15 percent compare with 2010. About the mission statement of Hanoimilk, they want to develop and improve Hanoimilk to a specialise company about milk products...

Words: 4505 - Pages: 19

Premium Essay

Accounting for Emission Trading

...Boston College Environmental Affairs Law Review Volume 39 | Issue 2 Article 7 6-1-2012 Accounting for Emissions Trading: How Allowances Appear on Financial Statements Could Influence the Effectiveness of Programs to Curb Pollution Laura E. Souchik Follow this and additional works at: http://lawdigitalcommons.bc.edu/ealr Part of the Environmental Law Commons Recommended Citation Laura E. Souchik, Accounting for Emissions Trading: How Allowances Appear on Financial Statements Could Influence the Effectiveness of Programs to Curb Pollution, 39 B.C. Envtl. Aff. L. Rev. 475 (2012), http://lawdigitalcommons.bc.edu/ealr/vol39/iss2/7 This Notes is brought to you for free and open access by the Law Journals at Digital Commons @ Boston College Law School. It has been accepted for inclusion in Boston College Environmental Affairs Law Review by an authorized administrator of Digital Commons @ Boston College Law School. For more information, please contact nick.szydlowski@bc.edu. ACCOUNTING FOR EMISSIONS TRADING: HOW ALLOWANCES APPEAR ON FINANCIAL STATEMENTS COULD INFLUENCE THE EFFECTIVENESS OF PROGRAMS TO CURB POLLUTION Laura E. Souchik* Abstract: Cap-and-trade programs to curb carbon emissions frequently rely on the use of tradable emissions credits known as “allowances.” To date, companies' presentations of their usage of these allowances on their financial statements has not been uniform. Cap-and-trade programs will be most effective when presentation of allowances on...

Words: 11507 - Pages: 47