Saturday, August 31, 2019

Equity Analyst Project – Individual

Equity Analyst Project – Individual Scott Hatten MBA 737-F1WW (W13) Professor Lauren Thomas March 2, 2013 This paper will assess my ability to maximize my personal return on investment with an allocation of $1,000,000. The overall goal of this exercise is to obtain the highest return possible within the next 12 months. I am limited to the following asset classes for allocation of all investments: * U. S. Equities * U. S. Treasury Bonds * Cash This paper will be my prospectus on the justification of the allocation and potential earnings in each class. U. S. Equities| U. S. 30-Year Treasury Bonds| Cash| Proposed Allocation| 70%| 25%| 5%| $ Amount| $700,000| $250,000| $50,000| Forecast +/- (12 Months)| 13%| 3. 0%| 0%| ROI| $791,000| $257,500| $50,000| Estimated (ROI) for $1,000,000 as of December 31, 2013 = $1,098,500. 00 U. S. Equities As the United States economy continues to grow in areas but struggle in others, the decision to place the largest allocation of funds into this c ategory is made without hesitation. 013 is the 1st year after a presidential election and the second term for our current president. Typically in situations like this there is less hype about a new leader in office and more emphasize placed on making strategic decisions and outcomes. Even though were are currently looking at the possibility of thousands of government based worked to be subjected to mandatory pay reductions through a sequester plan, the United States business machines is moving at a strong pace.Since 2008 business and industry leaders have worked to understand the changing dynamics of both the US and International economic challenges and have positioned their organizations to adapt more quickly to those conditions (Investors, 2013). As consumer spending and consumer confidence continue to increase, U. S. Equities should continue on steady growth plan which is indicated in the strong S&P Indices (currently at 1518. 20), NASDAQ (currently at 3169. 74), and the DOW (cur rently at 14089. 66).These indicators provide direct indication that investor and business confidence levels are extremely high and favorable for positive returns. U. S. 30 Year Treasury Bonds Although this investment class can be considered the most conservative of the three, the low yield of government bonds in the past 10 years does not lend a comparative metric against many other investment opportunities (Jacobs, 2012). The fixed rate of these instruments allows for a guaranteed return, but should only be utilized at a point in an investing cycle when risk is higher than potential income growth.The 25% allocation that is invested in this class is positioned to provide a long term guaranteed investment, with the possible that these lower rates will not rise significantly in the next few years. Cash The lowest of investment allocation classes is cash. The cost to leave any instrument in this category is expensive and provides very little ROI. The funds kept in this allocation are specific for future investment opportunities where transition of funds from other classes could have a significant impact or cost to the overall 12 month plan (Mangla, 2012).Summary Looking back over the past ten years and most especially the past three years for investment returns and economic possibilities, there seems to be more growth in the past 24 months than what we have seen in over a decade. The rapidly changing international economic climate and the current government struggles with tax based polices and the continued climbing US deficit will make 2103 a year where investors must maintain a long term focus while being selective in short term growth opportunities.References Jacobs, D. L. (2012). Are Bonds The Next Facebook–Negatively Speaking?. Forbes. Com, 6. Investor's Business, D. (2013, February 19). U. S. asset demand picks up. Investor’s Business Daily. p. A02. Mangla, I. (2012). Yes, You Can Dump Your Bank. Money, 27-28. Ross, S. , Westerfield, R. , Jaf fe, J. , and Jordan, B. (2011-). Corporate finance: Core principles ; applications. (3rd ed. ).

Friday, August 30, 2019

Response Paper to “The Invention of Lying”

Response Paper One Joseph Leemon For my analysis of the movie The Invention of Lying as it pertains to our class, I have selected two parts from the IPC book, where I can apply some of what I have learned so far. The first part is the Ethical Systems of Interpersonal Communication table from Chapter 1 and the Stages of the Interpersonal Perception Process from Chapter 2, The Ethical system of interpersonal communication contains five parts. Those parts are categorical imperative, utilitarianism, golden mean, ethic of care, and significant choice.Categorical imperative is an ethical system that suggests that we should act as an example to others. This is demonstrated throughout the movie as the entire population (except Mark when he begins to lie), tells the truth no matter how it might affect the other person. A specific example is when Anna is talking to her mother on the date, and explaining that Mark is unattractive and undesirable, even though he is sitting right across from her. Utilitarianism is the ethical system suggesting that what is ethical will bring the greatest good to the greatest number of people.An example of this would be when Mark tells the lie that he can speak directly to God, and he is confronted with a worldwide audience. He then decides to make up his own version of the Commandments, because he believes that these will help society at large in the best possible way. Golden mean is the ethical system where a person’s moral virtue stands between two vices, with the middle being the foundation for a rational society. This is displayed when Mark uses his lies to get closer to Anna throughout the movie by manipulating other people to get money and fame.The other side of it is when he tells his dying grandmother how wonderful heaven is, so she will be able to die peacefully. Mark also has various other situations like this that keeps him centered and good. The ethic of care is the system that is concerned with the connections among peop le and the moral consequences of decisions. Throughout the movie, Mark tries to get Anna to like him, even though she originally thought of him as ugly and as a loser. They begin to grow closer, until Anna decides to marry Brad, because Brad is of better â€Å"stock† than Mark.Anna does not end up going through with marrying Brad, because she realizes that there are more appealing aspects to Mark, even though he has told her that he has not told the truth. Significant choice is the belief that communication is ethical to the extent that it maximize our ability to exercise free choice. This is brought up in the movie a couple of times. One of the first times Mark uses it is when he runs into Frank, who is contemplating suicide. Mark did not have to tell Frank that he was a good guy, and that he was worth something, but he found it was the ethical thing to do, and exercised his choice in that way.Another time is near the end of the movie where Mark tells Anna that he has not be en telling the truth. He wanted her to like him for himself, and not all the money and fame that he had accumulated by lying, so he made the choice to tell her the truth. The second part is the Stages of the Interpersonal Perception Process from Chapter 2. These include attending and selecting, organizing, interpreting, and retrieving. This is used on Mark and Anna’s second date, when Anna asks Mark about his family.Mark is able to draw her in by telling her of his father and his grandmother. Mark then uses organizing to create the belief that he is good enough for Anna, but Anna still believes that he is ugly and she does not want to have children with him. Because of this, Mark interprets that even though he has more money, Anna will still not be with him romantically. Mark retains this idea that he is not good enough throughout the rest of the movie, until the very end where Anna finally decides that she wants to be with him because of the person he is on the inside.

Thursday, August 29, 2019

Art History Essay The Breakfast Scene

The symbol of cupid presented reflects themes presented within Venus, Cupid, Folly and Time , displaying aspects of misguided love , primarily emphasizing how lust compromises the morale of individuals. That the count presented sense of obliviousness in regards to the consequences of his actions, well eventually taint his family name in regards to the infidelity committed , but also such constant self ind... ...h open composition, provides a rustic appeal in order to emphasize the working class. The portrait depicts a fisherman’s daughter , maintain her lovely complexion , in order to lure individuals , to purchase selfish that resides in a basket placed upon her head, establishing a sense of euphoria. Adopting such seductive appearance to establish a form of interest , not only to display her services , but also displays aspects of eroticism and feminism , very large breast that references aspects of fertility , but also the delicate facial features the use of blush to complement her subtle complexion. The use of contropasto, the bodily composition presents a sense of equilibrium in which the action correlates with the action depicted, in which her arm is extended in order to maintain the balance. While the other resides at her waist idealizing her feminine figure.

Wednesday, August 28, 2019

Inditex(Zara) Case Study Example | Topics and Well Written Essays - 1500 words

Inditex(Zara) - Case Study Example The United States of America is acknowledged to be a graveyard for European retailers. Everyone who goes there is believed to have struggled with comparisons to Laura Ashley’s shutting down and Benetton’s declining. The US is believed to be a complex market as shopping malls are located in the middle of nowhere while the real fashionistas live around the East and West coasts. In addition, everyone nowadays is dressing in Wal-Mart, the Gap and T. J. Maxx. If one is to open a successful fashion retail stores in the US, they would have to open at least 300 and focus all their energy into it to make it work. Another problem causing the inability of Inditex (Zara) to break the US market is a matter of size. For starters, the store is European which means it makes European style clothes. The clothes just would not fit in the US fashion where most of the clothes are for small bodied people. Therefore, Inditex would have to ask themselves why make production more complex? More money would have to go into producing new clothes that fit the US market. Inditex is a pioneer in the fashion industry essentially imitating the latest fashion trends and speed the cheaper imitated versions into stores. Badia (2009) Every one of their brands follow the Zara brand: trendy, decent but inexpensive products sold to people in beautiful, high-end stores. Zara has similar prices to the Gap with coats going for $200, T-shirts at $30 and sweaters for $70. Inditex now makes 840 million clothes every year and has around 5,900 stores located in 85 different countries. Arnarsson (2009) stated those numbers keep changing as in recent years, the company has already been opening more than one store a day or about 500 every year. Recently, there are around 4400 stores located in Europe and about 2000 Spain only. The company’s roots go back in 1963 when the railway worker’s son, Ortega, started a company making robes and housecoats in La Coruna. Oshea (2012) reveals he opened his

Tuesday, August 27, 2019

Teachers' Perception of Leadership Essay Example | Topics and Well Written Essays - 12000 words

