Wednesday, October 30, 2019

Case Essay Example | Topics and Well Written Essays - 500 words - 4

Case - Essay Example 5. The management of the company used the scientific management in their strategy. They looked at how the result of reducing the production would affect the growth of the company. In so doing they chose a method that could work and enable them make profits. 6. The quality control that the company used is that they satisfy their employees and motivate them enough. This ensured that they work well and produced quality goods. I believe that this is a good strategy as it ensured that they created quality goods for a long time. 7. The forces that are very important in the management of the company are the socio cultural forces and the technological forces. This is because they will keep the company in the upfront of the competition if they are looked at keenly. 10. The competitive strategy that the company has used is observing the competitors and coming up with a method that is a weakness for their competitions. The weakness of the competitors was also the strength of the company. 11. The key elements that the company observed was working with a target duration, having a measurable and attainable goals and having specific and results oriented objectives. These elements go a long way in ensuring that the company achieves all its goals and objectives. 12. One of the cultural variation issues that was once a problem for the company is the need of the manager to reward the workers in any instancing they do a good job. This is because it did not motivate them to work as hard. This is because they knew they could get a reward for putting just enough effort in the work that they did. 13. The company was wise to choose the acquisition strategy over the Greenfield. This is because with the acquisition strategy they have assurance that they will use their own strength to grow their company. 14. The company did not embrace the technology world and they thus cannot be able to have wider coverage. The company will also experience the problem of the wrong

