Saturday, August 31, 2019

Machiavelli’s Cycle of Governance Essay

Ancient Rome such a stable and economically fruitful empire. Concerning the structures of governance as it was in 16th century florence, Machiavelli expressed the opinion that only six forms of government exist that maintain a perpetual cycle of short lived power before sucuming to, what he viewed as a natural end. This is brought about either due to a successful insurection and instalment of a form of government which evolved out of oppression or a form of government that eventually grew to become greedy and corrupt through generational changes. The model Machiavelli presents begins with a society in a ‘state of nature’ or ‘Anarchy’ that exists until the people begin to realise strength in numbers and seek leadership from the foremost individual who assumes rulership, thus evolving into a ‘Monarchy’. The good Monarch is however, succeeded by corrupt rulers who use their power for their own gain and control through ‘Tyranny’. The Tyrant is eventually overthrown by a rebellion and the rebels retain control amongst themselves collectively producing an ‘Aristocracy’. The Aristocrats are then succeeded by a generation that again, begins to use its powers to oppress the people and becomes an ‘Oligarchy’. Like the Tyrant, they are overthrown by the oppressed who then form a ‘Democracy’. As time progresses, order and control dissolve completely until we find ourselves in a ‘state of nature’ or ‘Anarchy’ once again. As Machiavelli saw it, because of man’s propensity to greed and corruption against the collective force of the oppressed victims, the cycle of instability could only ever provide temporal security and was not an effective enough solution. Machiavelli lived in a period of insessent political conflict and social disharmony which provided him with a deep rooted motivation to ensure order and stability could be demonstrated within the system he sought. Machiavelli drew the conclusion that a balance of power shared between a monarchical figure, an aristocratic institution and a democratic institution, as the Ancient Romans had implemented, was the most benificial arrangement in the interest of the state. In order to sustain order, it is necessary to employ the method of ‘checks and balances’, meaning each faction must regulate the other to prevent the accumulation of too power in the hands of an individual or particular group. Today we use the term ‘separation of powers’ to identify this form of self monitoring government. Although critics of this form of power regulation state that it slows up progress, promotes excesses of executive power and unaccountability, those who would champion the method maintain it is an effective means to ensure liberty and democracy while avoiding the possibility of tyranny.

Friday, August 30, 2019

Atoms, Molecules, & Elements

Atoms are the smallest entities which resemble the properties of an element and cannot be broken down into smaller parts. Molecules are formed when two or more atoms are combined. This formation can happen in a variety of ways. When two oxygen atoms join O2 is formed, and when three oxygen atoms join O3 or ozone is formed. Both of these have different properties. Different atoms can also combine to form molecules. Hydrogen combines with sulfur to form H2S and hydrogen and oxygen also combine to form H2O.Dmitri Mendeleev’s Periodic table is based on atomic weight, whereas, the modern periodic table keeps the atomic number as the base. An atomic table arranges elements from left to right in a row with the atomic number and properties gradually changing. The elements on the next row will actually exhibit similar properties as the ones above or below it. This provides an example of the periodicity nature of the elements. The columns of different elements in a period have the same or very similar properties. The properties of the elements change gradually as the columns move down through the periodic table.Atoms in similar families, such as H2S and H2O, exhibit both similar properties and molecular structure. This shows periodicity in both the molecules and the individual atoms. Alkali metals contain a single electron in their outer shell rendering them highly reactive. This allows them to be ready to donate this single electron to form molecules with substances like water. Halogens are also extremely reactive containing seven electrons in their outer shell. Similar to alkali metals, halogens need only one electron in their outer shell to become stable.The reactivity of an element increases the when the number of outer shell electrons is closer to one or seven. Elements that contain eight electrons in their outer shell exhibit little or no reactivity. Alkali metals are the elements found in group one of the periodic table. Mixing these metals with water creat es a strong base used to neutralize acids. An example of an alkali metal is sodium (Na). Sodium contains one free electron to donate to form instant bonds like NaCl. Chlorine (Cl) is an example of a halogen. Chlorine requires one single electron to make eight electrons in its’ outer shell.Ultimately the high reactivity of alkali metals and halogens are a result of their unstable electronic configuration in the outer shell. In contrast, noble gases tend to be non-reactive because these elements have stable electronic configurations in their outer shell. Helium, for example, has two electrons and neon has eight electrons in the outer shell. These elements do not normally react with other elements. Molecules from atoms in similar families, such as H2S and H2O, have the same type of molecular shape and structure.Sulfur is less electronegative than oxygen making the hydrogen-sulfur bond less polar than the hydrogen-oxygen bond. Due to this difference in polarity, the molecules of H2S tend to remain in a gaseous state. In contrast, the polarity between hydrogen and oxygen keeps the molecules of H2O together in a liquid state. This phenomenon is known as electrostatic attraction which is stronger in H2O molecules and weaker in H2S molecules. The electronic structure of atoms refers to the way electrons are arranged around the nucleus.Four quantum numbers describe this structure and define the position of an electron in the electronic structure of the atom. These numbers illustrate the structure and arrangement of electrons. This can also be defined as a wave function showing the probability of finding an electron in a point in space. Electronic configuration is important for chemists in understanding how and why certain elements react with other elements. This method is much simpler than the quantum model and allows chemists to predict how certain elements will react sometimes before the chemical reaction has taken place.Chemists can then theorize a reaction b ased on this electronic structure. Chemists can also use knowledge of the electronic structure of atoms to predict how elements will bond. They can determine whether the bond will be an electrochemical bond, a covalent bond, or a coordinate bond, etc. This also helps in explaining how certain elements will behave. Diagrams illustrating the energy level of elements also aid chemists but electronic configuration is a more preferred and simpler method for chemists to use.

Thursday, August 29, 2019

Why did the Continental Congress select George Washington of Virginia Research Paper

Why did the Continental Congress select George Washington of Virginia to command its army Assess Washingtons service as commander of the Continental forces - Research Paper Example He was designated as the General and Commander in Chief of the United Colonies (Schwartz 20). It is apparent that several factors must have influenced the Continental congress decision in selecting George Washington to be the Commander of the continental forces. He was a Southerner and delegates believed he was the best man who could unite all the colonies (Martin 25). George Washington was also wealthy; hence the delegates of the Continental congress believed that Washington could not be influenced by corruption in his duties. George Washington was also courageous and fearless and a determined competent leader. He was going to head a military which was under civilian rule of the new congress. Washington understood fully all his functions as a military leaders since he choose strategies, operations and tactics which led to victory (Martin 32). In March 1776, he carried out his first tactical attack by occupying the Dorchester Heights after planting artillery which brought down Fort Ticonderoga. This move forced British to evacuate from Boston. Washington courage made him cross to Delaware on a cold and stormy night where he attacked Hessian garrison of Trenton, New Jersey and captured more than 900 prisoners. Tactically he avoided British forces traps from a large force which was deployed in Trenton. His success and withdrawal to Princeton compelled the British forces to eastern New Jersey. He continued attaining victories by mastering his battlefield strategies. He held the army together and avoided any discontentment amongst his Continental forces (Schwartz 28). He confronted General Howe’s forces in Philadelphia but was defeated but did not give up hence he decided to relocate to York. His tactical capabilities made him decide to send his well trained forces to the North in order to counter any threat of invasion from Canada by British force which was under General Burgoyne. He prevented the attempts of General Howe to rescue General

Wednesday, August 28, 2019

The management styles in the case of MULTICO Study

The management styles in the of MULTICO - Case Study Example On the other hand, there is always the choice of changing existed strategies and developing alternative plans, i.e. of introducing changes that can refer to a variety of organizational sectors. In this context, it is noticed that 'change is a constant in modern working life; since change is inevitable, managers must work to give their staff a sense of control over changing situations' (Rosenberg, 1993, 21). Current paper focuses on the changes implemented in Multico, a firm that operates around the world, especially referring to one of the firm's divisions, the 'DrugDiv'. In this division a series of changes was attempted; these changes involved in the replacement of the firm's (division's) IT systems. Appropriate training was offered to the firm's staff however it seems that there were further more issues that should be discussed regarding the specific initiative of the firm's managers. In Multico, management decisions focus on the expansion of the business activity and the increase of the productivity of employees. For this reason, a series of changes has been promoted by the firm's managers in order for the firm's operational standard to be improved - technology is the main tool for the achievement of this target. ... The implementation of the new IT system has been promoted without the employees to be informed in advance on the attempted changes; even after the implementation of the IT system the employees were not asked to state their view regarding the whole scheme. On the other hand, gradually efforts have been made by the firm's management in order to fill this gap. This effort started in December 1995 when each member of the staff was given a new laptop computer and new software in order to communicate more effectively with the other members of the staff. Apart from that, a database was also provided to all firm's employees (one year after, in December 1996) in order to further support the training of the employees on new systems and to improve the communication and the access of employees to valuable data. The above behaviour of the firm's management team could be evaluated using the relevant literature. In accordance with Eoyang et al. (2001, 5) 'many organization change initiatives start at the top and deal strongly with any resistance from system agents that blocks progress; common ways of responding to resistance include downsizing, restructuring, and re-engineering'. On the other hand, Huy (2002, 31) supported that 'fundamental change in personnel, strategy, organizational identity, or established work roles and interests often triggers intense emotions'. In other words, the way that managers in Multico handle the whole project (implementation of changes in the 'DrugDiv' division of the firm) could have led to severe turbulences within the organization. The above assumption is also supported by Coombs et al. (2004, 491) who noticed that 'managers need to understand how aggressive behaviour may signal organizational problems such as stress, resistance to