Teachers' Perception of Leadership - Essay Example However, they all agree that measuring job satisfaction is challenging because teachers are not in harmony with what satisfies them throughout their career. In spite of its difficulty to measure, investigators note that the degree of teacher satisfaction directly affects the school's stability, the quality of instructions and hence the overall climate of the school (Bogler, 2000; Richards, 2003; Woods & Weasmer, 2004). Chapter 1 Introduction 1.1 Literature Review Researchers examined the various qualities in a principal that are desired by teachers (Haser & Nasse, 2003; Nir & Kranot 2006; Jorissen, 2002; Richards, 2003). Richards (2003) compared the needs in terms of principal's behavior of three groups of teachers - those with 1-5years experience, those with 6 - 10 years and those with 11 years or more of teaching experience. Richards utilized a phenomenological study and discovered that the beginning teachers cited "emotional support and safety" as their main need. Teachers with 6-10 years valued "respect as professionals" as the key element in their job satisfaction while those with more than 10 years regarded "respect for their knowledge and experience" as their chief need (2003, p.12). However, support for the teacher was the main factor in influencing teacher's satisfaction for the entire range of teachers. Richards (2003), like Woods and Weasmer (2004), concluded that teachers at all stages in their career agreed that support in relation to parental confrontations, as well as in student... Researchers examined the various qualities in a principal that are desired by teachers (Haser & Nasse, 2003; Nir & Kranot 2006; Jorissen, 2002; Richards, 2003). Richards (2003) compared the needs in terms of principal’s behavior of three groups of teachers - those with 1-5years experience, those with 6 - 10 years and those with 11 years or more of teaching experience. Richards utilized a phenomenological study and discovered that the beginning teachers cited â€Å"emotional support and safety† as their main need. Teachers with 6-10 years valued â€Å"respect as professionals† as the key element in their job satisfaction while those with more than 10 years regarded â€Å"respect for their knowledge and experience† as their chief need (2003, p.12). However, support for the teacher was the main factor in influencing teacher’s satisfaction for the entire range of teachers. Richards (2003), like Woods and Weasmer (2004), concluded that teachers at all stages in their career agreed that support in relation to parental confrontations, as well as in student discipline were of primary importance for teacher retention and teacher job satisfaction. Other investigators have identified what teachers expect from their administration and their perception of their behavior. Factors affecting teachers’ satisfaction included the attitude of the principals toward them, the satisfaction of informal peer group relationship, freedom in planning work and the opportunity to participate in planning policies which affected them.

Monday, August 26, 2019

Intercultural Business Communication Essay Example | Topics and Well Written Essays - 2250 words

Intercultural Business Communication - Essay Example Culture can be defined as the combined programming of the mind that differentiates the member of one category of people from the other. This is always a collective phenomenon; however it can be related to different collectives. A variety of individuals belong within each collective. Considering the fact that we live in a global age where technology has brought each and every person much closer to each other than they were earlier, it has been witnessed that people belonging to different cultures are working together and henceforth are having frequent communications. This fact is of obvious interest but however, it can be frustrating at times when the thought comes to one’s mind regarding how one is supposed to relate to someone who belongs to a different culture. In what way must one start a conversion and are there any cultural taboos that one needs to know about? These are the questions that comes in one’s mind when the individual things about working or living with a nother individual of a different culture. Even after such barrier oriented questions people of different cultures are working, living and communicating with each other effectively and efficiently. Such is the diversity in culture that prevails all over the world. This shows the depth in the cultural dimensions that is witnessed all around the world. Establishing network with people all around the world is just one dimension of the cultural diversity. For the purpose of doing the same, one needs to understand the cultural differences. Psychologist Dr. Geert Hofstede came up with a theory that explained different dimensions of cultural diversity and the theories have become a standard that is recognized internationally (Hofstede, 2011). The following sections will involve a thorough analysis of the cultural-dimensional approach with reference to Hofstede’s research that will include arguments in favour of the validity and reliability of his research. Thereafter, the arguments a gainst the cultural-dimensional approach will be highlighted with reference to the notion of cultural heterogeneity and finally the researcher’s own perception regarding appropriate methodology for intercultural business communication research will be provided followed by an appropriate conclusion. 2. PART A 2.1. Hofstede’s Cultural Dimension Approach A discussion on cultural dimension approach must begin with a definition of culture. The quantity of the definition of culture expounded by the scholars are simply too numerous to count and each one is having specific relevance towards understanding the various dimensions of culture. Alvesson (2000) has enlightened about 128 definitions about culture. Hofstede himself has even provided a definition of culture that reflects culture to be a crucial factor that distinguishes one group with other. He defines culture to be â€Å"the collective programming of the mind distinguishing the members of one group or category of peop le from others†. Much attention has been placed on role of culture in shaping a business in the last few decades and it has never been that much significant as it stands today. Study on this field begun with Hofstede’s famous work on IBM in the early 80s (Arditi and Mochtar, 2000). Culture is adjudged as essential for numerous reasons related to business life. The significance becomes more visible when a business firms starts interacting with people in either forms such as employees, customers, suppliers or any other stakeholder group. Research studies related to cross culture has had most of the values and as a result of that it has succeeded to provide substances to the modern management techniques and practices. Some of the eminent cross cultural researchers such as Geert Hofstede, have to face criticism for failing to provide the valued guiding intelligence. Eminent authors such as Avolio (2007) and Barrett (1993) argues that the

Networking Term Paper Example | Topics and Well Written Essays - 2750 words

Networking - Term Paper Example Statistics show that the Internet usage has more than doubled over the last five years. However, research indicates that a majority of Internet users tend to assume that the transfer of data on the Internet is safe, reliable and is not at risk of forgery or hacking. Yang et al. (2012) argues that most Internet processes and services depend on data relayed by the Domain Name System (DNS) through excellent functioning and accurate mapping of domain names that can be understood easily using the IP addresses. Nevertheless, the DNS, which is mainly relied on for this function, does not provide any content protection. This implies that data remains unsecured against any manipulation when being relayed or while in the servers and caches. As a result, identification and avoidance of forged data becomes impossible. It is at this point that the Domain Name System Security Extensions (DNSSEC) becomes useful. DNSSEC, according to Yang et al. (2012) is a technology developed for the purposes of p rotecting data against attacks by digital ‘signing’ so as to provide assurance of its validity to the user. It authenticates the source data by ensuring that the path between the DNS servers and the validating DNS client are secured. The technology has proved remarkably effective in protecting Internet data from forgery, something that DNS has failed to provide. This paper will start by describing the DNSSEC technology in light of what it means and how it works. This will be followed by a SWOT analysis of the technology. The paper will then evaluate the current ethical and legal issues surrounding DNSSEC technology. The essay will also explore the improvements that have occurred over the last two years to DNSSEC technology and provide a suggestion on the improvements warranted on its current usage. Finally, the paper will predict the future role of DNSSEC for both personal and commercial use. It is an acknowledged fact that the Internet has revolutionized the world. Cur rently most parts of the world have Internet connectivity including the remotest regions, thanks to the recent technological advancements, according to Osterweil et al. (2011). Normally, for one to reach another person on the Internet, he, or she must type the recipient’s address on the computer or Internet-enabled phones. The address is usually unique to the individual, making it easy for computers to find each other. The unique identifiers are normally coordinated worldwide using the ICANN. Coordination of the identifiers is very crucial because, without it, the entire world would have a single global Internet, suggests Osterweil et al. (2011). When typing an address, it must first be translated into several systems before the final connection can be established. The translation of the address is performed by the DNS, which does the work of translating addresses such as www.google.com into Internet Protocol (IP) addresses. After the completion of the translation, ICANN then ensures that the addressing system is coordinated so as to ensure peculiarity of addresses. However, recent findings showed that DNS is extremely vulnerable and allows attackers to forge this process of searching for someone or site on the Internet using their address. The attacks are mainly committed in order to take charge of the session such as directing the user to the hijacker’s own deceptive website for a password and account collection. The vulnerability of the DNS has prompted the establishment of the DNSSEC

Sunday, August 25, 2019

An associative relationship between drug abuse and child abuse Essay

An associative relationship between drug abuse and child abuse - Essay Example Hindrances to data collection may include time to contact enough persons in order to get a proper sample. It may also include the reluctance or fear of the subjects to provide accurate data about a private and embarrassing matter. It might also be difficult for some to accurately remember the details of the situations involved. If sample size falls too low, critics might consider the data unreliable (Hopkins, 1997). Hypothesis Two: The same participants as for the previous hypothesis would be used for this part of the study. The items on the questionnaire used would also include probes about the different circumstances under which these persons were most likely to use drugs and how much drug use was associated with these times. They would also be asked whether they considered their actions toward the children to be dependent on the amount of drugs they used. Each questionnaire would also include the option to accept an interview. Those interviewed would be probed about the circumstances surrounding the most intense of the abusive episodes in order to shed light on the amount of drug abuse involved in the situation. It might, however, be a challenge to get persons to agree to an interview. Those interviewed would be probed about the circumstances surrounding the most intense of the abusive episodes in order to shed light on the amount of drug abuse involved in the situation. It might, however, be a challenge to get persons to agree to an interview. Obtaining clearance to enter the rehabilitation centre would prove problematic, and interviews that take place over the phone might be criticized as having lost the element of immediacy and the access to body language that would increase the depth of the findings.