Sunday, October 27, 2019

A Case Study Of Social Work With Families Social Work Essay

A Case Study Of Social Work With Families Social Work Essay This was my third contact with Mrs G however my first contact with Mrs G on her own without Ps presence. The purpose of the visit was to carry out a carers assessment which focused on Mrs Gs needs separate from Ps needs. It was important that I tuned into the visit in order to work with Mrs G effectively. The process of tuning in helped me consider the legal mandate for the intervention, it helped me prepare myself for areas Mrs G may have wanted to discuss, I was able to consider relevant theories, Mrs Gs feelings, my feelings as a worker and how I would address these feelings through the use of good knowledge, skills and values. Before meeting with the family I had read through the existing case file which allowed me to gain an insight into the social work involvement of MS the transition co-ordinator to date, other professionals involved and an insight into the family background. I had previously carried out a UNOCINI assessment on P, had been on a few visits to P and Mrs G and liaised with several other professionals involved with P such as the Renal Team at the Royal Belfast Hospital for Sick Children (RBHSC), the school, Ps G.P, Clinical psychologist etc. I had already gathered relevant information and thus obtained a good insight into the family situation, particularly through liaising with the Clinical Psychologist who had done some brief family work with the family. From liaising with him, I was able to determine that there were strained relationships within the home. As my role in this instance involved assessing the needs of a carer, I read around carers in Northern Ireland, their needs and what the y often experience etc. This allowed me to tune into what Mrs Gs life may involve with regards to caring for P and consider some of the challenges carers experience on a regular basis. As I had already been involved with the family and completed a UNOCINI assessment, I gained a great insight into the familys circumstances, history/background. During this contact I wanted to obtain a greater insight into how Ps disability impacted is currently impacting on Mrs G, the primary carer of P. I prepared myself for the contact by familiarising myself with the carers assessment form however I had already decided to approach the situation by allowing Mrs G to take control and explain openly how she was coping etc. My practice teacher also discussed her expectations with me during supervision. My primary purpose in this piece of work was: The purpose of the work was to meet with Mrs G in her home. Carry out an assessment of Mrs Gs needs as a carer separate from Ps needs by allowing Mrs G to talk openly about her situation, how she was coping as a carer etc, express any concerns she had and ask her how she feels we could best support her at this time. This allowed Mrs G to take control of the discussion and identify areas to discuss. My main aims and were they achieved I contacted Mrs G prior to the visit to explain the observation so that she was aware of the situation before we arrived at the house. On arrival, I discovered that Mrs G had forgotten about the visit and planned to go into town. I asked Mrs G if she would like to reschedule but she said she would prefer to go ahead with the visit. I did not have to introduce myself at the beginning of this contact as I had clarified my role and function within the agency during the first visit with the family. I firstly introduced my practice teacher, reassuring Mrs G that she was there to assess me and my practice and that anything she would be writing would be about myself and not her. I further reassured Mrs G that anything discussed within the visit would not be discussed outside of the visit. At this stage I feel I could have explained the boundaries of confidentiality. I explained to Mrs G she was entitled to a carers assessment under the Carers and Direct Payments Act and that this would focu s on her needs as a carer as apposed to Ps needs. On reflection I do feel I could have explained to Mrs G at this stage what the assessment involved and I could have summarised what I intended to cover during the visit. Instead I just explained her entitlement to a carers assessment and that it focused on her needs. I acknowledged how difficult life has been for Mrs G and her family up until this point and asked Mrs g what it was like caring for P. Mrs G gave a very detailed account of Ps medical history and how his condition affected him. Issues arising were Ps restricted diet intake, Ps noncompliance to take medication and his personal care. On reflection, although I did attempt to probe further on these issues as an attempt to determine if and what triggers may have been contributing, looking back I do feel I could have used more effective questioning as an attempt to determine the impact this has had for Mrs G as a carer. Other issues arising were Ps lack of self-esteem and body issues which clearly contributed to his low mood. Looking back I feel I could have explored into this area more through probing more however I recall the carer at this stage having given me allot of in-depth information. I had reacted by probing further on another topic and had forgotten to go back and explore this a rea. On reflection I feel it would have been important to have explored this area further to gain a greater insight into how Mrs G coped with knowing that her son was insecure and body issues. Does she attempt to talk to P? Does this worry her, make her feel stressed etc, how does she cope seeing how Ps disability impacts upon him? Looking back another issue which Mrs G explained was the fact that P had fell out with their local Church over his diet. This was a clear issue/concern for Mrs G, however looking back, I did not probe further on this issue as once again, I recall Mrs G explaining a number of issues at once. I explored further on one issue and again I forgot to go back and explore this concern. At this point I feel I should have listed back to Mrs G the concerns that were arising and explored each of them one by one. Instead I feel I became overwhelmed by all of the information she was giving me, I consequently responded by exploring into one issue, which then led into another issue and I forgot to cover the other issues arising a the beginning. This has been a big learning curve for me as a worker. From this in particular I have learnt that I need to be more assertive and take more control of the conversation, particularly if you are with a service user who is quite talkative. In future I plan to say , ok, mrs G, youve given me quite a lot of information there. You have raised concerns about this, this and this. I would then cover each of the issues separately to ensure I have explored all areas fully that the service user has identified as being problem areas. I will also ensure to take more control of the conversation by stopping the service user if I feel she has overwhelmed me with information and pace the flow of the interaction to ensure each area is being fully explored. I recall Mrs G explaining that P had been abiding by his restricted fluid and diet intake recently as apposed to what he had done in the past. Mrs G did however express that P would still sometimes push the boundaries. I recall just reassuring Mrs G that this was very positive, however on reflection, I feel that I could have picked up on the fact that she had expressed he still pushes the boundaries at times and explored more into how they managed this, how he reacts when she reminds him the importance of his restricted diet and how Ps reactions impacted on Mrs G and other family members within the home. Mrs G went on to explain that the clinical psychologist P had been to see recently had diagnosed P as being biologically depressed and not clinically depressed. I recall probing further as an attempt to determine how Mrs G felt about this diagnosis, and asked whether P would continue to see the psychologist. However on reflection I do feel I could have explored further with regard to the possible risks this presented for P, how P was behaving, had she noticed any significant changes in his mood, behaviour etc. Looking back I feel this would have been very important and usually I feel a very obvious area to cover however I recall reminding myself of my role within that visit and that was to focus on Mrs G as a carer and how she was coping as a carer. Looking back however I do feel it was important to have explored further on this issue as there evidently could have been risks involved which could have led me to determining how Mrs G felt and coped with these. I recall Mrs G explaining about Ps argumentative nature. I did attempt to explore this area further however again at this stage I recall Mrs G giving a lot of detailed information and again I do feel it would have been beneficial to have redirected the information she had given back to how Mrs G was affected and how she was coping. I summarised by explaining to Mrs. G the main issues which we had discussed during the visit and what Mrs G was currently dealing with. I then reminded Mrs G of the main reason for the contact which was an assessment of Mrs Gs needs as a carer, how things have impacted on her and how she was coping as a carer. I summarised by asking Mrs G to once again eplain what the main concerns were for her in coping and caring for P at the minute. Mrs G once again clearly highlighted that the main concern for her as a mother was the fact that P had no opportunities at the minute to meet, socialise and interact others his own age group. She further explained that she felt this would undoubtly help to promote Ps independence while giving her and her husband a little respite. I paraphrased this back to Mrs G to have her clarify what I understood in relation to Ps needs and how this would ultimately benefit them as carers. I summarised by acknowledging and explaining to Mrs G that I understood the l evel of Ps care needs, what the family have come through in their lives to date and the impact of caring for P and other family members. At this stage I recall advising Mrs G of some support groups which may be of support to Mrs and Mrs G. Mrs G however clarified that she felt it was not them as parents who needed the support but their son, P who would benefit from some sort of social outlet. Furthermore, she did highlight she felt this would additionally benefit her and her husband as P relied quite a lot on her and her husband to take him out. Mrs G expressed she felt it would be beneficial for P if someone Ps age were to come and bring P out for a few hours. I mentioned a voluntary befrienders scheme however I was unsure as to the likeliness of getting a befriender that age within the locality thus I reassured Mrs G I would follow this up and get back to her. At this stage I recall introducing the topic of direct payments. Looking back, I feel the conversation had flowed up until this point. On reflection I had no reason to bring up the topic of direct payments as the conversation up until this stage had been centred on Mrs G, her life as a carer and how this was impacting on her. I had prepared to cover this topic solely on the basis that this was one of the topics covered within the agencys Carers Assessment forms. Looking back, I feel there was no reason to introduce this topic as there was simply no purpose in this instance. I recall asking Mrs G if she was aware of direct payments and or if she received direct paymen ts. Mrs G was not and asked if this was the same as carers allowance. At this stage I recall going completely blank. I knew it wasnt however I went completely blank and I could not think and turned to my practice teacher for reassurance and ask her if they were the same. At this stage I felt quite nervous and found it hard to refocus my mind back on the topic of conversation. I then recall trying to explain the concept of direct payments to Mrs G. I was able to explain that It focused on empowering service users through allowing them to be employers and this was a payment paid to them which would allow them to effectively employ someone if for example they wanted to pay someone to come in and care for their disabled child. I recall stumbling through this explanation as I consciously knew I wasnt communicating my understanding of direct payments effectively in a way to ensure that Mrs G understood it and furthermore I doubted what I was saying. I feel I cold have tuned in better to w hat direct payments were, whether Mrs G and P would have been eligible for this service, what the options were for them and been able to explain to them in a way that they understood and have given an example of their circumstances as apposed to a child. i.e. considering the fact that P was turning 18 in a few months. I feel if I had prepared better by doing this, there would have been more structure and purpose to introducing the topic in the first instance, Mrs G would have grasped a clear and concise understanding of what direct payments were, I would have come across as a more competent and knowledgeable worker and this would have lessened the likeliness of confusion or unrealistic hopes and expectations on Mrs Gs behalf on their eligibility and entitlement for the service. Straight away following the visit I acknowledged how my responses could have potentially have given Mrs g unrealistic hopes and expectations with regard to what they could get. I feel nervousness and lack of concise preparation significantly contributed to my inability to explain the service effectively and concisely, particularly after I was unable to explain the difference between carers allowance and direct payments initially. I finally summarised what I was going to do for Mrs G such as looking into the befriending scheme, their eligibility for direct payments, as she queried if she would be able to pay someone to come and take P out for a few hours a week etc. I then explained Mrs G that I would be in touch to arrange a time and date to talk through the assessment once I had completed it and have her sign it. Mrs G agreed. Skills I do feel I listened to Mrs G and demonstrated respect by being empathetic towards her and her situation past and present. I was very aware of the sensitivity around what Mrs G has come through in her life to date and used silence allot to allow Mrs. G to gather her thoughts before answering the questions. When she was talking I continued to use silence as a means of letting Mrs G tell her story and express her feelings. I ensured to maintain eye contact. My non verbals I hope indicated to Mrs G that I was listening to what she had to say. Although I contently listened to Mrs G and what she had to say, I do feel she overwhelmed me with information a lot of the time. Although I managed to explore further some of these issues by probing further on certain issues, I feel I failed to probe further on all the issues/concerns expressed by Mrs G. I feel I could taken control of the interaction more by stopping Mrs G at times and sensitively saying for example, ok Mrs G, you have given me quite a lot of information there. You mentioned this, this, this and this.. Can you firstly tell me a bit more about (1st issue), how does this affect you as a carer etc. I would then have gone through each issue separately and have explored each issue fully. I then would have got Mrs G to proceed. This would have ensured that I was using my probing skills more effectively and ensured I was exploring and analysing equally all areas which arose. Furthermore, I feel I did probe further on certain subjects to gain a further insight into how G fe lt about certain things although in doing this I do accept that I still may not have kept the topics focused on Mrs G as much as what I could have. I do feel however that in this instance, the needs of Mrs G was very dependent on that of meeting Ps needs first as she continually stated, if I thought that P was getting ready and looking forward to going out and meeting with others his age, I would be able to relax and when he would be away, this would act as respite for me. I truly feel this was the main issue for Mrs G and she clarified this towards the end of the visit. I was particularly ware of this as I had tuned into the fact that in a typical encounter involving two people, it is estimated that the actual spoken or verbal content is likely to carry only one third of the social meaning in any given event, whereas the non verbal forms convey roughly two thirds of the meaning (Birdwhistell, 1970). Communication is a two way process. It involves listening as well as speaking. Non- verbals used were: nodding, having an appropriate body posture, using eye contact, smiling and sitting in the SOLAR position. Allot of the time Mrs G was talking. I hope my non-verbals indicated to her that I was listening to what she had to say, respected the information she was sharing and demonstrated empathy and respect. I feel I used my interpersonal skills throughout the visit ad this contributed to a relaxed atmosphere and interaction. I do feel however I had developed a good rapport at this stage with Mrs G as I had been on a few previous home visits through carrying out the UNOCINI assessment. I feel I had a generally good structure to the contact however I do feel I could have explained at the beginning the content of what I hoped to cover with Mrs G instead of just summarising that I would be looking at her needs as a carer. I feel I demonstrated good non verbal communication through appropriate facial expressions, a good sitting position with an open posture, good eye contact and nodding my head to reassure Mrs G I acknowledged, was listening and understood what she was saying. I feel I laughed when appropriate and showed empathy when covering sensitive issues such as Ps past medical history of cancer and chemotherapy. I did ask various open questions which I had planned as a means of applyin g the exchange model and allowing Mrs G to talk openly about her life as a carer. This also allowed me to gain an insight into what Mrs Gs life was like, what her caring role entailed and how she coped with her caring responsibilities. I asked closed questions to gain more information on certain issues and clarify information. I feel my tone of voice was appropriate considering we were covering issues which were sensitive to Mrs G. Generally, I feel I effectively communicated with Mrs G. Effective communication is an essential component of traditional social work activities (Lishman, 1994, pg 1). I communicated clearly with Mrs G by explaining why I was there, introducing my practice teacher, explaining her role, reassured Mrs G my practice teacher was there to observe me and not her. I explained clearly what I hoped to cover during the contact and under ground she was entitled to a carers assessment. The process of engaging entails social workers being explicit about what we are do ing and why (Munro 1998a: 98). I feel I engaged well with Mrs G by clearing explaining my role and purpose. I paraphrased back to Mrs G what she had said at certain stages, particularly towards the end of the contact to show Mrs G that I understood what shed told me. This involved me paraphrasing or feeding back to Mrs G what theyd conveyed, in a meaningful way. This was also useful in having Mrs G clarify that this is indeed what she meant. Empowerment- Empowerment is more commonly used to describe service users being given meaningful choice and valuable options (Clark 2000: 57). I feel I provided Mrs G with choice and valuable options by providing her with information, informing her of the services available. I do feel I actively listened to G and responded by probing further on certain issues. On reflection, I feel the type of questions I asked G could have been more focused on the needs of G and Ge as apposed from having her explain about P. Initially I felt this may have given R an insight into what Gs life is like and I thought it may have been a good starting point however I feel I could have covered aspects such as how she coped when P was away to college, to dialysis. In saying this I do feel that G made it very clear particularly towards the end that the main concern for her at the minute was the fact that her son had no friends his age, was unable to get out and had nothing to look forward to. And continually expressed that this was the main issue for her and that if he had an opportunity to get out and socialise with others his age, this would positively impact on her as she would be able to relax if she felt P was happy and this would also act as a few hours respite for her as relationships in the family had been strained recently. I feel I did not communicate to Mrs G in a clear and concise manner what direct payments was and was unable to provide her with a clear distinction between that of carers allowance and direct payments. Looking back I went blank at this point and felt I could not think and panicked. As a result I looked to R for re-assurance. I do not feel I came across as a competent worker as on reflection I turned to my practice teacher when G asked me if a carers assessment was the same as a direct payment. Looking back on this I feel very silly as I knew the difference but I just recall going blank as I stumbled with how to explain the difference. I feel this was down to nervousness and as a result I panicked and turned to R for advice. I will definitely try to avoid doing this in future as it is not professional and service users expect that we as workers know what we are talking about. I feel I could have been better prepared with regard to knowledge in relation to direct payments and carers allowance etc. Although I thought I knew what they were, obviously hadnt read enough around them or had the information prepared in a way that would enable me to effectively communicate to the service user what they were. Although prior to the contact I felt I was prepared, On reflection, I feel I could have been better prepared with regard to familiarising myself better with direct payments and carers allowance etc. I should have prepared in my head how I would explain this to G in a way that was clear and concise that she would have understood. My main aims achieved were: I was successful in getting Mrs G to open up about her situation and her feelings I was successful in determining what it was she felt would best help and support her and her husband at the moment, which was providing them with respite by providing P with opportunities for social interaction. The main knowledge used and how it impacted upon my work: I had an understanding of Mrs Gs circumstances through previous visits with the family and carrying out a UNOCINI assessment and liaising with other professionals already involved with the family. I feel I tuned in thoroughly to Mrs Gs past history, current circumstances and her life and needs as a carer. I did not have a lot of knowledge about the appropriate way of completing the carers assessment form. From discussing the topic with my practice teacher and other work colleagues, I felt it was better to not bring the form in with me during the visit. I felt this may have put Mrs G of or have distracted her. I considered the sensitivity of some of the issues that Mrs G may be relaying to me and I wanted to give her my utmost attention, reassure that I was fully listening to her, engage fully with Mrs G and let her lead the interaction and speak openly about her situation. This then led me to apply the exchange model of assessment which looks upon service users as experts in their ow n lives. I tuned into the fact that no-one knew Mrs G and her life situation as well as herself and so I felt this model was ideal to apply as a method of assessment. The Life needs model is another model which informed my knowledge base prior to the visit. This is a developmental and social-ecological model and increased my knowledge base on key transitions in childrens lives. Although this model informed my knowledge base more so with regards to Ps UNOCINI assessment, it also allowed me to consider how Mrs G as a carer may be coping with Ps transition and current life stage of adolescence, as a carer and mother. Knowledge around assessment theory increased my knowledge base on what assessment is and what it involves. Erik Eriksons life stage theory increased my knowledge base around Mrs Gs life stage. Theories around loss increased my knowledge base as to how Mrs G had experienced loss as a consequence of Ps physical disability and his cancer. This was very significant as the focu s of the work was on assessing Mrs Gs needs as a carer, considering who she cares for, how that impacts on her life and how she effectively copes with her caring responsibilities. As a carer of a child who has a physical disability and who had had cancer and been treated with chemotherapy and has had two failed kidney transplants, this theory allowed me to tune into a number of losses Mrs G may has or may have had, losses in terms of lack of socialisation, independence etc. This knowledge allowed me to consider that Mrs G may have been affected psychologically, physically, emotionally and socially. One of my objectives for the visit was to discuss direct payments. I feel that I did not carry out sufficient research to allow me to explain this service clearly and concisely in a manner that Mrs G would have understood. I recognise that direct payments is a relatively new way of receiving services and other professionals are still learning about what they are and how they are used. How ever, this is an area I had planned to cover with Mrs G as it is one of the questions within the carers assessment form and thus I do feel I could have researched this area more concisely to ensure I was confident in explaining it in a way that Mrs G would have understood. I also feel I had a good grasp of the current family situation through completion of the initial UNOCINI assessment and thus I could have enquired into the familys eligibility for receiving direct payments prior to the visit. I feel I had already previously adequately researched into Ps renal condition, kidney dialysis, the effects, the importance of a restricted fluid and dietary intake and the consequences of not abiding by a restricted diet from completing Ps UNOCINI assessment. This information allowed me to further consider what life is like for Mrs G as a carer. I had already gained a great insight into the family circumstances through liaising with other professionals and completing the initial UNOCINI asse ssment. This knowledge was significant as it allowed me to consider the challenges Mrs G was facing as a mother and carer and thus I already had an insight into how she was coping with caring for P. I also done some research on carers of children who have disabilities which allowed to familiarise myself with what pressures and stresses carers are faced with on a daily basis. Throughout my work with this family I am constantly aware of overarching legislation such as the Childrens Order (NI) 1995, the Human Rights Act 1998, Disabled Persons Act (NI) 1989, and The Education (NI) Order 1996. The main piece of legislation that informed this piece of work however was the Carers and direct payments Act (NI) 1996. I must always be aware of the legal and statutory context in which I work. It is impossible to practice without coming up against the Law: it is impossible to practice effectively without an in-depth understanding of how the Law affects everyday social work practice (Johns, 2005:1). Looking back I strongly feel I could have increased my knowledge base more effectively around direct payments and familiarise myself with what the criteria is for eligibility for families. I have since spoken to other workers in the team and have read around the topic more and thus feel much more confident about the topic. The main values I used were: The NISCC Codes of Practice for Social care Workers underpins my professional value base and I felt this impacted when working with this family. I feel that I treated Mrs G and her home environment with respect by asking Mrs G prior to the visit if she would mind my practice teacher being present to observe my work. I feel I empathised with G by being understanding of her all that her and her family have come through in their lives to date. I felt I could easily empathise with her when she was referring to P and his medical history and his cancer. I considered prior to contact how devastating this particular time would have been in their lives and acknowledged the importance of showing empathy, particularly if this service user was willing to talk openly to me who she may have looked upon as a stranger, about such a sensitive area in her life. I empathised with her further when she talked openly about her older son also having been born with a renal condition and the ongoing everyday stresses and strains this had. I did not judge Mrs G. I listened openly to what she had to say and demonstrated empathy by being understanding of Mrs Gs circumstances at present and what she has come through to date. By being empathetic and understanding towards Mrs G, I feel she was more motivated to work in partnership with me. I feel I demonstrated respect by explaining the issue of confidentiality, explaining my student status, gaining consent and ensuring Mrs G was happy and content working with myself, a student, by reminding Mrs G of my student status and allowing her to clarify she was happy to proceed. Furthermore, I feel I respected Mrs G by pre arranging the appointment and turning up on time. I feel I demonstrated respect at all times throughout the visit by maintaining eye contact, listening to Mrs G, using silence when appropriate and allowing her to speak, gather her thoughts and express her feelings. I was genuinely interested in what Mrs G had to say, finding out m ore about her life and past experiences and I was honest and open which I feel contributed to an effective, positive working relationship with Mrs G. I made myself aware of any cultural/structural oppression that the service user may be experiencing, such as gender, religious issues. I also considered that Mrs G attended a Church group and that she and her family held firm religious beliefs and attended Church on a regular basis. Future learning requirements indicated by this piece of work What I hope to improve upon in the future: From looking back I can see that there are significant areas I need to develop my knowledge and experience in. For example I strongly feel I could have increased my knowledge base more effectively around direct payments and have familiarised myself with what the criteria is for eligibility for families. My lack of experience delivering direct payments is obvious here. I feel that my understanding on this topic could be improved through reading further on the topic and possibly shadowing other social workers in the team when they visit service users about direct payments. Being well prepared for what it is I want to cover during contacts is another significant area I need to work on. Looking back, I feel the contact had flowed up until the point at which I introduced the topic of direct payments. I feel, I already had an insight into the family situation through completing the initial assessment ad I knew that Mrs Gs main concern was that P did not have enough opportunities for social outlets and if I had prepared to introduce this topic, I should have previously enquired into whether this was an option for Mrs G and her family. On reflection this would have made much more sense as I would have had reasoning for introducing the topic and I would have been able to inform Mrs G of information that was clear, concise and accurate, preventing informing Mrs G of information that was inaccurate, risking false hopes and possible dis

