Monday, September 30, 2019

Ethical & Legal Issues in Counseling Essay

Counselors like any other medical professionals are guided by professional ethics when it comes to performance of their duties. More often than not, mental health professions are usually faced with the challenge to observe ethical guidelines and legal concerns due to the unique criteria that comes with their job. Primarily, the ethical requirement requires the confidentiality, privacy, and professional relationship between the counselor and the client. This is meant to safeguard the well being of the client and the society at large. The American Counseling Association however provides the ethical guidelines to help these professionals to be able to strike a balance between the ethical practice and the legal requirements depending on the condition of the patient. This leads us to the ethical and legal issues in counseling profession which stems from the 1976 Supreme Court ruling in the State of California better known as the Tarasoff v. Regents of University of California ruling. This paper shall review the California Supreme Court ruling giving details of the case and its implications on the counseling profession. It will also revisit the Virginia Tech Tragedy and draw comparisons between the incident and the Tarasoff decision. Review of California Supreme Court findings: Mental health professionals are confronted with scenarios in which the patients are expressive of some tendencies to cause harm to other individuals. This presents a dilemma on what should the mental health professional do in an effort to avert the imminent danger that the client might pose to the third party. In legal terms, this has been referred to as ‘the psychotherapy’s duty to warn or protect third parties’. The duty to warn and/or protect the third parties came up during the Tarasoff V. Regents of the University of California case in 1976. After learning of the incident in detail, the California Supreme Court observed that the psychotherapists engaged in the treatment of mentally disturbed patients had the duty to warn the threatened individuals based on their reasonable care in an effort to prevent the foreseeable danger that may arise from the condition of the patient (Buckner, and Firestone, 2000). In this landmark ruling, the Supreme Court had learnt of the negligence of the parties concerned which culminated in the death of the Tatiana Tarasoff. The facts of the case outlined that Prosenjit Poddar and Tatiana were in a relationship which to Poddar, was destined to be intimate. However, when Tatiana revealed to him that they were not going to be in such a relationship Poddar was heartbroken leading to the start of the emotional and mental breakdown. Tatiana left for Brazil in the summer of 1969 and Poddar’s conditions started to show some signs of improvement. He was later to enroll for psychotherapeutic sessions after a friend advised him to do so and became a voluntary outpatient at Cowell Memorial Hospital. He was placed under the care of Dr. Lawrence Moore and it is argued that he confided to the doctor that he was going to commit murder. He was referring to Tatiana, his supposed girlfriend when she returned from Brazil (Buckner, and Firestone, 2000). Dr. Lawrence Moore took an initiative to notify the police officers based on the campus regarding the intentions of his patient. He even wrote a letter to the police Chief based at the campus elaborating that Poddar was suffering from an acute and severe paranoid schizophrenic reaction and that he could be a danger not only to himself but also to the other people. The doctor proposed that he was ready to sign the seventy-two hour surveillance order if the police decided to pick up the patient and relocate him to Herrick Hospital. The doctor also observed that his patient’s behavior could at times be rational. Doctors Gold and James Yandell, who were supervisors to Dr. Moore, agreed with his diagnosis and recommendations that Poddar needed to be hospitalized. The patient was taken by the police and put into custody. The police officers including Gary L. Browning; Joseph P. Halleran; and Atkinson interrogated Podder and found out that he was indeed rational and had changed his attitude. The police however released Poddar from custody after he promised to avoid Tatiana and stay far away from her. On the same issue, Dr. Harvey Powelson, who was the Director of Psychiatry at Cowell Memorial Hospital ordered for the return of the letter that had been written by Dr. Moore to the police chief requesting for the 72-hour emergence detention of Poddar. He called for its destruction including the notes that had been written by Dr. Moore on the patient. The Director also issued warnings against taking of any action in putting Podder under the 72-hour emergency surveillance (Buckner, and Firestone, 2000). In the month of October 1969, Tatiana returned from Brazil and Poddar failed to live by the promise that he had made to the police and continued to pursue her. It is claimed that Poddar stopped his appointments with Dr. Moore after Tatiana had returned from her trip. However, the Supreme Court observed that Poddar had stopped seeing the psychotherapist after he was detained by the campus police. All the same, towards the end of October in 1969, Podder went to check on Tatiana at their home. At first he could not find Tatiana and was ordered to leave by Tatiana’s mother. Podder was to come back later equipped with a knife and a pellet gun. This time, he was lucky to find Tatiana alone at home. Tatiana refused to speak to Poddar and upon insisting, Tatiana started screaming. This prompted Poddar to aim at her with the pellet gun with Tatiana running wildly from the house. Poddar pursued her and was able to catch her up in the yard stabbing her severally. Poddar then retuned to the house and informed the police of what he had done asking to be handcuffed (Buckner, and Firestone, 2000). Dr. Kermit Gruberg, who was serving the Berkeley Police Department upon observation of Poddar in less than twenty four hours of the incident, confirmed that Poddar was a victim of paranoid schizophrenia. Poddar was charged with murder though he refused to enter a plea on the ground of insanity. Some times before he was tried, examinations from a neurologist who was hired by the defense indicated that Poddar had organic abnormalities in his brains. During the trial, Dr. Philip Grossi, Dr. Gruberg, Dr. Anderson, Dr. Moore, and Dr. Gold gave testimonies that Podder was insane and a paranoid schizophrenic. It was during the testimonies of Dr. Moore and Dr. Gold that the details about the victim’s plans to murder Tatiana were exposed. Poddar was convicted to second degree murder and following numerous appeals, he was released and ordered to immediately leave the United States, never to come back (Buckner, and Firestone, 2000). Vitaly and Lydia Tarasoff, who were parents to Tatiana, filed the wrongful death suits against the University of California and the psychotherapists who were treating Poddar. The parents alleged four actions which included failure to detain Poddar by the psychotherapists and failure to warn the Tarasoffs that Poddar was of potential danger to their daughter. The other two allegations included the one directed towards Dr. Powelson following his activities in abandoning a dangerous patient and the last one was regarding the ‘Breach of Primary Duty to Patient and the Public’ which was more same to the first allegation (Buckner, and Firestone, 2000). The rulings of the Alameda County Superior Court and the court of appeals dismissed the case ruling in the favor of the defendants. It was argued that there was no special relationship between the defendants and Tatiana or her parents and thus there was no obligation to warn. Dr. Powelson was said to have had no duty to commit Poddar and in case he did so, this action was fdiscretionary and in accordance with the statutes. The Tarasoffs were not satisfied and sought redress from the California Supreme Court (Buckner, and Firestone, 2000). California Supreme Court Decision and its impacts on counseling profession: The decision made in 1976 by the Supreme Court is said to be a second time in considering the case. The very first decision was made in 1974 whereas the second decision emanated from the re-hearing which was granted in 1975. The first decision exemplified that the campus police had a case to answer for having failed to warn Tatiana whereas the second decision was freed them from all legal responsibility (Buckner, and Firestone, 2000). In the second decision, psychotherapists were handed greater latitude to offer protection to the potential victims. In the first decision by the California Supreme Court, the defendants claimed that had no obligation to issue any warnings to Tatiana or the Tarasoffs since they were not patients to the therapists. The court rejected this view while observing some exceptions. Under this the court observed that though the defendants had an exceptional relationship with Poddar as their patient; they had even attempted to control his behavior through the initiation of a police detention (Buckner, and Firestone, 2000). The defendants were also opposed to the duty to warn potential victims calling it problematic in the performance of their duties. However, the Court was quick to assure that not all incidences reported could result into the duty to warn and that a reasonable degree of skill, knowledge, and care would be required in exercising good judgment within the acceptable professional opinion. On the need to protect the confidentiality of the patient, the Court observed that limitation must be observed in disclosing information to prevent danger of patients to other individuals. In the second decision, the California Supreme Court required the psychotherapists to discharge duty to the endangered third parties by other means apart from warning them. The ‘duty to warn’ was therefore changed to become ‘the duty to protect’ under the second decision. The Court held on the decision that required the psychotherapy to protect third party victims upon using reasonable care aimed at protecting the other individuals from the dangers posed by their patients. The Court held that the Psychiatrists could warn the would be victims directly, sending other people who are likely to inform the intended individual, informing the law enforcement agencies, or taking any necessary step depending on the situation (Buckner, and Firestone, 2000). Following the landmark ruling in the Tarasoff v. Regents of University of California, many individuals thought that such a decision was an abnormal one and likely to be overlooked. The professions in mental health also observed that this decision was aimed at undermining psychotherapy practice through the destruction of the principles of confidentiality. Such observations were to be proved wrong since in a couple of year’s time, a New Jersey Superior Court in the McIntosh v. Milano (Buckner, and Firestone, 2000), indicted a psychiatrist basing on the Tarasoff incident. It has to be observed that the California Supreme Court decision which required the mental health professions to give a warning to third party individuals who were in potential danger from their patients has been adopted in most jurisdictions and the decision has even been broaden to incorporate other areas in healthcare practice (Buckner, and Firestone, 2000). The American Counseling Association (ACA) elaborates on the steps to be taken when there is a conflict between the established code of ethics and law requirement. The ACA observes that in the event there is a conflict, the counselors have the duty to make known their commitment to the ACA Code of Ethics and when the conflict stands unresolved by this; counselors have no choice but to relinquish their code of ethics and adhere to the laws and regulations. This means that the law reigns when there is a conflict between the established ethical responsibilities and the law (Docstoc, 2010). The Tragedy at Virginia Tech: Preliminary facts regarding the tragic incident at the Virginia Tech in the year 2007 were appalling. On this fateful day, 33 students and staff lost their lives in a shooting spree carried out by one of the students at the institution. The perpetrator was an English student known as Cho Seung-Hui who was described as a loner by his colleagues and is said have been identified by at least two of his professors as troubled. Earlier on the fateful day, Cho Seung-Hui is said to have mailed a tape to NBC News after having killed two of his victims. In the tape, he fumed against the wealthy in the society and argued that the society was to blame for his actions. The tape indicates that Cho Seung-Hui was full of rage and that he was emotionally troubled. His roommates and friends observed that Cho Seung-Hui showed anti-social tendencies on campus. He is said to have rarely engaged in conversations and was known for one word answers especially on questions that could expose much of him. Further more it has been established that much of the writings made by Cho in his course work revealed violence and murderous images and fury directed towards the female gender (Angelo, 2007). The incident at the Virginia Tech relates in many aspects to the Tarasoff case where the defendants failed to issue warning to the victim and her family. The United States Department of Education findings indicate that the institution dishonored the established campus crime-reporting legislations in responding to the shootings. It is argued that after the first shooting incident occurred at around a quarter past seven in the morning only for the university to issue the e-mail warning at around nine thirty. A moment later the gunman went on a shooting spree which resulted in the death of 33 students and professors including the gunman who shot himself. Timely warning was not issued and that the e-mail that was issued was inadequate as it failed to comprehensively pass the message. The mail read, ‘shooting incident’ without mentioning any fatalities. There is no justification for the two hour delay from the very first incident and the vagueness of the warning. The Virginia Tech officials had enough information that could have helped in identifying the threat and passing information to students and employees (Lipka, 2010). After the shooting, many people have claimed to have raised an alarm regarding Cho’s behavior two years before the incident. His English teacher at the institute is said to have been alarmed by his drawings and even asked him to stay out of class. There were also two other complaints rose by female students at the institution. Cho is said to have contacted one of the female in person and by phone and the other through instant message. After the incident were reported to the campus police, the only asked Cho not to repeat his advances. In the year 2005, the victim is said to have been ordered to a psychiatric observation by a court which revealed that he posed imminent danger to himself. He is also said to have spoken of suicide on several occasion. The officials from higher education claims that these observations are in contravention with the student’s right to privacy. Thus the institution was not in any position to conduct the parents of Cho without his consent on his background (Angelo, 2007). It is evident that those who had some crucial information on Cho Seung-Hui did not take the bold step on sharing the same. It is assumed that by sharing the information that colleagues and professors held about that the young man harbored could have seen the ugly incident averted through psychotherapy. It has been argued that his roommates and some professors had observed some warning behavioral traits. According to the findings of the 2007 Report to the President on Issues Raised by the Virginia Tech Tragedy; it was found that there are impediments in sharing of crucial information. One of the findings read; Education officials, healthcare providers, law enforcement personnel, and others are not fully informed about when they can share critical information on persons who are likely to be a danger to self or others, and the resulting confusion may chill legitimate information sharing (The White House, 2007, para 4) Conclusion: In the Tarasoff incident, the patient is said to have revealed of his intention to kill the girlfriend to the psychiatrists but the therapist failed to issue a warning to the intended victim which tragically ended in the death of the victim. The therapists were found to be answerable for having failed in their duty to warn the victim of the potential danger posed by their patient. The psychiatrists cited breach of confidentiality in their defense which was dismissed by the Supreme Court ruling by offering guidelines on the confidentiality issue. The Virginia Tech incident on the other hand presents a scenario where the institution was barred by the right to privacy to inquire into the psychiatric background of the student gunman and this led to the fatal incident where many lives were lost in cold murder. Reference: Angelo, J. M. , (2007). Tragedy at Virginia Tech. Retrieved on 17th July 2010 from; http://www. universitybusiness. com/viewarticle. aspx? articleid=758 Buckner, F. , and Firestone, M. , (2000). â€Å"Where the Public Peril Begins†: 25 Years After Tarasoff. Retrieved on 17th July 2010 from; http://cyber. law. harvard. edu/torts01/syllabus/readings/buckner. html Docstoc, (2010). Ethical and Legal Issues in Counseling Practice. Retrieved on 17th July 2010 from; http://www. docstoc. com/docs/18350933/Ethical-and-Legal-Issues-in-Counseling-Practice Lipka, S. , (2010). Virginia Tech Contests Education Department’s Assertion of Late Warning in 2007 Shootings. Retrieved on 17th July 2010 from; http://chronicle. com/article/Virginia-Tech-Disagrees-With/65613/ The White House, (2007), Report to the President on Issues Raised by the Virginia Tech Tragedy, Retrieved on 17th July 2010 from; http://www. hhs. gov/vtreport. html

