Tuesday, December 24, 2019

The Theories Of Cognitive Development On The Curriculum...

This paper will briefly describe the targeted instructional setting that is the foundation for the discussion that follows. Then this paper will present the implications of several theories of cognitive development on the curriculum and instructional strategies used within the targeted instructional setting. These include the cognitive development theories of Jean Piaget and Lev Vygotsky, among others. Based on these theories, two recommended adjustments to the curriculum content for the targeted instructional setting will be presented along with a justification for the recommendations. This is followed by a recommendation of two instructional strategies for the targeted instructional setting and a justification for the recommendation. Wy’east Middle School (Wy’east) is the targeted instructional setting for this paper. Wy’east is an urban middle school that serves grades six through eight. Wy’east is a Title 1 school in Step 5 of the school improvement process. Wy’east has a population of approximately 851 students comprised of 449 male and 402 female students. There are 18 different home languages spoken. Approximately 54% of the students qualify for the free and reduced-price lunch program. There are 84 students active in the ELL program (ELLs) and many more that have been exited from the program. There are 146 students in the Special Education program. The school day runs from 8:15 a.m. until 2:45 p.m. Students attend core classes (English Language Arts,Show MoreRelatedGrade 12 National Assessment Of Educational Progress6761 Words   |  28 Pagesthe use of the grade 12 National Assessment of Educational Progress (NAEP, 2014). A combination of factors were considered for academic readiness and preparedness for entry-level college coursework, such as core subject or content knowledge, cognitive strategies (problem solving, reasoning, planning, etc.), learning, and transitioning skills. The results of a series of studies conducted since 2008 indicate that students scoring at or above 163 on the NAEP mathematics scale, and students scoring atRead MoreThe Theories Of Maslow s Theory5216 Words   |  21 Pages It is difficult to perceive that a subject as abstract as that of creativity or imagination is tangible to modern science. Technology and psychophysiological research into the cognitive functions of the brain have advanced th e field of neuroscience to a realm that not just merely anatomically maps the brain with its different lobes, and dendrites, and neural pathways, but also has found the deeper â€Å"mind.† A thought, an idea, a memory, or an answer were previously intangible concepts. However, theRead MoreHow Content Area Teachers Plan And Design Instruction3294 Words   |  14 Pagesinstruction so that students will actively engage in literacy- and subject-related activities? Content area teachers can implement strategies and scaffold learning when planning and designing instruction so that students will actively engage in literacy. According to Dobbs, content area reading instruction includes: the information present in the text, and the instructional plan teachers use to help students understand the content (2003, p.3). Vacca, Vacca, Mraz explain that in order to plan instructionRead MoreConstructivist Theory8093 Words   |  33 PagesConstructivist theory Formalization of the theory of constructivism is generally attributed to Jean Piaget, who articulated mechanisms by which knowledge is internalized by learners. He suggested that through processes of accommodation and assimilation, individuals construct new knowledge from their experiences. When individuals assimilate, they incorporate the new experience into an already existing framework without changing that framework. This may occur when individuals experiences are alignedRead MoreM Odule on Crafting the Curriculum5135 Words   |  21 PagesCurriculum Models, Types and Design Curriculum Design Models Curriculum design is a process of thinking through how you want to organize what you want your students to learn. Whereas, lesson plans are what the teacher plans to do for the day and unit plans are what the teacher wants to do over the several lessons or weeks. Curriculum plans should be what the teacher wants students to learn over years. Thus, a curriculum design is forming set of lessons that will obtain the objectives for the studentRead More2.0 Learning And Assessment ( Final )8082 Words   |  33 Pagesknow how students learn in order to ensure that assessment used to assess them is appropriately matched for the underpinning of how learning takes place (Black and Wiliam, 1998; Broadfoot, et al., 1991; Brown, S., 2004-05; Pryor and Crossouard, 2008; Ecclestone, 2005). Garfield, (1994) aligns herself to this notion of assessment. She argues that if the collected information by assessment is consistent with learning objectives and is used appropriately to inform instruction, it can enhance students‘Read MoreSupporting the Development of English Literacy in English Language Learners22851 Words   |  92 PagesSUPPORTING THE DEVELOPMENT OF ENGLISH LITERACY IN ENGLISH LANGUAGE LEARNERS Key Issues and Promising Practices Diane August August Associates Report No. 61 February 2003 This report was published by the Center for Research on the Education of Students Placed At Risk (CRESPAR), a national research and development center supported by a grant (No. R-117-D40005) from the Office of Educational Research and Improvement (OERI), U.S. Department of Education. The content or opinions expressedRead MoreWhat Are Icts and What Types of Icts Are Commonly Used in Education?6247 Words   |  25 PagesWhat are ICTs and what types of ICTs are commonly used in education? ICTs stand for information and communication technologies and are defined, for the purposes of this primer, as a â€Å"diverse set of technological tools and resources used to communicate, and to create, disseminate, store, and manage information.† These technologies include computers, the Internet, broadcasting technologies (radio and television), and telephony. In recent years there has been a groundswell of interest in how computersRead MoreThe Core Features Of Teacher Professional Development7561 Words   |  31 Pagesprofessional development. Second, it presents main stages and primary models of teacher professional development. Third, it presents the role of principal leadership in a teacher’s professional growth. Fourth, it presents a review of some cases of successful and unsuccessful teacher professional development programs of American public schools, and some reasons for failure of professional development programs. Finally, it presents the basic concepts and principles of National Staff Development Council’sRead MoreEducational Needs Of Children With Disabilities3035 Words   |  13 Pages Children with disabilities today, routinely attend the same public schools as children without disabilities. But this wasn t always the case. Prior to the 1970s special education was in a dark state. Parents of children wit h cognitive or emotional disabilities, deafness, blindness or the need for speech therapy, among others had very few options other than to be educated at home, institutionalized, or receive no education. By the1970s after many court cases legislation restructured and transformed

Monday, December 16, 2019

Organisational Culture Free Essays

The Intel Corporation produces microprocessors that are used in computers. It has a market share of over 75% and has been praised for its highly innovative culture. Do you think that an innovative culture can be relied on to guarantee the future success of a business? Justify your answer with reference to Intel and/or other organisations you know. We will write a custom essay sample on Organisational Culture or any similar topic only for you Order Now (40 marks) An organisation’s culture refers to ‘the way we do things around here’ and is determined by the values, attitudes and beliefs of the people who work within it. As such, culture will undoubtedly influence the success of a business. In particular, it can be argued that an innovative culture can lead to business success because it enables companies to share ideas more freely and thus innovate and develop their business strategy. Furthermore, in light of Handy’s view of â€Å"discontinuous change† being ever more present in the business world, an innovative culture is likely to enable business to be flexible enough to cope with challenges that the future holds. However, it is important to bear in mind that when a business possesses over 75% market share that it benefits from economies of scale which can be an important determinant of success, regardless of culture. Perhaps more importantly, not every success international business possesses an innovative culture. A successful business strategy can be underpinned by other business cultures and thus the type of industry a business is in, and the different challenges it faces may determine what is the most suitable culture for them. Innovative cultures are essential in companies who are involved in technological markets, where developing new products and ideas can be key to success. The Intel corporation operate a very innovative culture which has lead to huge dominance of the market, capturing 75% market share after the production of microprocessors used in computers. Another example where innovation has lead to success is at Google, where CEO Eric Schmidt commits to innovation, making sure all employees are comfortable sharing ideas and opinions. The relaxed feel around the company allows employees to be creative, which has allowed Google to be one step ahead of competitors, which is especially important working in a technological industry. BMW use a similar culture where everyone is expected to help find solutions. They have a network of committed associates with few hierarchical barriers, allowing every employee to voice their opinion. This culture has allowed BMW to promote new products and get the product just right through thousands of brainstorming sessions. These examples show how innovation can lead to success in technological industries. Innovative culture can be relied on to guarantee the future success of a business, as the external environment is constantly changing. This can be linked to Charles Handy’s theory of ‘discontinuous change’ which means that in the future change is constant, and therefore an innovative culture would most likely guarantee a business success. Being highly innovative would mean that managers would have to be flexible and react to the constantly changing external environment, therefore adopting an innovative culture would mean businesses would have to come up with ideas and strategies for the future in order for the business to remain competitive and successful. Innovative culture should equip firms with the ability to cope better with change. For example Intel’s strategy of diversification where they use tactics such as job swapping and controlled employee role changes to increase the efficiency of their teams. This is useful as the workforce is flexible to the externally changing environment, and can guarantee future success of a business as they would be able to react to any change within the business. Hence I think that an innovative culture can determine the future success of the business, especially in a technological industry as the external environment is constantly changing meaning a firm has to be flexible and prepared to react and respond if it wishes to remain competitive and profitable. If a business did not react to changes and maintained there current strategies and plans then this could have negative effects on the business such as a declining market share due to competitors coming up with new innovative ideas and hence a lower profit. One way in which we can see that an innovative culture cannot be relied on to guarantee the success of a firm is that there are other organisations that have a different cultural approach that have been very successful. I believe that the culture within Tesco has significantly helped it to become one of the most successful retailers in Britain. Tesco use a person and role culture which I believe have helped to contribute to the success of the firm, there are ‘six levels between the till operator and the CEO’ in Tesco and I would think that this would have helped lead to the success of the firm as employees would feel like an important asset of the firm and are therefore motivated to work harder for the benefit of the business. Also it is evident in Cadburys, the biggest confectionary retailer in England who take a role and task approach to their culture that an innovative culture is not needed to guarantee the success of a firm. I believe that the putting an emphasis on results and giving staff specific roles within the business has led to the success of Cadburys as there is a specific focus on achieving targets and working as a team which I believe can highly motivate employees. So it is evident in a range of businesses that an innovative culture is not the key to success in business, various different cultural approaches such as task and role can have a significant contribution towards the success of an organisation. However, it can be argued that the size of Intel’s organisation provides it with its main competitive edge. Intel has a market share of 75% bringing with it certain benefits that are arguably more influential to its success than its innovative culture. A firm of this size is likely to benefit from economies of scale, propagating lower unit costs that can lead to higher profit margins. Higher profit margins enable greater re-investment into the firm, allowing Intel to continuously expand. Therefore, it seems apparent that even without its innovative culture, the sheer size of the firm would enable it to compete successfully. However, one cannot say that a large firm is guaranteed future success as demonstrated by the IBM monopoly that quickly lost majority market share to Microsoft and today only operate within a business-to-business niche market. Although business â€Å"success† is essentially easy to measure through examining market share, revenue, profit and other such measures, the factors that lead to such success are less easy to see. Factors such as a strong business strategy, good leadership, a favourable competitive environment and culture all contribute to a business’s success but being able to separate out which factor contributes more to success is near impossible. Furthermore, being ble to measure how effective an innovative culture versus a role or person culture is very difficult. Ultimately, the ‘best’ culture will vary according to industry and the nature of the business structure itself. Some industries such as the technology industry has developed its products at an exponential rate, inconceivable just 20 years ago. The nature of such a fast moving industry relies on quick and consistent innovation which is no doubt dependent on an innovative, networked culture like the type we see at Google and BMW. Other industries such as retailing and supermarkets, however do not face such radical and constant need to develop their product offering, and factors such as good quality service and product quality may be more important. As a result, a role and person based culture are more likely to lead to success. However, in light of Handy’s â€Å"discontinuous change†theory, all businesses, regardless of industry will face an ever changing external environment and so although an innovate culture may not be the most suitable per se, having an element of innovation and flexibility is key to any business intending to succeed in the future. How to cite Organisational Culture, Essay examples