Saturday, August 24, 2019

Resolving International Disputes. What Mechanisms are Available to the Essay

Resolving International Disputes. What Mechanisms are Available to the United Nations to Resolve International Disputes - Essay Example The UN has an additional challenge in the form of geographical dispersion and cultural diversity1. Among the primary purposes of the UN are international dispute resolution and upkeep of international security and peace, which means that the body takes collective measures to prevent and remove threats to the security and peace. The mechanisms that are in place to facilitate such objectives include the Security Council, the International Court of Justice, the General Assembly and the Secretary General. Being the key organ charged with the responsibility of maintenance of security and peace, the Security Council calls upon parties involved in disputes for the purpose of settlement as per articles listed in Article 33 of its statutes2. The dispute mechanisms are structured processes that address grievances or disputes arising between parties engaged in societal, legal or business relationships. The mechanisms are used in resolution of disputes and usually incorporate negotiation, mediat ion and conciliation. Through the dispute settlement systems in place, the UN is the best-suited international institution to address the new challenges facing international security. This paper will discuss the mechanisms available to the United Nations to resolve international disputes and their merits. The Security Council has the key responsibility of maintaining security and peace among countries. Other organs of the UN may only make recommendations to member states, but the Security Council has the authority to implement 1 Winnefeld, J 2004, The changing nature of intra-state conflict, Rand, California, pp. 19. 2 Simma, S 2003, The charter of the United Nations, Oxford University Press, New York, pp. 56. binding decisions that member states have agreed to carry out3. Such decisions by the Security Council are referred to as Security Council resolutions. As described in Article One, the UN has a purpose to maintain international security and peace. Hence, it takes collective me asures to prevent and remove threats to peace, suppresses acts of aggression and brings peace in conformity with the guidelines of international law and justice. It aims to develop friendly relations based on respect among nations. As an international body, the UN is determined to reaffirm faith in basic human rights, dignity and value of humanity. Its intention is to establish conditions that facilitate respect and justice for the obligations that stem from international sources of law and treaties as well as promoting better qualities of life, freedom and social progress4. The key motivation behind creating the UN was to save future generations from the threats of war. From the time it was created, the body has been striving to prevent the escalation of disputes into war as well as facilitating the restoration of peace in the event of armed conflicts. Typically, dispute mechanisms used by the UN are not judicial in nature since they are not deployed in courts of law. Instead, they are governed by core processes of human rights as defined by treaties of human rights5. The UN acknowledges that the absence of military conflicts or war between countries is not an assurance of international security and peace. Threats to international security and peace are seen in other sources outside of the military such as the instability arising from ecological, humanitarian, social and economic fields. Other factors that contribute to the insecurity are international environmental disputes that stem from 3 Thomas, G 2009, Admission to the United Nations: Charter Article 4 and the Rise of Universal Organization, Martinus Publishers, Chicago, pp. 64. 4

Friday, August 23, 2019

Psych Case Formulation on Bipolar patient Study

Psych Formulation on Bipolar patient - Case Study Example Bipolar patients experience recurrent episodes of high or elevated moods; characteristics of mania and depression states. Bipolar disorder symptoms can lead to broken relations, and even suicide. Individuals who experience the combination of major depressive episodes and mania are diagnosed with bipolar I disorder, and individuals who experience the combination of major depressive episodes and hypomania are diagnosed with bipolar II disorder. Bipolar illness is a long term condition that can be managed throughout the lifetime of a patient; enabling the patient to lead a healthy life. This paper will deal with sequences of thought, feelings, and deeds that are maladaptive, disruptive, either for the bipolar patient; treatment options will also be discussed in this paper. Clinical data regarding to bipolar disorders is used by most researchers, who follow the bio-psychosocial approach. Bipolar disorder is a psychological disorder, analyzing it requires the combination and interaction o f biological factors, psychological process, and socio-cultural contexts. According to a survey performed by Kessler et al (2005), bipolar disorder develops in an individual’s late teens or early adult life, before the 25 years. A small percentage of bipolar patients experience their initial symptoms during childhood while a larger percentage develops symptoms later on in life. It is very hard to make a diagnosis of bipolar disorder during its onset. This can be better explained by the neurobiological model which focuses on genetic influences and biological disturbances in the brain. Most individuals go through so much anguish for years before they are correctly diagnosed and treated. This study also proved that this mood disorder may be due to problems in the frontal lobes, hippocampus, and other brain parts associated with moods. Imbalanced of neurotransmitters such as norepinephrine, dopamine, and serotonin according to research is one of the causes of late onset of bipola r disorders. Current completed epidemiological research has approximated the lifetime occurrence of bipolar I and II disorders in the general population to be 3.7%–3.9% (Hirschfeld et al, 2003; Kessler et al, 2005). The frequency in samples of patients displaying depression is much higher, ranging from 21% (Hirschfeld et al, 2005) to 26% (Manning et al, 1997) in primary care settings, and from 28% (Hantouche et al, 1998) to 49% (Benazzi, 1997) in psychiatric clinics. A study conducted by Hirschfeld et all (2000) on the development and validation of a screening instrument for bipolar spectrum disorder recommended the mood disorder questionnaire. Results from this study proved that the use of screening equipment, such as the Mood Disorder Questionnaire, can significantly improve recognition of individuals with bipolar illness, particularly among depressed patients. These results aid in the displaying of bio-psychosocial elucidations, which emphasize the impact of anxiety, negat ive thoughts, and other psychosocial and emotional responses. From the questioner, the way the participants thought about their stressors indicated the likelihood of a mood disorder. A study funded by the national institute of mental health, conducted by Frank et al (2005) revealed the likelihood of relapse due to psychosocial intervention. Careful attention is paid to the social and cultural factors that form the context, or background of abnormal behavior. From the data obtained, psychosocial inte

Thursday, August 22, 2019

Creation of Snow and Jack Frost Essay Example for Free

Creation of Snow and Jack Frost Essay Long ago, the weather was just warm and the grass was just green. Every person on earth was happy the way they were, and the way everything was. God was always trying to bring new things into Earth, to complete its perfectness. One day God had this big feeling that he needed to create something for Earth and his people. But what could it be? Everything was already so perfect. So God asked and angel named Jack to go down to Earth and figure out what was missing. Jack went down and searched and searched, he disguised himself as a human and asked many children and adults, â€Å"If you could add something to our earth, what would it be? everybody’s answers were the same. They all said that there was no needed change. Jack reported back to God and told him everything, but God still didn’t agree. He thought and thought of different ideas every day. One day, He caught a cold, and He couldn’t stop coughing or sneezing. Even when He had this cold, he still looked over Earth every single day and tried to improve it. But right when God was just about to give up and say the Earth was perfect enough, He let out the biggest strongest sneeze anyone could imagine. His sneeze was so powerful that it blew all the clouds onto the ground onto Earth and made them stay over top of the grass and cover every single thing on Earth in soft white stuff. When God seen this, He was appalled. He thought he ruined everything. But then a bright idea came into Angel Jack’s head. He said â€Å"Well since Earth has only warm weather and green grass, what if these clouds turn into cold soft ice and the weather becomes cold for half the year? † God thought this was a brilliant idea, so He did what Jack suggested. He turned the clouds and weather cold. He decided to call the clouds snow. He then told Jack to go check it out and see how the humans reacted. Jack once again went down to Earth and disguised himself. He asked all the children and adults what they thought of this snow. They all said the same thing, that they don’t know what to do or how to have fun in this snow. Jack thought to himself, â€Å"what if I think of fun games the children could play in this snow? † So he did, he lied on top of the snow, and started to move his hands up and down and his feet in and out. All the children saw what he was doing and did the same. They asked him what he was doing. Jack answered quickly, â€Å"I’m making, uh, snow angels! See these are the wings and these are their white long clothes! † The children’s faces lit up and asked Jack if he could show them any other fun stuff to do. So he thought quickly and started forming balls to throw and blocks of snow to make little forts. The children seen what he did and all said, â€Å"Let’s make snow balls and snow forts like Jack is! I love the snow! † Once Jack heard this, he was on his way back to God. He came back and when God asked how everyone liked it, he told him all this stories and God was exceeded. God then asked Jack, â€Å"Do you like this snow? † Jack answered, â€Å"I love this snow, so much! † So then God asked if he would like to become in charge of when snow falls, and in charge of making games and keeping the snow to the humans’ likings. Jack answered with a yes, so God said, â€Å"Well then Angel Jack, you are now named Jack Frost! † Jack was happy with that, he made his home at the North Pole and kept track of the snow and made sure everyone was happy ever since.