Tuesday, August 27, 2019

4. Explain the theoretical and historical construction of sexual Essay

4. Explain the theoretical and historical construction of sexual identity. Illustrate your answer with reference to the role of race in the construction of sexual identity and sexual roles - Essay Example The essentialist view looks into the biological differences inherent within each individual (Schwartz & Rutter, p.23). The construction of sexual identity is dependent on the genetic program of each individual, whether one is male or female. And consequently, the sexual roles of each are dependent on these biological differences. On the other hand, the social constructionist perspective sees sexual identity as the result of the social processes that are dependent on social interactions and social institutions (Schwartz & Rutter, p.23). Sexual roles, then, are dependent on the sanctioned norms that define the differences between male and female behavior. Sexual identity can, therefore, be seen as a result of social expectations because that is who an individual is supposed to be, whether male or female. With this perspective, the biology and inherent sexual being is being matched to the sexual role. We are expected to behave as a male or as a female according to the biological roles that each one plays. The roles are learned through culture, however, it is expected to match the inherent biological sexual orientation that each one has. Sexual identity can also be a result of learned behavior. In this perspective, culture is a significant process in acquiring one’s sexual identity and role. An individual learns to behave in such a way that their social experiences dictate. One can behave like a male or a female, depending on how one is socially influenced. From these primary perspectives, other theories and perspectives come into play. With the movement and changes of the social world, the theories also move from defining primarily how one is expected to behave, to differences in power, social roles and expectations according to gender sensitivity and similar social constructs that affects the society’s course of thinking regarding sexual identity. The major sociological perspectives interpret sexual identity differently. Functionalist perspective

Monday, August 26, 2019

Violent Behavior in Healthcare Institutions Research Paper

Violent Behavior in Healthcare Institutions - Research Paper Example Workplace violence can be categorized into different forms depending on the nature of healthcare institute, characteristics of patients and external environment, for instance, physical assault and verbal abuse is experienced by most of the medical staff. Violent behavior particularly in the mental healthcare setting has become a reality and also a major concern for both healthcare providers and policy makers. Therefore mental illness and psychological issues are thought to be the precipitating factors of violent behavior among patients. This paper aims to discuss the basic factors giving rise to sadistic behavior in healthcare institutions along with the responsibilities of medical stuff and dynamics of violence. Moreover, the intervention strategies and effective methods to follow up with victims shall also be discussed. Precipitating Factors There are number of factors contributing to the violent behavior of patients and physical assault of medical staff in Healthcare Institutions. Human Service providers in general, and nurses in particular are often exposed to critical conditions where they need to identify the precipitating factors of violent behavior in order to make security measures and also to safeguard the victims. Following are the most common factors which excites violent behavior among patients: Mental Illness: Mental illness is an abnormal psychological pattern which often leads to behavioral issues. There are different forms of mental illness which might result in violent behavior against the healthcare professionals. For instance, delusions have a very close relationship with violence since these patients frequently experience physical or mental insecurity due to which they harm others in order to save themselves. However, in this case anger contributes as the major element to excite the violent behavior. Study shows that Delusions might cause minor forms of violence but the extreme violent behavior is usually supported by anger which is a perso nality disorder (Coid, 2013). Another important precipitating factor is hallucination which causes an individual to feel, hear or visualize things which aren’t present. In such a situation patients who do not have command over the hallucinations harm the medical staff while others does not pose any significant threat to the service providers (McNiel, 2000). Violent fantasies such as desire to murder or rape also lead to aggressive behavior if not addressed on time. Homicides in healthcare setting are often due to the violent fantasies (Gellerman, 2005). Organic Issues: These largely include diseases and injuries related to brain. Patients with organic brain issues are reported to have been involved in violent behavior. For instance, Dementia causes damage to the memory, speaking abilities, problem solving skills and other significant brain functions of an individual which ultimately leads to aggression and sadistic conduct. Similarly brain injuries caused by accidents might a lso lead to considerable behavioral changes which might transform an individual into a violent personality (Fountoulakis, 2008). Personality Disorders: These occupy the largest proportion as precipitating factor of violent behavior against healthcare service providers. Mood swings, anger, impulsivity, lack of control over emotions, psychopathy etc. are the most common examples of personality disorders. Research indicates that issues concerning the social life of an

Sunday, August 25, 2019

Report Research Paper Example | Topics and Well Written Essays - 1500 words

Report - Research Paper Example .. 7 3. Summary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 9 4. References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10 APPENDIX The Brazilian Economy 1. Executive Summary Brazil has maintained considerable economic difficulties from 1900 to 2012 due to ineffective financial policy construction, government reforms, and an over-reliance on commodities to drive economic sustainability and growth. Historically, coffee and oil have been staple export products; however, these commodities are subject to unpredictable spikes or decline in prices. At the same time, the CPI in Brazil is affected by higher-than-average inflation due to rising supply chain prices and interest rate fluctuatio ns that limit consumer spending and investment. It is recommended that Brazil diversify its economy and return to the crawling peg monetary policy now that industrialization and consumerism are beginning to develop effectively in this country. 2. Background on Brazil and its Economy Brazil is currently experiencing significant economic growth due to changes governmental and economic reforms as well as its current position as a major contributor to the global trade system. The country, once overly reliant on coffee production and rail system transportation to promote economic growth and job security, now maintains a growing industrial base in consumer products, industrial products and commodity development that contributes to a high GDP comparatively to other countries around the globe. Sixty seven percent of total GDP is attributed to the service sector, as it relates to health care, hospitality, beauty provision and restaurant (to name only a few). The rest of gross domestic produc t is allocated in agricultural development and industrial-based employment. Unfortunately, Brazil currently has a debt to GDP ratio of approximately 50 percent, which is much higher than that of other emerging or developing nations (Blanchard, 2005). At the same time, the inflation rate in Brazil is approximately four percent annually which impacts disposable income for consumers and also cash flow availability for companies in the industrial and agricultural sectors. High prices throughout the commodity supply chain, as one example, are offset by rising prices on corn, coffee and other commodity products used in the household sector. High inflation occurring annually since 2003, when the country experienced over 17 percent hyperinflation, continues to erode the government’s ability to stimulate more economic and job growth. The provision of public services, such as electric, telephone services, and water consumption experienced inflation rates of 8.38 percent with supplement ary tariff increases of over 15 percent on all of these services (Business News Americas, 2004). Brazil has not, even during years where inflation was reduced through economic policy and infrastructure development, experienced any significant decreases from these cost levels. As such, consumerism is reduced due to lowered disposable income for consumer products. From 1990 to 1997, Brazil experienced inflation to the level where gross national product was consumed up to 40 percent due to rising prices (Selva, 2010). Further, credit card companies, in response to decreased consumer savings in banking institutions, began charging upwards of 25 percent for consumer and industrial purchases (Selva, 2010). The lack

Saturday, August 24, 2019

Database Essay Example | Topics and Well Written Essays - 250 words

Database - Essay Example The developer should also specify the data type stored in the database. One should also specify the type of activity to be acted upon each and every screen. Workflows in any system determine the order in which tasks should be carried out and therefore in the database system we should also specify the workflows of the system. One should also specify who can enter delete or update data in the database system. The system should also meet applicable regulatory requirements in the organization. Non functional includes the ability to recover and back up data in the database to prevent loss during failure. Others include data security, privacy issues, privacy issues and minimum hardware and software requirements of the system that the database will run on. Non functional requirements also include performance and configuration requirements such as expected business volumes and system responsiveness. It should also ensure that the system is available for use for when needed. It should also ensure proper utilization on the resources of the computer i.e.; CPU cycles, disk space, memory, bandwidth. The database system should be portable across different platforms the system should also enforce. Finally it should ensure high performance. Certain tasks or features are more critical than others. The system should also be capable of maintaining its performance all through its lifetime. An electronic database provides a highly efficient way of storing data. Its advantages are considerable. It saves time; a properly designed database running on a powerful server can be searched through remarkably easily and within an extraordinarily short time. It also helps to save time lost during transfer of physical data from one office to another. Secondly, a database offers more security, file cabinets can be compromised, stolen, accidentally destroyed, or be misplaced. Databases add

The Socioeconomic Background of Kuwait Essay Example | Topics and Well Written Essays - 2000 words

The Socioeconomic Background of Kuwait - Essay Example Kuwait's official language is Arabic, but English is widely spoken. The Kuwaiti Dinnar (KD) is the official currency, and it is further divided into 1,000 Fils. The average exchange rate is 0.3KD:$1.00US. Kuwait is an Islamic country. Most of her citizens worship in mosques around the country and follow the principles of Islam which also provides a legal foundation for the country. Kuwait adopted a democratic constitution in 1962 that guarantees freedom of liberty, speech, press, and worship. Kuwait is governed by an emir of the al-Sabah dynasty and a fifty-member National Assembly. The National Assembly holds much of the power and has played a critical role in the political, economic and social development of Kuwait. Much of Kuwait's importance derives from its geographical location as the gateway to the Arabian peninsula. Linking the desert and the ocean, its strategic position has led to Kuwait's development as a significant trading center. At the beginning of the 1700s, immigrants from Saudi Arabia came to the area that is now Kuwait. They settled in small villages and at that time only a few thousand people lived there. They took advantage of Kuwait's strategic location and began trading goods. In 1756, the leader of the al-Sabah family became the first Emir of Kuwait, and his ancestors have ruled continuously to the present day; the current Emir is sheik Sabah al-Sabah, the thirteenth in the line. Kuwait continued to grow as a commercial center in part because of political turmoil and war between Persia and the Ottoman Empire. This caused a number of trading families to relocate, and these families played anbig role in the commercial development of Kuwait (Alsabah 1980). England's East India Company also fled the instability in Basra, Iraq and set up a new headquarters in Kuwait to act as a terminal and staging area for goods from east India to England. In 1875, the Suez Canal opened, and the East India Company left Kuwait, but by then, the country had grown and developed. The economy had also diversified somewhat. Pearl diving, fishing, and sea transportation became the foundation of the Kuwait economy. Small family-run businesses carried out these activities without large amounts of working capital; income on a per capital basis was low. The most important industry was pearling which was the economic base of Kuwait and the entire Arabian Gulf. Pearls were exchanged for primary products and consumer goods from India and Bahrain. Pearling employed the most people and also contributed the most to the economy. For example in 1920, 25% of the population was employed in pearling (Al-Fraih, 1993). The industry declined in the 1930s when Japanese pearls overtook the world market. Kuwait's strategic location was also conducive to seafaring and trade. Kuwaiti vessels plied the entire Indian Ocean carrying passengers and cargo among Iraq, India, and the east coast of India. One of the principle commodities was date; they were loaded in Basra Iraq and traded throughout the Arabian Gulf and India. Of course to carry out this trade and collect pearls, the Kuwaitis became excellent boat builders. Indeed, Kuwait became the boat-building hub for the entire Gulf. Woods for construction was imported from the coast of Africa and south Asia. Fishing -- another related activity -