Sunday, December 8, 2019

National Study Of Experiences Of Education â€Myassignmenthelp.Com

Question: Discuss About The National Study Of Experiences Of Education? Answer: Introducation Governance in health care involves the formation of several measures to improve the quality of health care services. It focuses on developing trustworthy relationship with the management.Governance and management in health care systems involves the dedicated approach of the nurses and the clinicians in delivering quality care to all their patients (Gauld, 2014).This assignment demonstrates the framework, key principles and the strength and the weaknesses of governance and management in providing health care service. Framework Governance in health care systems play a significant role in the development of appropriate rules for policies and programs in order to improve the functioning and the provision of health care services in order to achieve the aims and objectives in the health care sector. Hence, it is quite challenging for the government authorities to provide proper access to all the individuals. There are several processes that can be operated in order to provide quality outcome. There are times when properly designed systems do not work efficiently according to the expectations (Hastings et al., 2014).The framework plays an important role in the assessment of the policies in the health care and the performance of evaluation of the efficacy of health care systems. Key principles Healthcare access is a basic right of all the individuals and there should be no discrimination in providing healthcare services to all the individuals. The principles of governance in healthcare services involves proper decision making skills along with the characteristics of accountability, safety and professional maturity in providing equality health care services to all the patients.It also focusses on shaping engagement of residents around several issues.It also focusses in the formation of policies by the governemntal organizations. Strength and weakness The strengths of governance in the health care services are transparency in the formatiion and development of policies.There has been a proper provision and arrangement in provididng appropriate and efficient services.There has been a proper response in meeting the needs and the requirements of the health needs of the general public.Good health governance focusses on the empowerment of health of the citizens and the formation of effective health programs. The formation of governance policy involves developing partnerships between the corporate and the clinical sectors. It also focuses on the identification and providing support to the management team and developing proper decision making skills (Maier, 2015).It also works effectively in reducing corruption in the health industry. The weaknesses of the governance in healthcare system are thet the civil society is not able to socialize and guide the residents to play an important role in governance.Proper training is required for the nurses and other health care professionals in improving the quality of healthcare services. There are times when the hospital staff is not willing to take up the role of management when required; they just only focus on the roles and responsibilities assigned to them. But, there is a need to organize several improvement sessions to make sure that leadership and clinical governance should be the responsibility of all the staff in the healthcare department. (Smith, Latter Blenkinsopp, 2014) References Gauld, R. (2014). Clinical governance business development: learning from the New Zealand experience.Postgraduate medical journal,90(1059), 43-47. Hastings, S. E., Armitage, G. D., Mallinson, S., Jackson, K., Suter, E. (2014). Exploring the relationship between governance mechanisms in healthcare and health workforce outcomes: a systematic review.BMC health services research,14(1), 479. Maier, C. B. (2015). The role of governance in implementing task-shifting from psychology to nurses in advanced roles in Europe, US, Canada, New Zealand and Australia.Health policy,119(12), 1627-1635.Tenbensel, T., Burau, V. (2017). Contrasting approaches to primary care performance governance in Denmark and New Zealand.Health Policy. Smith, A., Latter, S., Blenkinsopp, A. (2014). Safety and quality of nurse independent prescribing: a national study of experiences of education, continuing professional development clinical governance.Journal of advanced nursing,70(11), 2506-2517.

Sunday, December 1, 2019

Why do you think people get a tattoo an Example of the Topic Personal Essays by

Why do you think people get a tattoo Getting a tattoo is a form of rebellion made by the individual or a statement made to show others that the individual is a part of a society that will not accept the norm. The tattoo as an art form has developed over the years. In the past it was a way youth and other individuals made a statement to society, showing them that they were not ordinary. The tattoo became a representation of their rebellion and the tattoo they chose to have engraved on their body was the symbol of their beliefs. In the past bikers, sailors and prisoners, people who lived against the norms of society got tattoos. Today, we see tattoos as a more prevalent part of society. Need essay sample on "Why do you think people get a tattoo" topic? We will write a custom essay sample specifically for you Proceed People Often Tell EssayLab writers:I'm not in the mood to write my paper online. I don't have the timeEssay writer professionals recommend:Ask Us To Write My Paper And Get Professional HelpBest Student Essay Writing Company Cheap Writing Service Reviews Grab My Essay Review Professional Academic Writing Services Celebrities are getting tattoos and flaunting them. People from diverse parts of society are getting tattoos. So has the symbolism of the tattoo changed? Not quite. While in the past society was more constrained and less open in its outlook today all that has changed. The diversity of society ensures that the biases of the past are slowly eradicated and prejudices no longer exist to the same extent. Yet, the tattoo still retains its exotic reputation. While in the past only the people who rebelled against society openly got tattoos, today the tattoo has become a form of making a statement for those leading an otherwise ordinary life. A school teacher may go out and get a tattoo. Its his or her way of showing their individualism in an otherwise ordinary life. The tattoo is a cultural phenomenon. In the European society the tattoo represented a group, a family or a people of a certain class. In African society it represented different tribes and in Asian society it represented coming of age. For them the tattoo was a norm, but for the Western society we see the tattoo as a social symbol. As society is seen to change the tattoo retains its exotic value. The value of the tattoo as a form of rebellion may have become less but it nonetheless retains its appeal of going against the norm. The very idea of having something engraved on the body is perhaps the most tantalizing. It is something so permanent that it is a statement against society and nature. This is what ordinary people aim for, getting a small part of the extraordinary, in this case the tattoo and making themselves something unforgettable in the mainstream of their ordinary lives. References: Atkinson, Michael. Tattooed : The Sociogenesis of a Body Art. Toronto ; Buffalo: University of Toronto Press, 2003.