Wednesday, August 21, 2019

Building an Ethical Organization Essay Example for Free

Building an Ethical Organization Essay When building an organization the main focus will be to help the public with specific needs. We will have to build the business on ethics and human service laws. The main goal is to help those in need and do this with respect and caring. There are many ways to run an organization and we need to choose the right services to meet the needs in the community we serve. The organization is for the help for people living with Alzheimer’s and the people that love them. We will be there to offer services for the person suffering from the disease and their families. The services offered will be assistance at home, a live in if necessary, counseling for the family, and client, and a residential home. Services include shopping, sitting when a day out might be needed. We will offer a class to help the family understand the disease and its progression, and have group counseling to help them support each other. This is a not for profit organization. Helping people should be top priority over making money. Human services are about helping the people in our communities in need of services. The mission statement: To support and develop programs through education to teach how to live with the daily changes, and to strengthen family ties. We have to let them know they can count on us for understanding and support. This will support the ethical system by keeping the respect and dignity of our clients, supporting them in their time of need, and giving the famil y the support that is needed to face the day-to-day heartache that comes with watching your loved one suffer. The message that this mission statement will put out in the community is we will be there for them. We will not turn them away when the need is there. We have let the community know they can count on us to provide the necessary services to their loved ones, and also help them through a difficult time. Coping with this disease is not an easy thing to do. The services that will be provided will help the families understand  that this does not have to be a burden, and will help them to know that their loved one is getting the necessary care and love to help them in the progression of this disease. Having an ethical leader in the organization will help to have ethical social workers. Having a leader that is respected and trusted in the community will benefit the organization as well as the community and clients. The organization is only as good as its leaders. Our values in the organization will be: Commitment to the public, commitment to superior service and to maintain the publicâ₠¬â„¢s trust, and respect. Having empathy for our clients and their families, dignity and self-worth of all that seek help, and the importance of human relationships. Respecting the diversity of our clients and their families at all times, and we will not discriminate against anyone for any reason. Treating our clients with the dignity and respect that every human being is entitled to is what can be expected when they walk through the door. This helps support the vision that the organization has for its future. To have our clients and their families living with dignity and having control over a terrible disease, to have the community see and know that our clients receive the services to have as happy a life as possible. The staff will be highly trained in the area of Alzheimer’s to assist, and care for our clients, and be there to help the families with all the means available to the organization. We can put all this into action within the organization, and this will benefit the clients and community as well as the employees. We need an ethical leader who can set an example for the employees. The leader will need to always show their leadership with the ethics that we want to have within the organization. This will help teach the employees how to behave and always keep the mission in mind and work toward the vision that the organization has for the community and the clients. Abiding by the ethics laws and the hum an service laws will help with the code of conduct that is expected of all employees in the organization. According to Statement of values and code of ethics for nonprofit and philanthropic organizations (2004) â€Å"going through the process with the board and staff also begins to infuse into the culture of the organization recognition of how important it is to address issues of values and ethics on an ongoing basis†. All the employees need to be involved with the process so they fully understand what is expected of their behavior in the organization every day. When difficult situations arise with clients all  employees will handle the situation the same way, and make sure that the client has their needs met in an ethical and respectful way. Social workers have a code of ethics that are an important part of the job. According to NASW (2013) â€Å"social workers have an ethical responsibility to their clients, self-determination, competence, social diversity, privacy and confidentiality†. All laws will be posted around the organization so they will be seen daily and keep the mission in the minds of the employees daily. Our clients will respect the organization and the employees for always using ethical conduct and fairness when it concerns helping them find the right services that work. If more services are needed than we have to offer the clients they can have peace knowing they will be sent to an ethical place to have the services needed that will work together with what we offer the clients. When a social worker in the organizati on as not conducted themselves in an ethical way, and has caused problems will be reprimanded. The client’s dignity comes first in the organization. Dealing with a disease that has no cure is devastating to the family, and it is a horrific disease for the client to deal with. Having caring people treating them with love and respect makes a big difference in their world. Offering as much assistance as we can by the programs we have and services we offer will make a big difference in their day-to-day routine. Letting them know they are not alone, and we will be there to make it a bit easier to get through. References: Statement of values and code of ethics for nonprofit and philanthropic organizations. (2004). Retrieved from http://www.ncdsv.org/images/ NASW. (2013). Retrieved from http://www.socialworkers.org/pubs/cod