Friday, August 23, 2019

Sampling Strategy and Sample Size for a Quantitative Research Plan Coursework

Sampling Strategy and Sample Size for a Quantitative Research Plan - Coursework Example Because the population is made up of a very large size, the researcher shall set up a sample size. The sample size basically refers to a fewer group of persons out of the population who would become respondents to the researcher (Berry, 2005). In order to arrive at this number, it is important that the researcher uses a sampling strategy that would meet the objectives of the study. To this end, the researcher shall devise the use of the random sampling strategy to select the members for the sample size. Random sampling is the kind of sampling strategy where every member of the population has an equal chance of becoming part of the sample size. This is because the researcher uses a strategy that presents all members in the population with an equal probability of becoming part of the sample size. The mechanism that would eventually ensure that some members are included whiles others are rejected would be the effect of chance. By this, reference is being made to the fact that given the same probability, it would only be by chance that some members will be selected ahead of others (Bartholomew et al, 2008).  Ã‚  Ã‚   The random sampling strategy shall be applied in a very specialized way. This would be done to ensure that the researcher enjoys and benefits from the full advantages of the random strategy. It is worth noting that the procedure by which the researcher shall select the members of the sample size by applying the random sampling strategy is known as sampling (Cheng, 2009). There are several sampling procedures.

Thursday, August 22, 2019

Malware, Spyware And Adware Essay Example for Free

Malware, Spyware And Adware Essay How do we get Spyware How Spyware operates Spyware effects Man In Middle attack Counter-Measures Anti-Malware Techniques Bibliography Introduction: From the early days of cracking passwords and stealing information from personal computers, to deadly Internet based attacks that can shake entire’s nation security, cyber crimes have evolved from the endeavors of entertainment by cyber kiddies to organized crimes and terrorist activities of cyber mafia. Virus Attacks, hacking, browser hijacks, spam, phishing and so on are various manifestations of malicious activities that have evolved on the internet in last couple of decades. Malware is one such tool that has emerged as a widely preferred choice to consummate criminal activities on the Internet. Malware is new genre of hostile software, written in a high level language. Normally they target technical vulnerabilities in the system. Spyware, adware, Trojans, virus, worms are very common form of Malware prevalent on the Internet. It propagates through emails, IM and other web services. It can be categorized into criminal and business malware. Criminal malware is used in cyber terrorism and vandalism; while business malware is used for business/monetary benefits. Spyware is a software program that collects personal information of the users without their formal consent. Unlike viruses and worms, spyware does not usually self replicate, or intrude into the system directly or spread from one system to another; instead, it intrudes into a system by deceiving the user or exploiting software vulnerabilities in a system. Once it gets into the system, its implications can range from disturbing to devastating. It propagates using personalization cookies, tracking cookies, Trojans, drive-by downloads, hacking and piggybacking. Malware: Along with viruses, malware is the biggest threat today to the computer users. It can hijack the browser, redirect search results, serve up pop-ups and many more. Malware stands for â€Å"malicious software† and is used to identify all unwanted and potentially unwanted software. We can get infected by malware in several ways. It often comes bundled with other programs (examples include kazaa and i-mesh). These are usually pop-up ads, that send revenue from the ads to the program’s authors. Others are installed from the website, pretending to be software needed to view the site. Its most destructive feature is that once we are infected with the malware, it tends to multiply!! Earlier, it was mainly written for the destruction of computers and their data but now a days malware development is a big business. It is mostly used as a tool for extorting money out of its victims. In the form of rogue security programs, these are used to convince uneducated computer users to purchase the removal software from the same people who have written it. The types of malware are: Adware- It is the class of software that monitors the internet use for known e-commerce sites. When a user attempts to reach a site, adware pops-up suggesting an alternate site which may or may not be legitimate. Porn Dialers- This software was used heavily during the days when modem was the primary mechanism for connecting to the internet. This used to silently disconnect a modem from its service providers and redial to another premium rate telephone number. The resulting phone number charges, usually that of far-removed countries, would be found by the user only on its next telephone bill. Backdoors- These are the software tools which are mostly used to bypass existing security mechanisms present in either operating system or any application. Exploits- It is a general term used to describe any software code that is specifically designed to take advantage of a known weakness in operating system or application code. When vulnerabilities exist on a system, the exploits can be created to grant attacker administrative privileges, disclose or destroy any data or complete any task. Key loggers- These are the original spyware. It is a type of malware that is mostly used to â€Å"spy† on the user of a system. One way to accomplish this is to log every keystroke typed into that system and then using that data to extract credit card social security numbers and all other sensitive information. Trojans- It is software that illegitimately performs some action that is different than its stated purpose. It may appear to be a legitimate software package that accomplishes a task desired by the user but at the same time after installing it can also perform some illegitimate tasks like destroying personal data. Examples of malware: GAIN- It is one of the oldest and best known examples of malware, created by Claria company. webHancer- It is a spyware application that is commonly bundled with other programs. Upon installation, it starts a program that runs in the background and collect details of the webpages we visit. ISTBar- It is a combination of toolbar and hijacker. It installs a toolbar with search functions provided by slotch. com. Recent Attacks:- Katrina-themed Malware attack Hits the Net This malicious site hosted in Poland harbors a secondary line of attack designed especially to dupe windows users. It cynically offers a â€Å"free scan† for the zotob worm that in reality infects users. It also exploits well known IE vulnerabilities to install a variety of Trojans including Cgab-A, Borobot-Q etc. Most Recent Malware: Stealth Malware Stealth is a program that deliberately tries to conceal its presence in the system. It may try to hide changes it introduced in the system, including dropped files, file changes, running processes, registry settings etc. Malware Development Life Cycle- In recent years, malware has evolved in complexity to rival many decent sized software projects. This indicates an improvement in decent methodologies that enables malware producers to improve their output and capability to achieve maximum gain. Following are the steps generally deployed by the creators of malware to ensure its success: Get the malware onto the target system. Ensure the survival of the malware in the target system. Once establish engage its payload. There are several ways by which malware can be installed on the target machine. Some of these include websites or vulnerabilities in software installed on target machine. There are also actively spreading worms, which propagates via emails, peer to peer network, and IM. A growing trend is not to target vulnerabilities in software but to exploit the users of that software. Malware tricks the users and entice the user to download. One of the major requirement of malware is to remain undetected and viable once installed on the target machine. For this purpose the most common techniques used are compression and encryption. Now a days two more techniques are getting common i. e. code obfuscation and executable injectors. Once establish the main job of malware is to deliver the payload. This payload varies from malware to malware. Spyware- It is a type of malicious software that collects information from a computing system without his/her consent. It can capture keystrokes, screenshots, internet usage habit other personal information. The data is then delivered to online attackers who sell it to others or use it themselves for marketing or identify theft. How do we get spyware:- The main culprits in spyware transmission are:- Unprotected web browsing – Many advertising companies send tracking files, called â€Å"cookies,† along with their banner, ads or provide â€Å"special offers† that, when clicked, install extra software without our consent. Peer-to-peer applications – Kazza Lite is a notorious carrier of spyware installation packages. Many MP3 sharing sites also cause spyware problems. Opportunistic â€Å"freeware† or â€Å"shareware† programs – Weatherbug is one such program which collects more information than it is authorized. Web browsers using cookies – Any web browser can permit spyware to be installed on clicking the page that installs it. Some legitimate commercial software – Windows Media Player and America Online are considered sources of spyware. Each installation of Windows Media Player includes a uniquely identifying number that is provided to Microsoft, and America Online installs additional software packages that report data usage to advertising companies. How Spyware operates: When keywords of interest like names of banks, online payment systems etc are observed, the spyware starts its data collection process. The most common area of interest for spyware is the data sent using HTTPS i. e. HyperText Transfer Protocol Secure. This HTTPS is mainly used for very sensitive data and uses Secure Socket Layers(SSL) Transport Layer Security(TLS). Encryption using these SSL TLS makes it difficult to intercept data during transmission but when spyware is running on the end user’s computer, it is collected before encryption. Man-In-Middle Attack Man in Middle Attack or Bucket Brigade Attack can be active as well as passiveform of eavesdropping. It is a type of attack in which the cyber criminal funnels communication between two users and none of the user is aware that the communication is being illegally monitored. The man in middle employ spyware that when loaded on the consumer’s computer redirects the web browser to the fake site. Countermeasures: Users/Organizations can formulate their anti-malware strategy depending upon the type and complexity of Malware attacks that they are exposed to, and the level of risk associated with such attacks. Different organizations use different tools and approaches to counter malware attacks. These tools and approaches are often based on their functionality, suitability and a cost. The two basic approaches are: Reactive Approach Proactive Approach Reactive Approach- It is an incident response process. In this method, once a problem is encountered, the investigation of the problem, analysis and findings remedy, and documenting the resolutions for future is done and that too mostly in same order. The existing anti malware tools available, identify the malware by scanning the computer executable files check if any know malware have sneaked into the system. This is done by detecting programs that are making changes to the operating system registry. Here, there are only three alternatives for dealing with malware:- Running Malware removable tool to detect and repair malware. If, anti-malware tool fails, Malware can be removed manually by the administrator or formatting the system. Use anti-Malware tool to prevent them from entering the system. Proactive approach- In this approach, the Malware can be deleted even before they get executed. It can be done in following ways:- Apply latest firmware to hardware systems and routers as recommended by vendors. Apply latest security patches to server applications and other applications. Ensure recent anti virus software is running. Maintain a database that keeps track of what patches have been applied. Enable firewalls. Enforce strong password policies. Use Least-privileged user account(LUA). This will do less damage as compared to high privileged processes. Anti-Malware techniques: When a worm or virus starts spreading into the computer networks, one must be able to react quickly to minimize the outbreak and damage it can cause. Traditionally, organizations use firewalls and antivirus scanning tools in order to prevent Malware from entering the system. These tools are used as a protective wall between a node and its network and the internet. The main motive is to prevent malicious code from entering into the system. However, these firewalls antivirus scanning tools and traffic monitors are not free from technical vulnerabilities, that can still be exploited by new generation Malware. Advanced Anti-Malware techniques: Integrating filters ‘with signatures’ – Having layers of application filter on the network, will increase the efficiency of the security tools. Advanced antivirus tools, firewalls, web and email filters can be clubbed together, with latest updates/patches to prevent Malware from entering the system. This approach reduces the probability of Malware intrusion to minimum possible. Though not zero. For example, Malware that attacks the web-browser normally bypasses the firewalls, but gets identified and deleted by web filters. Similarly, a new Malware whose signature is not there in any of the filters can still sneak into the network unnoticed. ‘Multi-Layered Defense’ without signatures- It is very much similar to the ‘Integrating Filters’ approach but the only differentiating factor is that they can detect any malware even without their definition or signatures. In the integrating filters with signature technique there is a vulnerability i. e. these are amenable to attacks by unidentified or reported Malware. To overcome that vulnerability ‘Malware without signature’ approach must be adopted. It includes following technologies.