Tuesday, November 26, 2019

Biography of Lyndon B. Johnson, 36th U.S. President

Biography of Lyndon B. Johnson, 36th U.S. President Lyndon Baines Johnson (Aug. 27, 1908–Jan. 22, 1973) was a fourth-generation Texas rancher, who became the 36th President of the United States on the death of his predecessor John F. Kennedy. He inherited a painfully divided country and is known both for his failures in Vietnam and his successes with civil rights. Fast Facts: Lyndon B. Johnson Known For: 36th President of the United StatesBorn:  August 27, 1908, Stonewall, Texas.  Parents: Rebekah Baines (1881–1958) and Samuel Ealy Johnson, Jr. (1877–1937).Died: January 22, 1973, Stonewall, Texas.Education: Southwest Texas State Teachers College (BS, 1930), studied law at Georgetown University from 1934–35.Spouse: Claudia Alta Lady Bird Taylor (1912–2007).Children: Lynda Bird Johnson (b. 1944), Luci Baines Johnson (b. 1947). Early Life Lyndon Johnson was born on Aug. 27, 1908, on his fathers ranch in rural southwestern Texas, the first of four children born to Samuel Ealy Johnson, Jr. and Rebekah Baines. His father was a politician, farmer, and broker, and  Rebekah was a journalist who graduated from Baylor University in 1907- a very rare circumstance. When Lyndon was born, his politician father was concluding his second term on the Texas legislature: His parents would go on to have four more children, three girls, and a boy. Johnson was a fourth-generation Texan: at the age of forty, Johnsons great-grandfather Robert Holmes Bunton came to what was then the Republic of Texas in 1838 to be a cattleman.   Lyndon worked throughout his youth to earn money for the family. His mother taught him to read at an early age. He went to local public schools, graduating from high school in 1924. He spent three years traveling around and working at odd jobs before going to the Southwest Texas State Teachers College in San Marcos. Introduction to Politics While Johnson was in college, he worked as a gofer for the president of Southwest Texas State, and he was the summer editor of the student paper. He used his credentials to attend his first Democratic convention in 1928,in Houston, with his then-current girlfriend, who ended the relationship shortly afterward.   Johnson dropped out of school to take a teaching job in a Mexican school in the Cotulla School District, where he was determined to build a sense of hope in the beaten-down children. He developed extracurricular activities, arranged a parent-teacher group, held spelling bees and organized a band, a debate club and baseball and softball games. After a year he left and returned to San Marcos and finished his degree in August of 1930.   During the depression, his family was hit hard. Johnson was a volunteer for Welly Hopkins, who was running for the state senate, and he obtained a job teaching public speaking and business arithmetic in Houston. But a position as what would today be called a staff director for a newly elected Texas congressman Richard Kleberg opened up, and Johnson was tapped to fill it. He arrived in Washington DC on Dec. 7, 1931, which is where he made his home for most of the next 37 years. Marriage and Family As Klebergs secretary, Johnson made several trips to and from Texas, and it was on one of those trips that he met Claudia Alta Taylor (1912–2007), known as Lady Bird, the daughter of a well-to-do Texas rancher, and holding degrees in journalism and history from Baylor University. They married on Nov. 17, 1934. Together they had two daughters:  Lynda Bird Johnson (born 1944) and Luci Baines Johnson (b. 1947). Political Career and Presidency While in Washington, Johnson lobbied hard for more power, making a few enemies and not finding much success. He was offered a partnership in an Austin Law firm if he obtained a law degree, and so he enrolled in evening classes at Georgetown University. But it didnt suit him and after a year he dropped out.   When he was named the Director of National Youth Administration in Texas (1935–37), he left Klebergs office. Building on that, Johnson was elected as a U.S. Representative where he served from 1937–49. While a congressman, he joined the navy to fight in World War II. He was awarded the Silver Star. In 1949, Johnson was elected to the U.S. Senate, becoming the Democratic Majority Leader in 1955. He served until 1961 when he became Vice-President under John F. Kennedy. On November 22, 1963, John F. Kennedy was assassinated and Johnson took over as president. The next year he was nominated to run for the Democratic Party for the presidency with Hubert Humphrey as his vice-president. He was opposed by Barry Goldwater. Johnson refused to debate Goldwater. and easily won with 61 percent of the popular vote and 486 of the electoral votes. Events and Accomplishments Johnson created the Great Society programs, which included antipoverty programs, civil rights legislation, the creation of Medicare and Medicaid, the passage of some environmental protection acts, and the creation of laws to help protect consumers. Three important pieces of  Civil Rights  legislation signed into law by Johnson were as follows: 1. The  Civil Rights Act of 1964, which did not allow  discrimination in employment  or in the use of public facilities. 2. The Voting Rights Act of 1965, which outlawed discriminatory practices that kept blacks from voting. 3. The  Civil Rights Act of 1968, which outlawed discrimination for housing. Also during Johnsons administration,  Martin Luther King, Jr. was assassinated in 1968. For her part, Lady Bird was a huge proponent of the beautification program to try and improve the way America looked. She was also quite a savvy businesswoman.  She was awarded the Medal of Freedom by President Gerald Ford and the  Congressional Gold Medal by President Ronald Reagan. The  Vietnam War  escalated during Johnsons administration. Troop levels which started with 3,500 in 1965 reached 550,000 by 1968. America was divided in support of the war. America, in the end, did not have a chance of winning. In 1968, Johnson announced he would not run for reelection in order to spend time to get peace in Vietnam. However, peace would not be achieved until  President Nixons  administration. Death and Legacy Johnson retired on January 20, 1969, to his ranch in Texas. He did not return to politics. He died on January 22, 1973, of a heart attack. Johnsons legacy includes his costly error in escalating the war in Vietnam in a vain attempt to win it and the fact that he eventually had to turn to peace when the U.S. was unable to achieve victory. He is also remembered for his Great Society policies where Medicare, Medicaid, the Civil Rights Act of 1964 and 1968 and the Voting Rights Act of 1965 were passed among other programs. Sources Caro, Robert A. The Passage of Power: The Years of Lyndon Johnson. New York: Random House, 2012.  Ã‚  -. The Path to Power: The Years of Lyndon Johnson. New York: Random House, 1990.Goodwin, Doris Kearns. Lyndon Johnson and the America Dream. New York: Open Road Media, 2015Peters, Charles. Lyndon B. Johnson: The American Presidents Series: The 36th President, 1963–1969. New York: Henry Holt, 2010.

Friday, November 22, 2019

Feminist Consciousness-Raising Groups

Feminist Consciousness-Raising Groups Feminist consciousness-raising groups, or CR groups, began in the 1960s in New York and Chicago and quickly spread across the United States. Feminist leaders called consciousness-raising the backbone of the movement and a chief organizing tool. The Genesis of Consciousness-Raising in New York The idea to start a consciousness-raising group occurred early in the existence of the feminist organization New York Radical Women. As NYRW members tried to determine what their next action should be, Anne Forer asked the other women to give her examples from their lives of how they had been oppressed, because she needed to raise her consciousness. She recalled that labor movements of the Old Left, which fought for workers rights, had spoken of raising the consciousness of workers who did not know they were oppressed. Fellow NYRW member Kathie Sarachild picked up on Anne Forers phrase. While Sarachild said that she had extensively considered how women were oppressed, she realized that the personal experience of an individual woman could be instructive for many women. What Happened in a CR Group? NYRW began consciousness-raising by selecting a topic related to womens experience, such as husbands, dating, economic dependence, having children, abortion, or a variety of other issues. The members of the CR group went around the room, each speaking about the chosen topic. Ideally, according to feminist leaders, women met in small groups, usually consisting of a dozen women of fewer. They took turns speaking about the topic, and every woman was allowed to speak, so no one dominated the discussion. Then the group discussed what had been learned. Effects of Consciousness-Raising Carol Hanisch said that consciousness-raising worked because it destroyed the isolation that men used to maintain their authority and supremacy. She later explained in her famous essay The Personal is Political that consciousness-raising groups were not a psychological therapy group but rather a valid form of political action. In addition to creating a sense of sisterhood, CR groups allowed women to verbalize feelings they may have dismissed as unimportant. Because discrimination was so pervasive, it was difficult to pinpoint. Women may not have even noticed the ways a patriarchal, male-dominated society oppressed them. What an individual woman previously felt was her own inadequacy could have actually resulted from societys ingrained tradition of male authority oppressing women. Kathie Sarachild remarked on the resistance to consciousness-raising groups as they spread across the Womens Liberation movement. She noted that the pioneering feminists had initially thought to use consciousness-raising as a way to figure out what their next action would be. They had not anticipated that the group discussions themselves would end up being seen as a radical action to be feared and criticized.

Thursday, November 21, 2019

PepsiCo's Capital Structure Choices Essay Example | Topics and Well Written Essays - 3500 words

PepsiCo's Capital Structure Choices - Essay Example o is used in the analysis of the financial statements and this helps analyze the protection that the company has available to the creditors (Samuels, Wilkes, & Brayshaw, 1995). A high ratio generally expresses that the business has a high level of risk and this is mainly because the company requires meeting the principal and interest on its own obligation, without any external financing as the creditors are unwilling to finance the company due to the high debt position. A lower ratio shows that the company is more financially stable and is in a better financial position to avail debt in the future. The net debt ratio is a useful tool to bring out the current performance of the company and also helps the investors gain a clear idea of the financial standing of the company. Either too high net debt ratio or too low are both not acceptable. Here a ratio above 1.0 should be avoided as this clearly indicates that the investors have a greater stake in the business (Bull, 2007). However, a ratio that is too low simply implies that the business is too conservative and not realizing its potential. The net debt ratio of the firm is found using: The total debt of a company simply implies the overall combined value of the current liabilities, long term liabilities and the capital liabilities (Chapman, Hopwood, & Shields, 2007). Although in most theories the book value of the debt is considered, in reality, the market value is normally taken into account. The market value of debt is generally more difficult to obtain since most firms do not keep their debts in the form of outstanding trading in the markets. In most cases companies tend to keep the debts in the form of book value (Clayman, Fridson, & Troughton, 2008). It is important to also understand here that use of book value can give mis-leading values as the actual values might be significantly different. Using a book value can have three main mismeasurements. Firstly, it can have an impact on the cross sectional