Sunday, September 29, 2019

Bw/Ip International, Inc Case

Valuation of Corporate Finance BUFN 750 BW/IP International, Inc 1? BW/IP is a good candidate for the leverage buyout. * Steady cash flow (around 30 million per year). * Strong management team. * Positive NPV (about 61. 5 million) The NPV of BW/IP is 61. 5million(301-239. 5). Thus, we are quite optimistic about this BW/IP’s project. Calculating the NPV. Method: APV: VL=VU+PV (ITS). We can get the interest paid schedule from the BW/IP’s projected operating performance, which means there is a pre-determined interest paid to debt holders.Assumption: Tax rate: 38%. From 1991 to 1993, the tax rate remains to be constant, which is 38%. And we assume that the tax rate will continue to be 38%. Exhibit 1 shows the process of calculating tax rate: Growth rate:We assume the project will last for infinity, and grow in perpetuity after year 1992. And we use the average annually growth rate from 1990 to 1993 as our perpetuity growth rate, which is 2. 3%. Change in NWC:We subtract cas h from NWC provided in the case and we get the adjusted change in NWC.The calculation is presented in Exhibit 2. Discount rate:Typically, the investment horizon of a common leverage buyout range from 5 to 10 years, so we use the ten years treasury yields, ending at 1987 as the risk free rate, which is 8. 79%. For the market return, we use the S&P 500 index in 1980s, which is 12. 79%. Thus, we can easily get the risk premium. Exhibit 3 shows the process of calculating discount rate. Tax shields:Giving the interest paid schedule, we can figure out the tax shield each year from 1988 to 1993 at the tax rate of 38%.Discount rate: with a pre-determined debt and interest paid, we should use the cost of debt to get the present value of interest tax shield, because the risk of tax shield is moving together with the risk of the loan (debt), instead of the total assets. We assume the corporate borrowing rate is the same with BBB long-term bond, which is the cost of debt, 10. 63%. Thus the pres ent value of tax shield from 1988 to 1993 is 31. 91. We assume perpetual debt from the year 1994, and the same growth rate, which is 2. 3%. Exhibit 4 shows the processing of calculating tax shields.The FCF is presented in Exhibit 5. Sensitivity Analysis for BW/IP is presented in Exhibit 6 2? We favor the proposed acquisition of UCP. The primary sources of value in the transaction include: * Low capital or cash requirement UCP is a small firm, which would require additional borrowing by BW/IP of only 13 million. * Synergy and efficient gains. UCP’s product line complemented BW/IP’s extremely well because UCP’s most attractive feature was its installed base in the petroleum industry and together they would have the largest installed base in the petroleum segment. Improved management Takeover can improve management because interest and principal payments can force management to improve performance and operating efficiency. The proposed price is reasonable, because it is higher than the levered value of the project, which is 48. 17. Method: APV: VL=VU+PV (ITS). Assumption: Tax rate: Tax rate=38%, which is the same as the tax rate for BWIP. Growth rate: We use the average annually growth rate from 1991 to 1993 as ourgrowth rate,which is 6%. Discount rate: We use the ten years treasury yields, ending at 1988 as the risk free rate, which is 9. 4%. Exhibit 7 shows the calculation of Vu Exhibit 8 shows the calculation of PV(ITS) Sensitivity Analysis for UCP/IP is presented in Exhibit 6 3. How do the various features of the BW/IP buyout affect the company’sdecisions about long-horizon opportunities such as the UCP acquisition? What are the advantages and disadvantages of the 1987 buyout, viewed as afinancial program? After the buyout, BW/IP became a privately owned company which was less dependent from Borg-Warner Corporation than before in decision making.For the opportunities that the managers favored, such as the UCP acquisition, the compa ny had more chance to carry on the deal. However, for the case in which larger amount of financing is required, the company may not be competitive enough without Borg-Warner’s financial support. The buyout could generateda better and a more efficient management, by changing the corporate structure (including modifying and replacing executive and management staff, unnecessary company sectors, and excessive expenditures), BW/IP can revitalize itself and earn substantial returns.However, since the 1987 buyout is highly leveraged, the new company has a high debt-to-equity ratio, which means the company needs to achieve required return to pay the cost of debt or faced the chance of bankruptcy. Besides, the leveraged buyout is also considered to be a risky project, which may be easily affected by economics environment. The chance of success tends to be larger under steadily growing economy, while smaller in recession periods. 4. As one of BW/IP’s bankers, would you approve t he company’s request for a waiver of covenants and financing of the UCP acquisition?Yes. A banker will not approve to finance a project unless he has confidence in the profitability of the project and in that he can get his money back. The projected NPV of the UPC deal is 48. 17 million dollars, which is far bigger than the offer 18. 5 million dollars. To analyze this qualitatively, the expected success of the UCP acquisition comes from several aspects. Undeniably, the economic and industrial forecast is against financing a risky project . However, the deal will generate positive synergies since UCP’s product line complemented BW/IP’s extremely well.BW/IP will raise its competence in both original equipment and aftermarket sector domestically as well as internationally after acquiring UPC. Besides, as mentioned in the case, the good credibility of Mr. Valli and his team and that C&D’s principals were experienced and respected in the financial community wi ll affect bankers’ attitude. Exhibit 1: Tax rate | 1987| 1988| 1989| 1990| 1991| 1992| 1993| EBT| -9. 56| -0. 001| 8. 91| 12. 95| 17. 31| 19. 49| 23. 57| Income tax| 2. 8| 0| 0| 3. 61| 6. 58| 7. 41| 8. 96| Tax rate| -29%| 0%| 0%| 28%| 38%| 38%| 38%| Exhibit 2: Change in NWC AR| 58. 68| 53. 1| 51. 69| 55. 08| 59. 11| 63. 6| 67. 91| 72. 54| INV| 58. 5| 58. 39| 60. 72| 64. 66| 69. 57| 75. 46| 80. 29| 85. 53| Other current asset| 3. 91| 3. 49| 4. 42| 4. 7| 4. 99| 5. 31| 5. 64| 5. 99| AP| 15. 78| 18. 12| 19. 73| 20. 94| 22. 32| 23. 78| 25. 19| 26. 69| Other current liabilities| 14. 92| 17. 29| 15. 19| 16. 12| 17. 1| 18. 23| 19. 36| 20. 56| NWC| 90. 39| 79. 57| 81. 91| 87. 38| 94. 25| 102. 32| 109. 29| 116. 81| Change in NWC| | -10. 82| 2. 34| 5. 47| 6. 87| 8. 07| 6. 97| 7. 52| Exhibit 3: Cost of capital Cost of capital| 17. 5%| CAPM| Rf| 8. 79%| Exhibit 7 | ?a| 1| Hint| Market return| 12. 79%| S&P 500 index in 1980s| Risk premium| 4. 00%| |Exhibit 4: Interest tax shield | 1988| 19 89| 1990| 1991| 1992| 1993| Total interest paid| 0. 63| 1. 75| 1. 66| 1. 51| 1. 4| 1. 22| ITS: tax [email  protected]%| 0. 24| 0. 67| 0. 63| 0. 57| 0. 53| 0. 46| Cost of debt 10. 63%| | PV (ITS) 1988-1993| 31. 91| PV (Terminal value)| 37. 1| Total PV (ITS)| 69. 00| Exhibit 5: Free cash flow | 1986| 1987| 1988| 1989| 1990| 1991| 1992| 1993| FCF| | 39. 37| 26. 8| 24. 62| 24. 11| 24. 57| 24. 72| 25. 8| Growth rate| 2. 3%| Terminal Value| 270| VU| 232. 89| PV (ITS)| 69| VL| 301. 89| Exhibit 6: Sensitivity analysis for BW/IP * Buyout| | * NPV| * % change of NPV| * Growth rate| * 0. 00%| * 32. | * -47. 91%| | * 2. 30%| * 62. 39| * 0. 00%| | * 4. 60%| * 109. 5| * 75. 51%| * Discount rate| * 10. 79%| * 81. 5| * 32. 52%| | * 12. 79%| * 61. 5| * 0. 00%| | * 14. 79%| * 44. 5| * -27. 64%| * Cost of debt| * 9. 63%| * 64. 5| * 4. 88%| | * 10. 63%| * 61. 5| * 0. 00%| | * 11. 63%| * 59. 5| * -3. 25%| Exhibit 7:The calculation of Vu | 1988| 1989| 1990| 1991| 1992| 1993| EBIT| -1. 15| 2. 59| 3. 29| 3. 96| 4. 34| 4. 74| Income tax @| -0. 44| 0. 98| 1. 25| 1. 50| 1. 65| 1. 80| NI| -0. 71| 1. 61| 2. 04| 2. 46| 2. 69| 2. 94| FCF| | | | | | | Depreciation| 0. 48| 0. 6| 0. 99| 0. 90| 0. 84| 0. 84| Change in NWC| | | | | | | Change in AR| 1. 13| -0. 15| -0. 22| -0. 20| -0. 13| -0. 14| Change in inventory| -0. 36| 0. 68| -0. 21| -0. 18| -0. 12| -0. 13| Change in other asset| 1. 73| 0. 00| 0. 00| 0. 00| 0. 00| 0. 00| Change in current liability| 0. 27| 0. 18| -0. 01| -0. 35| -0. 04| -0. 04| Change in NWC| 2. 23| 0. 35| -0. 42| -0. 03| -0. 21| -0. 23| Capital expenditure| 0. 18| 1. 20| 0. 40| 0. 40| 0. 40| 0. 40| FCF| -2. 64| 1. 02| 3. 05| 2. 99| 3. 34| 3. 61| Growth rate| | | | -2%| 12%| 8%| Average growth rate| 6%| | | | | | Terminal value| | | | | 53. 15| | FCF| -2. 64| 1. 02| 3. 05| 2. 99| 56. 9| | VU| 40. 28| | | | | | Exhibit 8:The calculation of PV(ITS) | 1988| 1989| 1990| 1991| 1992| 1993| Interest | 0. 63| 1. 75| 1. 66| 1. 51| 1. 40| 1. 22| ITS: tax [email  protected]%| 0. 2 4| 0. 67| 0. 63| 0. 57| 0. 53| 0. 46| Terminal value| 2. 18| | | | 10. 01| | PV (ITS)| 7. 97| | | | | | Exhibit 9: Sensitivity analysis for UCP/IP UCP| | NPV| % Change of NPV| Growth rate:| 0. 00%| 14. 35| -51. 76%| | 6. 00%| 29. 75| 0. 00%| | 12. 00%| 278. 5| 836. 13%| Discount rate:| 10. 79%| 46. 5| 57. 63%| | 12. 79%| 29. 5| 0. 00%| | 14. 79%| 20. 21| -31. 49%| cost of debt:| 9. 63%| 30. 5| 3. 39%| | 10. 63%| 29. 5| 0. 00%| | 11. 63%| 27. 5| -6. 78%|