Wednesday, August 21, 2019

Effect of the Recession on Multinational Enterprises

Effect of the Recession on Multinational Enterprises Economic recession Is general slowdown of economic activity over a period of time that measured by Gross Product Domestic (GDP),recession is highly characterized by falling of investment spending, business decline, slow growth of new business high rate of unemployment.  [i]   Economic recession can be caused by widespread of drop in spending and investments, poor micro-economic policies, such as poor control of financial institutions such as banks, and other lender institutions as well as other economic variables During economic recession, many business profitability declines and other bankrupt due to lack markets for their products and services, many customers have inadequate money to buy these products and services. Economic recession also affect stock markets, where by share of the companies drops sharply and reduce confidence to investors Government revenues decline due to economic recession, hence government fails to provide social services and other future plans. Economic recession in one country can also affect others, in sense that recession has magnitude, many multinational companies operate more than one country, and hence impact in one county can have multiplier effects in other countries, many FDIs also will be affected E.g. economic recession which was hit USA in 2008/2009 which was contributed to united states housing bubble and subprime mortgage crisis, was affected not only in America but almost all over the world, many business affected with this recession, stock markets such as NYSE,LSTE, and other banks were bankrupted such as warner brothers.  [ii]   Impact of Economic Recession High rate of unemployment, recession can contribute to high rate of unemployment in sense that may company reduce number of staff in order to strive; in recession it leads to other problems, such as people who lack jobs may engage in criminals in order to survive. Recession may lead people to lack disposable income; and other fails to repay their loans hence many families are affected. Decline in productivity, where by many business profits falls, other firmà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s bankruptcy, hence and affect the whole financial system. Recession has negative impact due to decline of growth domestic produces (GDP) where by its affect economic as well social life. Many new businesses collapse, and hence fails to repay their loans banks. Recession can led to decline in living standard due to the fact people depend on wage and salaries, this can have negative impact on stability of families and individuals health and well-being Multinational Corporation (MNC) or transnational corporation, is an enterprise that manages production or delivered service in more than one country, multination cooperation has been achieved due to advancement in information technologies as well globalization, British is one of country which have many multination companies such British petroleum Vodafone, Virgin, Rynair as which operate within and outside the country, they are interested to operate in emerging economies such as India, china, Africa and Brazil British companies usually engaged in international business Acquire new markets, British multinational usually going international in order to search new markets for their products and services, many large firms flock to china, India, brazil and Africa due to growing of consumer purchasing power. Increasing sales, firms expand international so as to increase its market share hence being able to compete. Acquiring resources, large firms decided to go globally because to find resources so as to continue producing and ensure production cost can be controlled hence to able to pass benefit to customers. Cheap labor, due to growing of stiff competition in the markets, large firms fight to reduce production cost in order to earn profit, this led companies looking overseas areas where cheap labor is available. Global Strategies, many firms consider engaged in international business as strategies in order to survive in a stiff competition Growing consumer pressure, tastes and preferences of consumer has changed dynamic, income increase; consumer can be able to purchase luxurious products and services, growing income to emerging economies influence many firms to set their operation and respond to these markets The external environment is an essential element for the business to operate international due to the fact business do depend on external environment because and changes can have multiplier effect toward business, if the country policies towards economy are good and there is peace and security business will prosper as well as economy PESLTEL for British Multinational Enterprises are; Political British MNE they are highly interested to operate in where there high democracy and freedom of speech, and where there is a less government intervention towards business unless ità ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s breaking the abiding laws. Multinational Enterprise, interested operates in a country which there is peace and security, and that countries have diplomatic relation with other countries. Tax policy is well structured and can be predicted, this give opportunity for business to incorporate into their business, in a country where taxation policy is highly uncertainty many British MNE are not interested to invest in these countries Multinational enterprises interested to know all regulatory bodies governing trade, local and international business such competition laws, employment laws, Business ownership laws, health and safety laws, foreign and local trade regulatory, fair competition bodies as well as environment protection laws main objectives is to make sure the business running smooth. Economic British Multination enterprises are interested in invest in a country where a GDP is heading toward good direction, this is good conducive environment for growth of business Also British MNE prefer to engage in international business in a countries which their economies are growing and their citizen has disposable income in sense that this will provide market as well as access to raw material. British MNE prefer to invest in countries which have national comparative advantage, such as huge population as well as huge market, good climatically condition availability of natural resources such gas, oil and minerals. British MNE also interested to invest in a country which has efficient money supply low interest rate British MNE are highly consider types of economic system, preferred capitalism where by supply and demand is controlled by markets Multinational Enterprises interested to operate in countries which are not prone to recession and depression, due to the fact these affect companies profitability.. Technological factor Advancement in Information and telecommunication technologies (ICT) and innovation contribute for multination enterprises to participate in international business, technologies such as internet, teleconferencing, where company headquarters can have two ways communication with scattered branches around the world. Transport Innovation, development of maritime technology and existence of many airline companies, contribute MNE to engage in international business Transportation innovation, Development of maritime technology and existence of many airline companies in transportation system lead easier to fly around the world at competitive fares and conduct business. Many international companies inject huge sum of capital in research and development to come up with a newer, better and innovative products due to increase of competition among international companies as well growing of consumer pressure due to increase in of income Social factors Multinational enterprises interested to operate in country which there is large population, hence be a market of the products and services provided by these multinational companies, many multinational companies interested to operate in china, India and most of African countries due to large population. Due to powerful economies of western countries and globalization, social culture and life style affects other societies, such as Africans and Asian societies adopt a western culture, and hence create opportunity for MNE to engage in international business Ansoff Matrix Model Source; tuitor2u.net Ansoff Matrix Model is one strategic tools objectives, and most well-known framework for deciding upon strategies for growth, the firms which attempts to grow depend on wither its market to a new or existing products or in a new or existing markets Market Penetration is when a firm decides to market existing products to its customer, the aim is to maintain or increase market share to the existing products to customers and increase usage of existing customers Strategies such as, competitive pricing strategy, advertising, sales promotion and also personal selling as well as aggressive promotional campaign and led market to be unattractive for competitors. Market Development, Is when firm decide to sell its existing product into new market, firm can implement this strategy by, by moving into new geographical areas such as exporting to a new country, new product dimension or packaging, new distribution channel or different pricing strategies which can attract new customer. Products Development, is the growth strategy where by firm introduce new products into existing markets, strategies such as upgrading which can appeal to existing markets Diversification, is the growth strategy where by firms decide to market new products to a new markets, diversification can relate or unrelated depending with company policies. Strategies to execute in recession period In period of Economic Recession many multinational enterprises should review their growth strategies, due recession which affect the prosperity their business, By using Ansoff Matrix Model as strategic tools for growth, Multinational Enterprise can adopt this in survive. The first strategy should be execute for multinational companies in a recession period is cut operation cost and reaming with core business in order to survive The appropriate strategy, which Multinational Enterprise can execute, is by market development strategy, where by firm can decide to shut down their operations in countries which affected with recession due to the fact recession affect purchasing power, hence people fails to buys products and services, firms can decide to operate in countries which economy is growing. Other Strategies which can be adopted by the Multinational enterprises is diversification strategy where by firms can decide to market new products to a new markets, a Multination company can decide to diversity their business and start new business e.g. electricity firm can decide to enter into hotel business but there is lot of risk to be considered before making decision to diversify Multinational Enterprises can decide to diversify their operation into new emerging market, and which are not affected with recession, countries such as china, India and Brazil. Globalization is the broadening set of interdependent relationships among people from different parts of a worlds thatà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s to be divided into nations, the growth of globalization has accelerated due to advancement in information and telecommunication technologies such as internet, teleconferencing, Enterprise resource planning (ERPs),Knowledge management (KM), Customer relationship Management (CRM). I do agree that the benefit of new technologies will off-set the in investment in RD. in one perspective but in other circumstances new technologies might increase investment in RD, this can argued as follows. New technologies help multinational companies; to reduce cost as well as time which were previously invested in RD due to the fact the time taken to come up with the new product is essential due to competition among multinational companies Development of new application software, such has designing and drawings software, CAD, 3Ds helps companies to design a products which meets customers taste and preferences to customer across the world. Internet technologies help multinational companies to advertise and sell their products and services on line around where it can reach many customers at a low cost. Internet technologies also helps RD departments in multinational companies to get instant review about their products, such as how customer perceive that products, their weaknesses. This feedback helps companies to come with the newer and innovative products in the market. In other circumstances new technologies in RD contribute to increasing competition to multinational companies, due to the fact barriers for entry become low, companies now days can but these technologies on shelves and entering into business. Despite of new technology, in RD, the competition become stiff, due to emerging economies such as china, India have decide to engaged in international business. New technologies helps to reduce investment in RD but also create new challenges due to the fact many small emerging companies used technology as strategy to engage in international business, and create stiff competition.

