Permission to Do Research

In: Business and Management

Submitted By Anozira
Words 787
Pages 4
Ms. Christine Carrasquillo, MBA
National Human Resource Recruiter
2050 Spectrum Blvd.
Fort Lauderdale, FL 33309

November 7, 2012

John Dearing III
Program Manager
2050 Spectrum Blvd.
Fort Lauderdale, FL 33309

Dear Mr. Dearing,

After careful thought and consideration, I, Christine Carrasquillo do hereby request permission to conduct an in-depth investigation on the demographics of the areas we currently are having challenges in. This includes but is not limited to: market research, consumer behavior with regards to market analysis, population, income analysis, market employment trends and the norm.

The reason this research is required is because our tracking report indicates that not enough qualified candidates are being located and/or submitted to the current job orders in the following regions; this includes but is not limited to: Ohio and Missouri. Currently, the most common position needed to fill is in the Mortgage Loan Processing field. In general, this position’s qualifications and responsibilities are defined as: • “Obtain necessary information to process and complete loan files. • Examine documents to ensure accuracy and compliance with existing underwriting guidelines. • Must have a high school diploma or its equivalent and 0-2 years of related experience. • Must have knowledge of commonly-used concepts, practices, and procedures within a particular field. • Rely on instructions and pre-established guidelines to perform the functions of the job. • Works under immediate supervision. • Typically reports to a supervisor.” (Salary, 2012)

Unfortunately, our client at US Bank for example is willing to pay a salary wage of $8.63 an hour. This may appear to be an insult to those candidates with experience in the mortgage industry; therefore, in an attempt to think outside the box; a thorough analysis is…...

Similar Documents

Permission from Microsoft

...4635 East Elwood Street Phoenix, AZ 85040 September 10, 2012 Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 Subject: Request to use screen shots from Microsoft Office Suite Dear Microsoft: I am writing for permission to use screen shots from your product in a procedure manual. The product I will be using is Microsoft Word 2010 and would like to use screen shots from you product to illustrate the manual, in hopes to make the manual easier to understand and follow. My manual is a step by step procedure manual on how to access and use your product. The written text will take the user from the beginning of installing your product properly to explaining how to access different templates available for creating a variety of word document with you product. The screen shots of your product will be used along with the text to illustrate to the user what to look for and to know what part of the software they should be using. I have found that using illustrations with text allows the user to better understand the text and to feel more comfortable with the product. Screen shots from you product will play a big role in helping the user see the layout of your product and how to access the multiple features and functions of you product. Being able to use all the features and functions of you product that I will cover in my manual will open up opportunity for the user to purchase more of you Microsoft Office Suite products. I would like to thank you......

Words: 304 - Pages: 2

How to Do an Accounting Research

...SEC will not acknowledge this, but everyone pretty much agrees that the decade-long effort to converge U. S. GAAP and IFRS has been marked by many more failures than successes. Convergence Phases II and III — Would take an additional 5 to 7 years and require the FASB to formulate plans for merging active IFRS projects into U. S. GAAP. If FASB-style "due process" can't get it all done, someone is supposed to be able to figure out a way to pick up all the pieces. Endorsement — Simple math combined with the most obvious lessons learned from recent history leads to the inescapable conclusion that the "endorsement" phase can't even begin for at least another decade. At that point, the FASB is supposed to get hog tied; it will not be allowed to do anything except for figuring out how to fit new IFRSs into the GAAP codification. The Staff Paper Fizzles instead of Sizzles Except for the Big Four (I'll be getting to that later) and perhaps a few large companies, the Staff Paper has gone over like a lead balloon. To start, the handpicked investor panel at July's SEC Roundtable on IFRS provided only tepid encouragement, and the smaller public companies panel could barely be held back from strangling the SEC staff; all they saw in IFRS was a lot of incremental cost and zero incremental benefit. Other federal regulators exercised political restraint, but the representative of the state boards of accountancy condemned the SEC's for its foolhardy quest for a holy grail -- which not......

Words: 1777 - Pages: 8

Unix Permissions

...Running head: UNIX PERMISSIONS CONTROL UNIX Permissions Control UNIX provides file permissions on several levels. By user ID group membership or association. Administrators can add delete or change file permissions. These permissions and other control information are stored in the inode. One example is FreeBSD which identifies access mode, owner, and group-access identifiers, file creation and update history. Size of file is also identified along with block pointer and block size identifying number of blocks used for file. File characteristics with user settable flags and kernel are identified too. Generation number and file system block size are also identified. UNIX utilizes a file access control scheme developed in earlier versions. Users are identified by typical user identification through number assignment. Users are also assigned to a primary group and maybe other groups too. This is done through the use of a group ID. Upon file creation these relationships are established. The owner ID and group ID are contained with 12 protection bits in the inode. Nine of the 12 bits establish read, write and execute permissions. At the directory level this grants read, renaming, and delete capabilities. Utilizing the execute bit the right to search the directory is accomplished. The remaining three bits are utilized to set user ID (SETUID) and group ID’s (SETGID) (Stallings, 2012, 558). When users with execute privileges access a...