Saturday, September 28, 2019

Customer service Essay Example | Topics and Well Written Essays - 750 words

Customer service - Essay Example Customer Service Professionals has to be viewed as internal customers also and as such constant meeting has to be held to get feedback from not only to respond to their questions on how to handle customer concerns but also on their concerns as employees. Job designs or how tasks are combined to complete the job should also be responsive on how the Customer Service Professional responds to the customer’s needs. This can be done through perpetual job reengineering of processes and work-flows to enhance the frontliner’s effecitivity. Job improvement of a Customer Service Professional in a credit card company has to be viewed not only in terms of skills but also in motivation. The job can also be physically demanding as the employees has to work in shifts including weekends and holidays and as such, employees are susceptible to being burned out when this is not checked. The company has to guard itself from those tendencies to keep its employees motivated to perform. One way to guard it is by employing job enlargement whereby a job is enlarged, the worker performs a large work unit involving a variety of task elements rather than a fragmented job. An enlarged job can elicit intrinsic motivation for a number of reasons (Chung, Ross, 1977) and employees working on a greater number of workstations reported lower scores for resignation (Weichel et al, 2010) How would you improve the customer service professional's job through rewards and incentives only?   Rewards and incentives are very important to keep Customer Service Professional motivated to perpetually improve on their jobs. The company, being one of the leading credit card providers has to provide excellent customer service to remain competitive in the business and this translates to high expectation of performance from its frontliners, the Customer Service Providers. When metrics for the delivery excellent customer service are met and exceeded, management should give incentives among its Custome r Service Professional not only in monetary terms but also in recognition, career progression and an enjoyable working environment. For example, when the Customer Service Professional received a positive feedback from a customer and met the number of queries, cases resolved with minimal tardiness and absenteeism, a corresponding amount should be given as an incentive to the employee. On a team level, teams who perform are given bonuses as a reward. A team outing can also be arranged as a reward without affecting the operation of department where the team can go out to have fun. This will serve as a reward and also to guard the employees from being burned out with the demands of the work. How would you improve your current or last job?   It is a given that any employee who belongs to an organization should know his/her job. But beyond job knowledge, an employee should also involve in the Management’s initiatives on how to improve job performance. When suggestions are asked o n how to improve job work-flows and processes or to modify existing systems to enhance productivity, I should share my insight so that the Management will have a better perspective in improving productivity. I will also be open to job rotation where I will be moved through a schedule of assignments to give myself a breadth of exposure to the entire operation of the company. I will cooperate on

Friday, September 27, 2019

Surrealism - Leonora Carrington Essay Example | Topics and Well Written Essays - 1500 words

Surrealism - Leonora Carrington - Essay Example The essay "Surrealism - Leonora Carrington" discusses surrealism and the figure of Leonora Carrington. She got most of her morale from her mother who encouraged her to participate in art. Besides encouraging her, her mother played an important role in shaping her daughters career. In 1936 she gave Carrington Herbert Read’s book titled surrealism. This played a major role in encouraging her to turn up to be a surrealist. In 1937, Carrington met Max Ernst the person who had influenced her into surrealism before he even met him. This led to their marriage as Ernst separated with her wife to settle with Carrington. Most of her paintings were images of beast something that she attributes to have learnt from her culture in Mexico. She also depicts pictures of horses in most her diagrams something she affirms as a woman’s source of strength. Her main aim of painting and writing was to engage in unconscious forms of art as a philosophy of the surrealism. This paper is going to analyze the artistic background of Leonora Carrington. The paper looks into her influence in surrealism and tackles most of her novels and paintings. Just like any other artist, Carrington was attracted to surrealism with the interest of resolving contradicting conditions of dream and realities. This was the main aim for many artists mostly painters and novelist to join the surrealism movement. Most of these artists attribute their works to the influence of philosophers. For example, when Sigmund Freud developed his work of free association.