Tuesday, November 19, 2019

The Meaning of Health and Illness in the Mexican Culture Essay

The Meaning of Health and Illness in the Mexican Culture - Essay Example Without a doubt, health can be deeply understood in terms of a combination of biological, cultural and social factors slightly than with the sole purpose in biological terms. As it was stated above that the complete health image can be understood more deep by diverse of factors. No one can deny that the social influence on health is significant, where the better health and higher quality of life of community members depend on the level of their participation in the social networks, assistance to each other and overall change of the society to become more healthy and prosperous. Such social networks usually include the family, friends, neighbors, church, work, sport clubs and other social groups where people can exchange information, experience and advices. For Mexican people, health is seen as holistic issue or a unity between mind, spirit and body. In the West, the doctor hopes to "cure" a problem after people are unbearably sick, when they are in pain or feel physically disruptive symptoms. A traditional Mexican practitioner, by contrast, seeks to prevent disease by keeping all systems balanced and finely tuned throughout the patient's life span. Consultation with the practitioner of acupuncture is ideally an ongoing part of every patient's life. Although the idea of preventive medicine (for instance, prenatal care) is prominent in current discussions about revamping our medical care system, there is really no comparison to the prevention that is accomplished through acupuncture and herbs. illness also comes from a gradual blocking and deficiency of body energy. Mexican people see the body threatened by lifestyle factors such as overeating or overworking. We also look for disharmonies of the internal nature in intensely prolonged emo tional states such as grief or depression (LaVeist, 2005). Mexican culture and gender have their own influences on health care since the person's socioeconomic status, ethnicity, gender and other factors directly affect his/her perception of the disease, necessity or financial ability to seek appropriate treatment. It is obvious that those people who live in poverty or from low socioeconomic status receive less medical help than those with stable income and medical coverage. In multi-ethnical communities the doctors can influence the patients by learning and understanding the beliefs, attitudes and experiences of patients from different ethnical groups and nationalities. The influence of gender on health care can be observed while analyzing the female and male patients, their attitudes and behaviors, where men are usually direct and logical decision makers and women are less independent and more influenced by others (Chabram-Derners, Torre 2008). While some symptoms are obvious both for the person him/herself and others around (nervousness, physical dependence on alcohol or drugs, etc), other symptoms are rather difficult to recognize. Usually, people use schemas as the organized ways to look at things and people that influence person's expectations, behavior, etc. Certainly, to seek medical treatment is the responsibility of each drug-dependent person or those who surround him based on the perception of the severity of the addiction symptoms. Though, there are some factors that might positively influence treatment seeking, including belief systems, certain life activities, gender, SES and ethnicity. While the good patient role presumes that the person behaves well and properly by following the prescribed treatment and medical services, the role of bad

Saturday, November 16, 2019

Harris on End Times Essay Example for Free

Harris on End Times Essay : Hey, John. What are in you today? You don’t look as upbeat as usual. Is there anything that I can do to help you? John: I don’t know, but perhaps you can. You see, I am taking Eschatology 1. My professor is weird. On top of that, he is a lousy lecturer. I can’t understand what he’s saying. And I can’t even understand my notes! I have to study it and read the book of Revelation in order to pass his test. Steven: Let me see. Hmmm. You’re not a good note taker; it’s very obvious. But I guest your professor isn’t an organized lecturer. Well, you can always read my book and†¦ John: But the exam is four hours away! Steven: Oh my goodness. You are definitely in trouble. Listen, I will lecture you briefly on the main points that you will need to pass this test. Listen carefully, and I hope you’ll get an A. John: Ok Steven: From Chapter 15 of my book, I said the Revelation can be outlined as follows: 1. Prologue: the authors self-identification and au ¬thority (1:1-20) 2. Jesus letters to the seven churches of Asia Minor (2:1-3:22) 3. Visions from heaven: breaking seven seals on a scroll; seven trumpets (4:1-11:19) 4. Signs in heaven: visions of the woman, the dragon, the beast, the Lamb, and the seven plagues (12:1-16:21) 5. Visions of the great whore and the fall of Babylon (Rome) (17:1-18:24) 6. Visions of the eschaton: the warrior Messiah, the imprisonment of the beast and Satan, judgment of the dead, and the final defeat of evil (19:1-20:15) 7. Visions of the new heaven and a new earth; descent of the heavenly Jerusalem to earth (21:1-22:5) 8. Epilogue: authenticity of the authors prophetic visions and the nearness of their fulfilment (22:6-21). In addition, many of John’s imagery and style came from Old Testament Apocalyptic Literature, and†¦ John: Wait, you mean principles of interpretation in Daniel and others such as â€Å"one apocalyptic day = one literal year† also holds in Revelation? Steven: That’s right! John: So everything I’ve learned in the previous term about Hebrew Prophecy can also be used here? Precisely the reason why I had to take Hermeneutics 2 and Hebrew Prophecy before I study Revelation? Steven: You betcha†¦ John: So first, let me recap. Let’s take a look at the terms the Lamb, the dragon, the heav ¬enly woman, the whore, and the marriage of the Lamb and the heavenly city. They are not literal being but symbols of another referent, right? Steven: Yes, and to take you to the shortcut, the historical belief is the Lamb is Jesus Christ, the dragon is a figure of Satan, the whore is his church the Roman Catholic Church, the marriage of the Lamb symbolizes the union of the Christian Church of the aggregate of the true believers after the Rapture, and the heavenly city is a picture of our destiny with Jesus Christ. Though I find it personally hard to accept that it is literally as described, but I do not really show that in the book because I do not want to offend my Christian brother.

Thursday, November 14, 2019

Southwest :: essays research papers

Changes in cost and efficiency   Ã‚  Ã‚  Ã‚  Ã‚  The situation today in the airline industry is basically a price/cost war. Companies are battling to cut and keep their operating cost low in order to remain competitive in an industry that is strongly driven by price. The principal cost factors that drive the industry are labor and fuel. In terms of labor Neeleman, Jetblue’s CEO, said that â€Å"The biggest problem in the industry isn’t pay, its work rules†. Labor cost accounts for the 38% of the overall operating cost of an airline company. Depending on the system that a company uses, its labor cost and labor necessity will vary. The point-to-point systems requires less personnel and the aircraft is less time on the ground, and more in the air, being able to flight more times that those aircrafts flying under the hub-and-spoke system. The first system is widely used by the new low-cost carriers, while the hub-and-spoke is very typical of the traditional airlines (Appendix 1). Moreover, labor cost is rising, which increases the overall cost per seat (Wright, September 8, 2003). In terms of labor efficiency, low-cost carriers are reducing labor or either by e-ticketing or by doing what Southwest states on their contracts, any qualified employee can perform any function (load, unload, cleaning, etc) as needed (Thompson.2005).   Ã‚  Ã‚  Ã‚  Ã‚  The second, most important factor that determines the cost structure in the industry is fuel cost. It is said that for one-dollar increase in the price of a fuel barrel, is costs the industry a billion a year (Tang, C. April 11, 2005). Moreover, in the future, the price of fuel is expected to continue increasing, what will tighten even more profit margins.   Ã‚  Ã‚  Ã‚  Ã‚  What other companies have done to lower their cost is to eliminate meals. Instead, in short flights, snacks are served to the passengers, and in long-distance ones, costumers are allowed to bring food with them or buy it on board.

Monday, November 11, 2019

Dulce Et Decorum Est Essay

The poem â€Å"Dulce et Decorum est’ was the work of Wilfred owen’s and in this essay I will be writing how the mood and atmosphere is made and what it is like. I will write about the horrific and sading mood of World War One. ‘Dulce et Decorum Est; is about the soldier’s expedience in the WW1 trenches in France. He writes about how the men are walking and coughing, he talk about how they look and talk, he then gose in to talk about the old lie dulce et decorum est pro patris mori. In the first stanza of the poem he talks about how horrifying the way the soldiers are walking. â€Å"bent double, like old beggars under sacks, knock-kneed, coughing like hags† he gives them impression that the young men are like old men with a bad back and knock kneed, they are like horrible old hags coughing and hacking to clear their throats of smoke and dirt. The startling description of the solders shows them to be in poor healthy creating a black and sad mood. In the second stanza he talks about how the solders are looking like and what is going on behind them. He shows you what they look likes by saying. â€Å"Men marched asleep, many had lost their boots, but limped on, blood-shot†. This make you think the solders are so tired from the war and the horrible fighting, that they look like the=y are all asleep with one shoe on and one off. That the war bad they are so tired, to tired to walk. Later in the stanza he goes on to say. â€Å"All went lame; all blind; drunk with fatigue; deaf even to the hoots of tired, outstripped five-nines that dropped behind.† In this part of the poem he make it sound like they are all blind and all can’t walk, it make the atmosphere that they are all in a terrible condition and are extremely exhausted. In the third stanza is where the writer try to set the atmosphere to be horrifying and sadding, he use lots of words choses and other language techniques to set the mood and atmosphere, a good example is. â€Å"Gas! Gas! Quick, Boys!† with the short sentences is gives you the atmosphere of fear that the gas is coming and they have to be quick or they will die. In the last two stanzas the writer set the atmosphere by taking about after the gas attack. â€Å"If you could hear , at every jolt, the blood come gargling from the forth-corrupted lungs.† It make you think of what the gas can do to you and makes the mood a sading and terrifying, it make you think of the blood is coming from his lungs whenever the van jolts. It make an unsettling mood. Later in the last stanza he says. â€Å"The old lie; Dulce et decorum est pro patria mori† This means it is sweet and fitting to die for you country. This last sentences in the poem makes you see how horrifying, terrifying and sading the war really is, not the sweet or fitting but cruel and terrible. This set the atmosphere for the poem to be terrifying and horrible Overall, I think that the writer has made a particular atmosphere and mood thought out this poem and kept the mood thought out it. he effected use of poetic techniques to creat this atmosphere and to get this important message across.