Tuesday, August 20, 2019

Network Attacks in Real Time Scenario Over Campus Network

Network Attacks in Real Time Scenario Over Campus Network Amit Mahajan* Vibhakar Mansotra** ABSTRACT This paper presents study of attacks in real time scenario over the campus network. The attacks were monitored over a time and analyses were made. The paper discusses about the dependency over the IDS/IPS signatures and proposes for a solution which records the events with raw traffic and visualizes the traffic to give better understanding of the behavior of the traffic flow over the network. Keywords: UTM, Attacks, Visualization, Afterglow, tcpdump. I INTRODUCTION Networks have been under attack from the time Internet came into existence. There is consistently some lack of determination connected with the effect of these attacks. In the present situation of PC innovation, any institution can have enormous machine frameworks of distinctive natures. With the advancement of technology, Organizations have started facing difficulties due to different types of computer viruses and attacks. This resulted in tremendous loss of the internal assets like data and utility of time. Thus there is an urgent need to study these attacks and network breaches by means of which one will be able to devise preventive measures and thereby protect the internal assets. In view of the above objectives one has to understand the networks and how they expand widely. Also one has to understand the attacks and breaches. Mostly the internet is one of the sources of the viruses and attacks but quite often the local network is also a major source of threats for campus networks. Generally administrators and organizations safe guard their networks from outside threats but the internal attacks and breaches are very crucial. The IDS/IPS ( ) are installed over the gateway level to scan the outgoing and incoming traffic. Where these kind of mechanism to study the behavior of internal attacks is vague. One is very much interested in knowing the kind of traffic flow, and its identification etc in the network. This kind of approach will help the user community to adopt preventive measures or in other words one has obtain a solution by studying the internal attacks and network breaches and thereby how to minimize and protect the internal assets . Analysis of the netw ork can be used as a tool to scan the network traffic. The behavior of the network may be understood through penetration tools, simulations etc. Alternatively a tool like IPS having capability of network behavior analysis also can be of great help in understanding the problem. SURVEY OF WORK Asmaa Shaker Ashoor and Sharad Gore in their research differentiated the Intrusion Detection System and Intrusion Prevention System (IDS/IPS) technology which is used in the computer networks. They compare the stability, performance and accuracy wise result of IDS and IPS. They highlighted that the major difference between the IDS / IPS is among their deployments over the network. IDS technology works on out band system which means it is not lined with the network path but IPS technology works on in-line with the system, means it can pass through in between the devices in real time. Jared Holsopple, Shanchieh Jay Yang, and Moises Sudit discusses about the Present run-through for fighting cyber-attacks which are typically used by the Intrusion Detection Sensors (IDS) to inactively detect and block multi-stage attacks. The algorithm, TANDI, helps in reducing the problem difficulty by separating the simulations of the attacker’s capability and opportunity and thus fuses the two to determine the attackers intent. The results of the research demonstrate that the algorithm TANDI predicts that the future attack action precisely as long as it is not a coordinated attack and which contains no internal threats. In the presence of the malicious attack events, the algorithm TANDI, will give alarm to the network analyst for further analysis. This can be further analysed with the help of simulation. Nilima R. Patil and Nitin N. Patil in their paper discussed about the importance of attack graph to check the possible attacks in the network. Using attack graph, analysis can be done effectively. This helps the administrators to further analyze the attack graphs deeply to know where their system weaknesses lie. Accordingly help them to decide what kind of security measures can be opted for effective deployment. They study different ways to analyse attack graphs and to provide future scope for research on these attack graphs. Rosslin John Robbles, Tai-hoon Kim, Seung Lee in their paper have shown that a second level in addition to access control intrusion confinement can dramatically enhance the security especially integrity and availability of a system in many situation. It showed that intrusion confinement can effectively resolve the conflicting design goals of an intrusion detection system by achieving both a high rate of detection and a low rate of errors. Developing a more concrete isolation protocols will further be studied in the future research. Meera Gandhi and S.K Srivastava in their paper highlighted the importance of Intrusion detection in business sector and in active area of research. They describe IDS as important tool for information security. An IDS is intended to identify and fight with some common attacks over the network systems. In such systems log displays the list of attacks to the administrator for ambiguous action. This system works as an observant device in the event of attacks directed towards an entire network. In the light of the above available information a need has been felt to undertake similar type of work in the University of Jammu as well. This will help in study of attacks received by the network of the campus. The network is setup on optical fiber backbone with around 100 distributed switches across the campus. Which also has WI- FI wireless Connectivity with access points around 200 approx. Such an ICT facility available over the network is plays an important role in helping the students, researches, teacher and staff. The number of users in the UOJ campus network appxo 3000. Thus the analysis of the attacks is taken up in this campus. II EXPERIMENTAL SETUP USING UTM University of Jammu is one of the pioneer higher educational institutes in the state of Jammu and Kashmir, India. Whose vision is to be an internationally competitive academic and research institution? To achieve University of Jammu has lot of focus on the information technology. In 2003 university started its initiatives to be an IT enabled university by setting up a university campus network on optical fiber backbone. Later this network was further converged with Jammu University JU Wi-Fi. This facility is playing a very crucial role in order to help the students, teachers, researchers and administrative staff to use the ICT facilities available over the network. University of Jammu is having huge internet bandwidth connectivity’s to cater the needs of the university fraternity. This internet bandwidth connectivity’s constantly keeps on upgrading from time to time. At present university is having 40 mbps Internet bandwidth 1:1 OPTICAL FIBER lease line from reliance an d 1 Giga optical fiber connectivity from National Knowledge Network. Students, researchers and teaching faculty are able to access the scholarly contents online from any location within the campus. There are around 37 departments comprising of teaching and centers other than administrative blocks which are connected through this optical fiber back bone network. All the three girls and boys hostels are also connected through the optical fiber backbone. There are around 100 distributed switches (Cisco and Dlink) and approx. 200 indoor wireless access points (Linksys and Dlink) and 18 outdoor access points (Dlink) which are installed at the various locations of these departments / blocks of the university. All the equipment’s are connected through optical fiber backbone to the control room campus network of the university with Cisco catalyst switches 4507R, 4506. In order to maintain such vast network and ICT Facilities University has deployed a UTM device in the network. This UTM device helps the university it administrators to maintain the university campus network more efficiently. UTM installed at the university is a product from world’s top IT security company Cyberoam. This UTM is installed almost all the major academic institutes of the country. The UTM device has multiple solutions in a single box. It comprises of load balancing of internet bandwidths, Antivirus and anti-spam scanning at the gate way level, User identity based firewall rules, gateway level IDS and IPS scanning and AAA authentications etc. This UTM device is installed between the ISPS Routers and Cisco catalyst switches so that the whole traffic gets scanned through the UTM device. All the policies are applied on the firewall rules as per the requirement of the University network. Figure: 1 UTM Deployment in Gateway Mode With the increase in the University network and ICT facilities over this network, it is observed that the ratio of attacks also gets increased. These attacks reduce the performance of the University Network and other ICT facilities available. Thus to study the kind of attacks, their significance and a solution how to reduce them is proposed in this paper. UTM device installed in the University network is considered for collecting the IPS attacks data. Since it has the ability to produce the Attack reports, this will help the University IT administrators to see the trend of the attacks how they are generating and affecting the system. The critical IPS attacks will be studied over a time to find the patterns of the attacks and their significance over the network applications and ports to which they are associated. This study will help the university and other institutes which are using the same UTM to fine-tune the rules and other parameters so that network bandwidth and other services performance does not get affected with the attacks and users of the ICT facilities should have performance oriented service. III DATA COLLECTION AND ANALYSIS USING UTM As described in the previous about the network system university campus. The information on the number of IPS attacks has been collected since 1 July -2013 to 2-dec -2013 (22 weeks). The total number of attacks is 1301567. Out of these the type of attacks having frequency more than approx 100 is 1299646 lakh. These 13 lakh IPS attacks have been classified into 5 categories broadly example HTTP/ HTTPS, ICMP, UDP, FTP, TCP based on the signatures. The display of the number of IPS attacks belonging to each category is shown in figure-2: Figure -2 Classifications of Attacks Out of the above 13 lakh of the attacks the top 14 critical attacks from the five major categories have been identified to 162810 by the IPS and them display is shown in figure-3: From the figure-3 it may be noted that the prominent attack having a frequency greater than equal to 4.38% are 6 types (responses 403 forbidden type is 45.62% , 17.38 % web misc handler access 8.57 % is https/ssl renegotion , 7.38% web php , 7.34% web cgi count , 4.38% info ftp bad login) . While rest of the 16 attacks less than 10 % are having very small frequencies. The percentage of attacks each of the 22 weeks is shown in the bar diagrams in figure series: Week 1 Week 2 Week 3 Week 4 Week 5 Week 6 Week7 Week 8 Week 9 Week 10 Week 11 Week 12 Week13 Week 14 Week15 Week 16 Week 17 Week 18 Week 19 Week 20 Week 21 Week 22 Out of 22 weeks, the percentage of Attack Responses 403 Forbidden is the most dominant one. Forbidden attack response is the highest attacks with 45.62% overall in the 22 weeks, this incidence is generated when a 403 error response code is returned to a client by a web server, which indicates that an effort is made to take an unauthorized access to a web server or an application running on a web server. The 400 series error messages indicate an error on the part of the browser client making the request to a web server. The 403 response shows a request for a forbidden resource which cannot be gain access to even with authentication identifications. Many events can show a determined effort to exploit vulnerability on the victim’s server. Certain applications do not perform strict checks when confirming the credentials of a client host linking to the services offered on a host server. It can lead to an unauthorized access and probably escalated rights to that of the administrator. Information stored on the machine will be compromised and trust relationships established between the victim server and the other hosts that can be exploited by an attacker. In such Attack Scenarios; attacker can access the authentication mechanism and provide his/her own credentials to gain access. On the other hand the attacker can exploit the weaknesses to gain the administrator access without any exploit code.While the other prominent attacks are:- ICMP trace route: This attack is generated when a Windows trace route (tracert) is detected. A trace route is be used to discover live hosts and network topologies. A Windows trace route command uses an ICMP echo request with a lower than normal Time to Live (TTL) value to identify live hosts and network topologies. Web- MISC handler Attacks: this attack is generated when an attempt is made to exploit a known vulnerability on a web server or a web application resident on a web server. The other attack which has very high severity level is the SNMP attack. From the figure- 4 shown below , it is noted that there is a peak in the number of attacks in the 8th (19-0ct-2013 and 9th week).It may be noted that this peak is due to SNMP attack responded by UDP with application whose activity is pronounced. Figure: 4 shows16 different types of attacks out of 22 attacks per week are shown Figure –5 different types of major attacks per week Figure: 5 Shows 16 different types of attacks out of 22 attacks per week are shown over the entire period. Of these 6 are found to be more conspicuous: ATTACK-RESPONSES 403 Forbidden (ATK-RES403F) 71067, ICMP trace route (29205), WEB-MISC handler access (13959), SNMP request UDP (11954), SNMP public access UDP (11952), HTTPS/SSL Renegotiation DoS (7062) IV FRAME WORK FOR EVALUATION AT THE GATEWEY LEVEL TO STUDY THE ATTACKS USING RAW PACKETS GENERATED BY THE NETWORK To study the attacks more affectively, a frame work was deployed using open source software like Ubuntu, tcpdump with visualizing software like afterglow to capture real time at the core switch. This will help to monitor and analyze the network traffic in real time scenario. Data was evaluated for two hundred thousand packets captured using tcpdump –nnelr data.pcap l wc –l at the root. This will capture the raw traffic for two hundred thousand packets for data analysis and visualization. The data captured by the tcpdump will be converted to a csv file with all fields. Tcpdump-vttttnnelr ju.pcap|./tcpdump2csv.pltimestamp sourcemac destmac sip dip sport dport flags len proto ttl id offset tos ipflags > ju.csv. The Csv file is then exported to Mysql database. load data infile ’ju.csv’ into table analysis fields terminated by ’,’ lines terminated by ’n’ (timestamp, sourcemac, destmac, sourceip, destip, sourceport, destport, proto, tcpflags, length, ttl, ipid, iptos, ipflags, offset); Further, ju.csv file was converted to dot file, which was converted to png file. tcpdump -vttttnnelr Ju.pcap |./tcpdump2csv.pl|./afterglow.pl-c color.properties > Ju.dot Cat Ju.dot | neato -Tpng –o Ju.png Figure 6 shows Whole Traffic captured for network Figure-6 shows that the outgoing traffic is greater than incoming traffic, which states that traffic is compromised. Therefore there is need to identify the port 80 traffic and identify the machines which are compromised. From figure 7 we identify visually that the out traffic on port 80 is very high. Therefore, needs to identify machines which are compromised. Figure 7 shows the out going traffic of port 80 Figure -8 shows ATTACK from IP 192.176.2.25 Figure-8 Shows visualization of machine with IP 192.176.2 25 that is connected over the network which is compromised and sending malicious traffic outside. This helps the administrators to identify the machine irrespective of any signatures within the IPS database. Similarly other machines can be identified. V CONCLUSION AND FUTURE SCOPE IDS/ IPS are installed in almost every organization but they are designed to work on signatures. To study attacks which exist other than signatures, we need to further do the analysis through the frame work created with high end hardware which is required to capture and analyze the traffic for longer duration. So that fine tuning of the IDS/IPS as per the campus network requirement will be done to further increase the network performance. VI REFERENCES [1] Paxson. Bro: A System for Detecting Network Intruders in Real- Time. In Computer Networks, volume 31 (23– 24), pages 2435–2463, 1999 [2] G. Stein, B. Chen, A.S. Wu, and K.A. Hua, â€Å"Decision Tree Classifier for Network Intrusion Detection with GA- Based Feature Selection,† Proc. 43rd ACM Southeast Regional Conf.—Volume 2, Mar. 2005. [3] Schwartz, Matthew, â€Å"Beyond Firewalls and IPS: Monitoring Network Behavior.† February 2006, available on http://esj.com/articles/2006/02/07/beyond- Firewalls-and-ips-monitoring-networkbehavior.aspx [4] S. J. Yang, J. Holsopple, and M. Sudit, â€Å"Evaluating Threat Assessment for Multi-stage Cyber Attacks,† in Proceedings of IEEE MILCOM: 2nd IEEE Workshop on Situation Management (SIMA), Washington, DC, Oct 23-25, 2006 [5] Z. Yu and J. Tsai, â€Å"An efficient intrusion detection system using a boosting-based learning algorithm†. International Journal of Computer Applications in Technology, Vol. 27 (4), 2007, 223-231. [6] Meera Gandhi, S.K.Srivatsa â€Å"Detecting and preventing Attacks using network intrusion detection systems† International Journal of Computer Science and Security, Volume (2) : Issue (1) June 2009 [7] Asmaa Shaker Ashoor, Prof. Sharad Gore, â€Å"Intrusion Detection System (IDS) Intrusion Prevention System (IPS): Case Study†. International Journal of Scientific Engineering Research Volume 2, Issue 7, July-2011 [8] Rosslin John Robles, Tai-hoon Kim,SeungLee,† A Study on Intrusion Confinement for Internal Network†, Journal of Security Engineering), vol.5issue no1, P73, 2008 [9] Patil, Nilima R.; Patil, Nitin N, † A comparative study of network vulnerability analysis using attack graph† World Journal of Science Technology; 2012, Vol. 2 Issue 3, p91 *University of Jammu, e-mail id :[emailprotected] , **University of Jammu, email id: [emailprotected] 1

Monday, August 19, 2019

Use of False Analogies in Public Discourse Concerning the Iraq War Essa

" Iraq is no diversion. It is a place where civilization is taking a decisive stand against chaos and terror, we must not waiver," said President George W. Bush in favor of the Iraq War of 2003. When considering the rhetoric used by those to gain support for the war and by those to oppose the war, it is clear that both sides tried to use historical analogy to argue for their side. While the proponents of the war argued that the Iraq War was comparable to World War II, the opponents argued that it was comparable to Vietnam. Both of these sides used this kind of rhetoric among many other tools, to persuade people to support their side by asserting that if they want to avoid another Hitler, or another Vietnam, then they should support their side. However, both of these sides have used false analogies. When considering the historical facts of both World War II and Vietnam, neither of these conflicts compare to pre-war Iraq. Nevertheless, this kind of argumentation provides many implications about war and American society. In order to understand the basis of these implications, the idea of the analogy will be examined, then the World War II and Vietnam comparisons will be scrutinized, and finally, the implications of this rhetoric will be explained. Arguments from analogy seek to establish that two situations X and Y are alike (Trenholm, 2001). For example, the statement, "It worked for Canada, so it must work for the United States," is an analogy. The validity of this analogy, however, is determined by two criterion. The first criteria is that the two cases compared must be alike in all important respects. The other criteria is that any differences between the cases must be insignificant. When looking at the argument, "It work... ...ton Gazette ( West Virginia). 4 April 2003: Pg. P5A. Academic Universe. Lexis Nexis. Washburn University Library, Topeka, Kansas. 13 February 2005. Dunham, Charlotte Chorn. "Generation units and the life course: A sociological perspective on youth and the anti-war movement." Journal of Political and Military Sociology. Winter 1998. 4 April 2005. http://www.findarticles.com/p/articles/mi_qa3719/is_199801/ai_n8759989/print Rieger, Cheryl. Schuman, Howard. "Historical Analogies, Generational Effects, and Attitudes Toward War." American Sociological Review. June 1992: pg. 315(12). Academic Universe. Lexis Nexis. Washburn University Library, Topeka, Kansas. 13 February 2005. Barone, Michael. "The Long Shadow of Vietnam." US News and World Report. 12 April 2004: pg 21. Academic Universe. Lexis Nexis. Washburn University Library, Topeka, Kansas. 13 February 2005.