Thursday, September 26, 2019

Design Process Tchnical Research Paper Example | Topics and Well Written Essays - 750 words

Design Process Tchnical - Research Paper Example The Ericsson Company pioneered the development of Bluetooth technology in the early 1990s, with the key individuals behind the discovery being Jaap Haartsen and Sven Mattisson (Burbank et al. 2013). Its name originates from the legendary Harald Bluetooth, a king who united two warring tribes, hence the borrowing of the name, owing to the capability of Bluetooth technology to connect two devices for data transfer. The development of Bluetooth technology has come in the form of versions since its inception in the 90s (Franklin & Layton, 2014). The first version of the device (known as Bluetooth 1.) came in the initial stages of homogenization. However, this earlier version had the challenge of compatibility, since it did not work with other devices. Additionally, the device posed challenges of slowed connectivity, hence the need for its improvement (Burbank et al. 2013). The second version of Bluetooth appeared in 2004, and this came with increased speed and higher compatibility rate, as opposed to the earlier version. Later, in 2007, the manufacturers upgraded this Bluetooth version into version 2.1. The device had a higher compatibility rate, reduced power consumption and increased connectivity speed. Research is still in progress to fashion a better version of this technology that will enable even faster connectivity and save on time and power consumption. Bluetooth technology came in handy to eliminate challenges of technology that wire technology posed. Besides, Bluetooth technology has significantly aided in the reduction of cost challenges that cable technology poses, since, before the invention of this technology, one has to utilize cables that were costly, slow and consumed vast amounts of energy (Burbank et al. 2013). Bluetooth technology is an inexpensive mode of communications that allow data transfer over short distance ranges. The ranges of 2.4 to 2.5 GHz may be unregistered across the

Wednesday, September 25, 2019

Decriminalization, drug maintenance and harm reduction Essay

Decriminalization, drug maintenance and harm reduction - Essay Example Thus it is time to seek alternative approach in combating drug abuse. Among such alternatives are: decriminalization, harm reduction, and drug substitution and maintenance. Decriminalization is the process of making an action no longer a criminal act in the relevant jurisdiction. While decriminalized acts are no longer crimes, they may still be the subject of regulation; for example, the licensing and regular medical testing of prostitutes, or a monetary penalty in place of a criminal charge for the possession of a soft drug. (Decriminalization, 2006). The decriminalization of drugs is a complicated issue embracing numerous distinct moral/ethical and practical strands which can, possibly, be summarized thus: (a) Whose body is it anyway Where do I start and the government begins What gives the state the right to intervene in decisions pertaining only to my self and contravene them (Valnin, n.d.). However, most studies shoed that decriminalization could the best weapon against drug abuse. For example, in the case of marijuana, findings from dozens of government-commissioned and academic studies published over the past 25 years overwhelmingly affirm that l iberalizing marijuana penalties will not caused an increase in marijuana utilization or influence a teenager perception of drug use. Since 1973, 12 state legislatures -- Alaska, California, Colorado, Maine, Minnesota, Mississippi, Nebraska, Nevada, New York, North Carolina, Ohio and Oregon -- have enacted versions of marijuana decriminalization. In each of these states, marijuana users are no longer jailed when caught possessing marijuana (Marijuana Decriminalization & Its Impact on Use, 2002). Harm reduction Another alternative would be to replace unsuccessful laws and policies with harm-reduction strategies, which center on reducing the societal costs of drug abuse and other drug use. Techniques include education to avoid overdose, needle exchange programs to reduce the spread of blood-borne diseases. Addressing drug use as part a public health issue rather than a criminal one would be beneficial in the long run (Zinberg, 1984; Drug Abuse, 2006). The central idea of harm reduction is the recognition that some people always have and always will engage in behaviors which carry risks, e.g. casual sex, illicit substance use. Harm reduction aims to lessen the potential harm linked with these behaviors without attempting to prohibit the behaviors. Therefore, no one should be denied of health care services simply due to the fact that they take risks. Furthermore, harm reduction seeks a social justice response to illegal drug use, in contrary to a criminalizing one (Harm reduction, 2006). Drug substitution and maintenanceAnother alternative to unsuccessful laws and policies is drug substitution and maintenance. These approaches have a long history however. The logic behind is that of harm reduction: if some people are unable to quit using drugs, both users and society at large benefit if these users, i.e., addicts, are able to switch from "black market" drugs of indeterminate quality, purity and potency to legal drugs, of known purity and potency, obtained from physicians, pharmacies and other legal channels (Drug substitution

Tuesday, September 24, 2019

Experiment Mitosis Essay Example | Topics and Well Written Essays - 1000 words

Experiment Mitosis - Essay Example Cell division is a fundamental process in both plants and animals’ growth and development as well as recreation. This paper investigates the mitosis process in both plants and animals’ cells to identify distinct stages of mitosis and the structure of cells at each stage. The experiment identifies similarity in mitotic stages for cells in both plants and animals. The mitotic process leads to division of one parent cell to form two identical daughter cells that can further undergo subsequent mitotic divisions. Introduction Cells are the fundamental elements of living things, both plants and animals. Consequently, realized mechanisms originate from cells and manifest in organs and the entire organism. Mitosis and meiosis are some of the fundamental processes that take place at the cell level. They refer to cell divisions that lead to generation of new cells to replace dead or worn out cells, generation of cells for development of organs, and cell division towards growth. M itosis leads to generation of identical daughter cells for growth or replacement of cells in organs. It takes place in a number of stages, interphase, prophase, metaphase, anaphase, telophase, and cytokinesis (Goldberg and Goldberg, p. 77- 80). The interphase is a preliminary stage in cell division that precedes the mitotic stages. It is fundamental as it forms the largest percentage of a cell’s life. The major activity at this stage is replication of cell proteins within cells and developments to visibility of cell nucleoli. Mitosis however has four stages that result into cell division. The first stage is the prophase, followed by metaphase, anaphase, and telophase respectively (Goldberg and Goldberg, p. 79). At the prophase, â€Å"strands of chromosomes begin to condense† and can be seen with the aid of a powered microscope. Visibility of the nucleoli however disappears while fibers develop in the cell’s cytoplasm. The developed fibers emanates from a pair of centrosomes that stretch to opposite poles of the cytoplasm. Disintegration of the â€Å"nuclear membrane begins† at this stage and marks the end of the prophase and the process moves to the metaphase (Goldberg and Goldberg, p. 79). At the metaphase stage, the chromosomes are arranged along a plate that is perpendicular to the centrioles’ plane and the â€Å"spindle fibers† interlink the centrosomes and the chromosomes (Goldberg and Goldberg, p. 79). A new phase, the anaphase is then marked by disintegration of chromosomes into centromeres that are then attracted to the centrosomes along the fibers (Goldberg and Goldberg, p. 79). The cell then enters a new phase, the telophase, where the pulled chromosomes converge at the opposite sides of the cell, along the fibers and the nuclear membrane begins to reappear. Each set of chromosomes assumes the normal thread like structure and the nuclear membrane develop around each group of chromosomes to form two nucleuses within the cytoplasm (Toole and Toole, p. 139). The cytokinesis process, where the cytoplasm divides to form two different cells then follows this (Goldberg and Goldberg, p. 79- 80). The structure of the cells in plants and in animals may however be different. This is because of a number of factors such as the lack of significance of the spindle fibers in the plant cells. The nucleus, rather than spindle fibers in plant cells, moves to define the new position of chromosomes in the mitosis process (Cassimeris, Plopper and Lingappa, p. 952). This paper seeks to explore mitosis in plants and animals’ cells. It aims at describing chromosomal events in mitosis, differentiating between plants and animal cytokinesis, and explaining why mitotic divisions are necessary in living systems. Materials and methods The experiment used the following materials and equipments Allium root tip slide Whitefish blastula slide Living onion roots Acetic oxcelin Mitosis models Methods Using a prepare d slide of onion root tip and a 4x objective, a

Monday, September 23, 2019

Under what conditions could it make sense to combine private and Essay

Under what conditions could it make sense to combine private and public warehouses in a logistical system - Essay Example Private warehouses are those ones that are owned by the companies for their manufacturing and storage purposes. These warehouses are operated by the companies to store their products. These companies tend to have enough resources to buy their own warehouses using large areas and money to buy the place. These warehouses are beneficial as they are a one-time cost for the company and they can design these warehouses as per their own needs and product demands; for example controlling atmosphere for edible products (Ismail, 2008). On the other hand, some companies use public warehouses. These warehouses are owned by the public sector but are given on lease or rent to the companies who need them to store their products mostly for a temporary period of time. These warehouses can be expensive and not always available. However, companies may choose them because of their location in the center or near to the manufacturers. Mostly small scale companies lease these warehouses as they don’t have enough resources to buy their own warehouses whereas large companies buy their own warehouses to avoid inconvenience (Ismail, 2008). The third type of warehouses that companies may go for is contract warehouses. These warehouses are combined of private and public warehouses. Companies chose these warehouses for several reasons and decide to combine the private and public warehouses for their logistical system. These warehouses are chosen by the companies because contract warehouses operate on a contract basis with a long-term relationship maintained which lowers the cost as compared to an average public warehouse. Contract warehouses can also benefit in operations such as flexibility, expertise, and economies of scale as equipment, labor, management, and risk is shared amongst a number of clients (Voortman, 2004). Companies thus combine private and

Sunday, September 22, 2019

Safeguarding Young People Essay Example | Topics and Well Written Essays - 2000 words

Safeguarding Young People - Essay Example This research will begin with the statement that the world is changing and so are the people living in it. Every day we are bombarded with news of new technology evolving, new cures for the ailing and progress and research in every field. Unfortunately, the changing world has also given us a reason to fear for our safety. Since the 9/11 attacks on the world trade center, terrorism has become the ‘it’ word and our times has seen quite a few examples of terrorism already. The US attacks on Afghanistan and Iraq has instilled fear of attack against all Muslim nations just because terrorism and Islam have time and again wrongly been used concurrently and many times interchangeably. However, the successes and concerns discussed above have all been on the Macro level. It is important that these successes and concerns be judged on an individual level too. At this microscopic level, we can find out lesser issues of life and the little reasons happiness. Scoring a good grade on a term paper might be the source of happiness for a student while family pressures may be a distressing factor. This paper aims to discuss these micro-level problems the youth face in that period from birth becoming young adults. â€Å"Today’s youth is tomorrow’s future†. This adage holds true since children of today will inevitably become important people in the future. Protecting and looking after them is not only a duty of the parents but also of the whole society. Sometime in the future parents will expect their children to look after them, and the society would want that the children take care of the society’s values and beliefs too. ‘Safeguarding’ is the term that is used to describe the caring and protection the youth need against the various harms and risks they unknowingly face each day. (Safeguarding, Page 257) The example in Activity 1 (page 257) helps us to discover the concept and meaning of ‘Safeguarding’. In the example, Carl is described as an outgoing person who hangs out with his friends. He is abused at home so he goes out with some street friends who are of the wrong type and so he gets involved into wrong activities as well resulting in his grades at school to drop. Evaluating this scenario we can say that everybody near him is at a risk of getting hurt. Hanging out with the wrong type of friends may harm the whole society. Being irregular at school and a source of getting bullied also poses risk to the school environment and other students. However a social worker would describe as Carl being at the highest risk. Domestic abuse, bullying, lighting a fire and abusive language are the risks that Carl faces in his life. He might be kicked out of school and since his parents don’t care about him, and end up with his hooligan street friends stealing to live his life and if he gets caught someday, he will end up in prison. This is how easily a person’s life can be destroyed if they are not safeguarded. Therefore it is our binding duty to protect such innocent children and show them the correct path to the future. Problems Faced Children usually perceive their problems to be connected with the broad domains of school, family and friends. These are usually the domains through which the children get to interact with others and learn. Problem such as domestic abuse may lead to pervasive and persistent damage to health. Family and social relationships will inevitably decrease and the child will become anti-social. Getting bullied in school may hamper the education capability of a person and can downgrade the emotional and behavioural development. The child then might just want to hide his social presence and not participate at all in collective activities that are prompted by the society. (Safeguarding, Page 258, 259) (Young People and Welfare, Page 1) It is observed that when young people are able to rid themselves from situations of harm, they make them vulnerable to a different sort of harm that is usually more dangerous. A child, who runs away from home since his father abuses and hits him, might adopt a more passive