Tuesday, August 20, 2019

Case Study: Elderly Patient with Several Concerns

Case Study: Elderly Patient with Several Concerns Daniel Littlewood   Case study Mrs Hiruni Jupangati You are an Enrolled Nurse working in the small public hospital in Cattelanbaa, rural QLD. This is your first job since completing the Diploma of Nursing and you have been working here for the past month. Mrs Hiruni Jupangati (born 20/05/1929) was admitted by her GP last night with exacerbation of asthma. She was born in Sri Lanka but migrated to Australia with her Australian Aboriginal husband whom she met during the 2nd World War. He worked as a stockman for a nearby cattle station until he retired to their small house in town 25 years ago. Their eldest son left home as a teenager and hasnt maintained contact with the family. Mrs Jupangati has 2 other children a daughter who lives on a sheep station just out of town, and a son who is a remote Aboriginal health worker in the NT. Mrs Jupangati has lived alone since her husband of 68 years died suddenly from a stroke 9 months ago. Although she is eligible for a place in a nursing home in Bigganbad, the regional centre 650km away, she is determined to see out her days at home. She receives support from the community nurse for wound care and her daughter who visits weekly to help with housework etc. She enjoys pottering in her vegetable and herb gardens, cooking Sri Lankan food, watching cricket and making robes for the Katina ceremony. Hiruni likes to spend time every day meditating, chanting from the Pali canon, and burning incense. The Buddhist monk visits once a month from Bigganbad and she attends the annual Poson and Katina festivals in Brisbane with her daughter. Mrs Jupangati has some mild short term memory loss and her GP noted she seemed somewhat confused during his visit. While she is normally independent in performing her ADLs, Hiruni attends to them once or twice per week. She wears a light pad for some urge urine incontinence. After 45 years of smoking heavily she stopped 5 years ago. Mrs Jupangati had excision of cataracts and insertion of IOL 2 years ago and wears glasses for reading. She can mobilise short distances independently with a walking frame. Mrs Jupangati has Osteoarthritis in her back, right hip and both knees. She had a left total hip replacement 6 months ago and is on the waiting list for the other joint replacements. She was diagnosed with Type 2 Diabetes Mellitus (DM) 5 years ago and has required insulin for the past 3 years. Her BGLs have been reasonably stable over that time. Along with Asthma and Diabetes, Mrs Jupangatis medical history includes Rheumatic fever as a child, Ischaemic Heart Disease (she had CABG 25 years ago), Congestive Cardiac Failure (CCF), and Chronic Obstructive Pulmonary Disease (COPD). At age 67 Mrs Jupangati had a left mastectomy and axillary clearance for breast cancer. Treatment included radiation and chemotherapy. There has been no apparent reoccurrence although she has not complied with follow-up mammograms which can only be done in Bigganbad. Mrs Jupangati has had four admissions to the local hospital in the past 6 months. One was for a fall and the other 3 for exacerbation of COPD and respiratory tract infections. She has a small skin tear on her right forearm, a diabetic ulcer on her left foot, and 2 small scratches from gardening on her right lower leg, all of which are being managed by the community nurse GP. Mrs Jupangati has several missing and decayed teeth. She is complaining of painful areas on her coccyx and red right heel since watching the recent cricket test series on TV. She wears hearing aids though needs reminding to use them. Patient observations on arrival to the hospital were as follows: Height 150cm Weight 87kg BP 160/90 Pulse 108 irregular Respirations 32 Temperature 37.8C O2 saturations 84% room air BSL 8.2mmol/l Urinalysis pH 6.0, SG 1010, Nitrates +, Leukocytes ++, Blood ++, urine cloudy and offensive Current Medications: Lantus Actrapid Seretide and Ventolin inhalers Panadol Osteo Voltaren Gel (her daughter gave this to her last week to help with arthritic pain) Oxycodone PRN Frusemide Enalapril Prednisolone Atorvastatin Coloxyl and Senna Pending investigations: Chest X-Ray Blood tests Spirometry Mid-stream urine (MSU) Other orders: TED stockings Bed rest with toilet privileges Oxygen @ 2L/min via nasal prongs Fluid balance bowel charts Q2:Identify, list and briefly outline the use for the equipment required to obtain all of Hiruni Jupangatis observations and complete the assessment form. A2: As written in (Tollefson, J., Watson, G., Jelly, E., Tambree, K., Bishop, T, 2015, pp.10-30, 66-98) the equipment required to carry out the observations for Mrs Jupangati are: Gloves and hand wash aid in preventing spread of infection. Height and weight scales needed to find BMI. Calculator to work out BMI. Blood Pressure and sphygmomanometer with BP cuff to take blood pressure. Stethoscope to listen to heart beat. Pen torch to check if PEARL. Watch for RR and pulse rates. Thermometer with probe covers take temperature. Pulse oximeter to get Mrs Jupangati SpO2 level. Urinalysis Commode, bedpan as required/ PPE/ specimen container/ urinalysis bottle with regent strips/ paper towel/ perineal care equipment/ watch/ pen and paper. BGL Glucometer/ cotton balls or gauze/ lancet/ sharps container/ testing strip/ diabetic chart/ warm water. Computer / relevant forms and pen to document data collected. Satisfactory Needs revision Q3:List five (5) strategies you could implement to enable Heroin to meet her emotional, psychosocial and spiritual needs. Identify 3 ways you would ensure both her privacy and confidentiality are maintained while she is an inpatient. A3: Understanding how Mrs Jupangati culture belief view health care will help to tailor questions and treatment plans to the Mrs Jupangati needs. By asking Mrs Jupangati about her religious and spiritual practice, you can learn something about Mrs Jupangati health care choices and preferences. Get to know Mrs Jupangati health problems will help you to develop a care plan for Mrs Jupangati, also involve Mrs Jupangati in her care plan. Anticipate Mrs Jupangati needs this will show Mrs Jupangati that you do care and that you want to provide Mrs Jupangati with the best plan of care possible. Gain Mrs Junpangati trust by providing consistent, respectful and patient-focused care, follow through on commitments and have an accepting attitude rather than being judgmental (Crisp, Douglas, Rebeiro, Waters, 2016 pp 447- 449 ). Three ways you would ensure Mrs Junpangati privacy are environment which is drawing curtains, closing windows and doors. No gossiping about her to staff members and patie nts. Do not post anything about her on social (Crisp et al., 2016 p225). Satisfactory Needs revision Q4What communication techniques would you use when interviewing/assessing Hiruni and explain briefly how they would assist you. A4: Active listening is taking an interest in what Mrs Junpangati has to say through verbal signal, nonverbal gestures, and body language. Using active listening will help build trust with Mrs Junpangati(Crisp et al., 2016 p222 ) . Using body language and gestures is important in making a connection with Mrs Junpangati, by taking the time to make eye contact, smiling, leaning forward and focusing my attention on Mrs Junpangati will help make a connection with her(Crisp et al., 2016 p223). Asking open end questions will require Mrs Junpangati to expand on her answer. English is Mrs Junpangati second language Junpangati may have difficult communicating, then closed questions may be required. Mrs Junpangati cultural difference and ESL may require me to prompt her, using clarification/validating techniques to build trust(Crisp et al., 2016 p224 ). Satisfactory Needs revision Q5:Review Mrs Jupangatis vital signs and observations. Identify whether they are within the normal range. If they are not within normal range state what the normal range and variance is and what the variance may indicate. Discuss your relevant duty of care expectations as an EN. A5: An EN duty of care expectations are to document, ensuring confidentiality of all vital signs and observations immediately after they are done. Any abnormalities of the vital signs and observations should be reported immediately to the RN so further action can be taken (Crisp et al., 2016 p173). Satisfactory Needs revision Q9:Identify four (4) potential risks in collecting the MSU and discuss what you, as the EN, would do to minimise these risks. Briefly state what relevance an environmental policy/procedure would have to Mid-Stream Urine collection/testing. A9: Four potential risks are contamination, infection, urine spill and incorrect labelling. These risks can be minimise by making sure the container is sterile, not touching the inside of the container, the specimen is taken mid-stream as required. Wear gloves to avoid infection and contamination and follow hand hygiene policy. Use ppe such as gloves, apron and glasses in case it splashes everywhere. To avoid incorrect labelling fill out the label before you give the container to Mrs Junganati, verify with Mrs Junganati details as the label is fill out and make sure the correct test procedure is written on the label as well (Crisp et al., 2016 pp 648-658 ).The relevance an environmental policy/procedure would have to a mid-Stream Urine collection/testing is it would tell you how to dispose of the urine and container correctly (Crisp et al., 2016 pp 132-133). Satisfactory Needs revision Q10:Explain good documentation standards/principles you would use as an EN caring for Mrs Jupangati. A10: Good documentation standards/principles are making sure all documents are focussed, accurate. Complete, timely, understandable, always objective and legible. On every document must be the unique identifier or medical record number, patients full name, DOB, gender. For good documentation entries must be neat, legible and English, must have proper grammar and spelling, must be accurate and clear, use black ink which is easily reproducible, use approved symbols and abbreviations, use the 24hr clock time sequenced, all entries from students must be countersigned by clinician who is supervising, all entries must be signed by author, followed by name and designation, make sure all entries are factual (Crisp et al., 2016 pp178-181). Satisfactory Needs revision Q13:Using your knowledge of anatomy and physiology identify and discuss three (3) possible causes of Mrs Jupangatis collapse. A13: Mrs Jupangati has osteoarthritis in her back, right hip and both knees. She also had a total left hip replacement 6 months ago and is on the waiting list for other joint replacements. She has also been admitted to hospital in the last 6 months with a fall. Mrs Jupangati has arthritis along with osteoarthritis which cause the cartilage or cushion between joints breaks down leading to pain, stiffness and swelling. Mrs Jupangati may have fell because her joints gave way or they lock up (Nazarko, 2015). Mrs Jupangati has type 2 Diabetes, she is taking insulin injections for her type 2 diabetes. Mrs Jupangati is obese which may be the cause she has type 2 diabetes. With Type 2 diabetes, the pancreas usually produces some insulin. But either the amount produced is not enough for the bodys needs, or the bodys cells are resistant to it. Symptoms of diabetes may include fatigue, blurred vision and loss of consciousness (rare). Type 2 diabetes also increases your risk of a stroke. Mrs Janpangati might have miss her insulin medication, which means glucose cannot make it into the cells to provide energy to the body, which may have cause Mrs Janpangati to have fatigue, blurred vision and loss of consciousness which cause her to fall (Nazarko, 2015). Mrs Jupangati was admitted last night with exacerbation of asthma. She was admitted with a very high respiratory rate. Mrs Jupangati use to smoke for 45 years. Mrs Jupangati has COPD and asthma which cause narrowing of the airways. Mrs Jupangati is not able to get the required amount of air into her lungs because she unable to take a full breath. Mrs Junpangati is tachycardia which means her heart is working hard to supply the body with more oxygenated blood, which means the lungs have to work faster to oxygenate the blood as well. Mrs Jupangati may have had an asthma attack which may cause her unable to breathe and lose consciousness, which cause her to fall and hit her head (Nazarko, 2015). Satisfactory Needs revision Q15:List Mrs Jupangatis analgesic medications. Outline the process you would use to assess the need to give the opioid. Is an [E]EN authorised to administer the opioid? If so, explain how legislative and regulatory standards support this practice and how the EN would ensure these requirements are met whilst performing this activity. A15: Mrs Jupangatis analgesic medication is Oxycodone and Panadol Osteo. To assess to see if Mrs Jupangati needs her Oxycodone PRN a pain assessment will be required. A pain assessment consists of provoking/palliative factors what makes the pain better or worst. Quality what the pain feels like in the patient words. Region and radiation, where is the pain, does it radiate, does it occur anywhere else, have the patient point to where the pain is. Severity, have the patient rate their pain using a pain rating scale, ask the patient how much pain they have at rest and how much pain they have at movement. Time, when the pain began and how long did the pain last. Patients understanding of the cause of pain and what treatments have they tried to relieve it (Crisp et al., 2016 p1336). An EN can administer the opioid because it is a control drug. For a EN to administer Mrs Jupangatis opioid they must have written in instruction from one of the following dentist, doctor, nurse practitioner, p hysician assistant or surgical podiatrist and a doctor, dentist or registered nurse supervise, or they can give control drug to a person if has been dispense for that person doctor, dentist or registered nurse supervise (Queensland Government, 2016). Satisfactory Needs revision Q16:Review Mrs Jupangatis medical history medications. Identify urgent patient education needs, describe how you would go about this and who you would involve. A16: Diabetes, Mrs Jupangati needs to lead a heathier lifestyle I would involve the following doctor, dietician or nutritionist, accredited exercise physiologist/physiotherapist and her daughter. Blood glucose Mrs Jupangati needs to check her blood glucose levels at home to making sure she is within normal limits and Mrs Jupangati must take the required medication so the following people should be involve the RN, her community nurse and Mrs Jupangati daughter to ensure she carry out this. Pressure Area Care, Mrs Jupangati needs education on pressure injuries, how her diabetes will increases the risks, what can Mrs Jupangati do to minimise these risk and how Mrs Jupangati can care for her pressure injury. People to get involved doctor/RN speak to her and her daughter and community nurse. Wound care, involve Mrs Jupangati, daughter and community nurse. Nutrition get the following people involved nutritionist and her daughter. Advise them of what Mrs Jupangati should be eating and avoiding. Oral hygiene Mrs Jupangati needs to be refer to a dentist, educate Mrs Jupangati, community nurse and daughter, educate them on steroid medications effect on Mrs Jupangati teeth and educate them on mouth care. ADLs/hygiene involved Mrs Jupangati , community nurse and her daughter, explain to them why hygiene is so important when you are a diabetic because it can cause sores to become infected a lot easier. How to use puffers/spacer, involve Mrs Jupangati, community nurse and her daug hter. Explain the process with them and show them as well. When teaching Mrs Jupangati reduce environmental distractions, to compensate for Mrs Jupangati hearing loss and with Mrs Jupangati attention and concentration. When talking to Mrs Jupangati use a low-pitched voice, speak clearly and slowly, and face Mrs Jupangati while talking. Encourage Mrs Jupangati to use her hearing aid. Ask the Mrs Jupangati questions to verify that she has understood what been said, and give written information as backup to what youve presented orally to Mrs Jupangati. Mrs Jupangati has impaired vision, use adequate diffused light, and avoid having Mrs Jupangati face a direct source of light. Make sure Mrs Jupangati has her prescription glasses, make sure she is wearing them, and use large print for labels and instructions. Keep teaching sessions short for Mrs Jupangati between 10 to 15 minutes and schedule them to allow Mrs Jupangati to rest as needed. When teaching Mrs Jupangati any activity or skill, the pace must be set Mrs Jupangati(Crisp et al., 2016 pp 2 6-7) . Satisfactory Needs revision Q17:Identify potential causes of Mrs Jupangatis poor oral condition and describe how you could assist her in maintaining proper oral health. A17: Cause of Mrs Jupangati poor oral condition are diabetes if Mrs Jupangati poorly managed her diabetes she is at an increased risk of tooth decay and gum infections (Diabetes Victoria, 2016). She is a former smoker which can cause mouth decay. She is taking Prednisolone which may lead to bone loss in her mouth. She is taking steroids which can cause oral thrush. Mrs Jupangati has medicine for high blood pressure, analgesics and ACE inhibitors which cause insufficient saliva which cause gum disease because saliva keeps the mouth healthy (NPS MedicineWise, 2016). While Mrs Jupangati is in hospital I will help her with her oral care by assisting her with oral care twice a day. By assisting Mrs Jupangati I will educate Mrs Jupangati on why it is importance to do her oral care and it will get her in a routine. Educate Mrs Jupangati about diabetes and gum disease that she needs to have her BGL at the right level, needs to take her medication correctly and is to test her BGL regularly. Satisfactory Needs revision Q18:Discuss the potential cause of Mrs Jupangatis painful coccyx reddened right heel and explain why this might have occurred. Outline how the EN will manage this concern effectively. A18: Mrs Jupangati is 87years old, has diabetes, and limited mobility. As people age their subcutaneous fat diminishes and their skin texture flatten out. The loss of skin texture allow the epidermis to peel away, increasing the likelihood of skin tears. Mrs Jupangati has lost her skin texture and has poor blood flow to her extremities, especially legs and feet due to her diabetes. Mrs Jupangati poor glucose levels may result in a reduced blood supply which makes them more prone to infection, ulcers and pressure injuries As Mrs Jupangati has been watching the cricket sitting down for a long period of time without moving, she would be applying pressure on her coccyx and her heels on the couch. This would have interfere with her circulation because she was applying pressure which would have cause tissue death. The EN will need to do a waterlow risk assessment Mrs Jupangati must be move every two hours, the EN will need to put a mepilex INSITU on Mrs Jupangati heel and coccyx . Mrs Jupangati must have a wedge pillow under her shins and be given an air bed. The EN can wash and dry the area as well. The EN must educate Mrs Jupangati on pressure injury care and prevention, advising Mrs Jupangati to move every couple of hours. Informing Mrs Jupangati to use non-cosmetic moisturisers on her skin, check regularly for red or sores areas, and about hygiene (Crisp et al., 2016 pp724-736). Satisfactory Needs revision References       Crisp, J., Douglas, C., Rebeiro, G., Waters, D. (2016). Potter Perrys fundamentals of nursing (5 ed.). Australia: Harcourt Publishers Group Pty Diabetes Victoria. (2016). Diabetes long-term effects. Retrieved 2 19, 2017, from https://www.betterhealth.vic.gov.au/health/conditionsandtreatments/diabetes-long-term-effects Nazarko, L. (2015). Modifiable risk factors for falls and minimizing the risk of harm. Nurse Prescribing, 13(4), 192-198. Retrieved from CINAHL database http://web.ebscohost.com NPS MedicineWise. (2016). Prednisolone (corticosteroids (oral and injectable)). Retrieved 2 19, 2017, from http://www.nps.org.au/medicines/hormonal-and-metabolic-system/corticosteroids-oral-and-injectable/prednisolone-corticosteroids-oral-and-injectable Queensland Government. (2016). Health (Drugs and Poisons) Regulation 1966. Retrieved from https://www.legislation.qld.gov.au/LEGISLTN/CURRENT/H/HealDrAPoR96.pdf Tollefson, J., Watson, G., Jelly, E., Tambree, K. (2015). Essential clinical skills: Enrolled/division 2 nurses. (3 ed.). Melbourne, VIC, Australia: Cengage Learning Australia.