Saturday, November 9, 2019

Essay on Renting Hearts Essay

Science fiction is a genre, whose stories take place in an imaginary environment where science, and in particular the technological development has undergone more or less significant changes with effect on both society and individuals. Science fiction is based on more or less imaginative themes of science results and ways of looking. The topics are often about high tech future societies, space travels, time travels, creatures, end of world, different universes etc. [1] The short story takes place in the future where the technology has taken over, and where people can buy their happiness for money, and that human now just can go to a rental shop and get a new heart in order to avoid pain When you fall in love, often you will get or end up with a broken heart. It happens for almost every one, who gets in relations with other people. But in this short story, you can get out and rent a new heart, and meet other relations without having any fear of getting hurt. The short story is about a person that has been in love with a lot of people, and then tries to not getting hurt. When he/she is getting hurt by the relations she/he goes through, he/she keeps going to the â€Å"rental place†, every time he/she falls in love, so instead of dealing with some of the pain and letting it get worse, he/she just visit the rental place and rent a new heart. There is no information or any descriptions about the main characters sex, but I would say that it is a teenage boy because he does not appear to be dramatically, and does not describe the actions detailed, as a girl would do generally. The main character is a teenager, since a typical teenager would say â€Å"And our love was going to last forever, which at our age meant six months. † It starts with his first love with Jacob, where he was very much in love with him, and they were happy for each other. â€Å"†¦ first heart. Jacob was as solid and golden as a tilled field, and our love was going to last forever, which at our age meant six months. Every time Jacob touched me, I felt my heart thud wetly against my lungs. But in the last, Jacob left him which broke his heart. . A year later he meets Anna, who is a girl. She tells him to go and rent a heart so he may be able to fall in love, because he is afraid to fall in love, since his heart has been broken before. Renting hearts made him not to feel any pain again, because of this opportunity to rent a heart. Teenagers are often confused, and a lot of things don’t make sense, especially love and relations. They fall in love quickly, and as they fall in love, they can easily fall off again. Throughout the short story, he meets both men and women, which says that he is bisexual. It may also be quite normal in this society, in the future, where you in fact can simply buy a new heart, where it is possible to try anything without noticing any consequences, otherwise it may be because he is confused about his own sex and therefore he is trying to figure out his relations to both men and women. The main character seems to have it difficult to find a balance in his life, because he cannot live without being with a regular partner, or without having someone who loves him. He cannot even manage to break up with a partner, and naturally calm down, and it is pretty hard for him, where he will feel sorrow for a long time, which he cannot stand, and therefor has to switch his mechanic heart, to get in better conditions and save himself from the pain. Another problem with the main character is that he cannot incorporate his feelings, especially with regards to be an open person towards his relations properly. He fall in love, without looking for his partners criteria, and even don’t find out if the partner matches his expectations, but will instead end up in relation without any feelings and without any fear of falling in love and get hurt. I don’t think that he lives under a safe environment with values such as family, friends or work, or a stable structure. That is what I assume. He is actually locking himself out of the truth, and he knows that his actions are wrong, so he make himself renting hearts as a facade but is still feeling bad about his life because everyone who rent a heart will realize that pain isn’t just in the heart, but also in the mind, and it cannot be obviated.