Saturday, September 21, 2019

Smoking Problem in the Families Essay Example for Free

Smoking Problem in the Families Essay Cigarette smoking has entered almost every household under the guise of a normal and yet slightly unhealthy habit. Family life includes many aspects and perhaps one of the most important is health. Despite the fact that most people in todays society are aware of smoking-related dangers, many smokers continue to use cigarettes. Although many smokers justify their smoking habit with an excuse that it is their own decision to damage their bodies, they, unfortunately, do not fully and intelligently consider all the consequences of smoking that can affect their families. This essay will concentrate on the problem of passive smoking which can affect family life in the most negative ways and possible solutions will be given. . Smoking cigarettes may affect family life, particularly health in very destructing ways. For instance, by smoking around the family, whether indoors or outdoors, a smoker produces second-hand smoke which has a detrimental effect on the health of children and partners. Passive smoking is a serious yet hardly acknowledged problem, which can lead to all smoking-related diseases such as cancer and other devastating diseases. If someone in a family smokes, it correspondingly affects other members of the family, and this exposes the entire family to many risks. Children and pregnant women are particularly vulnerable to the harmful effects of tobacco smoke, they breathe in second-hand smoke. Children are much more susceptible to the devastating effects of tobacco smoke because they breathe more often than adults, and have less developed lungs and immune system. If both parents smoke cigarettes this obviously increases the impact on the children. For pregnant woman, it is very harmful to be in the same room with a smoker. Furthermore, women who smoke during pregnancy or men smoking around pregnant partners put their unborn child at risk of poor health outcomes. This may reflect in penchant to many diseases and slow development. There are different ways of solving this problem. Smokers should get the cigarettes out of their lives and save their families from dangerous chemicals in the cigarette smoke. The only correct solution to this problem is simply not to start it or stop smoking as soon as possible. One of the solutions for people addicted to nicotine is to stop smoking cigarettes around their families, to keep them away from extremely dangerous passive smoking. Switching to the Nicotine-based chewing gums, tablets and patches which provide a certain amount of nicotine needed for smokers. Using electronic cigarettes become more and more popular amongst the smokers because it is more cost effective and more convenient than traditional cigarettes. They simulate the act of tobacco smoking, but free from dangerous chemicals and second-hand smoke. People can smoke e-cigarettes at home, in a car without harming other family members. Government can help in solving this problem by establishing new laws and regulations. Smoking in public places should be banned in order to prevent passive smoking. For example, nowadays, there are many cafes and restaurants which have smoking and non-smoking areas. Providing the support from different organizations such as â€Å"Tobacco Free Families Campaign† will help people handle the problem of smoking which affects their family life. Many young families who experience this kind of problems would ask for help or advice. When a family member smokes it affects on the health of the entire family. There are many dangers of passive smoking that may lead to certain health problems inside the family. To avoid these potential dangers people should think not only about themselves, but also about their loved ones. If smokers stop using cigarettes, children and partners will be much healthier. One solution to this problem is to switch from traditional cigarettes to non-tobacco products such as electronic cigarettes, nicotine-based chewing gums, tablets etc. Another solution is governmental support and new laws against smoking in public places. These possible solutions would make family life better and prevent from any smoking-related problems.

Friday, September 20, 2019

Contradicting Theories On Choking Under Pressure Psychology Essay

Contradicting Theories On Choking Under Pressure Psychology Essay For several decades, the relationship between stress and performance gained much attention. Numerous psychological researches provided evidence for the anecdotal phenomenon that pressure negatively affects cognitive and motor control during performance. This phenomenon is known as choking under pressure, defined as performing more poorly than expected, in situations where performance pressure is at a maximum, given at ones skill level. Contradicting theories on choking under pressure A widely accepted explanation for choking under pressure in cognitive tasks is the distraction hypothesis (Wine, 1971). In accordance to distraction theories, it is proposed in high-pressure situations, the individuals attention needed to perform the task at hand is coopted by task irrelevant thoughts and worries such as worries about the situation and its consequences that leads to choking which harm their performances. (Beilock Carr, 2001; Lewis Linder, 1997; Wine, 1971). Essentially, pressure creates a dual-task environment in which situation-related concerns compete with the attention required to accomplish the task at hand. Distraction-based accounts of skill failure propose that performance pressure affects concentration from the main task that one is trying to perform to irrelevant cues. Therefore, there are insufficient working memory resources to successfully support both primary task performance and to deal with worries about the pressure situation and its consequences un der pressure which results in skill failure. Although there is evidence that pressure prompts failure by sidetracking attention away from skill performance, a contradicting class of theories has been put forth as an alternate explanation for skill failure. Baumeister (1984) proposed a self-focus theory called explicit-monitoring theory which claims the opposite that pressure could in ¬Ã¢â‚¬Å¡uence the performance of skilled individuals by causing them to engage explicit processes that interfere with carrying out the procedure such as increase in their self- consciousness and anxiety about performing well (Gray, 2004; Masters, 1992) which in turn leads performers to emphasize their attention on skill execution to ensure optimal result (Beilock Carr, 2001). This focus on the oneself is thought to prompt individuals to turn their focus inward on the precise processes of performance in an effort to apply more explicit monitoring and control than would be applied in a non-pressure situation. Rationale Distraction and explicit monitoring theories of choking under pressure pose very different mechanisms of skill failure. While distraction theories suggest that pressure influence performance by shifting attention and working memory resources away from it, explicit monitoring theories suggest that pressure shifts too much attention toward skill processes and procedures. However it is unclear as to whether distraction or explicit monitoring will impact performance, even though both mechanisms have tendencies to occur in certain contexts. We believe that pressure can do both in aspects of the performance environment itself. Distracting thoughts, explicit monitoring, or even both will be lead to depending on the specific elements of stress suffered in high-pressure situations as it may essentially involve multiple components; therefore, exerting multiple effects. The questions as to whether performance fail or succeed, and how this failure will occur, rest on aspects of the pressure situation and the required attention for the task being performed. Aim The aim of the experiment is to study the effect of different levels of pressure inflicted by an audience on peoples performance (word count and accuracy) in a typing task. Experimental outline This study was conducted on a total of 102 undergraduate psychology students, of which 54 were females and 48 were males. The participants ranged from 17 to 55 years of age (Mean=20.51 years; SD=6.28). The participants performed a typing task under 3 di ¬Ã¢â€š ¬erent environments which is no pressure, low pressure and high pressure in random order. The no pressure condition involves participants typing while the projector screen was turned off, so no one else in the room could see what they were typing. In the low pressure condition, the screen was turned on, so the rest of the class could see what was being typed. In the high pressure condition, the class crowded around the participant as they typed. In each condition, they are allocated a script of text which they need to replicate as much and as accurately as possible in the time allocated (45 seconds). Quality of performance is analyzed by counting the number of words typed and errors made. Hypothesis We hypothesize that pressure have a negative impact on performance. In no pressure condition, we predict that the participants would achieve the highest word count with lowest number of errors, whereas in high pressure condition, we predict that the participants would achieve the lowest word count with highest number of errors. Discussion The results showed that the number of words typed was significantly affected by pressured condition. Participants performance speed was fastest in the low pressure condition compared to the high-pressure condition. The results showed that accuracy was significantly affected by pressure condition. As for the participants accuracy, it was greater in the no-pressure condition compared to the low-pressure and the high-pressure condition. As such, the results of this study support the hypothesis proposed. These findings are consistent with the study conducted by Gray (2004) who examined how expert baseball players batted in a baseball simulator in both low-pressure and high-pressure conditions. Gray (2004) found an increase in batting errors and movement variability under high pressure, relative to low-pressure situation; suggesting that pressure negatively affects performance. As with the baseball players, we believe that our participants also experienced distracting thoughts and/or explicit monitoring under pressure which interrupted their performance. As a result, the participants experience a decrease in typing speed; hence, produced less word count and made more errors while typing. Strengths of the experiment This experiment assessed both male and female which rules out any possible gender difference. With the wide age range of 17 to 55 years of age, it also rules out age difference. Also, by manipulating the pressure environment, individuals will focus on the process of performance versus the outcome of performance, allowing us to study different aspects affecting ones performance in pressure-filled situations. Improvement to the experiment A larger sample size would have enabled us to achieve more accurate results. Significance This study enables us to better understand performance failure, and ways to prevent it; across a variety of skill types and situations, from a student taking a final exam paper to a professional athlete playing on the field. Such developed knowledge aids the improvement of training regiments and performance strategies designed to lighten these choking performances as such reducing the possibility of failure. Understanding the reason choking occurs is important for developing training methods to deal with it. Understanding skill failure and success under pressure may give a clear view on the similarities and differences in the cognitive control structures underlying a diverse set of skills. Furthermore, by uncovering the mechanisms thats leading pressure-induced failure, we can also further our understanding of how emotional and motivational factors combine with memory and attention processes to impact skill learning and performance. An understanding of how the performance environment modifies cognitive processes not only advances our understanding of the choking under pressure phenomenon explicitly but also provides an perception into related situations in which performance unintentionally falters, ranging from test anxiety to the threat of conforming to a negative stereotype. Finally, these  ¬Ã‚ ndings suggest an important avenue for future research working toward an all-embracing th eory of when performance will fail versus succeed under stressful situations.