Friday, October 25, 2019

Declining Trust In Our Government :: essays research papers

Declining Trust in Our Government Is the American people's trust in our government declining? According to most people, it definitely is. Recent polls make this argument very valid. In 1995, the Princeton Survey Research Associates conducted a telephone interview of 1514 random sample adults. In this interview, people were asked how much of the time they trusted in the federal government to do the right thing. Twenty- one percent said most of the time and seventy-one percent said only some of the time. When asked the same question of their state governments, the results were only slightly better. Thirty percent said most of the time and sixty-two percent said only some of the time ("Why Don't"). This indicates that a majority of the American people believe that the American government is not doing the right thing in a lot of the actions it takes. Of course, nobody expects the government to operate perfectly with no mistakes, because this is not a perfect world. These numbers are too high though. What caused this problem in the United States, what is the extend of this problem in our country, and is this distrust of our government even a serious problem at all? These are three questions that need to be addressed in out society today. What really has caused the American people to distrust our government and when did this trend actually begin? I do not believe there is any clear answer to these questions and I do not believe it would ever be possible to pinpoint any exact reason for the feelings of the American people. One reason cited by some is that it is the fault of poor leaders. Two commonly blamed leaders are President Johnson and President Nixon. Two of the biggest drops in the public's confidence in our government occurred in 1964, during the bombing of Vietnam, and in 1972, during Watergate (Nye). Although these two events may have contributed to the distrust of the American government, I do not believe that two events and two leaders can be held totally responsible. For one thing, these things occurred over twenty years ago, why is there still distrust today. Not only does this distrust still exist, but many would say that it has increased greatly since then. I do not thing that two leaders can be pinpointed and blamed for destroying the trust in our government. Perhaps though the blame could be laid on American political leaders in general. In a 1995 poll, thirty- five percent said the main reason that they do not trust the federal government