Heart of Darkness, Hollow Men, and Apocalypse Now Essay examples -- Mo

Similarities between Heart of Darkness, Hollow Men, and Apocalypse Now      Ã‚  Ã‚   In today's literary world there are many different texts that have interlocking literary meaning through their references to one another and to other works. I am going to compare and draw similarities between T.S. Eliot’s The Hollow Men, Joseph Conrad's Heart of Darkness, and Francis Ford Coppola's Apocalypse Now. These three sources have many different references to one another in different ways. In T.S. Eliot's The Hollow Men, he begins the poem with the title and underneath the title he uses the famous line "Mistah Kurtz- he dead" from Joseph Conrad's Heart of Darkness. This famous line is said by one of the servants about Mr. Kurtz who dies and all of the natives were shocked by his death. Eliot uses this line at the beginning of the poem because he is drawing a comparison between the hollow men and Kurtz. He does this because Kurtz's idea of the civilization that he wanted to create didnÕt turn out the way he wanted it to in the end. Kurtz's ideas lead to his downfall in the movie Apocalypse Now. He is also considered as being hollow himself because of his ideas and inability to face reality. This is similar to the hollow men because they don't know what they will turn out to be. They have an idea of what they want to be but they know that will never happen. The hollow men really have no choice what they will be; they just let it happen. These hollow men are waiting t o go to "death's dream kingdom", but they donÕt know if they will ever get there. Eliot talks about these hollow men and these men can be compared to the people who are following Kurtz. They are all hollow people because they are following this radical figure and do not have i... ...Hollow Men. They show many similarities and there is reasoning behind the scene in the movie Apocalypse Now; where Kurtz is reading Eliot's poem. It all is tied together and has specific meaning. It shows that different literary sources can be used to help out other literary texts. Conrad's Heart of Darkness lays down the foundation of the character of Mr. Kurtz and then Eliot and Coppola portray this character through their pieces of art. Their literary meanings tie all of these works together to make them all unique in their own way. Works Cited Conrad, Joseph. Heart of Darkness. Norton. New York. 1963. Eliot, T.S. The Hollow Men. 1925. Jain, Manju. A Critical Reading of the Selected Poems of T.S. Eliot. Oxford University Press. New York. 1991 Southam, B.C. A StudentÕs Guide to the Selected Poems of T.S. Eliot. Faber and Faber. Boston. 1968.

Sunday, August 18, 2019

Canterbury Tales Essay - Anti-Feminist Rhetoric in The Wife Of Bath

Anti-Feminist Rhetoric in  The Wife Of Bath    In Geoffrey Chaucer's The Canterbury Tales, The Wife of Bath is a strong woman who loudly states her opinions about the antifeminist sentiments popular at the time. Chaucer, however, frequently discredits her arguments by making them unfounded and generally compromising her character. This brings into question Chaucer's political intent with the Wife of Bath. Is he supportive of her views, or is he making a mockery of woman who challenge the patriarchal society and its restriction and mistrust of women? The Wife's comedic character, frequent misquoting of authorities, marital infidelity, and her (as well as Chaucer's) own antifeminist sentiments weaken the argument that Chaucer supported of the Wife's opinions. Chaucer chooses to make a comedy of the Wife, putting into question the seriousness of her character. What opinion is the reader to make of a woman who rants about marriage and female domination when she is described as a clown prepared for battle in the General Prologue ? Her bright red stockings, bold scarlet face, shield-like hat and sharp spurs draw the picture of a silly, if not crazy, woman whose manner is larger than life. The Wife's comical 'larger than life' characteristics apply to her feminist beliefs as well. Equal coexistence is not enough; she says men "shall be bothe my dettour and my thral "-something likely unheard of when this piece was written. Much of what makes her comical is the plethora of sexual innuendoes dispersed throughout her dialogue. For instance, when she irrelevantly mentions in her tale the eager friars that have replaced the fairies of old: Wommen may go saufly up and down: In every bussh or under every tree, Ther is n... ... easily state Chaucer's support of the Wife's opinions, it is important to note the disabling of her arguments and credibility, as it brings into serious question Chaucer's intent with the Wife of Bath.    Footnotes: 458-60, 471-75 Wife's Prologue, 161 Wife's Tale, 884 Wife's Prologue, 585 M.H. Abrams, et al; ed., The Norton Anthology of English Literature, Sixth Edition, Volume I. W.W. Norton & Company, New York/London, 1993. Wife's Prologue, 149 Wife's Prologue, 186-9 463 Wife's Prologue, 4 General Prologue, 465-70 Wife's Prologue, 563 Wife's Prologue, 549-68 Wife's Prologue, 44-6 216-20 Wife's Prologue, 233-4 Wife's Prologue, 540-4 Works Cited: Chaucer, Geoffrey. The Canterbury Tales. Norton Anthology of World Masterpieces. Ed Mack, Maynard et al. W. W. Norton and Co. New York, NY. 1992.

Saturday, August 17, 2019

Nursing Care Plan and Evaluation

Instructions: 1. The nursing care plan evaluation is based upon the application of criteria appropriate for the student’s skill set. 2.All nursing care plans must be typed (Times New Roman, 12 point font). The nursing care plan form is available on Blackboardâ„ ¢ in each clinical course. 3. The grading rubric must be attached – last page of nursing care plan. 4. All relevant assessment tools used (physical, psychological, or psychiatric i.e. Braden Skin Assessment, Fall Risk) must be attached.HIPAA (Health Information Privacy and Protection Act) mandates all health care providers protect patient privacy. Only information that the patient specifically releases may be shared with others. Only professional persons (students and instructors) involved in care are allowed access to the health care information. The student should be cautious about what information is shared verbally and with whom. If the student is approached for patient information by someone who purports to have authority, the best course of action is to refer that individual to the appropriate administrative personnel.IVY TECH COMMUNITY COLLEGE OF INDIANA – REGION 6 NURSING PROGRAMNURSING HISTORY & PHYSICAL ASSESSMENT FORMStudent _________________________ Date of Care __1-26-2010 to 1-27______ Facility/Unit _Oncology_BMH___ InstructorHealth HistoryBiographical Data:Patient's Initials _DH___ Age __79__ Gender__F__ Martial status: Widow__ DOB: _7/29/1930__________Birthplace: Randolph County__ Ethnic origin/Race: _Caucasian_ Occupation: previous factory worker_Work status : retired_________ Educational background __High school______________History source initials ___Pt__ Relationship to client __self__________________Transcultural Considerations: (Time, space, touch, & value orientation, language considerations, spiritual beliefs, education level)Pt speaks English. High school was the highest education received. She worked at a factory for years and then quit to stay home and r aise her two kids.Special Needs:WalkerReasons for Seeking Care: (Brief statement in patient's words that describes reason for visit – Chief Complaint) Pt states she is here due to her ovarian cancer.Past Health History:Approximate hospitalization dates: 1/17/2010Serious or Chronic Illnesses (Approximate onset): Pt has a hx of: HTN, gallbladder disease, hiatal hernia, ulcers, diabetes type 2, hypothyroidism, depression, ovarian cancer, arthritis, migraines, cataracts and a right leg fx. Pt has also had these surgeries: hysterectomy, appendectomy, cataracts, cholecystectomy, colon resection, hernia, thyroidectomy, tonsillectomy, and adenoidectomy.Obstetric RotationCurrent Obstetric Assessment:Gravidity ______ Term ______ Preterm ______ Abortions ______ Living ______Blood Type _____ Rh Factor _____LMP _______ EDC _______ RhoGAM Status ______ DTR ________ (if applicable)Date & Time of Delivery __________________________________Type of Delivery ___ SVD ___ Forceps ____ Vacuum ____ Cesarean Section___________ Anesthesia/Analgesia _______ EBLPerineum: ______ Intact ______ Episiotomy _____ Laceration & Location__________________Please note any current obstetrical problems/complications (GDM, pre-eclampsia, etc.)Please note any past obstetrical problems/complications: (Condition, duration, treatment)Infant Data:Gender ___________Apgar Score ___ / ___ Gestational Age _____weeks Cord Vessels_____ Feeding method ______ Weight at Birth _______ Length at Birth ________Blood Type & Rh ______ Direct Coombs ________ (if known)Complications at Delivery:Attachment Behaviors:Allergies: Medications: _Vaseline, Tetanus, Penicillin, Codeine, Aspirin, Morphine, Sulfa ___________ What kind of reaction was experienced: __Rash, hives, facial swelling, Headache, _______ Foods: ___NA________________________________________________________________ What kind of reaction was experienced:_Na_________________________________________ Contact: __NA_________________________________________ _______________________What kind of reaction was experienced:__NA________________________________________Current Home Medications: (all prescription, over the counter, home and herbal remedies, include trade or generic name, dose, and frequency) Reason for taking medication (patient stated). 1. Lisinopril 20 mg 1 tab q pm daily- lowers BP2. Levothyroxine 100 mcg 1 tab qdsync daily- thyroid replacement 3. Ondansetron IV 4-8 mg q6hr or PRN- nausea med 4. Sennosides 8.6 mg 1 tab daily- for constipation 5. Polyethylene glycol 17 gr powder daily take with 8 oz of water- for constipation 6. Demecloclycline 300 mg 1 tab TID- tx of bacteria 7. Nystatin 5 mL QID swish and spit- tx of fungus 8. Insulin Reg (Human) PRN with sliding scale- for diabetes 9. Promethazine 12.5 +5mL q8hr dilute with 9mL NS prior to IV with max rate 25mg/min – helps with nausea and used for antihistamine 10. Hydromorphine brand: Dilaudid 2 mg q2hr or PRN- per painSubstance use: (Frequency and amount) Tobacco _ __Past hx for 40+ years _________ Alcohol ___hx of occasional ____________________________________________ Illicit drugs __none____________________________________________________________Family History: (Health status or cause of death of blood relatives displayed in a genogram format)Family & Social Support Systems: Pt has a daughter and son that visit her daily. She also has a granddaughter that visits a few times.Physical AssessmentPrimary Medical Diagnosis: _______Hyposmality___________________________________________________________________ Secondary Medical Diagnoses: __Ovarian Ca Height __5’5†______ Weight ___182_____ Head Circumference (if < 2 yrs of age) _________________ TPR _98.5 – 66 – 28_____ B/P __142/77____ Pain Score ___10___Pain Goal __0___ BMI ___30_______ Oxygen Saturation _92____ Supplemental Oxygen _2L___ Diet: __general with 1500 ml fluid restriction____Consumption % __less than 10% General Appearance:Pt is a 79 year old female with g ray hair. She is sitting up on the BSC with a pillow behind her back and a pillow in her hands pressing against her abd. Breakfast tray is sitting in front of her but she is unwilling to eat. Pt states she â€Å"just hurts so bad from the constipation.† Pain meds had already been given to her.Patient's Health Promotion Activities At Home: Pt uses a walker at home.Site Assessment of Invasive Lines and Drainage Tubes: (Note location, type, and findings) PICC line in right upper chest with no signs of redness or bruising. There is an IV in her upper right arm that has some bruising.Mental Status – General Impression: (attach screening tool/results if used) A & O X3. Pt sometimes seems to be a little confused.Skin, Hair & Nails: Braden Scale Score: ___19 LOW _______ (attached) Skin is warm/dry/intact. Pt has a bruise over her left antecubital area and on top of left hand due to a previous IV. She has a scar from her gallbladder surgery that is still healing with no signs o f infection. She also has an appendectomy scar from a previous surgery years ago. Hair is full and thick. Nails of both upper and lower extremities are yellow with cap refill.