Thursday, September 19, 2019

Creating Madness in The Yellow Wallpaper -- Yellow Wallpaper essays

  Ã‚  Ã‚  Ã‚   As summer progresses in the story "The Yellow Wallpaper," John's treatment of the narrator as though she were a helpless docile child becomes a self-fulfilling prophecy; she sheds the skin of her adult self and gives birth to her inner child via the wallpaper. From the moment she implies she is sick, his behavior becomes more and more parental and authoritarian. Under this guise he slowly disintegrates any resemblance of an adult wife he had. At the end he's victorious because he does beget a child. Simultaneously, he's a loser because the behavior of this childlike being mirrors his own attitude toward his wife: she's defiant and assertive and runs right over him. The tables have reversed. In the beginning of the story, John laughs at her feelings about the queerness of the estate he has rented for the next three months. He acts as if her imagination has gone wild. Clearly he does not see her as his equal but as an undeveloped being who would entertain such nonsense. John "has no patience with faith" and "he scoffs openly at any talk of things not to be felt and seen" (Gilman 178). John does not have the patience to deal with a lesser being's outlook. It takes a great deal of patience for a parent to deal with the inner workings of a child's imaginative mind.    John and his brother-in-law, both physicians, refuse to believe she is really sick. Instead they assume she has "a slight hysterical tendency" (178). In their eyes depression is not an illness but a symptom of being a female. John has "forbidden her to 'work'" (179). Very often parents don't believe children when they say they are sick. Adults think that children blow things out of proportion in order to get their parents' attention. His prescription for... ...his infantile creation "had to creep over him" (191) as she escapes from the womb of the wallpaper.    Works Cited Gilman, Charlotte P. "The Yellow Wallpaper." An Introduction to Literature. Ed. Sylvan Barnett, Morton Berman, and William Burton 10th ed. New York: Harper Collins, 1993. 178-91. Golden, Catharine. "The Writing of 'The Yellow Wallpaper': A Double Palimset." Studies in Short Fiction 17 (1989): 193-201. Hume, Beverly A. "Gilman's Interminable Grotesque: The Narrator of 'The Yellow Wallpaper.'" Studies in Short Fiction 28 (1991): 477-83. Johnson, Gregg. "Gilman's Gothic Allegory: Rape and Re-demption in 'The Yellow Wallpaper.'" Studies in Short Fiction 26 (1989): 521-30. King, Jeanette, and Pam Morris. "On Not Reading Between The Lines: Models of Reading in 'The Yellow Wallpaper.'" Studies in Short Fiction 26 (1989): 23-32.   

Wednesday, September 18, 2019

US-Latin America Essay -- Politics, Dominican Republic

During the late nineteenth and early twentieth century, the United States was the most dominant power in the Western Hemisphere. European nations conceded to the United States their right of any intervention in the Western Hemisphere and allowed the United States to do whatever they wanted. The United States took this newly bestowed power and abused it. The United States intervened in many Latin American countries and imposed their policies on to these countries against their will. A perfect example of this aggression is what occurred in the Dominican Republic in 1904. The United States intervened in this sovereign nation and took control of their economy and custom houses. A memorandum from Francis B. Loomis, the United States Assistant Secretary of State, to the Secretary of States illustrates the United States’ goals, interests, attitudes and assumptions in the Dominican Republic and how the United States policy makers felt towards Latin America during this time period. The United States had a wide variety of goals and interests in the Dominican Republic and in Latin America. In the Dominican Republic, Americans were heavily invested in the Dominicans’ industries. Americans invested in an area of six million dollars just in the Sugar industry alone (Loomis 2). And â€Å"the total American investments in the Dominican Republic of an important and active sort are estimated to be worth about twenty million dollars (Loomis 2). Also, many American citizens owned and operated many vast and major plantations and railroads in the Dominican Republic. American citizens’ owned and operated 60 miles of important line of railway (Loomis 3). Also at Sosua, the American company, United Fruit Company owned some twenty thousand acres of land which... ...l power in Latin American. The United States didn’t engage in classic direct imperialism which is colonialism, but engage in indirect imperialism which focused on controlling and intervening in the economic and social institutions of Latin America. The United States only cared for their economic well-being. They didn’t care the suffering the people of Latin America were going through. The United States only cared that their economic interests were thriving in Latin America. The policies the United States government undertook clearly show this. The policies of Roosevelt’s corollary and Taft’s dollar diplomacy only mention the United States’ interests. There is nothing about the Latin American’s interests and well-being. Many people suffered because of the United States’ policy that only supported and protected the rich and powerful corporations.

Tuesday, September 17, 2019

Sexual Harassment in the Workplace Essay -- Sexual Harassment, Womens

Sexual harassment is a violation of women's rights and a prohibited form of violence against women in many countries. Sexually harassing conduct causes devastating physical and psychological injuries to a large percentage of women in workplaces around the world. Harassment directed against women in the workplace by their supervisors, fellow employees, or third parties interferes with the integration of women in the workforce, reinforces the subordination of women to men in society, violates women's dignity and creates a health and safety hazard at work. Women's advocates around the world work to further women’s right to be free from sexual harassment. Critical to these efforts to combat sexual harassment has been the growing recognition of sexual harassment as a form of violence against women which violates women's human rights. States are obligated under international law to take effective steps to protect women from violence and to hold harassers and/or their employers accountable for sexual harassment in the workplace. The prohibition of sexual harassment in the workplace is closely linked with theories relating to the subordination of women to men that were first introduced in the United States in the 1970s. These theories associated sexual harassment with violence against women, the perpetuation of gender stereotypes and the assertion of economic power over women, all phenomena which serve to subordinate women to men. In general, the role sexual harassment is believed to play in the subordination of women in society has led many countries, including the United States, the United Kingdom, Canada, Australia, Japan and South Africa, to recognize sexual harassment as an actionable form of sex discrimination. Over time, howe... ...orris, N. M. (1985). Journal of Health and Social Behavior. 10. Sobel, M. E., & Leinhard, S. (Ed.) (1982). Sociological methodology 1982. Washington, DC: American Sociological Association. 11. Swearer, S. M., Espelage, D. L., & Napolitano, S. A. (2009). Bullying prevention and interventions: Realistic strategies for schools. New York, NY: Guilford Press. 12. Touchette, E., Henegrar, A., Godart, N. T., Pryor, L., Falssard, B., Tremblay, R. E., & Cote, S. M. (2011). Psychiatry Research. 13. Willett, J. B., & Sayer, A. G. (1994). Psychological Bulletin. 14. Woodside, D. B., Garfinkel, P. E., Lin, E., Goering, P., & Kaplan, A. S. (2001). American Journal of Psychiatry. 15. Zurbriggen, E. L., Collins, R. L., Lamb, S., Roberts, T., Tolman, D. L., Ward, L. M., & Blake, J. (2007). Report of the APA Task Force on the Sexualization of Girls.

Monday, September 16, 2019

Malware and Spyware

Malware Malware,  short for  malicious  (or malevolent)  software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of  code,  scripts, active content, and other software. ‘Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. This malware will operate invisibly, often without displaying itself in your Task Manager. To top it off, malware usually refuses to be uninstalled through your control panel, and requires special tools to delete them from your drive.Yes, this is a direct cousin to viruses, but with a broader portfolio of wicked intentions. Malware includes  computer viruses,  worms,  trojan horses,  spyware,  adware, and other malicious programs. However, some malware is disguised as genuine software, and may come from an official company website. Malware is often used against individua ls to gain personal information such as social security numbers, bank or credit card numbers, and so on. Left unguarded, personal and  networked  computers can be at considerable risk against these threats.Various factors make a system more vulnerable to malware: * Homogeneity: e. g. when all computers in a  network  run the same operating system; upon exploiting one, one can exploit them all. * Weight of numbers: simply because the vast majority of existing malware is written to attack Windows systems, then Windows systems are more vulnerable to succumbing to malware attacks. * Defects: malware using defects in the operating system design. * Unconfirmed  code: code from a  floppy disk,  CD-ROM  or  USB  device may be  executed  without the user’s permission. Over-privileged  users: some systems allow all users to modify their internal structures. * Over-privileged  code: some systems allow code  executed  by a user to access all rights of that user. * Malwares affect networks easily because of the use of same OS. What does malware do? The most common malware functions are: 1. Malware steals your personal information and address book (identity theft and keystroke-logging). 2. Malware floods your browser with pop-up advertising. 3. Malware spams your inbox with advertising email. 4. Malware slows down your connection. 5.Malware hijacks your browser and redirects you to an advertising or a phishing-con web page. 6. Malware uses your computer as a secret server to broadcast pornography files. 7. Malware slows down or crashes your computer. Spyware Spyware  is a type of  malware  (malicious software) installed on  computers  that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such askeyloggers, may be installed by the owner of a shared, corporate, or  public computer  intentionally in order to monit or users.While the term  spyware  suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including  personal information  like  Internet surfing  habits, user logins, and bank or credit account information. Most spyware is installed without users' knowledge, or by using deceptive tactics. Spyware may try to deceive users by bundling itself with desirable software. Some spyware authors infect a system through security holes in the Web browser or in other software.When the user navigates to a Web page controlled by the spyware author, the page contains code which attacks the browser and forces the download and installation of spyware. Spyware also has the same effects as malware has. How to protect your computer from spyware and malware? Here is the checklist for detecting and destroying malware * Install two or three different  anti-spyware programs  (â€Å"spyware cleaners†) on your computer, and update their definition lists regularly. Because every anti-spyware cleaner is imperfect, it is necessary to use combinations of these programs to catch the greatest breadth of malware.Also, the anti-spyware manufacturers regularly add new entries to their â€Å"definition† lists, just like anti-virus software. Make sure to keep your spyware cleaners updated with these lists! * Avoiding and destroying malware/spyware is not instant, and it is not a one-time event. Instead, stopping spyware/malware is a long-term game that is exactly like cleaning dirt out of your home. You need constant vigilance, and a regular habit of cleaning malware out of your computer every week. Build a weekly habit of â€Å"scan and detect†. This should also be done whenever you install new software.Many anti-spyware programs can be set to automatically perform scan-and-detect nightly. * Carefully read every EULA (end user license agreement) before clicki ng â€Å"accept†. If you see the phrase â€Å"3rd-party software may be installed†, make sure to follow the software install with a spyware cleaning. * Educate yourself on the latest strains of malware. In particular, start visiting these recommended anti-spyware sites, and update yourself on the latest malicious programs. * Egs of antimalware programs * Antivirus/Antispyware at About * Network Security at About PestPatrol. com database * Spywareguide. com * SpywareWarrior. com * SurferBeware. com * Cexx. org * Save your data, and backup often. Below are 5 easy steps you can follow to try to avoid and, if not avoid, at least detect and remove these programs from your computer system: * Be Careful Where You Download: Unscrupulous programs often come from unscrupulous sites. If you are looking for a freeware or shareware program for a specific purpose try searching reputable sites * Read the EULA: Eula is End User License Agreement.The EULA is a legal agreement you are m aking with the software vendor. Without reading it you may be unwittingly agreeing to install spyware or a variety of other questionable actions that may not be worth it to you. Sometimes the better answer is â€Å"No, I do not accept. † * Read the instructions carefully before you click. * Protect Your System through Antivirus softwares. * Scan Your System through antivirus antivirus softwares, firewalls and other protective measures.