Thursday, October 24, 2019

Challenges in Motivating Employeess Essay

Why motivating employees is becoming increasingly challenging. The study of motivation is concerned basically, why people behave in a certain way or why people do what they do? Generally motivation can be described as the direction and persistence of action. However different items such as work environment or internal and external forces can influence the person’s choice of action. Managers face a significant challenge in finding ways to motivate their employees. Some employees can often if hard to get motivated for a job even after being employed. Maybe because there is a day job duties repletion, work condition and etc. Below I discuss some of the most significant challenges in employee’s motivation: Money is one of the major variables of satisfaction and motivation, no doubt that employees will feel less motivated if they feel their compensation is not appropriate. Paying employees less will lead to dissatisfaction and of course dissatisfied employee is an unmotivated employee. However we have to consider individual differences in the motivation. Employees have different needs and given reward do not motivate all individuals similarly. Managers should spend time necessary to understand what is important to each employee and the align goal, level of involvement and reward with individual needs. For example professionals and knowledge workers which highly trained with a college or university degree are more concerned with content of work rather than their place on the organization chart. Money and promotions typically are low on their priority list in contrast job challenge and having skill-development opportunities tend to rank high. However motivating low skilled service workers which pay levels are often little above minimum wage such as retailing and fast food is different. Many employees working in low skilled service jobs feel that they do not get the respect they deserve from their employers. Unless pay and benefits are significantly increased, high dissatisfaction is probably inevitable in these jobs. Trying to understand the needs of such employees might help motivate them better. Motivating employees in a unionized workplace environment is another challenge. For example unions have not been very receptive to pay for performance plans. They believe that differential pay to employees doing similar work can hurt corporation and lead to competition in the workplace. In other word in unionized companies providing opportunities for training and advancement and listening to employees concern all help in creating a more positive environment. On the other hand with todays globalized companies we have to consider motivation do not necessarily work equally through the world. Reward practices in different countries are variable based on cultural differences. For example countries that put a high value on uncertainly avoidance prefer pay base on objective such as seniority. Countries that put a high value on individualism place more emphasis on an individual’s responsibility for performance that leads to rewards. Countries that put a high value on human orientation offer social benefits and programs that provide working family balance, such as childcare, maternity leave and etc. Work conditions and environment is another motivation challenges. Changing the way workers are treated may boost productivity more than changing the way they are paid. An employee who feels his working conditions are unreasonable maybe unmotivated. If he feels completing a task would place him in a dangerous situation, he may not see the value doing or completing it. Other thing which could affect employee motivation is training. An employee being asked to do work which he is not qualified for or capable of doing can result in an unmotivated employee. People are generally the most motivated when their jobs give them an opportunity to learn new skills and tasks that are performed and enable them to demonstrate competence. So no doubt having an open, safe and welcoming environment is one of the most important factors. Regulation of the hours of work is another condition. If an employee is working 60 hours a week instead of the standard 40 hours, he may feel unmotivated to show up or give a full effort knowing that he will give more work and expected to stay late to finish project. Multicultural Team is another challenge in motivation. Nowadays most of the companies from big to small have multicultural team. People from diverse culture, background and beliefs. It’s clear we cannot motivate multicultural teams the same way we motivate teams with members all from same culture. Multicultural teams are differing from same culture teams in a variety of aspects. For example people from different culture have different communication style, working method and decision making practices. The expectations of team behavior vary among nationals and ethic cultures. In result managers in these companies have special challenges for motivation. Managing and motivating employees who respect different cultures can be simultaneously exciting and challenging, provide supervisors and managers understand how culture differences inspire organizational excellence, at the same time, employers encounter challenges by separating employees instead of using management and motivation techniques that focus on common traits through the workforce. In these companies as a motivating factor, money is important but only to some extent. Usually After they start getting a fairly level of compensation for their input, money stop being the greatest motivator for most people. Knowing the strength, weaknesses and performance history of each team member are very important. Some training such as multicultural awareness, team building and intercultural management workshop, motivate multicultural team members are very helpful but they must know why they are being trained. Result: All said and done working with a cross cultural team is significantly challenging as the manager must develop strategies to cope not only with differences but also motivate the team to be productive and efficient. Can a manager or supervisor â€Å"empower† an employee? Generally managers used their power as the part of their interaction with employees. In today’s workplace, there is a movement toward sharing more power with employees by putting them in teams and also by making them responsible for some of the decisions regarding their jobs. Some managers believe that to empower people is a real part of leadership as opposed to management and they give examples of way empowerment can actually set people set free to do the jobs they are capable of and also allow them to do self-managing. However managers have different concepts of empowerment, for example one group of executives believed that empowerment was about delegating decisions making within a set of clear boundaries. While another group believed that empowerment was a process of risk taking and personal growth. There is a lot of positive press on empowerment but much of the talk of empowerment, but much of the talk of empowerment, does not result in employees being empowered. Some managers have difficulties letting employees have more power. But most of the managers agree that the employees should understand how their jobs fit into the organization and that they are able to make decisions regarding job action in light of the organization purpose and mission. Empowerment can offer a number of potential benefits throughout all levels of organization. Although there is a continuing debate about the real benefits of empowerment, there appears to be a general assumption motivated staff, quality customer service and improved profits. However all the theories share a common assumption that workers are an untapped resource with knowledge and experience and an interest in becoming involved, and employers need do provide opportunities and structures for their involvement. It’s also assume that participative decision making is likely to lead to job satisfaction and better quality decision and that gains are available to employer (Increased Efficiency) and workers (Job satisfaction), in short an everyone win scenario. According to Erstad, among the many fashionable management refers to the change strategy with the objective of improving both the individuals and the organization’s ability to act. From the context of articles especially in this area empowerment is a complex process. In order to be successful it requires a clear vision, a learning environment, both for management and employees, participation and implementation tools and techniques.

Wednesday, October 23, 2019

Explore the Relation Between Othello and Desdemona

Furthermore, the tragedy of the play is Othello hubris forcing him to murder his wife – the action which proves his Inability to Integrate with Venetian society. Shakespeare presents the relationship between Desman and Othello in a deeply Immersed way by defining it both in terms of their personal interaction, and the reaction and interference of the characters in the play. Most importantly, the antagonist of the play, Ago, uses Adhesion's â€Å"goodness† as the net to â€Å"enmesh† Othello, In addition to his other victims Including Cassia and Ordering. Gags Machiavellian plot to be evened with Othello, â€Å"wife for wife† depends heavily on his ability to destroy his marriage – thus confirming the importance of Desman. The status of Desman and Toothless relationship as a major point of conflict is clear from the very beginning of the play – where Ago and Ordering attempt to â€Å"poison the delight† of Abrogation by revealing that D esman had secretly married Othello. In terms of context, the concept of marriage without parental consent was taboo in Jacobean society, and would've been controversial even in Venetian society – which was considered much more relaxed than Jacobean Britain.It Is also Interesting to note the use of the word â€Å"poison†, which Is a strong theme throughout the play -? ND foreshadows Toothless eventual request that Ago â€Å"get me some poison† in order to murder Desman. Foreshadowing is further utilizes by Shakespeare in Act II Scene l, where he has Barbarian warn Othello to â€Å"look to her Moor, she has deceived her Father and may thee†. This effect Is heightened by Toothless claim that he places â€Å"my life upon her faith†, a moment of great irony which perfectly complements the claim that ‘in losing [Desman], he loses himself.It is important to note the great trust Othello places in Desman In this scene and how it coincides with his non event, eloquent speech which prompts the Duke to acknowledge â€Å"this tale would win my daughter too†. The poetic blank verse which Othello speaks, and has led some critics such as A C Bradley to describe him as â€Å"the most romantic among Shakespearean heroes† is in stark contrast to the clumsy, monosyllabic prose which he speaks later In the play – by which point his confidence In Desman, and therefore himself, has been destroyed by Ago.There is some element of truth in Othello claim that he â€Å"loved too well† and it is this resolute nature which ultimately dooms him. His rashness, which would have been praised as decisiveness on the battlefield, forces him to dismiss Cassia perhaps too swiftly – and place too much trust in â€Å"honest Ago', whose role as â€Å"ensign† should be confined to military affairs – not his general's private life. It could also be argued that Othello was doomed by his race, in the words of Anta Lo mb the inflict of the play derives from â€Å"the threat of a black man and a white woman† to the â€Å"patriarchal† Venetian society.The racist semantic field used in the opening scene, â€Å"thick lips†, â€Å"old black ram† and simply â€Å"the moor† sets a precedent for the rest of the play, and Othello final speech where he acknowledges he is an outsider, â€Å"circumcised dog† is evidence that Lagos manipulation has forced him to question himself and become the stereotype Ago depicted him as. Ultimately, the relationship of Desman and Othello is integral to the play, and Othello descent into barbarism is facilitated by his loss of faith in Desman.Othello himself placed his â€Å"life upon her faith† – and as a resolute man he was left with no choice but to destroy himself when he felt she had betrayed him. Lagos malignant, calculating intelligence led him to the conclusion that the moor he hated could be destroyed by his love for his wife – Just as Ordering could be destroyed by his lust, and Cassia by his arrogant, flirtatious nature. Lagos ability to detect the weaknesses of those around him is the characteristic which defines the tragedy of ‘Othello', and thus the knowledge that Desman is Vital to her Husband' allowed him to exact his Machiavellian plot with tragic consequences.

Tuesday, October 22, 2019

Ford Ka Essay Example

Ford Ka Essay Example Ford Ka Paper Ford Ka Paper Historically, car manufacturers including Ford segmented buyers according to their income and age. Ford used these figures to classify small car buyers into four target groups. Financially constrained buyers (single men and women without children 100,000 FF) Average income, more youthful/expressive buyers (100-250 thousand FF, single men/women/childless couples) Average income and/or family constrained buyers (full nesters, empty nesters 100FF and above) Higher income, not family constrained buyers (single men, women, childless couples 250,000 FF) Pros: Manufacturers specialized in certain categories; small car manufacturers focused on low production costs while luxury car manufacturers focused on differentiation through product features and quality. This delineation resulted in less competition. In addition, regional level marketing was practiced. Cons: Max profits is not exploited because a fleet of cars to service a range of geographic, demographic, psychographic, behavioral and attitudinal segments is unavailable. Which segmentation approach should be used for the Ford Ka? Demographic segmentation was advocated by management due to its historical success and the fact that data was accessible. However, demographic focus group results contradicted management’s view. The 40-44 year old group comprised a 32% share. Attitudinal segmentation was advocated by the advertising agency. If it is true that the market is fragmented to a greater extent than Ford’s management currently assumes, then the attitudinal segmentation approach has the dual advantage of not alienating traditional market segments, such as the 40-44 year olds that featured highly in addition to encompassing a wider demographic based on lifestyle choices. Attitudinal segmentation had a risk of being expensive and risky. : Overall, the risk of choosing demographic segmentation and potentially experiencing project failure appears greater than the risk of favoring an attitudinal approach that aligns with an evolving market thesis. Favoring this approach is the fact that Choosers who placed the Ka among their top 3 choices also included the Twingo, which spanned demographic segments and aligned with an attitudinal approach. Freedom lovers and attention seekers could potentially convert Sensible Classics over time.