Thursday, November 7, 2019

Employee Health and Safety at Goliath Gold Mine

Employee Health and Safety at Goliath Gold Mine Introduction Mining is an income generating activity that sees many countries scale the heights of power and economic success. Mineral rich countries in the world include West African states, Canada, Australia, and Russia among others. While the list remains endless, some countries continue to discover lead, gold, fluorspar, diamond, and alumina among other minerals (Cam, 2010).Advertising We will write a custom essay sample on Employee Health and Safety at Goliath Gold Mine specifically for you for only $16.05 $11/page Learn More The main company of focus is the Goliath Gold Mine (GGM) listed in South Africa’s JSE 4 years ago (Annual Report: Goliath Gold, 2011). Employees in various mines probably suffer chronic diseases due to exposure to poisonous gases. Others are buried in the weak mines, while several others get salaries that do not match the amount of work they do at the mines. Mining is a risk taking activity, and the international community s eems to be on the spotlight. Some of the questions the submission will attempt to answer include what are the ethical and legal implications for mining? If there are consequences of mining as an income generating activity, are there any codes that protect the workers? Lastly, is mining an activity that takes care of the health of the workers? Most oil or gold rich countries in Africa have British or American mining firms working with Africans as casuals. It means that the real owners of the resources do not have the right technological and intellectual assistance to mining; they have to be subordinates in their own countries in order to earn a living. This notwithstanding the potholes left after the mining activity and the health risks posed to the locals at the same time. Best practices Adherence to OSHA regulations The Occupational Safety Health Administration (OSHA) regulations are categorical about the health standards of employees within the work place. According to the regul ations, people should work in non-hazardous environments, and should get compensations for any injuries while at work (Koradecka, 2009). Alumina and Uranium have some of the worst effects on the miners, and it is important for the workers to put on protective gears. These include eye and nose masks and gloves to prevent any form of irritation caused by contact with various minerals.Advertising Looking for essay on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More OSHA obligates all employers to set a clean and non-hazardous work environment through training, outreach programs, and health education, especially when the work environment is likely to pose danger to the employees. Bureaucratic companies dealing in minerals are likely to ignore such regulations, and the employees keep dying while at work or after few years of exposure to chemicals (Alana, 2012). For instance, at GGM, the precious commodity has to undergo different stages including extraction and washing. There are several chemicals involved, and without protection, the chemicals affect major body organs. Without prompt medical intervention, the case develops in other complex conditions including heart or kidney failure, cancer, or a chronic ailment leading to death (Annual Report: Goliath Gold, 2011). Sometimes the mining company refuses to take responsibility, especially when the firm provided the protective gear, but the victim still got ill. The rationale is that the gases released from the ground have high levels of penetration, and in most cases, the victims die from suffocation. By enforcing the OSHA principles, it will be difficult to come across such cases in the future. Rather, the cases will reduce over time. Inalienable basis human rights Each person has a right to life, and nobody has the right to take it away from him/her irrespective of the circumstance. While many people go to jail because of manslaughter and murder, several mine owners and companies do not face a similar sentence even though their actions amount to murder or manslaughter (Cascio, 1998). Exposing an unskilled worker to several feet below ground level with poor lighting, no oxygen cylinder, and poor protection is like a life sentence while at work. One of the best practices recommended for such situations includes provision of the best work equipment that applies the latest technologies. ISO certification is paramount for each mining company because it helps in identifying firms that apply the commonwealth mining laws (Goliath Gold Annual Report December 2012, 2013).  The first step to providing a safe and clean work environment is to recognize that workers are humans, they have families and friends who depend on them; therefore, their loss would have a great impact on the lives of their dependants. As such, workers need the assurance that they will get free medical cover when they fall ill at work. Besides being an element of motivation, it is a gesture to signify appreciation of life. Secondly, the mines such as gold fields and uranium fields need proper lighting below the surface to prevent tripping or collapse of the wall without the awareness of the team underground.Advertising We will write a custom essay sample on Employee Health and Safety at Goliath Gold Mine specifically for you for only $16.05 $11/page Learn More Latest technologies are equally helpful in reducing workload meaning that they have the ability to conduct surveillance beneath the land surface. Some can also carry out excavation; this would limit the number of people going underground to serve a similar purpose. However, there are concerns that the machinery would replace human labor, and this form of displacement is a cause of conflict among international organizations in the industry and the casual laborers across the world. To respond to the growing need for safety and health, GGM should consider CSR pro grams such as the ones carried out by Harmony Gold mine in Lesotho and parts of South Africa (Zwi, Fonn, Steinberg, 1988). Labor union representation and a functional code of ethics Labor union representation is equally paramount, but the workers have to prepare to part with monthly contributions towards the sustenance of such unions. Labor unions create an opportunity for the employees to address their grievances through the industrial courts, but most Middle East oil manufacturing and aero structures industry do not support the labor unions. For instance, Strata Manufacturing PJSC in Al Ain, Abu Dhabi believes that employees and the supervisors have a code of ethics and a mission statement that strongly supports comradeship. As such, the policies of the company cannot have any loopholes to accommodate any forms of conflict. Such assumptions should not prevail in the mining sector because of the various risks the employees face on a daily basis at work. A functional code of ethics at GGM provides a statutory authority to the supervisors to lead the organizations while the employees follow the due procedures. When the code of ethics fails to achieve the objective for which it was set, both the employees and the supervisors do not perform as per the company’s expectations (Breslow, 2002). For instance, application of health and safety standards is a two-way process that applies to both the managers and the workers. The supervisor provides the helmets, masks, and oxygen cylinders. He/she also invites professionals to educate the laborers on the significance of protection while mining. When the employee fails to heed to all these, the supervisors does not become liable to any accidents. In order to reinforce the same, supervisors and employees should sign the work contract with a clear knowledge of the principles of the code of ethics. This way, both the managers and the employees will take responsibility for any breach of organizational best practice.Adv ertising Looking for essay on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Reasons for adopting best practice Reputation building through adherence to OSHA regulations GGM has a long way to ensure that the project remains sustainable and the target consumers do not question any legal or ethical activities related to the firm. First, it has to consider engagement in a Local Economic Development (LED) program such as providing scholarships to bright, but poor students, establishing an institution for training laborers about mining, and funding hospices or diabetes treatment centers (Stellman, 1998). Such philanthropic or CSR programs would replace the image it has in relation to its inability to take care of the welfare of workers by exposing them to extremely deep fields. Most workers equally complain of underpayment or delayed payment; this led to defection from the firm in 2009. In a press release, the management of GGM apologized to the workers while explaining that since its inception, it was in the process of creating logistics on how to meet consumer needs while dealing with competition from companies established before South Africa’s independence in 1994. By adopting the OSHA regulations and ensuring that no one violates the principles, GGM will earn consumer goodwill, which will be important for reputation building. In its CSR program, it should refill the pitfalls left after mining, or promote the building of dams to assist the country during dry seasons. Besides mining, the country largely depends on tourism and agriculture (Steger, 2003). The water will be help in generating power and other domestic purposes save for cooking and irrigation because the gold or lead deposits that grow inside the plants often have long-term effects on consumers. Finally, by training people as the OSHA regulations reinforce, the company will get positive media attention, which is equally important in boosting its reputation and attracting new customers while retaining loyal consumers within Africa and the international community (Goliath Gold Annual Report December 2012, 2013). Significance of the code of ethics The codes of ethics adopted by GGM since inception in 2011 require appraisal after 3 to 5 years of operation. The reasons for such levels of strategic planning include the identification of strengths and weaknesses while providing recommendations on the next cause of action. In 2008, GGM realized that most minefields in South Africa incorporated artisanal mining techniques or the traditional extraction and washing methods. To the company’ realization, most miners got exposure to mercury, forcing the World Bank to support the closure of most artisanal mines in the country. To date, GGM is not a World Bank agency dealing in extraction of gold in various gold fields in South Africa, but it strives to implement the functional code of ethics adopted in 2011 (Goliath Gold Annual Report December 2012, 2013). There are several problems realized even after abandoning the artisanal techniques of mining since t echnological advancements equally come with challenges. Markedly, technology might not stop mercury pollution, and the code of ethics does not have the will to offer directives to the machinery. As such, GGM should review the code of ethics in order to make the company liable to any safety and health concerns instead of relying entirely on technology and ignoring the functional code of ethics the company adopted. By respecting the code of ethics, the company will no longer worry about the environmental land disputes because it will acquire the land mines legally. In addition, the safety and health of the workers and supervisors will be secure, and this will limit the negative international attention received by unethical firms (Koradecka, 2009). There are companies that face cases of illegal eviction of people in order to carry out mining. Like Harmony Mining, Goliath Gold Mining has the responsibility of resettling people, avoiding bureaucratic principles of governance, and incorpo rating ethics in all stages of product development (Breslow, 2002). Legal implications It would be irrational to ignore that no legal implications involve land acquisition, eviction of residents, leaving of pitfalls, and exposure to poisonous gases and chemicals. Acquisition of work permits for gold miners remains one of the most complex exercises for investors. It becomes manageable when the government runs the project, but individual mine owners such as Harmony have a very difficult time in South Africa. Notable legal issues observed by the firm are discussed below. Non-discriminatory training and seeking expert advice GGM is yet to establish an employment criterion that trains and appraises both employees and managers. Currently, there is no clear framework for identifying the number of minority workers in the firm, observing gender balance, and avoiding the deployment of child labor. Since GGM only has three years of operation in the market, it has to ensure that it does not hav e any biases during recruitment and retention. Child labor is equally a concern that destroys the reputation of many mining firms, but GGM does not have such allegations presently. GGM has an inclusivity campaign to ensure that the geochemists, laborers, geologists, and the engineers work together irrespective of their ethnic backgrounds. The firm focuses on expertise, and it should have plans of succession without any form of racial discrimination (Goliath Gold Annual Report December 2012, 2013). Observation of legal and civil law GGM does not formulate civil or legal regulations, meaning that it has to account for its land use and resettlement of displaced South African nationals in case the company seeks to acquire land for mining (Annual Report: Goliath Gold, 2011). The executive, the judiciary, and the legislature play significant roles in determining different investment ventures in the country. As such, the judiciary formulates laws that the legislature supports while the exe cutive assents. GGM should have an accredited title deed, a work permit, and a license of work in the various mines renewable by the Pretoria City council upon completion of work. Mines that are close to major roads or railway crossings and airports require way leaves because of future government construction plans (Steger, 2003). Government regulations Each sovereign country has a functional national government that approves most investment programs that are likely to provide jobs for the nationals. Therefore, the South African government has the responsibility of the citizens; it should not allow people to die in the name of earning a company income. GGM is partially dependent on the government; it has to adhere to various government regulations. Common factors worth observance include (Equal Employment Opportunities Codes) EEOC standards and CSR projects that GGM has to conduct in the environment of investment (Bennett-Alexander Hartman, 2001). GGM has to construct social amenit ies such as schools and health care facilities for the residents of Pretoria among other cities that largely depend on the growth of the industry. The government regulates GGM by ensuring that it is a member of the JSE, the Natural Resource Charter, and the South African Securities Exchange (SAASX) (Goliath Gold Annual Report December 2012, 2013). In essence, the government regulations are important in keeping checks and balances while preventing GGM from using its individually crafted policies in running the South African economy. Taxation remains the most common regulation technique, but the costs increase for international companies investing in South Africa. Recommendations The best practice that would ensure that GGM adheres to all the safety and health standards is the appraisal of the code of ethics to match the changing market trends. The code of ethics will definitely address the risks of exposure to mercury and environmental effects of the pitfalls left after mining. GGMâ €™s code of ethics should equally strive at training laborers in order to reduce the number of artisanal gold mining fields while increasing the number of expert laborers in the South African job market (Cam, 2010). A good code of ethics deals with discrimination, respect to authority, equal payment, equal employment, and the significance of obeying both civil and legal regulations. The code of ethics spearheads the strategic plan, which contains the mission and vision statements of the company. This means that employees and supervisors will have a common document that contains all the policies and implications of violating the same while working for GGM. Most companies violate the code of ethics even though they formulate good documents with best practices. By coming up with a good code of ethics that observes inclusivity, it will be difficult to ignore the same. The executive needs to provide the best example by paying taxes, filing returns, initiating CSR programs, and follow ing OSHA regulations, as well as EEOC principles. When this happens, the code of ethics becomes effective to the rest of the team (Stellman, 1998). One of the most important things about the code of ethics is that it also covers the legal duties of GGM and other mining firms that have functional code of ethics. Since South Africa would not want to abandon tourism and farming, most GGM CSR programs should support similar initiatives since the public believes that the increasing number of mines causes a reduction in cultivation space. A code of ethics is likely to face many challenges including ignorance, neglect, and lack of support from bureaucratic leaders. As such, a company attorney and a member of the mining industry regulatory committee should be present when the company generates a code of ethics. The regulatory commission acts as the overseer of the implementation and execution of the code (Gunningham, 2008). This way the commission provides a non-partisan approach to issues while ensuring the GGM operates based on best practices as supported by the code of ethics. Conclusion In summary, the mining industry generates a lot of income for many countries. When countries discover oil, uranium, lead, or gold, they seem to forget other avenues of income generation. Sometimes the mining of various precious commodities becomes the source of various problems including health and safety. Both employees and managers play an imperative role in determining the level of safety and health requisite for each person working at the mine. A proposed best practice to deal with the issue is the establishment of a functional code of ethics that addresses both legal and ethical concerns in relation to mining. References Alana, W. (2012). Peru’s Social Conflict is About More than Mining. Web. Annual Report: Goliath Gold. (2011, June 24). Web. Bennett-Alexander, D., Hartman, L. P. (2001). Employment law for business. Boston, MA: Irwin/McGraw-Hill. Breslow, L. (2002). En cyclopedia of public health. New York: Macmillan Reference. Cam, S. (2010). Soros Gold Bubble at $1,384 as Miners Push Buttons. Web. Cascio, W. (1998). Managing Human Resources: Productivity, Quality of Work Life, Profits. Boston: Irwin McGraw-Hill. Goliath Gold Annual Report December 2012. (2013, May 28). Web. Gunningham, N. (2008). Occupational Health and Safety, Worker Participation and the Mining Industry in a Changing World of Work. Economic and Industrial Democracy, 29(3), 336-361. Koradecka, D. (2009). Handbook of occupational safety and health. Boca Raton: Taylor Francis. Steger, U. (2003). Corporate Diplomacy: The Strategy for a Volatile, Fragmented Business Environment. Chichester: John Wiley Sons. Stellman, J. M. (1998). Encyclopaedia of occupational health and safety. Geneva: International Labour Office. Zwi, A., Fonn, S., Steinberg, M. (1988). Occupational health and safety in South Africa: The perspectives of capital, state, and unions. Social Science Medicine, 27( 7), 691-702.