Sunday, September 15, 2019

Coca Cola Essay

Organizations need to change and adopt dynamic survival strategies to stay alive in uncertain political, social and economic environment (Hiatt and Creasy, 2003). All environmental factors present in the nature experience change on continuous basis. Human nature resists change, so managing that resistance requires well planned change management strategies. A structured approach to transfer organization, its people and processes from current state to a desired future state is called change management. This process gives employees the ability to accept changes in the existing environment of the business. Change can be of different type for example, change in technology, operations or strategies etc. company needs to implement individual strategies to cope with each type of change. Coca Cola Corporation is among one of the oldest corporations of the world. It has gone through many internal and external changes since it has been in existence. The company has used techniques of change management in order to survive from the consequences of those events. Coca Cola is a type of company that requires making changes in its products and business strategies according to the consumer expectations and external environment. Here in this study we would quote different examples from coca cola corporation’s history and will examine that what were the triggering events for opting the change and what strategies the company developed and implemented in order to successfully going through the transitioning process. Coca Cola is a type of company that requires making changes in its products and business strategies according to the consumer expectations and external environment. Here in this study we would quote different examples from coca cola corporation’s history and will examine that what were the triggering events for opting the change and what strategies the company developed and implemented in order to successfully going through the transitioning process. It is a well known fact that Coca Cola Corporation is an entrepreneurial venture started by one person who bought the formula from another firm and laid foundations of that beverages manufacturing firm. Current structure of the coca cola company is simple with minimal labor and management division. New system that can be adopted by the company may be the â€Å"machine bureaucracy† which has been defined as an organization with clearly defined hierarchy, well defined area of operations, standard operating procedures, proper rules and regulations, well division of labor, formal relationships among the member of organization, centralized decision making, technical competence and standardization of work. The company has faced a lot of external changes, for example in world war II, the company was able to manage its existing position at that time and also entered in many new markets and discovered new niches. The company established 64 plants across the world to supply drinks to the troops (Coca Cola Company, 2006-2011). The company also provided free drinks to soldiers which were the part of its strategy to become a patriotic symbol for the people of the country. Also it boosted the sales, so the company achieved two objectives by carefully planning to respond to that external environmental change. The plants developed by the company in war era helped its expansion after the war. The recent change management at coca cola is directed towards the intrinsic values and motivations of the employees and can be referred to as ‘employee engagement’. The change management process, together with internal branding programs is expected to bring about ideal behaviors in employees, which would align the operations of coca cola worldwide, and bring about efficiency throughout coca cola across all its business segments. Coca Cola Company can use two change management tools to make sure that all people who are required to be the part of change management process. These tools are Force Field analysis and AKADAR model. Force field analysis is a technique developed by Kurt Lewin to scrutinize the forces that are causing an opposition to change process (Bass, 2009). By doing Force Field Analysis, Coca Cola Company will be able to induct people who are in need of appropriate training. Another useful tool is AKADAR model which stands for Awareness, Desire, Knowledge, Ability and Reinforcement. Through AKDAR model, firm creates awareness about the need of change, generate desire in the people to help in transitioning process, give knowledge to the people that how they can help the change process, develop an ability in the people to go through the change and provide them with continuous reinforcement to withstand the change (CMLR, 2011). Coca cola hopes to bring about a thoroughly integrated system of communications, and focus on creating brand relationships with their employees. This would enhance the operations of Coca cola, as an integrated approach would mean all employees believe in engaging fully in the values, and this would become an inherent part of the employees at a personal level. For this purpose, employee engagement surveys are conducted twice every year for all the coca cola associates, which serve to highlight the areas where action is required, and further actions and implementations can henceforth be executed. Employee engagement is very significant to all segments of operations at coca-cola and has translated into performance in areas where employee engagement is higher. For coca-cola, an engaged workforce means: A more committed workforce Employee performance aligned with organizational objectives Employees have a clear idea of what is expected of them and what are the deliverables Customer experience focuses an inherent part of employees’ values, who strives to provide a better experience to the customers. Customer focus was identified as a central tenant of the multi-year engagement strategy to be implemented in 2011(Gee, 2011) Change in inevitable. Therefore, the focus should not be on avoiding change, rather bringing about a smooth transition towards the new change by communication about the change, and ensuring all parties of the change that it is for the best of all those involved. To successfully implement organizational change of any nature, a specific regards to organizational structure, design, culture, management and leadership is required to see whether the change would make a best fit with the organizational goals and objectives. To conclude, it may be said that communication can be a key element to successful change management. Communicate the changes to the employees, tell them why the change was inevitable and how they will benefit from the change. The management should itself adopt a positive attitude towards the change so that employees can follow their lead and welcome the change. Coca-cola as a company has a heritage of embracing change rather than resist it and it should translate into their future endeavors towards change management to ensure that the organization is best poised to market and environmental conditions.

Black & Decker Case

1)Why is Makita outselling Black & Decker 8 to 1 in an account which gives them equal shelf space? †¢Trade is asking for advertising allowances and rebate money on products, profitability in the Tradesmen segment is near zero. †¢The B&D brand in the Tradesmen segment may be regarded as â€Å"weak† due to the fact that B&D dominated the consumer segment. †¢The â€Å"heavy do-it-yourselfers† may have a misconception on the quality/reliability/durability of B&D professional line. These individuals make a living from using these tools and simply cannot risk the aforementioned features. )Why are Black & Decker's shares of the two professional segments — Industrial and Tradesmen — so different? Wouldn't you expect them to be similar? †¢Tradesmen segment is growing faster than the industrial segment. B&D did not initially capture or dominate the tradesmen segment, hence the share differential. †¢Decision influencers in the industrial segm ent viewed B&D as a high-quality brand. Similarly, the consumer segment regarded B&D as a strong brand which helped B&D attain the #1 position in the marketplace. This did not spill over to the tradesmen segment, which needs more differentiation. Strong influencers in outlets such as â€Å"Home Depot† educate the consumer to â€Å"stay away from B&D†. 3)What, if anything, do you learn from Black & Decker's consumer research? †¢B&D uses very similar branding strategies for their tradesmen and consumer segments. †¢Brand perception is the main issue with B&D strategy for capturing a larger market share. †¢Durability/Quality issues are not substantiated. Blind tests of B&D products in the tradesmen segment reveal that B&D products are comparable to other major competitors’ products. In some instances, B&D products are elected as leaders in their product categories. )Joe Galli's objective is â€Å"to develop and gain corporate support for a viable pro gram to challenge Makita for leadership† in the Tradesmen category (p. 1). To gain support, the minimal share objective would have to be â€Å"nearly 20% within three years, with major share ‘take away' from Makita. † How realistic is this? †¢This is realistic due to the fact that there are a number of negative perceptions of Makita’s products including â€Å"arrogant & dictatorial†. The problem is that no single brand dominates all the product categories in the tradesmen segment.This means that product selection may be circumstantial and mostly influenced by tradesmen in-store influencers etc. †¢Currently, B has ~9% market share, meaning that it would have to take ~11% market share from Makita who has ~50% market share. Makita has the most to lose in this industry segment. †¢Since, B is financial strong and is not making much money in the tradesmen segment, the financial risk would be limited. 5)If you think Galli should pursue a â₠¬Å"build share† strategy, what actions do you recommend? Does the DeWalt idea have any merit?How about the subbranding option? †¢Gallie should pursue a â€Å"build share† strategy but only under a different brand. Choosing a different brand name such as DeWalt that already has positive resonance in the tradesmen segment would not only disassociate the current perception of B within that segment, but could help reduce B risk of â€Å"embarrassment† in the other two segments in case the DeWalt brand fails. †¢The sub branding option still carries the B brand with it. At this point in time the tradesmen segment is not a new & emerging market, but a well developed growing market.Sub-branding at best could help drive some product categories, but not the overall brand as a whole. †¢The yellow color choice would help the DeWalt brand truly stick out from the competition. Currently, the most exotic color in the tradesmen segment is teal – Makita†™s color. The yellow color choice would less likely backfire since yellow is a familiar job site color associated with safety. 6)Be specific about what you would do and remember you have at least three audiences to please: the consumer (the Tradesman), the retailer, as well as Nolan Archibald and Gary DiCamillo. Consumer oIntroduce DeWalt brand with yellow coloring oOffer rebates and incentives †¢Retailer oIntroduce DeWalt with limited supply to generate â€Å"pull† oPromote demonstrations of products that demonstrate superiority oMaintain existing B line as a benchmark for DeWalt’s success oSlowly phase out B and replace with DeWalt oOffer volume discounts to large retailers such as Lowes and Home Depot, since this channel is the fastest growing one †¢Bosses oPresent above and maintain sub-branding exit strategy