Monday, October 21, 2019

Free Essays on The Affects Of Music On Children

Music is no longer simply a way to relax and express your self anymore. Rather, it is a way to expand the brain’s faculties. From the beginning of life as a fetus until death music affects everyone’s lives. Indeed, it has been shown, that music has a profound effect on a child’s physical, intellectual and social development. To a great extent, through the early stages of childhood one can truly understand how worthwhile music is in a growing child’s life. The interest on how music affects young children began toward the latter part of the 19th century. Studies were taken up to determine an infant’s musical abilities. It appears that until the middle of the twentieth century, scientists failed to appreciate the capabilities of infants. They presumed that because infants lack speech and spend so much time eating and sleeping that not much cognition was going on inside an infant’s head. That view was largely displaced with the fact that infants have considerable musical abilities. For example, infants can perceive and distinctly remember not only the contour, but also the pattern of rising and falling pitches in a piece of music. They can also recognize a melody as the same when it is played at a very different tempo. Infant perception and cognition have been found to be similar to the ways in which adult listeners process music. Through the scientific discovery of musical abilities in infants there is never the less, a question that arises. To address this issue, at what age, do these types of abilities first appear? To answer this question, scientists must focus on the issue of whether or not infants remember their birth or even the experiences that go along with it. To do this they primarily rely on anecdotes, which claim that people have detailed memories of birth or even in utero experiences. Chiefly, the reliability of these stories have been claimed on the basis either of hypothetical reasoning or that... Free Essays on The Affects Of Music On Children Free Essays on The Affects Of Music On Children Music is no longer simply a way to relax and express your self anymore. Rather, it is a way to expand the brain’s faculties. From the beginning of life as a fetus until death music affects everyone’s lives. Indeed, it has been shown, that music has a profound effect on a child’s physical, intellectual and social development. To a great extent, through the early stages of childhood one can truly understand how worthwhile music is in a growing child’s life. The interest on how music affects young children began toward the latter part of the 19th century. Studies were taken up to determine an infant’s musical abilities. It appears that until the middle of the twentieth century, scientists failed to appreciate the capabilities of infants. They presumed that because infants lack speech and spend so much time eating and sleeping that not much cognition was going on inside an infant’s head. That view was largely displaced with the fact that infants have considerable musical abilities. For example, infants can perceive and distinctly remember not only the contour, but also the pattern of rising and falling pitches in a piece of music. They can also recognize a melody as the same when it is played at a very different tempo. Infant perception and cognition have been found to be similar to the ways in which adult listeners process music. Through the scientific discovery of musical abilities in infants there is never the less, a question that arises. To address this issue, at what age, do these types of abilities first appear? To answer this question, scientists must focus on the issue of whether or not infants remember their birth or even the experiences that go along with it. To do this they primarily rely on anecdotes, which claim that people have detailed memories of birth or even in utero experiences. Chiefly, the reliability of these stories have been claimed on the basis either of hypothetical reasoning or that...

Sunday, October 20, 2019

Tree Seedling or Sapling Transplant Instructions

Tree Seedling or Sapling Transplant Instructions Homeowners often need to move or transplant trees within the yard. Trees may have been planted too thickly or threaten to out-grow available space. Size is a critical factor in transplanting. The larger a tree, the more difficult it is to transplant. If you have a small tree growing near your house, driveway, or patio, visualize it at full size and decide now if it must one day be moved. The longer you ignore it, the less likely you will be able to save the tree. Difficulty: Average Time Required: Takes approximately an hour to dig tree and replant tree (including prep time) What You Need: Planting or transplanting spadeAvailable water and mulch How to Transplant The perfect day to move your tree is when the humidity is high during early spring but just before its leaves begin to bud out. While roots take up most of a trees moisture, leaves will give moisture up through evaporation when under stress. Avoid moving trees with leaves.Preplanning helps! If you know a tree is to be moved in advance, root pruning will greatly increase the chances of successful transplanting. By severing the roots at or just beyond the drip line of the tree to be moved, the long unbranched roots will be broken. This prompts re-growth of new roots near the main trunk. It takes two to three seasons to fully root prune a tree  but can help even as early as six months. This will compact the existing root system and increase the trees chances of survival once it is moved.Younger and thus smaller is better. Increasing the size of a tree increases the effort it takes to transplant. It also decreases a trees chance of survival if not done properly. Leave moving trees over 4 inches in trunk diameter to the professionals. It is easier to transplant small stemmed trees and they will overcome the transplant shock much easier and quicker. Each tree you move needs a protective root ball for proper transplanting. Small root balls (up to about 12-14 inches in diameter) can be done with an ordinary spade. You want to preserve as much of the soil surrounding the feeder roots as you can. The feeder roots are located only in the upper few inches of the soil so be very careful with that portion of the ball.It is important that you have already prepared your planting site and that conditions are correct for successful growth. The tree you dig should not be exposed to the elements for very long. Be sure the tree will be able to reach full maturity without competition and provide a site where soil is deep, fertile, and well-drained.Dig the planting hole deep enough to accommodate roots without twisting and breaking either the roots or the soil ball. The hole should be as deep as the root ball and the tree roots transplanted to a depth approximating its original level.Follow these planting instructions and make sure you correctly mulch and water the transplanted tree. It is extremely important that the newly planted tree has adequate initial moisture and that it is maintained. Do not fertilize the tree for one year. Tips An approximate rule of thumb is to use a root ball 20 times the diameter of the trunk (as measured just above the basal flare) for trunks up to 1/2 of an inch in diameter, 18 times the diameter of the trunk for 1/2 -1 inch diameter trunks, 16 times the trunk diameter for trunks 1-1 1/2 inches in diameter, 14 times the trunk diameter for trunks 1 1/2 - 2 1/2 inches in diameter, and 12 times the trunk diameter for trunks 2 1/2-4 inches in diameter. For most trees and shrubs, the root ball depth should be about 8 inches for a 12 inch diameter root ball, ranging up to about 18 inches for a 48 inch diameter root ball.

Saturday, October 19, 2019

Performance Management Essay Example | Topics and Well Written Essays - 2250 words

Performance Management - Essay Example 1. Focus on Performing Best to Achieve Organizational Objectives Link between Individuals, Team and Organizational Objectives Every organization hires and employs individuals who possess different sets of skills and are expert in their respective fields. These individuals are provided training to understand and learn what is required from them to put in their respective jobs, so that the organizational goals and objectives can be achieved. The objectives of an individual are to put their best efforts in their work so that they can earn good and move up in organizational hierarchy. Team’s objectives are to work as a unit to achieve organization’s objectives whereas the organization’s objective is to maximize the stakeholder’s wealth by performing well. The objectives of an individual are linked to the objectives of team, as when the individual being a member of the team, performs well, it will put positive impact on the moral of the team. When each individu al in a team performs well, it will be easier to achieve the objectives of the team and consequently, the working relationship of individuals within a team will help the organization to achieve its objectives. Being a potential manager or a leader of team, I would focus on working with each individual in my team separately. In my opinion, it is essential for me to discuss work related issues and solutions with every individual of my team so that the team members can get motivated and work towards achieving the organizational objectives. Selection of Individual and Team Objectives Individual objectives are selected after the analysis of each individual’s personal competencies and skills, whereas the team objectives are selected after considering the nature of work that is required to be performed by the team. There are numerous reasons for setting different objectives for a team and individual to achieve. Bering on a managerial position, I would set different objectives for my team and the individuals who are member of my team. Considering the fact that organizational objectives becomes difficult to achieve due to the knowledge, skills and abilities that are required from a single person. Provided that I would select a team of diversified individual, it will provide me a chance to fill the gaps left by one individual, by utilizing the skills of other individual who have skill to fill that gap. Areas of Individual and Team Responsibility To achieve organization’s objectives, a manger must create a distinctive line between the responsibilities of team and the individuals within that team. If I were the manager, I would have based my leadership style prescribed by John Adair (Adair 2012). As proposed by Adair, an action centered leader will identify aims and vision of a group, gather resources, create a plan, allot responsibilities, set standards and control the flow of activities. Being a manager of a team, I would be responsible for establishing ob jectives and reaching to a point where my team members agree with my work method and than work towards achieving the objectives. On the other hand, being a manger for individuals in my team, I would assess personal skill, problems, highs and lows of every individual and than assort individual responsibilities accordingly. Need to Trust and Support An environment where every individual of a team have a right to speak and share ideas, develops self-confidence and intrinsic motivation among the individuals. As being a manager, I would pay especial consideration towards winning trust of my team and individua