Monday, August 19, 2019

Lucy montgomery :: essays research papers

Lucy Maud Mntgomery The author of the famous Canadian novel ‘ ANNE OF GREEN GABLES’, Lucy Maud Montgomery was born in Clifton (now New London), Prince Edward Island, 30th November, 1874. When she was two, her mother died of tuberculosis. Her father, who was a merchant, remarried, and moved away. Montgomery was raised by her maternal grandparents in Cavendish. The place was isolated and her childhood was not particularly happy: she grew up in an atmosphere of strict discipline and punishment for the slightest reason. She joined her father briefly in Prince Albert, but they soon returned to Prince Edward Island. At an early age Montgomery read widely. She started to write in school and had her first poem published in a local paper at the age of fifteen. In 1895 Montgomery qualified for a teacher’s license at Prince Wales College, Charlottetown. During the 1890’s she worked as a teacher in Bideford and at Lower Bedeque, both on Prince Edward Island. From 1895 to 1896, Montgomery studied literature at Dalhousie University, Halifax. She returned to Cavendish to take care of her grandmother and worked at a local post office. On July 5th, 1911after her grandmother died, Montgomery married the Reverend Ewan MacDonald, to whom she had been secretly engaged since 1906. Prior to her engagement to Macdonald, she had two romantic involvements: an unhappy engagement to her third cousin Edwin Simpson, of Belmont, and a brief but passionate romantic attachment to Herman Leard, of Lower Bedeque. After their marriage, Montgomery and Macdonald moved to Leaskdale, Ontario, where Macdonald was Minister in the Presbyterian Church. She bore three sons, Chester (1912), Hugh (stillborn in 1914), and Stuart (1915). She assisted her husband in his pastoral duties, ran their home, and continued to write best-selling novels as well as short stories and poems. She faithfully recorded entries in her journals and kept up an enormous correspondence with frie nds, family and fans. Maud Montgomery Macdonald did not live on Prince Edward Island again, returning only for vacations. While caring for her grandmother, she wrote the first book of the Anne series. It drew on her girlhood experiences. The idea was based on a notebook entry from 1904, â€Å"Elderly couple applies to orphan asylum for a boy. By mistake a girl is sent to them.† Anne of Green Gables was the story of a talkative, red-haired orphan, Anne Shirley. She had big green-grey eyes and a narrow, freckled face. Lucy montgomery :: essays research papers Lucy Maud Mntgomery The author of the famous Canadian novel ‘ ANNE OF GREEN GABLES’, Lucy Maud Montgomery was born in Clifton (now New London), Prince Edward Island, 30th November, 1874. When she was two, her mother died of tuberculosis. Her father, who was a merchant, remarried, and moved away. Montgomery was raised by her maternal grandparents in Cavendish. The place was isolated and her childhood was not particularly happy: she grew up in an atmosphere of strict discipline and punishment for the slightest reason. She joined her father briefly in Prince Albert, but they soon returned to Prince Edward Island. At an early age Montgomery read widely. She started to write in school and had her first poem published in a local paper at the age of fifteen. In 1895 Montgomery qualified for a teacher’s license at Prince Wales College, Charlottetown. During the 1890’s she worked as a teacher in Bideford and at Lower Bedeque, both on Prince Edward Island. From 1895 to 1896, Montgomery studied literature at Dalhousie University, Halifax. She returned to Cavendish to take care of her grandmother and worked at a local post office. On July 5th, 1911after her grandmother died, Montgomery married the Reverend Ewan MacDonald, to whom she had been secretly engaged since 1906. Prior to her engagement to Macdonald, she had two romantic involvements: an unhappy engagement to her third cousin Edwin Simpson, of Belmont, and a brief but passionate romantic attachment to Herman Leard, of Lower Bedeque. After their marriage, Montgomery and Macdonald moved to Leaskdale, Ontario, where Macdonald was Minister in the Presbyterian Church. She bore three sons, Chester (1912), Hugh (stillborn in 1914), and Stuart (1915). She assisted her husband in his pastoral duties, ran their home, and continued to write best-selling novels as well as short stories and poems. She faithfully recorded entries in her journals and kept up an enormous correspondence with frie nds, family and fans. Maud Montgomery Macdonald did not live on Prince Edward Island again, returning only for vacations. While caring for her grandmother, she wrote the first book of the Anne series. It drew on her girlhood experiences. The idea was based on a notebook entry from 1904, â€Å"Elderly couple applies to orphan asylum for a boy. By mistake a girl is sent to them.† Anne of Green Gables was the story of a talkative, red-haired orphan, Anne Shirley. She had big green-grey eyes and a narrow, freckled face.

Sunday, August 18, 2019

An Argument Against Abortion Essay -- Pro Life Pro-life essays researc

Abortion in America is a controversial issue in which both sides have valid arguments at face value. The pro-choice side has many arguments to support it belief in keeping abortion legal. Many of these are faulty, and argue points irrelevant to the issue as I will attempt to illustrate, thereby eliminating the main pro-choice arguments. The pro-life position has somewhat different ideas. The most popular of these is: The unborn entity is fully human from the moment of conception. Abortion results in the intentional death of the unborn entity. Therefore, abortion can be defined the intentional killing of a human being. This killing is in most cases unjustified, since the unborn human being has a full right to life. If, however, there is a high probability that a woman's pregnancy will result in her death (such as tubal pregnancy, for example), then abortion is justified. For it is a greater good that one human should live (the mother) rather than two die (the mother and her child). Or, in such cases the intent is not to kill the unborn but to save the life of the mother. With the exception of such cases, abortion is an act in which an innocent human being is intentionally killed; therefore, abortion should be made illegal, as are all other such acts of killing. One argument made by people in favor of abortion is an appeal to pity. When one fallaciously argues by appealing to pity, one is arguing that certain actions should be permitted or tolerated out of pity for those performing them when in fact the basis for showing them pity is not a legitimate basis for the action. For example, a woman who argues that she should not receive a parking ticket because her child was crying and she took her child to a candy store to cheer her up is appealing to pity. The following abortion rights arguments are examples. Anyone who goes to pro-choice demonstrations in the United States will see on pro-choice buttons a drawing of a coat hanger. This is the symbol of the pro-choice movement representing the many women who were harmed or killed because they either performed illegal abortions on themselves (i.e., the surgery was performed with a "coat hanger") or went to physicians. That means, if abortion is made illegal, then women will once again be h... ...asy economic access to such "professionals." In the abortion debate the question of whether abortion entails the death of a being who is fully human must be answered before the question of fairness is even asked. That means, since equal opportunity to eliminate an innocent human being is rarely a moral good, the question of whether it is fair that rich people will have access to abortion if it becomes illegal must be answered after the question of whether abortion in fact is not the killing of an innocent human life is answered. This is like saying the benefits of the wealthy are virtues simply because the poor are denied them. Sounds like bs to me. Although the abortion argument will probably go on forever, eliminating faulty arguments will help people reach a reasonable decision on the issue. When the pro-choice side argues such points as the ones above, it tricks many people by playing on such things as peoples sympathy and compassion wrongly. If each side was represented fairly, it is likely people would become in favor of a ban on abortion when facts are the issue instead of a false play to people's emotion.

Pervasive Computing: IBMs Autonomic System and the Cautions Necessary

Pervasive Computing: IBM's Autonomic System and the Cautions Necessary Pervasive computing is here. It is being integrated into our society in as many ways that can be thought up. Chips are popping up in everyday objects. Cars, planes, ships, phones, PDA’s, refrigerators, and soon a person’s hat, shoes, and clothing. This is all well and good, the advancement of technology is something that has always and will always be a constant in our culture. The need for more interconnectivity is becoming more apparent in business, schools, and personal lives. IBM is working on a project, called Autonomic Computing, which will create a universal standard for technology and the integration of electronic devices. One of their claims for the necessity of the project is a quote, â€Å"Civilization advances by extending the number of important operations which we can perform without thinking about them." - Alfred North Whitehead. They say that we make cultural advances by taking the processes and procedures we have now and automating them, thus giv ing the freedom to explore new and unique ways to complete the left over processes and procedures. The advancement of the culture is a necessity for any society, but the relinquishment of control of certain processes has to be regulated. IBM says that the problem is because of the rapid expansion of information and technology we as humans cannot keep up with the increase. Access to information is becoming rampant through the creation of wireless and handheld devices. These devices need a standard of production and connection to provide the greatest effect. IBM’s solution is a computer network that is â€Å"flexible, accessible, and transparent.† (The Solution, IBM Research) The system will... ...lems are cause for worry. Humans ultimately need to have the control over the system, having the option to monitor and observe the system, limit its sphere of influence, or completely deactivate the system. Bibliography 1. http://www.research.ibm.com/autonomic/ Autonomic computing; IBM, 2. http://www.doorsofperception.com/projects/chi/ â€Å"The design challenge of pervasive computing,† John Thackara Doors of Perception, April 2000.. 3. http://www.nathan.com/thoughts/unified/unified.pdf Information Interaction Design: A Unified Field Theory of Design, Nathan Shedroff, Chief Creative Officer, vivid studios, 1994 4. Halligan, Tom., (1999) â€Å"Lose the remote, take in some oxygen.† Electronic Design. p. 16 (database: Applied Science & Technology Abstracts 1983 – Present) 5. Electronics industry index from www.encyclopedia.com