Words: 510 - Pages: 3

Guns Do Not Kill People Research Paper Final

...Guns Do Not Kill People WK 10 EN 1420   Three robbers entered a residence in Commerce City, CO; one of them pulled a knife, according to officials. The two men and a woman apparently had planned to rob an acquaintance, but the homeowner resisted the threat, drawing his semiautomatic handgun and shooting the two men. After the three fled, they called for medical help from a cousin's house. The police followed shortly thereafter. "As soon as they get out of the hospital, we'll be there to meet and greet them," said Sgt. Craig Coleman of the Adams County Sheriff's Dept. (Rifleman) These are two of many different stories that are produced monthly by the magazine American Rifleman. Every issue gives 4 to 7 stories on how handgun's save lives every day. There are many people who believe that a handgun can save your life, but there also people who believe that they are just used for bad guys to kill. The Constitution states that we have the right to keep and bare arms, but there are some groups that have decided that is not right. They will do whatever it takes to change Amendment 2. This year there was a new gun law added to the long list of gun laws. In Colorado and Oregon the law was passed with a huge margin. The law states that you cannot buy a gun at a gun show without a......

Words: 1499 - Pages: 6

Do No Harm

...Ethics: Do No Harm 1 Ethics: Do No Harm Linda Jones Walden University Ethics: Do No Harm 2 Ethical Research involves maintaining honesty in conducting and reporting scientific research, giving appropriate credit for ideas and effort, and considering how knowledge gained through research should be used (Stangor, 2001). There are four basic goals in ethical research and they are providing freedom of choice about participating in the research, protecting participants from physical and psychological harm, maintaining awareness of the power differentials between researcher and participant and honestly describing the nature and use of the research to participants. The first study that I decided to analyze is: A researcher worked for a time on the production line of a large manufacturing plant. His status as a researcher was unknown to his co-workers. It was not until he was about to leave that he revealed his purpose and identity to others. This study was not done ethical because it violated some of the principles of ethical behaviors. The first violation was the researcher with holding his identity until after the study. This was a form of deception due to him not informing the participants in the beginning of his......

Words: 441 - Pages: 2

I Want to Do Research

...fixed deposits. Transaction Banking Institutional and personal deposits product as well as services like- credit debt cards, ATM, safe deposits lockers, payment services, draft, remittance, sms banking, e-banking, travelers, cheque etc. CHAPTER-3 Research methology Research methodology Research is a process of systematic and in depth study of any particular object or to investigation, backed by collection, compilation, presentation and interpretation of relevant data and information. This case study report is prepared by collecting data from different sources and presenting it in necessary and important tables and diagrams to make report clear and reasonable. To achieve the objective of the study, research methodology that has been followed is such including sources of data, data collection, methods data presenting techniques etc. This report is made by field visit, questioner methods, and observation methods from airport as well as its sales office. Research process The conceptual frame work for this project work entitled “A field work report on service provided by Yeti Airlines at Bhadrapur and Country can be summarized and presented as follows: Theoretical framework Available resource Research design Data collection Analysis & presentation of data Fig: 1 Recommendation Chapter-4 Data Presentation Presentation of major performance indicators of ‘BOK’ is presentation as follows Amount in......

Words: 5112 - Pages: 21

Permission of Translation Letter

...SAMPLE PERMISSION REQUEST LETTER AND FORM [Adapt this letter in the bracketed areas to send out under your own letterhead with the accompanying form. At the top of the form, fill in the description of the item(s) for which you are seeking permission and, near the bottom, your proposed credit line. Send two copies of the letter and form to each recipient.] Dear [name], I am [a contributor to] [the author of] [the editor of] the book tentatively entitled [title] (the “Work”), currently scheduled to be published by the University of Calgary Press in [year]. I am writing to ask for your permission to reproduce [an excerpt] [excerpts] [an illustration] [illustrations] in the Work. This is a work of scholarship with a limited audience. To achieve broad dissemination of the Work to scholars, I hope to use electronic form in addition to print editions. With that in mind, I request a nonexclusive license as described in the following form. Please note that the statement asking permission to give rights, licenses, or permission to others is intended for our distributors, those who may wish to publish a translated version, and/or perform a play (for example). At no time would we give permission to third parties to use your material outside the context of the Work. [I am enclosing (a) photocopy[ies] of the excerpt(s) or the illustration(s)]. The University of Calgary Press is a nonprofit, academic publishing house. Given the scholarly nature of the publication I would......