Friday, October 18, 2019

Migration Assignment Example | Topics and Well Written Essays - 500 words - 2

Migration - Assignment Example Individuals may migrate because of social reasons such as family miss understandings, political turmoil, poverty or the intense desire for adventure. In its content, ‘the Bridge’ journal looks at some of the reasons why gender has been one of the core reasons for migration in many parts of the world. Gender roles, inequalities and relations highly influence migration in the current generation (Jolly S., Reeves H 2005 pg. 1). Gender oppression has been a key fight in many parts of the world. The current system of education provides equal opportunities to all people regardless of their gender. Women have the power to manage big institutions and to own property worth million and billions of dollars. This is unlike in the past where men were the dominant species and women were required only to act like companions and servants of the man. Gender movement erupted from the discovery of various abilities by oppressed parties which include both women and men depending on the envi ronment. It is not logical to say that only women are prone to oppression in the modern world. Every form of gender is prone to oppression that can in turn lead to migration. Migration is currently viewed as a problem caused by development but if deeply analyzed; sex segregation in the world’s labour market is one of the major causes of migration. Policies of gender migration in relation to labour markets provide different opportunities to men and women which at time cause unskilled women to more risky migration conduit (Jolly S., Reeves H 2005 pg. 4). Due to this fact, cases of human trafficking have become common in many parts of the world with Africa and Asia being the most affected regions. Economic imbalance, gender oppression and lack of employment cause many women to be lured into human traffic business with them being the commodity of trade. Their desire for a new

X-ray crystallography Research Paper Example | Topics and Well Written Essays - 1000 words

X-ray crystallography - Research Paper Example With this diffraction, it I easy to derive the three-dimensional outline or image projection of the density of electrons as profiled in the crystal. The crystal creates a platform for developing a pattern for mean positions of the atoms in the crystal. One can also manage to determine the chemical bonds of the structure, say carbon in diamond crystals and the varying disorders of some of the crystalline structures. Carbon is common in crystal formation. X-ray crystallography has been applied in many scientific fields due to the presence of crystals of many chemical compounds and elements. A pure crystalline structure is that of table salt, scientifically known as sodium chloride and represented by the chemical formula NaCl. Crystalline structures that have been studied by X-ray crystallography are many. Some of them are calcium fluoride (CaF2), calcite (CaCO3) and pyrite (FeS2). Others are spinel (MgAl2O4) and brucite (MgO4) among others. The inclusion of X-rays in studying crystalline structures enabled further understanding of these compounds in a manner that had never been used before and allowed for formation of more complex compounds through chemical reactions caused by interaction of crystalline structures. X-ray crystallography can be used to identify and locate unusual electronic properties of a material by studying their electron positions and mobility. It is also a tool for noting elastic properties of a material considering the chemical interactions that occur within the crystal and the associated processes. With these properties, X-ray crystallography is used in the design and manufacture of pharmaceuticals. Their application involves combining elements and modifying their crystalline structures to ensure that they bond as required (Clegg, 1988). Other than X-ray crystallography, there are other methods associated with determining atomic structures (Rhodes, 2006). However, they all rely on the principle of diffraction. These

Pop Culture icon about Superman Essay Example | Topics and Well Written Essays - 1500 words

Pop Culture icon about Superman - Essay Example Superman originated from Krypton where he was conceived but he was sent to earth before he could be â€Å"delivered† from the incubation chamber and he was the sole survivor from the doomed planet. Superman was then â€Å"born† on earth as his parents the Kents found him in a field and adopted him, he was named Clark Kent, as he grew up he discovered his superpowers and origins and he decide to use his powers for the good of mankind. When he was first introduced to Action comics he became an instant hit, this because prior to his appearance, there had been very few costumed crime fighters and definitely none with a superhuman abilities. His predecessors like the phantom got their powers from being physically stronger and smarter than their villains as well as sometimes incredible coincidences contrived by their creators to keep them winning all the time. The arrival of superman was therefore a refreshing change since audiences could read about impossible feats and not f eel cheated since the hero had superhuman powers after all. Nevertheless, the very nature of- superman was a source of controversy and criticism from the onset and which have persisted even today, by virtue of his kryptonite heritage, he is omnipotent by earth’s standards and impervious to any physical danger known to man (Shannon). He is immune to bullets, solar radiation, he has the strength to stop fling rockets lift buses and he can virtually achieve any physical feat without breaking a sweat. However in literature and film, suffering provides the key to sympathy and by extension identification all which are hard to come by in a character that can escape any foe and is virtually incapable of suffering at least in the physical sense. Nevertheless, this criticism wasn’t so apparent in the onset owing to the euphoria of a superhero character, in fact the idea of a perfect savior stuck a cord with the post-world war two audiences who probably appreciated the fantasy of a morally incorruptible sentinel who could watch over the world and vanquish any forces of evil. When the first superman movie came out in 1978, it was a resounding success in regard to direction and cultural programming, for the first time, in a long time the film audiences encountered a protagonist who want unlikeable and deeply flawed. Prior heroes included the likes of Michael Corleone and Randal Murphy and other antihero-like protagonists who were just as much villains as they were heroes. His appeal was added to by the fact that there had not been, before him a character powerful enough to stop trains and pick up buses with his bare hands. He is however vulnerable to Kryptonite radiation and magic, his power although superhuman is not infinite and when he flies off to space he has to fill his lungs with air otherwise he would suffocate. Superman’s inflexible moral compass that drives him to use his powers for the sake of other has been touted as one of the appeals of t he superman films and cartoon as it was seen to impart moral virtues in young viewers who were likely to model superman. Nonetheless, with time, the magic appeal of superman begun to fade and chinks started

Thursday, October 17, 2019

Frederick II (Frederick the Great) Research Paper

Frederick II (Frederick the Great) - Research Paper Example Majority of military strategists perceive him as a brilliant military thinker while critics accuse him of being a power-hungry tyrant willing to go to any length to calm his ego and enhance his reputation.1 This paper asserts that Frederick II epitomized what a military leader should be, especially based on his profound and enduring influence on other military strategists, leaders, generals, and statesmen who came after him.2 Frederick II noted, â€Å"A country should be ready for war, offensive or defensive and preparedness for war hinges on the condition of the army and the finances. Frederick II of Prussia was one of the â€Å"enlightened monarchs† (enlightened despots) based on the reforms that he was able to bring to Prussia. During his reign, he was able to expand the territories of Prussia to become a power house in Europe. Frederick modernized Prussian bureaucracy and civil service, besides promoting religious tolerance. Frederick managed to modify Prussia from European back water to an economically powerful and politically reformed state. One of the strengths of Frederick II lies in the fact that he was an enlightened absolutist and thus, could run the political side while simultaneously directing the army to achieve the objectives of the state. One of Frederick’s most outstanding quote details â€Å"a nation lacking an army is like an orchestra without instruments.†3 As a military leader, Frederick II focused on drill and discipline, besides stimulating initiative and inspiration in his military leadership. Frederick II maintained that common soldiers should fear their own officers more compared to the enemy, and he closely monitored his generals to ensure that none could be trusted to perform independently. As crown prince, Frederick II maintained that Prussia could not evade being drawn into conflict practically anywhere in Europe. However, his country was short of the

The Impact of Technologies Innovation on Airlines Travel and Thesis Proposal

The Impact of Technologies Innovation on Airlines Travel and Transportation Business - Thesis Proposal Example s travel and transportation business has become a necessity as these organizations concentrate on getting and retaining the competitive advantage in the market. In the traditional business systems the procurement processes and the collaboration and coordination among business partners are not very strong but with the integration of innovative technologies like IT the better ways and collaboration can be obtained. And for this problem â€Å"the extranets were being gradually used for communicating with partners and to support business-to-business (B2B) relationships† (Dimitrios Buhalis, 2003). The issues of traditional procurement process, inventory management, finance (Dimitrios Buhalis, 2003) forced the organizations to adopt IT with the existing business system. In traditional approaches a very long time period is required to streamline the procurement processes but in case of electronic procurement this problem can be solved within limited time. The benefits of IT and innovative technologies are associated with procurement, product purchase, services and product delivery. Benefits associated with the information systems and ecomme rce are distributed roughly and are more favorable for network leaders (Riggins and Mukhopadhyay 1994). All the industries are trying to reduce the overall expenditure of procurement processes without the awareness of innovative technologies. So there is the need to introduce the benefits of innovative technologies and its integration with the existing systems. Innovative technologies also play a vital role in reduction of costs (Alexander & Young, 1996, Domberger, 1998, Hallikainen, 2003). IT can better help in the maturity of procurement processes in a very less time. IT has deeper impact upon economy (e.g. see Choudhury et al., 1998; Crowston, 1997; Ein-Dor et al., 1997; Pereira and Tavares, 1998; Wang et al., 1996) or cost component and generating revenues for the industry. The ultimate strategic goal behind the implementation of

Wednesday, October 16, 2019

Frederick II (Frederick the Great) Research Paper

Frederick II (Frederick the Great) - Research Paper Example Majority of military strategists perceive him as a brilliant military thinker while critics accuse him of being a power-hungry tyrant willing to go to any length to calm his ego and enhance his reputation.1 This paper asserts that Frederick II epitomized what a military leader should be, especially based on his profound and enduring influence on other military strategists, leaders, generals, and statesmen who came after him.2 Frederick II noted, â€Å"A country should be ready for war, offensive or defensive and preparedness for war hinges on the condition of the army and the finances. Frederick II of Prussia was one of the â€Å"enlightened monarchs† (enlightened despots) based on the reforms that he was able to bring to Prussia. During his reign, he was able to expand the territories of Prussia to become a power house in Europe. Frederick modernized Prussian bureaucracy and civil service, besides promoting religious tolerance. Frederick managed to modify Prussia from European back water to an economically powerful and politically reformed state. One of the strengths of Frederick II lies in the fact that he was an enlightened absolutist and thus, could run the political side while simultaneously directing the army to achieve the objectives of the state. One of Frederick’s most outstanding quote details â€Å"a nation lacking an army is like an orchestra without instruments.†3 As a military leader, Frederick II focused on drill and discipline, besides stimulating initiative and inspiration in his military leadership. Frederick II maintained that common soldiers should fear their own officers more compared to the enemy, and he closely monitored his generals to ensure that none could be trusted to perform independently. As crown prince, Frederick II maintained that Prussia could not evade being drawn into conflict practically anywhere in Europe. However, his country was short of the