Saturday, August 17, 2019

British Imperialism Essay

Jordan Shiber Pd. 5 European Imperialism in parts of the Middle East, Africa, and Asia had a more positive impact on the world. The three main reasons I say this is one, Europeans truly thought they were doing good by imposing on other countries. They thought buy bringing in new cultures and traditions the country would be better off and it would benefit them and the country there are imposing on because both countries would be together and the country taking them over would have new and useful resources and the country being taken over would be a part of the European success and gain new ideas and a way of life.Jules Ferry said, â€Å"something else is needed for France:†¦that she must also be a great country exercising all of her rightful influence over the destiny of Europe, that she ought to propagate this influence throughout the world and carry everywhere that she can her language, her customs, her flag, her arms, and her genius†. (Beck 351) This translates to basic ally the definition of assimilation, or influencing a country using your customs, traditions, and way of life.Second, European countries were more modernized than African countries so by invading they are helping to modernize Africa. Just look at Africa today compared to back then especially South Africa, they are extremely modernized other than the desert parts. Lastly, the invasion of European countries gave the Africans more job opportunities which helped their economy. Before I get into the individual countries positive affects, think about Social Darwinism or basically survival of the fittest.If a country is too weak to defend itself and another country can take it over and successfully run the country, they should be able to without any complaints. To start off, the Europeans thought that they were actually good by invading Africa and imposing their ideas on them. They thought by bringing in new ideas and traditions it would actually benefit the Africans. Also, really good inf rastructure was built throughout Africa. Next, Africa and other places werent as modernized as Europe. Africans decided they had to adjust to the modern world or be consumed by it.The invasion of Europeans basically influenced them to change and become more like the rest of the world. In 1831, Muhammad Ali gained control of Syria and Arabia. He began a series of reforms in the military and in the economy. The Suez Canal’s construction was supported by his grandson, Ismail. The European influenced is what caused this canal to be built along with any other reform in Egypt. Egypt wanted to basically show their dominance by gaining power. This is a positive effect because other countries are starting to make themselves stronger.The final reason that European imperialism had a more positive impact on the world was that it gave out more job opportunities to those being invaded and helped the countries econmy and its way of life. Some examples of job created due to the invasion are servants,labourers on infrastructure projects, and soldiers in colonial armies. Also, local warfare was reduced and new hospitals and schools were provided. Another thing is richer families could send their children or even themselves to Europe so they could get a way better education.To conclude European Imperialism in parts of the Middle East, Africa, and Asia, I would say it had a more positive effect. Europeans thought they were doing something good by imposing on other countries. They thought it was a good idea to bring in their way of life and influence the other people. Second, imperialism in Africa influenced some countries so not just sit back and let it be but to show their power and dominance. Lastly, imperialism created more job opportunities and helped out the country itself.Dadabhi Naoroji said â€Å"The genius and spirit of the British people is fair play and justice†. (Beck 351) This means is was okay for the British to do what they are doing. This is how Euro pean Imperialism in parts of the Middle East, Africa, and Asia had a more positive impact on the world. MLA Citations: Beck, Roger B. Modern World History: Patterns of Interaction. Evanston, IL: McDougal Littell, 2005. Print. Fieldhouse, David K. â€Å"Western Imperialism in the Middle East, 1914A? A? A? 1958. † Western Imperialism in the Middle East, 1914A? A? A? 1958. N. p. , n. d. Web. 14 Feb. 2013.

Friday, August 16, 2019

An Analysis of “1984” by Orson Welles Essay

Back during the time of World War II, paranoia swept across the globe. Hitler, brainwashing thousands of people into fighting for him, nearly defeated all who opposed him. Had he succeeded in his mission, a fascist government system would have formed, greatly inhibiting the rights and privileges of the general populace. George Orwell wrote 1984 to demonstrate the horror this system would bring. Using setting, characters, and conflict, Orwell uses this book to portray the theme of raw, unrefined humanity, and its ability to rise above a corrupt and confining evil of an enemy. Orwell distorts the idea of Utopia, an ideal society where human beings live a perfect existence, and creates a fictional setting in which life is extremely bad from oppression, deprivation of rights, and terror. Fear is used as a tool for manipulating and controlling individuals, and nearly every positive feeling is squelched. The world is divided into three political countries: Oceania, Eastasia, and Eurasia. Each of these states is ruled by a totalitarian government and is constantly warring on multiple fronts. Using the terrifying atmosphere of the archaic world, Orwell creates the illusion that Winston has nowhere to escape the oppression. Winston is forced to live within his present circumstances; able to change where he lives, yet unable to change how he lives. Oceania’s political structure contained three segments: the ruling class, the educated workers, and the working class. Orwell, being a socialist, realized that with class distinctions came class struggle. The ruling class, consisting of the wealthy and powerful, was only two percent of the population. In Hitler’s Germany, the very few people who were considered part of the ruling class had a more luxurious lifestyle that the masses, yet in this nation, as in 1984, revolt was inevitable. The conflict between Winston and O’Brien is another way Orwell shows how a society can try to brainwash a person into believing the impossible. For instance, O’Brien wants Winston to believe that two plus two is five, going  against all the laws of mathematics Winston has studied all his life. O’Brien is one of the top leaders in the Inner Party, and may even be part of a hive that creates the idea of Big Brother. When O’Brien reveals himself as a representative of the Party and all of its contradictions and cruelty, Winston discards all feelings of friendship and suddenly becomes his enemy. This action directly relates to the theme in how if humanity is confronted with evil, every ounce of effort will be used to resist. Doublethink, the ability to hold two opposing ideas in someone’s mind at the same time, is forced into Winston by O’Brien, only confusing him further. If only Winston had accepted the doctrines of the Party, his life would have been spared. Instead, Winston is murdered because of his individuality, ensuring the inability to spread his idealistic views to the public, hungry for freedom and escape from oppression. Winston Churchill was the exalted leader of England during World War II. One must consider why Orwell gives the name â€Å"Winston Smith† to his main character. The name Winston stands for the individuality, uniqueness, and greatness of the character, while Smith stands for the regularity of such a person. In the failing governmental system in 1984, even the greatest person can be shoved aside and told to work in a menial job, negating all hope of ever reaching his full potential. Because Winston is so common, so real, it is easy to identify with him and to imagine being in his shoes. Winston embodies the values of a civilized society: peace, freedom, democracy, love, and decency. When Winston is killed, these things are destroyed with him. He represents the struggle between good and evil, and there is no mistaking where the lines are drawn. A Totalitarian government does not permit these characteristics in their citizens, therefore insisting upon Winston’s death. George Orwell wrote about 1984 in 1948, and the ideals he introduced can still be applied in the present. Although Winston dies at the end, Orwell is trying to show the stubbornness of human nature. We cannot forget that above all, individuality must be expressed, or the common man will have no reason, or desire, to live.

Thursday, August 15, 2019

Amazon.com – the world’s biggest e-commerce retailer

Amazon is the world’s biggest e-commerce retailer. They were founded in 1994, being the first online retailer to secure one million customers in 1997. They are based out of Seattle, Washington but have locations in 18 U. S states and 14 international locations. They currently have over 88,000 employees and are still growing. Amazon sells pretty much anything you want on their website, from DVDs and video games to shoes and sports equipment. When Jeff Bezos, founder of Amazon. com, started Amazon all he was selling was books and now they have their own tablet, called the Kindle, which is a virtual book. Amazon’s mission statement is â€Å"Our vision is to be earth's most customer centric company; to build a place where people can come to find and discover anything they might want to buy online. † The way that Amazon does their business isn’t rushed, just wanting to earn a profit. Jeff Bezos business plan was a slow-growing business, and he didn’t even turn a profit until 2001, after the â€Å"dot-com boom† of the late 1990s couldn’t even stop then when a lot of other online companies had to file for bankruptcy. But they survived and made 97 million just in the last quartered of 2012. Amazon has a code of business conduct and ethics, with their main statement being â€Å"Amazon. com employees should always act lawfully, ethically, and in the best interests of Amazon. com. This Code of Business Conduct and Ethics sets out basic guiding principles. Employees who are unsure whether their conduct or the conduct of their coworkers complies with the Code of Conduct should contact their manager or the Legal Department. † The type of system that they are using is virtue ethics, which is where morals are internal. They are trying to internalize moral behavior, making sure that everyone is aware that they are there to benefit the company and do so in a lawful way. Amazon was built on making their customers happy, and by doing that they need to make sure that all of there employees are performing to the best of their ability, making sure they are making the right decisions for the company. Amazon has strict rules on conflicts of interest, insider trading, harassment, record keeping and many other things. They also give their employees the opportunity’s to submit ideas that they believe will not only better the company, but also the world called the Kaizen program. The Kaizen program is where Amazon employees work together to implement environmental and energy initiatives across all parts of the company. They have done everything from figuring out a new way to package trucks, for less shipments and saving fuel to figuring out how to install lights that are on motion sensors to help reduce energy costs.

Wednesday, August 14, 2019

Philosophy of Human Nature Essay

Evil can be used in two ways- when someone has done evil and when someone has suffered evil. Since God is good, God does no moral evil; however, because God is just, God punishes the wicked and thus causes the evil of punishment. People are the cause of their own evildoing. Furthermore, because learning is good a thing, we do not learn evil. It is people’s inordinate desires that drive their evildoings. There are two laws- eternal law and temporal law. Both laws are good and guarantee people to live perfectly. To live perfectly and well, we need to know that we are alive, that we live with reason and understanding. And when the impulses of the soul are guided by reason, a person is perfectly ordered- eternal law. However, it is possible that the reason or mind does not rule. According to Augustine, this can only happens if a person’s own will and free choice make the mind a companion of cupidity. It is up to us to decide whether we want out will to be good or bad, and whether we desire things we can lose or we can’t lose. Thesis (What is the central point of the reading? Use no more than three sentences. ): Augustine claims that people do evil by the free choice of our will. Your questions So if God is all good and omnipotent, then why will God allow anyone to do evil by the free choice of their will? If we are images of God, and God is all good and omnipotent, shouldn’t we be all good and not act in ways that conflicts with God’s image?