Friday, August 16, 2019

Brains vs Beauty

In the Tales from the Thousand and One Nights the women are represented as fraudulent, cunning characters using their sexuality to their benefit. Some of these women are portrayed as deceitful harlots, while others honestly use their sly wits and beauty to their advantage to obtain what they desire. In the time of the Tales, female sexuality was prevalent, so it’s not absurd to read about all the infidelity and sexuality in these stories; however it is interesting to see how each female character uses that to her benefit.Some women show to be evil minded while others have good intentions. Throughout the Tales from the Thousand and One Nights, there are different stories that Shahrazad tells, depicting the women in different manners. Some women were represented as deceitful whores, such as the wives of the kings in the Prologue of the Tales, others used their wit and knowledge to gain their desire, for example, Shahrazad, the story teller of the book. Shahrazad uses these women as examples to show King Shahriyar and his brother, Shahzaman that not all women are untrustworthy.They just know how to use what they have sexually and intellectually to gain control of a situation. By sexually, I don’t mean throwing themselves at different men; men are weak and will easily fall for anything a woman says if he thinks he will â€Å"benefit† from it. In â€Å"The Tale of King Shahriyar and his Brother Shahzaman† the two kings find out that their wives were frolicking about having affairs with different men. This is in the Prologue of the Tales, the two kings went on an expedition and ran into a woman, who happened to be the wife of a Jinnee, she threatened the brothers to please her or she shall wake the Jinnee.Once the fowl woman was done using the kings for her pleasure, she proceeded to pull out a string with ninety-eight rings on it. Each ring represented a man she had slept with. The kings were astonished but at the same time relieved, â₠¬Å"If such a thing could happen to a mighty Jinnee, then our misfortune is light indeed†(19). In the beginning stories, women look like they are the villains in the book, because they portray themselves to be indecent harlots. The kings at this point come to the conclusion that all women are they same, so they devise a plan to be with a virgin every night and kill her the next morning.The brothers will never feel the pain of a broken heart again. Sexual fidelity has always been the core social concern. Some of these tales prove that to be true. The kings refuse to let that happen to them again, so they come up with this plan. So as one can see, the women so far in the Tales hold a bad reputation, until King Shahriyar met the Vizier’s daughter, Shahrazad. Shahrazad, is also the storyteller of the Tales she begs her father to let her marry the king despite the fact that he wishes to kill her in the morning. She was very confident that she could sway the king’s deci sion of her dooming death.She devised a plan with her sister in high hopes that it will save her life. Shahrazad was going to ask for her sister, Dunyazad to bid her a farewell, and she was to ask Shahrazad to tell a â€Å"tale of marvel, so that the night may pass pleasantly†(23). The king agreed. In this story Shahrazad proves to use her wit to her advantage, although she knows that her death is possibly near she shows strength and confidence. She knows that if she can pull this off, not only will she save her own life and the life of any other of the kings victims, but also she will be made the wife of the king.She cunningly uses her knowledge to prolong her death. Shahrazad presents a number of representations of women throughout the stories in the Tales and does not rely on the stereotype presented at the beginning of the book when all women are perceived as harlots. In the story, â€Å"The Woman and Her Five Lovers† a young woman falls in love with young man who gets into a brawl and is imprisoned. The woman is distraught and thinks of a plan to free her lover. She goes to five men to help her achieve her goal. She goes to the Governor, the Vizier, the Cadi, and the King asking them to sign a petition to free her lover.Instead of telling them that he is her husband, she tells them that he is her brother and her sole support. The four men are so at awe with her beauty and sexual demeanor that they agree, but only if they can have her for one night. She convinces these men to meet her at her house, â€Å"it is more fitting that I should wait for you at my house, were there are neither slaves nor maidservants to intrude upon our privacy†(107). She then goes to a carpenter and asks him to build a cupboard of four large compartments, he said he’d do it with honor and free of charge if she would give him one night to himself.The sly woman agreed and in the midst of leaving told the carpenter she forgot she needed five cupboards, not four. The carpenter did as she ordered. One by one the men started to show at her house, she greeted each man kissing the ground before him and saying slick remarks such as, â€Å"first take of your clothes and your turban. You will be much more comfortable in this light robe and bonnet†(109). Not soon after there’d be a knock at the door, the woman would tell the men to quickly jump into the cupboard because that was her husband at the door.They all ended up in the cupboard, but the woman made sure to have all petitions signed so that her husband could be freed. Once the men were locked up, she rescued her lover. In this specific story, Shahrazad showed the King that not all women are unfaithful. She did use her sexuality to her benefit to connive these men into her ultimate goal, to free her lover. She used her wit just as Shahrazad had. This particular character in the book goes against the perception in the beginning of the Tales that all women are unfaithful.She might have been wrong per se because she deceived the five men, but she did it for her lover, which in turn, makes her a heroine in her lover’s eyes. The idiocy of the men to fall for her seductive demeanor leads them to an unpleasurable stay locked in a cupboard. In the times the Tales were told in, it was the norm for woman to be seductive, women knew that they had an advantage because men are weak when it comes to the desire of a beautiful lady. So in these tales, it is not unusual to read stories of such perversity.Some of the women used their sexuality as a tool for their own pleasure, while others respected their lover and bodies and used their brains to obtain their ultimate goal. These were the wise women of the stories. Most of the other women who were caught being unfaithful were killed, which again was routine punishment for their deceit. The women who used their brains over their bodies were rewarded with respect and love. Ultimately, Shahrazad, through her lesson s in the form of stories, she depicts women as not simply whores and tricksters, but as capable of wit, intelligence, and much more beyond sex and infidelity.