Tuesday, November 5, 2019

Enthalpy Definition in Chemistry and Physics

Enthalpy Definition in Chemistry and Physics Enthalpy is a thermodynamic property of a system. It is the sum of the internal energy added to the product of the pressure and volume of the system. It reflects the capacity to do non-mechanical work and the capacity to release heat. Enthalpy is denoted as H; specific enthalpy denoted as h. Common units used to express enthalpy are the joule, calorie, or BTU (British Thermal Unit.) Enthalpy in a throttling process is constant. Change in enthalpy is calculated rather than enthalpy, in part because total enthalpy of a system cannot be measured. However, it is possible to measure the difference in enthalpy between one state and another. Enthalpy change may be calculated under conditions of constant pressure. Enthalpy Formulas H E PV where H is enthalpy, E is internal energy of the system, P is pressure, and V is volume d H T d S P d V What Is the Importance of Enthalpy? Measuring the change in enthalpy allows us to determine whether a reaction was endothermic (absorbed heat, positive change in enthalpy) or exothermic (released heat, negative change in enthalpy.)It is used to calculate the heat of reaction of a chemical process.Change in enthalpy is used to measure heat flow in calorimetry.It is measured to evaluate a  throttling process or Joule-Thomson expansion.Enthalpy is used to calculate minimum power for a compressor.Enthalpy change occurs during a change in the state of matter.There are many other applications of enthalpy in thermal engineering. Example Change in Enthalpy Calculation You can use the heat of fusion of ice and heat of vaporization of water to calculate the enthalpy change when ice melts into a liquid and the liquid turns to a vapor. The heat of fusion of ice is 333 J/g (meaning 333 J is absorbed when 1 gram of ice melts.) The  heat of vaporization of liquid water  at 100 °C is 2257 J/g. Part A:  Calculate  the change in enthalpy, ΔH, for these two processes. H2O(s) → H2O(l); ΔH ?H2O(l) → H2O(g); ΔH ?Part B:  Using the values you calculated, find the number of grams of ice you can melt using 0.800 kJ of heat. SolutionA.  The heats of fusion and vaporization are in joules, so the first thing to do is convert to kilojoules. Using the  periodic table, we know that 1  mole of water  (H2O) is 18.02 g. Therefore:fusion ΔH 18.02 g x 333 J / 1 gfusion ΔH 6.00 x 103  Jfusion ΔH 6.00 kJvaporization ΔH 18.02 g x 2257 J / 1 gvaporization ΔH 4.07 x 104  Jvaporization ΔH 40.7 kJSo the completed thermochemical reactions are:H2O(s) → H2O(l); ΔH 6.00 kJH2O(l) → H2O(g); ΔH 40.7 kJB.  Now we know that:1 mol H2O(s) 18.02 g H2O(s) ~ 6.00 kJUsing this conversion factor:0.800 kJ x 18.02 g ice / 6.00 kJ 2.40 g ice melted Answer A.  H2O(s) → H2O(l); ΔH 6.00 kJ H2O(l) → H2O(g); ΔH 40.7 kJ B.  2.40 g ice melted

Saturday, November 2, 2019

Sexual Fantasies Essay Example | Topics and Well Written Essays - 1750 words

Sexual Fantasies - Essay Example Sexual fantasies may also be extreme and for this reason, very few of them are actually tried in reality. In the past, such fantasies were seen to be symptoms of mental and sexual frustrations and sexual starvation. They were considered unhealthy aspects of life (Bader, 58). It was believed that sexual fantasies caused tenets such as homosexuality, rape and incest. However, recent research on this subject states that people should not be ashamed because they have sexual fantasies. Such thoughts are healthy and when communicated to one’s partner can lead to a very satisfying relationship. Sexual fantasies exist among both men and women. However, their nature is completely different given the natural differences between them. This is further illustrated by the difference in sexual fantasies between men and women. Men are attracted by visual things. This is known as voyeurism. Men are sexually stimulated by what they see and this gives them a lot of pleasure. They just want to watch something stimulating, whether it is sexual content or just their partners. It is not uncommon to find men watching sexual content; this is not to be seen in the negative light but as an expression of sexual desires. A threesome refers to sexual activity between three people. Most men fantasize about having two women at the same time. It is a common fantasy and many would gladly indulge in it if given the go ahead by their partners. This activity can make them feel more masculine and boost their egos (Bader, 29). Role playing is a form of sexual fantasy that is common between men and women. This involves partners taking up various roles such as nurse- patient, cop- bad girl, teacher- student and many more. No matter the partners’ roles, they have to look sexy to each other. This boosts their sexual morale as they play out their fantasies with each other. A woman would want to take part in sexual role play so that she gets to

Thursday, October 31, 2019

Management information system Research Paper Example | Topics and Well Written Essays - 1750 words

Management information system - Research Paper Example The unparalleled progresses in calculation and communication technologies have made such requirements adaptable into attainable objectives. Thus, a large portion of the world population has its stake in information systems. Invariably, such systems are computer based. Today, more than ever before in the history of human kind, we have an unquenchable thirst for information. The society has changed significantly from the Barbarian to the Agrarian Society, from Agrarian to the Industrial society and from the industrial society to a society dominated by the service sector. People have witnessed the industrial revolution, the advent of automobile and introduction of telephones. Today, people are all living in an information society. It goes without saying that we describe the present times as the information era or the IT age. Underneath this is a tacit acceptance of the fact that not since the advent of the automobile and the introduction of the telephone has an invention, had such wide spread impact on our lives and society as the computer, which has ushered in the information era. ... Notably, organizational management systems that pertain functioning, planning, and running of an organization are very significant. In reference to Lucey (2004), management information system implies chiefly â€Å"organizational information systems which are generally large, sophisticated, structured, and dynamically evolving and of immense commercial value†. In addition, Lucey (2004) notes that computer data structures required to aid administration of a business structure the primary subject of this transcript. Description of the information system and its functions Management information system is a familiar term to most of the managers working in both public and private organizations. These systems are used widely by administrators at central, functioning and superior degrees in an organization. Organizations employ a high number of system analysts and programmers and systems analysts to build numerous management information systems (Lucey, 2004). Obviously, in the educati on of system analysts and programmers in addition to general executives, the subject management information system occupies a key position. A TECOM investments organization in Dubai is no exception. TECOM investment organization develops and manages business parks under Dubai Holdings. TECOM investment holding is a conglomeration of more than four thousand companies. This organization uses information systems in its management and provides information system services to its clients through the Dubai internet city business park. TECOM investment has installed management information systems in different departments which have different goals and objectives. Though Management Information system was envisioned as a single

Tuesday, October 29, 2019

Why do we need medical interpreters Research Paper

Why do we need medical interpreters - Research Paper Example Of all the articles that were selected and analyzed by the comparative use of ad hoc interpreters, there was a unanimous outcome which showed that using medical interpreters yield improved outcomes with utilization, clinical outcomes, communication, and patient satisfaction than when ad hoc interpreters are used. Writing on utilization, Fiscella et al (2012) noted that medical interpreters guarantee a high sense of utilization of the medical process. Evidence was given from various works of literature and the outcomes of various studies have should that medical interpreter are indeed needed in the healthcare delivery program. This is because when the roles of medical interpreters have assessed from the perspective of the four evaluation areas namely utilization, clinical outcomes, communication (errors and comprehension), and patient satisfaction, it was seen that having professional medical interpreters as against ad hoc interpreters ensured that there was improved performance. It would, therefore, be concluded that having and using medical interpreters is very important for ensuring improved outcomes for all individuals. By the use of medical interpreters, all people, regardless of the level of their English proficiency can be assured that they will receive health care outcomes that are well tailored to meet their needs. It will be appreciated that where there is inadequate training, the work of medical interpreters could be co nsequential. The need to continue emphasizing on the training of medical interpreters is therefore strongly recommended.