Words: 801 - Pages: 4

Do Television and Electronic Games Predict Children’s Psychosocial Adjustment? Longitudinal Research Using the Uk Millennium Cohort Study

...Downloaded from on January 12, 2014 - Published by ADC Online First, published on March 25, 2013 as 10.1136/archdischild-2011-301508 Original article Do television and electronic games predict children’s psychosocial adjustment? Longitudinal research using the UK Millennium Cohort Study Alison Parkes, Helen Sweeting, Daniel Wight, Marion Henderson Medical Research Council/ CSO Social and Public Health Sciences Unit, University of Glasgow, Glasgow, UK Correspondence to Dr Alison Parkes, MRC/CSO Social and Public Health Sciences Unit, University of Glasgow, 4 Lilybank Gardens, Glasgow G12 8RZ, UK; Received 7 December 2011 Revised 15 October 2012 Accepted 7 December 2012 ABSTRACT Background Screen entertainment for young children has been associated with several aspects of psychosocial adjustment. Most research is from North America and focuses on television. Few longitudinal studies have compared the effects of TV and electronic games, or have investigated gender differences. Purpose To explore how time watching TV and playing electronic games at age 5 years each predicts change in psychosocial adjustment in a representative sample of 7 year-olds from the UK. Methods Typical daily hours viewing television and playing electronic games at age 5 years were reported by mothers of 11 014 children from the UK Millennium Cohort Study. Conduct problems, emotional symptoms, peer relationship problems,......

Words: 1355 - Pages: 6

To Do or Not to Do

...Draft: Critique Paper To Do or Not to Do? : A Critique of "Disobedience as a Psychological and Moral Problem Do we do it or do we not do is always the big question, is it not? In the article “Disobedience as a Psychological and Moral Problem”, Erich Fromm explains how society has always defined “obedience is a virtue and that disobedience is a vice” (p. 683). As a well known writer and thinker, Psychoanalyst, philosopher, historian and sociologist, Fromm believed that “human history began with an act of disobedience, and it is not unlikely that it will be, terminated by an act of obedience” (p. 683). How many of us have done something without even thinking about it simply because we were told to do it? That is exactly where Fromm is going with this article. Are we doing something because we are told to or are we doing it because we are scared of what may happen if we don’t? But is that always the right answer? Although Fromm’s ideas were organized and the evidence he used to support his argument was effective, the counter argument is missing. Fromm is trying to get us to understand that by man being introduced to the world by disobedience, whether it be from Adam and Eve or Prometheus, we now have to answer to a authority figure, which in return having to obey to that authority figure will end the world. Fromm’s fear and worry is just that. If we get in the habit and routine of doing something simply because we are told to do it, what is going to......

Words: 1369 - Pages: 6

File Permissions

...the different file permissions available within UNIX®. Include how certain settings can help increase the security of the system. * Please type the discussion information into this handout and post in the Assignments Area for grading. |File Permissions |Discussion & Information | | | | | |r: file is readable by owner, group or other. | | |w: file is writeable. On a directory, write access means you can add or delete files. | |r, w, and x are three types of |x: file is executable (only for programs and shell scripts - not useful for data files). Execute permission on a directory means | |permissions |you can list the files in that directory | | | | | |Default file permission (umask) ......

Words: 406 - Pages: 2

Permissions Oversight and Overview

...Permissions Oversight and Overview Kelly O’Neil CIS332 Strayer University Professor Russell Wilson November 2, 2014 I have been contracted to explain the importance of setting resource permissions on the network of a medium sized company in the local area. Prior to beginning the preparation of the presentation I was approached by a senior company official and informed that an employee recently stole data from the company. The senior official also explained that the company does not have permissions or resource segregation set up on the network. Further, there are numerous file servers in the network that have full control permissions set for the “everyone” group. First and foremost it is imperative that everyone know and understand the importance of setting permissions on data contained on the company network. These permissions extend from computers and hard drives down to individual files. Each and every user on the network must be assigned specific permissions that pertain to their job. In order to safeguard sensitive data, it is necessary to ensure only those employees with a “need to know” will have access to certain data to perform their job. If an employee’s job is primarily data input, they will not need to access data pertaining to a customer’s personal information. By creating groups of users in the network it is possible to simply and easily control the access to certain information on the network. There are just a few basic user groups that......