Saturday, September 14, 2019

How after school programs benefit children and their educational experience

As societies continue to modernize and become more complicated, the pressure to work harder and to succeed also increases especially so with stiffer competition brought about globalization.Because of this, most families have both parents working to support their financial needs.   With both parents busy working, many of the studying children become susceptible to engage in unpleasant activities without adults attending or monitoring them after school.Because they often return to an empty house, they can freely engage into any activities regardless of whether they are beneficial or dangerous to them.And true enough, the prime time for juvenile crime during school days, where children were either the perpetrators or victims, is at its peak between from 3 PM to 6 PM. â€Å"The crimes that occur then are serious and violent, including murders, rapes, robberies, and aggravated assaults.† (Newman, et al, 2000, p2)In response to this pressing concern and relieve parents of their wo rries about their children’s safety and proneness to commit crime, after school programs were designed to prevent the children away from trouble and instead engage them into more productive activities that are beneficial to their overall growth and development.After School ProgramsAfter-school programs are special activities conducted regularly in the hours after school designed for children to learn new skills and contribute for their development as responsible people or adults.According to U.S. Department of Health and Human Services Administration for Children and Families, after school programs can be classified under four broad categories namely: Academics & Enrichment, Community Service Projects, Field Trips and Physical Activity & Nutrition.Academics & Enrichment refers to extra-curricular activities that are incorporated in the students’ academic programs such as arts, Civics & Government, Health & Safety, Math, Science and History among others. An after school program in science for instance engages the students to television viewing of the Space program of NASA.Community Service Projects pertains to activities that are directly linked to community service.   A popular after school program under this category is Peace Corpse, an independent US federal agency that sends students and other volunteer workers abroad to work in organizational entities i.e. governments, NGO’s and schools in the areas of education, business, technology, environment among others.Field Trips are excursions for students that permit them to have a first hand experience of what they learn in school. This includes a visit to Zoos, museums and parks. It affords students first hand experience of concepts, ideas and other things that helps enhance the learning experience.   For one, seeing a picture of lion in the book is different from seeing a real life lion in Zoo.Finally, Physical Activity & Nutrition refers to programs that are related to sports i.e. bas ketball, athletics, exercise nutrition i.e. culinary arts and cooking and health. A category in health is made to give emphasis to its importance. Human life is our highest value and the concept of health is fundamental to life. And this must start in the basic education of the youth.Benefits of After School ProgramsIt keeps children on the Right Track.   The children’s engagement or involvement in after school programs dissuades children from antisocial or delinquent activities and becoming victims of crime and violence, which predominantly occurs approximately during after school hours. â€Å"Latchkey† children or those who are expected to stay at home alone after school are at high risk of health hazardous behavior such as substance abuse i.e. drugs, smoking and alcoholism, because there are no adults to guide them appropriately.   (Chung, 2000)   Ã¢â‚¬Å"An idle mind is the devil's playground†.Children without adult guidance tend to experiment on things out of curiosity such as smoking or taking drugs which can eventually lead to vice or addiction. Being busy helps children to stay out of trouble. (Kessler, 2000, pp40-42)After-school programs can shift the attention of children from such vices to positive and healthy alternatives.   Finally, it helps in decreasing television watching thus preventing sedentary predilection that leads to obesity, or the absorption of violence that is freely accessible in the media.It enhances Academic Achievement. After school programs serve to supplement and complement the formal learning that academic institutions provide in school. Seeing things in real life or concepts in their actual applications allow children to see the value of education thereby fostering interest of studies.After school activities also are directly involve in skills building and developing such as reading. â€Å"Some program is intended to enhance work-study habits, social skills, social consciousness, working with peers, following instructions, and problem solving†. (Fashola 2001, p28).   Ã‚  The more enthusiastic children are on their studies and the more they are given the right skills for learning improves the quality of their academic learning and achievementIt promotes social development.   The social exposure provided by after school programs help children to deal with people more appropriately.   This includes improving how they conduct themselves as a person and in relation to others, which in turn boosts their self confidence.

Friday, September 13, 2019

Medical Negligence and Malpractice Case Study Example | Topics and Well Written Essays - 3000 words

Medical Negligence and Malpractice - Case Study Example There were no laws specifying requirements to practice any profession and anyone could practice whatever profession he or she wished to. As a result, there was tremendous competition between physicians and other healers. The only way the public could hold a person responsible for his actions were through tort laws. However, malpractice litigation can exist only with an established practice and a healer cannot be sued for deviating from standards if no standards exist. Since only trained physicians had professional standards, they were sued and quacks were not. There are five fundamental groupings of rationales for medical malpractice. First, a physician "contracts with those who employ him that he has such skill, science, and information as will enable him properly and judiciously to perform the duties of his calling." Second, "the principle is plain of uniform application, that when a person assumes the profession of physician and surgeon, he must, in its exercise, be held to employ a reasonable amount of care and skill. For anything short of that degree of skill in his practice, the law will hold him responsible for any injury which results from its absence (Breen et al, 1997). Third, a physician "undertakes that he will bring to the work a fair, reasonable and competent degree of care and skill in reference to the operation to be performed." Fourth, "freedom from errors of judgement is never a part of a contract with a professional man." And finally, physicians need not guarantee a cure. These principles led to increased malpractice lawsuits against better physicians. Although medical malpractice is founded on the standard principles of tort law, interest groups perceive medical malpractice differently depending on the way malpractice claims affect their financial, social, political, and professional interests. Differences in perception among politically perceptive interest groups have been significant obstacles in resolving malpractice problems. Articles su pporting and opposing the medical malpractice system have appeared in newspapers and magazines. Opponents of malpractice cite malpractice cost as a cause of high health care costs. Opponents argue that the medical malpractice system modifies the doctor and patient relationship and creates an environment in which defensive strategies influence treatment decisions (Fielding and Waitzkin, 1999). Opponents also claim that damage awards are like winnings in a lottery and provide unscrupulous lawyers and patients incentives to sue the providers. The costs of defending malpractice lawsuits and damage awards are increasing the cost of medical treatment. The costs of defensive medicine are increasing medical costs and making medical care unaffordable. Compensation for medical injuries is a paramount goal of medical malpractice actions (Hay, 1992). Compensation should be timely, fair, and paid to all who qualify for it. To be timely, compensation should be paid expeditiously. To be fair, compensation should be proportional to the amount of loss. However, it is important to determine what injuries will be compensated. The system could compensate all injuries regardless of cause, or medically caused injuries only or negligent medical injuries only. Using the concept of quality costs, malpractice costs can be divided into injury costs and

Thursday, September 12, 2019

Online Learning Research Paper Example | Topics and Well Written Essays - 2500 words

Online Learning - Research Paper Example Today employers in all branches of business are especially interested in executors who are able not only work with modern technologies but also are willing to study simultaneously with the working process. Such combination is possible only in case of distant or online education. Therefore leaders of the leading business stress important role of online education of future specialists as such practice will ensure constant knowledge refreshment (Kazi-Ferrouillet, 1989). Extension of online education courses requires restructuring of public education. From the one point of view, this will help to prepare future specialists to the modern technological environment but there is another point of view – online education may influence the performance of students and such influence may be positive as well as negative (David, 1991). The conflict between requirements of the business world and general requirements for educational programs, which are very often can’t be met by online educational courses, is the one to be solved. There are a lot of teachers and students who support online education, teachers because they can deliver information to larger audience and students because they don’t have to attend classes (Mehlinger, 1996); for this instance, online education gain stronger positions in higher and secondary school (Grimm, 1995). Online education, online educational networks, and development of these trends in education have attracted special attention of the educational world.

Wednesday, September 11, 2019

English 305 Assignment Example | Topics and Well Written Essays - 750 words

English 305 - Assignment Example In such a way, the following analysis will seek to analyze to articles upon the topic of global warming (Kunzig 21). The first of these articles takes the viewpoint the global warming is very much caused by human activity and can only be slowed by a definitive and corrective process of engagement on the part of nearly each and every societal stakeholder. Conversely, the second article takes the standpoint that global warming is a natural process, one that is ultimately contingent upon the sun, not human activity, and will necessarily run its course and give way to a cooler era in the near future. The first article, entitled â€Å"Collective Action and Citizen Responses to Global Warming†, discusses the way in which global warming threatens to have drastic impacts upon the way in which individuals live their lives, raise their families, and plan for discernible future (Lubell 399). As such, impacts upon factors such as increased temperatures leading to reduced crop yields, the effects of decreased oxygen in the atmosphere and the possibility for plaintiff and other compliments of the global food chain to be reduced, and the way in which decreased water supplies in some of the more arid regions of the world could easily lead to global conflict. Naturally, none of these determinants is especially hopeful and the reader is left with the take away that unless global warming is stopped, the repercussions of it will create a less than enticing environment in the very near future. By contrast, the article entitled, â€Å"Global Warming: The Hoax of the Century† takes a greatly different stance. Although it is mostly rhetorical in its analysis, this particular article focuses upon the fact that the scientific models and means of analytics that are being referenced to prove global warming are ultimately flawed. Moreover, the author points to the fact that the winds of politics at impacted upon the way in which individuals view the issue, and indeed the way in which scientists are representing it to the general populace (Mardell 15). Most importantly, the article itself puts forward its own set of scientific factors and discusses the manner in which the sun, the entity responsible for warming our planet and keeping the crust of planet Earth from being frozen, as is the case with so many of the other neighboring planets, is ultimately responsible for any fluctuations in global temperature that had been referenced lately. Naturally, the common sense approach that this particular article puts forward allows the individual to come to something of a realization for the fact that global warming, although potentially a serious problem, might not have the human causation that so many individuals and scientists have doggedly been pointing to the past several decades. From the complete and thorough analysis of both of these articles, a more nuanced understanding of what causes global warming and how it is reference within the current dialogue wa s understood. Ultimately, with the available evidence that exists, it is clear to discern that humans are having a negative impact upon their plan. Regardless of whether an individual is an extreme