Tuesday, October 15, 2019

Should the Zoos Be Shut Down Essay Example | Topics and Well Written Essays - 1000 words

Should the Zoos Be Shut Down - Essay Example Using animals for entertainment is just despicable and utterly cruel.   It teaches us nothing except to be tolerant of cruelty and hardship as we get used to sufferings of the animals in the zoo just to get us entertained or educated.   Moreso, when the kind of entertainment we get is twisted because it is at the expense of animal lives and well-being.   Nor are we educated about animals because we are not seeing the animals in zoos in their true nature.   All animals in the zoo relatively behave the same because of the small space and they are caged in. Zoos are harmful to animal lives.   It has already been proven that animals live longer in the wild than in the zoo.   It is because the wild is the natural habitat of the animals where their instinct to survive, adapt and feed on their own is honed.   In the wilds, they can run, a hunt which is good for them because their ability to hunt and survive is present not to mention that they can exercise there (all living animals needs to exercise!).   When one cages them, animals lose their instinct to hunt and survive and becomes dependent on the zookeeper making their lives miserable, depressed making them look like pathetic animals rather than a strong and wild.   Animals in the zoo live a miserable life because it is not their natural habitat and many of them even some of them display neurotic behavior because of their confinement.   If you wonder why some animals kept on walking in circles on ages and keep on shaking their heads, it is because the animal is suffering from neurosis which is wrought by the despicable environment of the zoo.   As a result, the lifespan of animals in the zoo are shortened.   Elephants for example, which are known to be survivors in the wild only live less than half of its natural years.   Where it usually lives for 56-60 years in the wild, elephants can only live for an average of 17 years!   Thus, the arguments used by zoo owners and keepers that zoos conserve animals are false.   Keeping animals in zoos are not conserving them but in fact, killing them.   Imagine the lion that we see on TV with all its might running and hunting its prey, that suddenly when it was caged, it became lethargic and me ek slowly dying like a poor cat dependent on the food is given by the zookeeper.  

Monday, October 14, 2019

Attack Tree Of Computer Security

Attack Tree Of Computer Security This report is introduces about the possible attack for company and it represent by the attack tree diagram. In the company have six computer and internal server. Each computer is using Microsoft window 7. They are using the DVD to store the backup and the router is default setting. Each employee has the email address. Firstly, I will attack the workstation, try to obtain the password illegally and attack the security such as install virus, Trojan, worm and DOS attack. After that, I will attack the dvd to get the dvd and do some malicious action. Obtain the DVD can through the employee, such as bribe or threaten. Malicious action will install the threats into the DVD and spread to other computer when they are using the backup. Then, we will attack the router which is change the WEP or filter the mac address to cause the computer cannot connect to the network. We also can using threats through the router to install into the system, e.g plashing, pharming, DNS cache poisoning and spoof ing. However, I will attack the server using the internal threats and external threats, such as ask a person to disguise a customer to get the information from company, or ask the temporarily customer to be a spy to do some malicious action. Moreover, attack the email using the security threats like phishing, email spam, virus and spam. Then, obtain the email password from the target. Finally, attack the window 7 using hacking tools to destroy the host file from the system and using physical attack to the system and obtain the important data or change the data to make a big lose for the company. All of these attacks will discuss in this report. Introduction and scope Attack tree helps one to understand security issue better, from the stand point of an attacker. Attack trees are a graphical and mathematical construct used to identify most of the attack that will cause the greatest risk to the defender, determine effective strategies decrease the risk in a acceptable level for the defender, describe the potential attack between the adversary and the defender, provide a communication mechanism for security analysts, capture what is known and believed about the system and its adversaries, and store the information in a diagram that can be understood for the subsequently defenders. Although it is very hard to identify the entire possible factor that leads to intuition, it is based on the experiences and the ability to extrapolate how the experiences apply on the new situation.  For example, the effectiveness of internet security, network security, banking system security, installation and personnel security may all be modelled using attack trees. Th e ideal of attack tree is that an equipment, software, process could have vulnerabilities that when successful, they could compromise the entire system. Scope There are six computers and one internal server and each computer encompasses Microsoft Window 7 and Microsoft Office 2007. Each workstation has been patched with all updates of March 25, 2010. They are using ADSL 2+ connection. The server and workstation backup is store in a DVD. All the employees have email addresses and there share the document through a D-Link DNS-323 NAS. The router is utilising default settings and consists of a D-Link DSL G604t. Each workstation is utilising Microsoft Windows Malicious Software Removal Tool. Assumptions -The room houses the server is not locked or well protected with access key. -The router is not updated with the latest patches and set the default setting. -The workstations are not created with user login account. -No legal antivirus software is installed. Attack tree for compromising availability Spyware Trojan Virus Worm DOS attack Security attack Attack workstation Description: Due do the workstation do not have any legal antivirus software, so the security of the workstation is weak. We can use different threats to attack the workstation. We will install spyware to the workstation through email, when the employee clicks on the email. Spyware will collect some information from there without their knowledge. It is hard to detect, unless the user install the anti spyware software. We also use the same way to install the Trojan, virus and worm into the workstation. Trojan will format the hard drive when the user runs it. Virus will spread from one device to another, when they are connecting to another computer or device. Most of the virus will destroy the data or cause the computer keep reboot. Worm will use up the computer resources and possibly shutting down the system. Install the DOS (Denial of service) attack to prevent the user to access information or service, such as access email, website, etc. Attack workstation Steal Get password from employee Bribe Threaten Find written password Obtain login password illegally Use widely known password Learn password Guess password Description: The other way to attack the workstation is obtain the administrator login password illegally. First of all, we can try to guess the password or use the widely known password, because most of the users usually use the password to easy memories. After that, we also can learn the password such as find the written password from the user. We also can get the password from the employee. There are many ways to get from them. Firstly, we can threaten the employee, like find out some secret from the employees. However, we can bribe the employees to give them some advantages, such as money or something they like. Finally, we can steal from the employee, like install remote password stealer computer and receive the password through email. Blackmail Bribe Employee Copy Steal Exchange DVD Obtain DVD Attack backup Description: The backup of company is store in a DVD, so there are many possible ways to obtain the DVD. Firstly, we can use another DVD to exchange with the DVD backup, so they cannot find out any problem before they use the DVD. After that, we also can steal the DVD or copy the DVD. Finally, we can bribe the employee or blackmail the employee to let him get the DVD. Attack backup Malicious action Spyware Virus Trojan Destroy DVD Description: Another way to attack the backup is do malicious action. We can destroy DVD, like burn or break it. We also can put the threats through email or employee to the workstation, so after they backup the threats also in the DVD. When they use the backup DVD, the Trojan will install in the system, and format the hard drive of the system. Virus will spread into the system to destroy the data or make the system error. Spyware will install into the system and collects some information from the system, so we can know what is the user doing in the system. Filter the mac address Set the WEP Get in the router Attack router Change router login password Block the website Description: Because of the router is using the default setting, so they do not change the login password. So we can get in the router using the default password. After that, we can change the login password and set a WEP to ignore the employee using the wireless. However, we can filter the mac address to disable employees computer to connect internet. Furthermore, we also can block some URL about the company, so the employee cannot access the website. Phlashing Pharming DNS cache poisoning Spoofing Attack router Security attack Description: There is some security attack to the router. We can use the spoofing attack to masquerades as another program to falsifying data and gaining some advantages. Furthermore, DNS cache poisoning will corrupts the DNS table and cache, so the domain name will assign with a malicious IP address. When the employee use the malicious IP address, the computer will infected by worm, viruses or spyware. Moreover, we also can use pharming to attack the router. Pharming is redirecting the website traffic to a bogus website. When the employee get in the website, pharming will conducted to change the hosts file or exploitation the vulnerability in DNS server software. Finally, phlashing will exploit vulnerability in network based firmware update, it will permanently disable the hardware by loading corrupted BIOS onto the hardware. Attack server Trojan Worm Virus Check for the security protection Install remote access Disguise Eavesdrop Security attack Espionage Temporarily employee Customer Internal threats Description: There are two internal threats to attack the server. Due to the room of server is do not lock properly, so the temporarily employee can easily get in the room. Temporarily employee maybe is espionage to get the information from the server. They will install remote access to control the server, such as delete the data or destroy the server. They also will attack the security and install virus, worm and Trojan to exploit the server and cause the server crash. Attacker also will disguise be a customer, so they can go to the company easily. They can be eavesdrop in the company, and they can check for the security protection of the company, find out the vulnerability, so they can easily get into the company when nobody inside. Attack server Internal threats Across to the computer room power Across to the power switch Turn off security protection Rename server Turn the power off Steal data Employee Description: Another internal threat is employee. We can bribe the employee, because employees already work in the company for a long time, so we can ask them to steal important data or some secret data of the company. However, we also can ask them to turn off the power of the server room, so some document have not save will missing. Employees can across the power switch or across to the computer room power to turn off the power. Then, turn off the security protection in the server, so we can easily to hack into the server. Finally, rename the server and cause all computer cannot connect to the server. Obtain password from target Threats Trojan Viruses Email spam Phishing Security attack Attack email Description: Email will attack by the threats and obtain the password illegally from the target. We can threaten or blackmail the target to get the email password, so we can send email for others and provide wrong information to them. There are four types of threats send to the email and bluff the employee to click it, so the threats will install into the system. First, phishing will send by the email and come out well known website, then the employee go to the website and key in the username and password, their information will obtain by attacker. Moreover, the email spam will send the message to numerous recipients by email, and it is unsolicited. However, viruses are dangerous because they often deliver extremely destructive payloads, destroying data, and bringing down entire mail systems. Finally, use email installs Trojan to obtain confidential information or gain control of the server. Attack Microsoft Window 7 Change the document Destroy host file Spyware Malware Hacking tools Turn off power supply Disguise Cleaner Destroy computer Description: Microsoft window 7 is the widely operating system in the world, so there are many hacking tools to hack into the system. Attacker can pretend be a cleaner, and using the tools to hack into the system, after that install the malware to destroy the host file or change the important document, effects the company process. Then, install the spyware to spy the user work in the system and obtain the login password. Furthermore, we also can destroy the computer such as use water or burn it. Finally, turn off the power supply and cause the system lost the data before the user save it. Attack Microsoft Window 7 Physical attack Security attack Teardrop Remote access trojan Worm Virus Crash Win 7 Description: Microsoft window 7 also can attack physically. Because of the window 7 is widely use, so attacker are found many security vulnerability. Teardrop attack is a form of denial of service (DOS) attack, it will exploit the system when the internet protocol requires that a packet too big for the next router to handle has to split into fragments. In the teardrop attack, attackers IP puts an odd and confusing offset value in the second fragment or in a fragment thereafter. If the operating system under the teardrop attacks, the system will crash. Another is security attack, we can ask the employee or using the email to install virus, worm and spread all of these threats to the entire computer in the company on the network, and make the system down. Another threat is using remote access Trojan to control the system. This type of Trojan creates a backdoor into the system. We can use the client to control the server, this can allow to almost completing control over the victims system. Attack Microsoft Office 2007 Confidential loss Threats of document Integrity loss Altered data Corrupt data Sell data Broadcast data Description The method of attack the Microsoft Office 2007 is threats the document. Firstly, we can get the document from employee or using the Trojan or virus through email send to the system to obtain the document. Then, it will cause the integrity loss and confidential loss. In the integrity loss, we will altered the data and corrupt the data. In the confidential loss, we will broadcast the data or sell the data to another company, so the secret of the company will know by everyone. These two type of method will cause big loss for the company. Conclusion As you can seem that from the diagram, there are many attack come from many different ways such as internal threats, external threats. Internal threats are cause by the employee, customer and the worker in the company. External threats are cause by the attacker using different method to hack into the system to do malicious action. But comparatively, the attacking from internal is easier, because the employee is know more about the company and can get the data easily, but that is dangerous, if the company found that, they will get catch. In the other hand, the attacking from external is difficult but safe, because they do not know where is the data and also need to avoid the security protection, but if the company found that, they is hard to track the attacker. All of the diagram above is some of the possible attack, there are still have many possible attack. Indeed, with the technological advancements, it is likely that the computer threats will emerge in endlessly, so the possible a ttack will come out more and more in the future. Glossary Virus- A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting i.e., inserting a copy of itself into and becoming part of another program. A virus cannot run by itself; it requires that its host program be run to make the virus active. Trojan- A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program. Worm- A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively. Spyware- Spyware is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the users personal computer. Spam-Electronic junk mail or junk newsgroup postings. Spoofing-Attempt by an unauthorized entity to gain access to a system by posing as an authorized user. Pharming-This is a more sophisticated form of MITM attack. A users session is redirected to a masquerading website. This can be achieved by corrupting a DNS server on the Internet and pointing a URL to the masquerading websites IP. Almost all users use a URL like www.worldbank.com instead of the real IP (192.86.99.140) of the website. Changing the pointers on a DNS server, the URL can be redirected to send traffic to the IP of the pseudo website. At the pseudo website, transactions can be mimicked and information like login credentials can be gathered. With this the attacker can access the real www.worldbank.com site and conduct transactions using the credentials of a valid user on that website. Phishing-The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. Typically the e-mail and the web site looks like they are part of a bank the user is doing business with. Denial of service-The prevention of authorized access to a system resource or the delaying of system operations and functions. Malware-A generic term for a number of different types of malicious code. DNS cache poisoning-DNS poisoning is also called DNS cache poisoning, and refers to the corruption of DNS tables and caches so that a domain name points to a malicious IP address. Once the user is re-directed to the malicious IP address his/her computer can be infected with worms, viruses, spy ware etc. Phlashing- Phlashing is a permanent denial of service (DoS) attack that exploits a vulnerability in network-based firmware updates. Such an attack is currently theoretical but if carried out could render the target device inoperable. Teardrop-Teardrop is a program that sends IP fragments to a machine connected to the Internet or a network. Teardrop exploits an overlapping IP fragment bug present in Windows 95, Windows NT and Windows 3.1 machines. The bug causes the TCP/IP fragmentation re-assembly code to improperly handle overlapping IP fragments. This attack has not been shown to cause any significant damage to systems, and a simple reboot is the preferred remedy. It should be noted, though, that while this attack is considered to be non-destructive, it could cause problems if there is unsaved data in open applications at the time that the machine is attacked. The primary problem with this is a loss of data.