Words: 1020 - Pages: 5

Request for Permission to Pursue Research

...|Paychex, Inc | |Memo To: Frank Fiorille, Director CC: Michael Silsbee, Risk Management Supervisor: Doug Baxter, Credit and Banking Risk Manager From: Danielle Cole Date: 3/16/2010 Re: Request for research proposal Request for Approval I’d like your approval for me to continue with my research on the benefits of switching to a lockbox for our invoice payments. In this memo, you will find some of the highlighted benefits that I feel will help you make your decision for me to continue with this research. A lockbox is a P.O. Box that is set up with our bank that our customers will be able to send their payments too. The bank has a machine that will open, sort and process the checks. Once the day’s checks are processed, the bank will create a file and send it to us. The Information Technology will load the file into our Oracle system and once the nightly processes run, the file will post automatically into our billing system. In my initial research of the benefits of switching to a lockbox, I have found many advantages. Switching to a lockbox could mean a reduction in costs, less errors, it would be more time efficient, and we would have an easier look up process. Switching to a lockbox could save us money by possibly reducing our head count. We have the potential to reduce our head count by two people. We could also save money because we could cut out fuel reimbursement casts.......

Words: 586 - Pages: 3

Why Do People Do Volunteer Work-Research Proposal

...student in Psychology at the University of South Africa (UNISA) and as such I have a special interest in the factors which motivate the behaviour of different individuals. As part of my honours course work I am required to complete a research project, which is to be submitted to my peers for review. My research topic for my course work is “Why do people do volunteer work?” Since this research topic could potentially aid the ministry in better understanding how to attract and retain volunteers it seems appropriate to propose and request permission to complete this research project on behalf of the ministry. I therefore herewith include my research proposal. I hope to hear from you soon. Kind regards, Candice Keen 5 Disa Street Morningside Ext 2 2196 Page 2 Sandton Why volunteer? The experiences and motivations of church volunteers. Research Project Overview and Purpose Volunteers are a vital part of how a church or ministry meets the needs of the community in which it operates. The local pastor is unlikely to have all the skills necessary to run the church effectively and efficiently. Nor is he/she likely to have the funds available to employ someone with the requisite skills level. A great deal of what churches do requires human resources. These resources usually come from those in the congregation who are willing to give of their time and skills without compensation. In other words, this gap is filled by volunteers. The importance of......

Words: 2061 - Pages: 9

Clinical Research Management - the Goal of Federal Regulations Is to Protect Research Subjects Do You Believe That the Original Regulations Took an Appropriate Approach to Protecting ARAVIND - 09901366442 – 09902787224 Clinical Research Management 1. Explain the steps involved in “Designing Clinical Trials?” 2. Explain in detail Responsibilities of CRC(Clinical Research Coordinator) and CRA(Clinical Research Associate)? 3. Explain in your words the “Ethical issues in patient recruitment”? 4. Explain in detail different types of audits involved in Clinical Trials? 1. How can Dr. Brown or Dr. Jones find an appropriate clinical trial for Mr. Smith? 2. What arguments can be put forward in favor of paying people for participating in clinical trials? 3. How convincing is the view that the market should decide how much subjects should be paid? That is, should people be offered as much as is necessary for them to agree to participate, or is there something about research that makes another standard of payment appropriate? 4. How convincing is the notion that participation in clinical trials is like low-skill work and therefore worthy only of a minimum wage? 5. The goal of Federal Regulations is to protect research subjects. Do you believe that the original regulations took an appropriate approach to protecting fertile females, pregnant women, and fetuses from research risk? What was the effect of this approach? 6. The new regulation permits but does not require inclusion of pregnant women in clinical research. Do you believe that pharmaceutical manufacturers will be interested in......

Words: 359 - Pages: 2


...of Companies, is an award-winning consultancy. This case describes the research behind its effort to measure and improve customer loyalty and the development of its five respect principles that lead to enhanced customer commitment. >The Scenario Much has been written about satisfaction research in the last 20 years. But only recently has the seeming disconnection between customer satisfaction and customer loyalty been getting increasing attention. For two years, CampbellEwald1 , the Detroit-based marketing communications company and part of the global Interpublic Group of Companies, studied one aspect of the disconnection: respect. As a result of its findings, the agency is passionate about helping firms reforge respect bonds with their customers as a primary business strategy. Campbell-Ewald is no stranger to this concept, which the Queen of Soul, Aretha Franklin, elevated to the measurable standard for relationships. Twice in this millennium, the agency has been selected by AdWeek’s Midwest edition as its Agency of the Year. In lauding Campbell-Ewald, AdWeek noted that it has an average client relationship exceeding 20 years, while the average in the industry is a relationship that lasts only 5.3 years.2 David Lockwood, senior vice president and director of account planning, says what started as an attempt to understand the disconnect grew into a major research initiative. It ultimately resulted in the identification of five......

Words: 1891 - Pages: 8