Sunday, October 27, 2019

Developing an Online Banking Application

Developing an Online Banking Application This report details the importance of securely developing a software and the best practices to implement throughout the development lifecycle. Using the Microsoft Secure Development Lifecycle Model, a software can be developed with sufficient security measures throughout each stage from the beginning of development until its eventual release and even responding to incidents that may follow its release. Creating an online banking application without thoroughly considering the security of the banks assets and customers information would be virtually impossible. Due to the vital importance of the assets a bank contains, large security measures while developing any aspect of its services must always be implemented. Developing this online banking application must include various steps as can be seen in the Microsoft Security Development Lifecycle (Such as Security Requirements, Risk Assessment and Threat Modelling). Banks and financial businesses are large targets for malicious attackers who target the online services provided by these companies. It is for this reason that the threats posed to a bank with an online banking service are vast and development of such an application should be treated as such. Considering the OWASP Top 10 is a good initial security measure as mitigating the threats of the top 10 most common vulnerabilities found in web applications will give a good foundation in avoiding attacks. The application works by having the user access the website through their browser, navigating through the two step authentication and then gaining access to various options relating to their account such as viewing statements, transferring money to other accounts and viewing the amount currently in their account. The first of the two step verification is an 8 digit pin that the user will have decided upon earlier when first creating their account for their online banking service. The second step verification will either be the users date of birth or occasionally it will be the users contact number. This second step verification will change randomly so as to avoid use of an automated tool attempting to access a users account. When the user creates an online banking account, they will be required to give their home address and account number. A letter will then be sent to the user giving them a code that is specific to them which they can then use to verify their identity on their first use of the online banking application and complete creating their account. This means that the only people who can use the service are those who already have full access to the users account details and their post. This is an effective security measure as implementing security into a software that can be compromised simply by having any person impersonate another user signing up for the service would be redundant. Another way that the login process will be secured is by using a counter in which if a user enters details incorrectly three consecutive times then they will be unable to make another attempt for a short period of time. The reason behind this two step verification process is to hinder the use of tools that would continuously attempt to crack the login system, possibly with the use of a tool such as John the Ripper or THC Hydra. The limited amount of login attempts is also used to avoid brute-force attacks from occurring. Having already been authenticated, a user will then have access to their account details including their balance, their previous statements and also they will be able to transfer funds from their account. All of this information will be stored in a database which will be encrypted and salted meaning that a leak of this information should not cause for the information to be decipherable by an attacker. The Secure SDL (Software Development Lifecycle) as implemented by Microsoft is a development process which assists developers in creating secure software and looks at complying with security requirements whilst reducing the overall development cost. The Lifecycle is separated into 7 different SDL practices as can be seen in the figure below. These practices are used to highlight security implementations in the various stages of a softwares development. For example, in the designing of a developing software, it is necessary to create accurate threat models which can be used to easily locate different possible vulnerabilities that the software may be subject to. (stan.gr, 2012). (Microsoft, 2016). Establishing Security Requirements One of the first steps to be taken in developing the banking software is to establish what security and privacy requirements will be implemented in the software. This will make it easier to identify the direction of the development and assist in keeping to the schedule. The team developing the banking software will primarily look at the OWASP Top 10 as the main vulnerabilities that may occur in the application and attempt to secure against these. One of the security requirements that will be present in the software is to secure the software against Injection. As the information that is shown when a user logs in is sensitive, the software must protect against malicious users attempting to login by using injection. In order to avoid SQL injection, the software will be developed using prepared statements in order to sanitise the input of the user. Validation methods will be included in the software to ensure that each user has the correct authority to use the functions that they attempt to use and that all inputs that are entered into the application will be acceptable so as to avoid cross site scripting and other such threats. Create Quality Gates / Bug Bars In the early stages of development, deciding what the minimum acceptable level of quality should be present in the security of the software is vital. Without this step, oversights may exist such as users private information not being totally secure as the development team did not focus on protecting this over a different area. Having a minimum acceptance level also helps the development team to correct security bugs as they are to follow the standard set and will be given some concept as to what risks are associated with various issues. For this software, it will not be acceptable that any bug that could be related to the leaking of information may be present. Strict security measures will be put in place to ensure that the privacy of the banks customers will be protected. Security Privacy Risk Assessment This stage of the development will involve examining the software design and locating areas that are potentially prone to more threats or perhaps possess more risks than other areas. For example, the database being protected, as it contains vital information, is of higher risk of a malicious attack than the website hosting the application. Identifying these risks and what they are susceptible to will improve the security of the software. This will be further developed in the threat modelling step as this step determines which parts of the project will require threat modelling. This stage is vital in the development process as the likelihood of protecting against a risk that has been overlooked in the development of the software is far less than if it had been analyzed throughout the development. Design (Microsoft, 2016). Establish Design Requirements Establishing the Design Requirements will ensure that the software will function in the intended way while also allowing to minimise cost and improve security throughout the development. This stage will guarantee that the software will be user friendly and will also assist in ensuring that there is no way that a user may accidentally gain access to information that they are not authorised to do so. Analyze Attack Surface This step involves analyzing which parts of the software presents opportunities for attackers and can assist developers in reducing these vulnerabilities. This may involve disabling or restricting certain access to services. This stage is another stage that will be a large part of the threat modeling stage in that it will allow the developers to identify aspects of the software that are viable to be attack targets. Threat Modeling This step will allow the developers to look at exactly what happens when a user is using the service and to anticipate what aspects are vulnerable to threats. From here, developers can decide the feasibility of reducing these threats and how this may be achieved. This can be done by identifying vulnerable areas and ensuring that they are secured against the attacks that they are susceptible to. The importance of this stage is highlighted by the importance of protecting the sensitive information that the application will be using. The figure below shows a threat model created with the Microsoft Threat Modelling Tool 2016 in regards to the online banking service. (Microsoft, 2016). Use Approved Tools Using approved tools throughout the development process will assist in ensuring that correct security procedures will be used in the software. This includes using a compiler which will flag security warnings if the software is being compiled and contains a known security risk. These tools may include the IDE (Integrated Development Environment) for the developers to programme the software on, such as Eclipse. Deprecate Unsafe Functions Banning functions that are deemed to be unsafe will reduce potential bugs in the software. Detecting these can be done by using automated tools or manually checking the code and ensuring that none of the functions are present on the banned list which can be found at https://msdn.microsoft.com/en-us/library/bb288454.aspx>. Static Analysis Analyzing the source code before compiling it is a good way of ensuring that the code has been developed in a secure manner. This stage will involve the developers to look at the code and check that the correct security protocols have been put in place such as prepared statements and sanitisation of inputs. (Microsoft, 2016). This stage of the Software Development Lifecycle involves testing the software to ensure that the software is functioning as it is intended and also allows for web application penetration testing to be carried out in order to confirm that the security functions put in place are working correctly. This penetration testing can be done by the business if they have their own department or it can be outsourced to an outside specialist company such as Offensive Security. Offensive Security offers more accurately simulate real-world hacking situations to audit network, web, and application security programs (Offensive Security, 2016). (Microsoft, 2016). Perform Dynamic Analysis Using various tools to monitor things such as user privilege issues will assist in verifying how secure the software is when being used. It is at this stage that the software can be looked at for any possible security oversights. This stage is similar to the testing stage and can be used to verify what devices the web application works on and also if there are any errors with how to application performs. An example of this would be that the application may work as intended on a Firefox browser from an android device but may not work entirely as intended on Safari on an iOS device. Fuzz Testing This step involves attempting to make the program fail by introducing random data. This testing is used to verify how the software handles errors and if there is any weakness in the security of how the software does this. This may involve an error occurring which gives sensitive data about the softwares database. This testing will ensure that the sanitisation of the user inputs is working correctly by handling these errors rather than executing code that is input. Attack Surface Review Reviewing the attack surface when the code has been completed will help ensure that any future changes to the design or functionality of the software has been considered and that these changes will not compromise the security of the software. An example of this could be that considering making the web application into a mobile device application may present difficulties as different vulnerabilities may be present. (Microsoft, 2016). Create an Incident Response Plan Creating an Incident Response Plan is crucial in order to combat any threats that may appear over the softwares lifecycle. It involves identifying security emergency contacts in the event that a security breach occurs. The incident response plan can be broken down into six phases: Preparation Detection Containment Investigation Remediation Recovery The Preparation phase involves having implemented the correct controls in order to recover following an incident. It states the policies, tools and contact information that is necessary in order to respond efficiently to an incident. Detection is a phase which involves the discovery of the incident. This can be through use of logging or may come in the form of a consumer alerting the business. In this phase, the incident will be declared and the severity of it will be determined. The containment phase will be where the affected part of the software will be isolated or mitigated if possible. If the incident affects the software in its entirety, it must be determined whether or not the entire software is to be taken offline so as to avoid any more users to be affected by it. The investigation phase will involve looking at the incident and attempting to identify the source, the scope and the priority of the incident. The remediation phase will be where it is decided which parties to inform about the incident and will confirm that the threat has in fact been contained. The recovery phase will be the phase in which it is determined how the software will ensure that the incident does not happen again and will confirm whether it is necessary to review any of the softwares policies. (Raderman, L. 2015) Conduct Final Security Review Reviewing all of the security checks and measures prior, throughout and post release of the software helps to ensure that they were carried out correctly and that none had been left out. This step can be assisted by using an automated tool such as Vega to scan the application and determine if any known vulnerabilities have been overlooked. Ensuring that the utmost has been done to protect the security and privacy of its users should be one of the banks largest priorities in developing this software as without the trust provided by this, the bank will surely suffer with a loss of assets in the form of customers and finances. Certify Release and Archive Certifying the software before it is released will help to ensure that all of the correct security requirements were met. Archiving the data will allow the developers to do roll backs and to review any future security or privacy breaches in relation to the original software. Without certifying the software upon its full release, the credibility of the software may be questioned and it may cause negative public relations for the business. As a bank, it is important that customers are confident in the security and privacy provided by the business. (Microsoft, 2016). Execute Incident Response Plan The capability of implementing the Incident Response Plan from the Release step will assist in helping users to avoid severe security and privacy breaches and allow for the company to have a quicker response to any exploits that may arise. This step is important as users should feel confident that the bank has their best interests in mind and will ensure that their security, being one of the business key assets, is being frequently and effectively protected. Developing an online application for a bank could prove extremely beneficial and convenient for its customers. However, the importance of the information that a bank retains in regards to its customers and their finances is high and with the nature of cyber security and its ever increasing attacks, especially to a high profile target such as a bank, the development of such an application should be assessed with security in mind throughout the process. Following the Microsoft Secure Development Lifecycle is a very effective way of ensuring that a software is thoroughly analyzed for security threats and vulnerabilities and ensures that a business will have reasonable plans in place in the event that any breach of security may happen. It is also beneficial when developing a software to be secure, to refer to the OWASP Top 10 vulnerabilities and ensure that the software is as secure against these vulnerabilities as possible. Microsoft (2011) Security Development Lifecycle (SDL) Banned Function Calls [online] available from:ÂÂ   https://msdn.microsoft.com/en-us/library/bb288454.aspx [accessed 27th December 2016]. Microsoft (2016) What is the Security Development Lifecycle? [online] available from: https://www.microsoft.com/en-us/sdl/ [accessed 27th December 2016]. Offensive Security (2016) Advanced Penetration Testing Services [online] available from: https://www.offensive-security.com/offensive-security-solutions/penetration-testing-services/ [accessed 2nd January 2017]. OWASP.org (2015) Top 10 2013-Top 10 [online] available from: https://www.owasp.org/index.php/Top_10_2013-Top_10 [accessed 27th December 2016]. Raderman, L. (2015) Computer Security Incident Response Plan. Carnegie Mellon Information Security Office [online], 13th Febuary 2015, (pg 8-9), available from: https://www.cmu.edu/iso/governance/procedures/docs/incidentresponseplan1.0.pdf> [accessed 2nd January 2017]. The phases of Microsoft SDL.(2012) [online image] available from: http://www.stan.gr/2012_11_01_archive.html>,[accessed 27th December 2016].