Sunday, October 13, 2019

Poker Essay -- essays research papers

Poker: Draw Vs. Hold 'em As the room fills with smoke from cigars and cigarettes, I look across the table at the last guy in the hand. I think to myself, â€Å"Why did he just raise me?† I just raised the pot $25 on two pair. The other guy re-raised the pot another $25. My heart is beating like a freight train racing down the tracks, I’m doing everything in my power to stop from sweating and I’m trying to keep my face stone cold straight as to not give myself away. I’m pretty sure at this point that this guy is trying buy the pot, but it still makes me nervous. I decide to call his raise and when the cards are turned over I realize that I had just made the right call. I won the pot and fought off his bluff. Poker is a card game that has been around for hundreds of years. Although the origin of the game and the name itself are debatable, the game of Poker is played more than any other card game in the world. The scenario I explained took place during a game of Five Card Draw. This is a very popular rendition of Poker. Poker has evolved over the years and hence has numerous types of games that still fall under the Poker category. My favorite games are Five Card Draw and Texas Hold ‘em. Both games are similar because they derive from the original game of Poker, involves betting, and using playing cards. They also differ because of the betting, the number of cards used and the way the cards are dealt. Five Card Draw is o...

Saturday, October 12, 2019

The Significance of Philosophical Scepticism Essay -- Philosophy Philo

The Significance of Philosophical Scepticism In answer to the question 'What can we know?' anyone who gives a pessimistic answer is labelled a sceptic. Scepticism is associated with incredulity. A sceptic is someone who questions things (particularly received opinions) and also practices suspension of judgement. This questioning outlook has been labelled by some as practical scepticism. However, philosophical scepticism involves more than this. Its essential element is a general view about human knowledge. In the broadest terms, philosophical scepticism holds, or at least finds irrefutable, the view that knowledge is impossible. There are two features of philosophical scepticism which differentiate it from everyday 'sceptical' outlooks. The first has to do with its strength. The more challenging sceptical arguments do not depend on imposing high standards for knowledge or justification. Rather, the scepticism they imply is radical. It is not just the case that we can have all kinds of good reasons for what we believe, though those reasons do not quite measure up to the standards required by genuine knowledge. The radical sceptic questions whether we ever have the slightest reason for believing one thing rather than another, so we can never even get to the point of justified belief, never mind whether our justifications are sufficient for knowledge, in some more restricted sense. The second crucial feature of philosophical scepticism concerns its scope. The philosophical sceptic's negative verdict on human knowledge is highly general. This generality explains why philosophical scepticism formulates its challenge in terms of the possibility of knowledge. it is not merely the case that we in fact know a good deal less t... ...sophy. Penguin Reference.(1996). pp. 502-503. Morton, Adam. Philosophy in Practice %#151; An Introduction to the Main Questions. Blackwell.(1996). Chapter 1. pp. 3-35. Moser, Paul. The Blackwell Guide to Epistemology. (Eds. Greco, J. and Sosa, E.). Blackwell.(1999). Chapter 2. pp. 70-91. Scruton, Roger.Modern Philosophy — An Introduction and Survey. Mandarin.(1994). Chapter 2. pp. 16-22. Shermer, Michael. A Skeptical Manifesto. The Skeptic, vol. 11, Spring 1992. pp. 15-21.http://www.skeptic.com Warburton, Nigel. Philosophy — The Basics. Routledge.(1992). Chapter 4. pp. 93-111. Williams, Michael. The Blackwell Guide to Epistemology. (Eds. Greco, J. and Sosa, E.). Blackwell.(1999). Chapter 1. pp. 35-69. Wittgenstein, Ludwig. Tractatus Logico-Philosophicus. (Translated by Pears, D.F. and McGuinness, B.F.). Routledge. (1961). Section 6.51, p73.