Thursday, August 15, 2019

Pros & Cons of Textbooks

The first popes of which were printed in 1454-1455. Only forty-eight original copies are known to existence, of which twenty-one are complete, Here Is a photo of a preserved Gutenberg Bible located at the New York library. Monsoons, 2011) In 2012, Steven Krebs author of The Printing Press states, â€Å"Printing facilitated the dissemination and preservation of knowledge In standardized form this was most Important In the advance of science, technology and scholarship. The printing press certainly initiated an â€Å"information revolution† on par with the Internet today. (Krebs, 2012) The ability to ass-produce and supply books led the world to formal schooling. Out of a demand for books that were specially designed for scholars, the textbook was created. The title of the first textbook used in American schools was â€Å"The New England Primer. † According to the Library of Congress. Books That Shaped America 1800 to 1850. â€Å"More than 6 million copies In 450 editio ns of the New England Primer were printed between 1681 and 1830. † (Rosemary Fry Polkas, 2014) Now two centuries later there is another Information revolution.The move to open-source material Is on Its way to the classroom. In addition, it will be accelerated by President Beam's push to invest in creating free online course as a part of his proposal to have digital textbooks in schools by the end of 2017. Textbooks have not gone the way of tablets yet, but many educators say that it will not be long before they are replaced. Being students and having to purchase, carry, and use textbooks led to tonight's topic on the pros and cons of textbooks In the classroom. Textbooks are frequently controversial, are they up to date?Are they effective? Now its forms of presentation are subjects of debate. Five sections including the introduction, the pros for textbooks, the cons, followed with tonight's recommendation and lastly, a strong conclusion. At the end, you will learn the pros and cons of textbooks in the classroom and a detailed explanation of why our recommendation will make the most sense. Transition: The four pros in favor of the textbook in the classroom. L. The four pros of textbooks In the classroom. A. First, textbooks provide organized units of work.According to The Complete Idiots Guide to Success as a Teacher by Anthony Fredrick's, a textbook will give you all the Lana and lessons you need to cover a topic in some detail. (Frederick's, 2005) When you are a student or teacher In class, you can depend on your textbooks to have the right information needed to complete a lesson and pass a test. Teachers are able to focus on what or how their teaching because textbooks contains the tools that practices for students like linking the past and present, and recognizing cause and effect. B. Secondly, a textbook is very durable and dependable.Unlike tablets, if you drop your textbook there is no worry of it breaking. There are many varieties of textbooks. Wh en you read and learn from a textbook, you are more likely to remember that lesson later in life. According to Science Teaching Reconsidered: A Handbook, the study of text structure has focused on how a reader builds cognitive representations from the text. In addition, studies indicate that using principle-first or textbook structure is more effective for long-term retention and understanding by novice readers. We are used to using textbooks. (Committee on Undergraduate Science Education, 1997) C.Next, children are more focused and have a positive outcome with textbooks. According to an article based on literacy issued by riff. Org, states that in 11,000 reports, children's book lending and ownership programs were shown to have positive behavioral, educational, and psychological outcomes. Children whom have access to print materials or textbooks reading performances are improved. Why? When children are provided with the right material or books it helps, them read better. With great er access to books, children are able to convey their enjoyment of books or academics, resulting of improved attitudes towards reading and learning. Mm Lindsay, 2010) D. The final pro about a textbook is if taken care of properly, a textbook will last for a very long time. One of the oldest multi-page books in the world is the Etruscan Gold Book. According to Winning Lane Books, the Etruscan Gold Book was discovered 70 years ago while digging off the Stratum River in Bulgaria. Monsoons, 2011) The estimated age of this book would be 2,763 years old. Textbooks are reusable and are handed from classroom to classroom. Transition: Now that you have heard the pros of textbooks in the classroom here is some of the cons. II.The four cons of textbooks in the classroom. A. Having textbooks in the classroom can have its downsides, such as having a limited source of information, the weight it bares on a student's back and cost. According to The Complete Idiot's Guide to Success as a Teacher by Anthony Frederick's, having a designated textbook per class only provides one perspective on a concept or issue. It is a sole source of information. How good is a mechanic if he only has one tool? (Frederick's, 2005) B. Next, another problem textbooks present are the weight that it bares on a student's back.An article posted in Kids' Health on icepack safety last accessed in June 2014 the weight from books in a backpack can compress the vertebrae in a child's growing spine and can lead to poor posture and back pain. (Dowdies, 2013) I found this fact especially concerning as a student who carries books back and forth from class. At times, I find myself hunched over trying to even out the weight of my books in my bag. Now imagine an elementary school student with his or her math book on that small body. Concerning right? C. Another default of having textbooks in the classroom is the impact on the environment.In an article posted in the Washington Post in 2010 by Stephan Lawman, appear . 1. 45 million tons of paper was used to produce textbooks. (Lawman, 2010) That's must continue to be â€Å"Green† in our way of living. D. Lastly, cost is a large drawback of textbooks in the classroom. According to an article posted on Scholastic Publishes Literacy Resources and Children's Books for Kids of All Ages composed in November of 2008, an average elementary book can cost more than $100. 00. (Rap, 2008) A very popular topic of conversation in politics is educational budget and how there Just is to enough money for schools.How are we to afford books that cost over $100. 00 each? In Florida, the average class size is approximately 25 students. That is $2500 for just one classroom. The real question we must ask ourselves is can we really afford books in the classroom. Transition: Now, in detail our recommendation for keeping printed textbooks in the classrooms and why it is the best option. Ill. Recommendation A. All of those cons can easily be countered with a simpl e logical explanation. Outdated source information is an invalid argument for most courses because codebooks are recycled every seven-ten years.How much has a pre-1900 history class changed in the past 10 years? Not much, because it would be impossible to changed what happened. In addition, for most basic science class, focus on the scientific laws has not changed in a hundred years. For more advanced and current classes online sourcing may be an additional layer for resources but the textbook still offers a good basis of information on the subject. B. Textbooks are long lasting and durable. They can fall from your desk or slip out of your hands and when it hit the ground it goes not crash or have a black out moment.You pick them up and they are ready to continue from where you left off. C. Back pain is a large problem in today's society however a type of eye fatigue or eyestrain commonly caused by computers is known as computer vision syndrome. It affects about 50%-90% of computer workers. (Eye Fatigue: Causes, Symptoms, and Treatment) If students start using computers instead of textbooks, this could affect them too. D. Cost is a complaint many people have about textbooks, but E-Books are usually only $10 less than textbook form. That is cause most of the cost is writing and publishing not paper.E. After reviewing all the pros and cons, we are recommending that it is in the best interest of the students and the learning process to continue using textbooks instead of adopting different technologies. Textbooks were made to be in the classroom and should stay in the classroom. Transition: Thank you for listing to our recommendation for keeping textbooks in the classroom, here now is the final wrap up. IV. Conclusion A. Remember, that nothing on this planet is perfect; there will always be pros and cons of everything that exists.With that said there are pros and cons of textbooks, as many of you know. The pros of texts books are that material is well organized i n particular sections, books are durable and you do not have to worry if you drop it, textbook will last forever. The cons of textbooks are that it limits us to one source of information, textbooks are heavy, and that it cost a lot of money having to buy new textbooks for every class. B. Based on our group's personal experiences and our pros and cons of textbooks, we feel comfortable in recommending that keeping textbooks in the classroom is best.

Wednesday, August 14, 2019

Immigration Study Essay

For many immigrants, becoming an American has been shaped by American’s and the American government’s identification of them racially. Latino and Hispanic immigrants are one race in particular that often has trouble adjusting to life in America. Most Latinos that wish to come to America have a much different view of America than Americans do. They see America as this wonderful place with endless opportunities, money and freedom. Yet, once they actually come to America, Latinos usually find it is not what they had expected. Many of them struggle to find jobs, struggle to find a place to live, and have a hard time fitting in. America may have a far better economy than Mexico, but Hispanic immigrants rarely get the jobs or the pay that they hope for when they come here. It can be nearly impossible for some immigrants to find work at all; sometimes because of their race and other times because of their lack of experience or their lack of education. Many Latino immigrants get stuck with jobs that most American’s do not want, like fast food restaurants, housekeeping jobs, farming, and landscaping. These jobs rarely give good pay, forcing them to get two or even three jobs just so that they can afford to feed their families. In the book The Circuit, Francisco Jimenez writes about his family struggling to make it in America many years ago. Jimenez writes about leaving Mexico to come to America as a child and constantly having to move in order for his parents to find work. In one chapter Jimenez says, â€Å"After stopping at several places and asking for work, we found a rancher who still had a few cotto n fields left to be picked. He offered us work and a tent to live in. It was one of many dark green tents lined up in rows. The labor camp looked like an army settlement†(Jimenez 54). Like many immigrants today, Jimenez and his brothers had to work on the farms instead of going to school to help support his family. On top of trying to find jobs and money, immigrants also battle with fitting in. They are looked down on by many Americans because they are a different  race with different traditions and cultures. Americans frequently accuse Hispanics of taking all of the available jobs; leaving none for anyone else. In an article entitled, â€Å"’Is This a White Country or What?’†, Lilian Rubin talks about the way white Americans and natural-born citizens feel about immigrants. Rubin writes, â€Å"For whites the issue is compounded by race, by the fact that the newcomers are primarily people of color. For them, therefore, their economic anxieties have combined with the changing face of America to create a profound uneasiness about immigration†(Rubin 227). Several white Americans are also afraid that Hispanics and other immigrants are going to overpopulate in America; making it less of a â€Å"white† country. Rubin explains, â€Å"Americans have always worried a bout the strangers who came to our shores, fearing that they would corrupt our society, dilute our culture, debase our values†(Rubin 227). Hispanics are too often misjudged for trying to find jobs and for coming to America. They must live in a country where a majority of the population tries to segregate them from the white society. In another article called, â€Å"Best of Friends, Worlds Apart†, Mirta Ojito describes two friends who drift apart because they are different races. Ojito writes, â€Å"The two men live only four miles apart, not even 15 minutes by car. Yet they are separated by a far greater distance, one they say they never envisioned back in Cuba. In ways that are obvious to the black man but far less so to the white, they have grown apart in the United States because of race. For the first time, they inhabit a place where the color of their skin defines the outlines of their lives-where they live, the friends they make, how they speak, what they wear, even what they eat†(Ojito NYT-3-1). For Latino and Hispanic immigrants, leaving their native country to come to America is not always what it seems. They face a lot of disappointment when realizing that America is not the perfect place that they pictured it to be. Losing hopes about getting the â€Å"American dream†, they must fight to find jobs, jobs that normally do not pay well at all. For immigrants, finding a place to live and raise a family can be an extremely difficult, especially in society where white people are seen as superior. Some children have to give up their education to help their families make money. For most Latinos and Hispanics, coming to a new country means leaving behind important  traditions to find their place in a white country. Works Cited Jimà ©nez, Francisco. The Circuit. New York: Scholastic, 1997. Print. Paula, Rothenberg. American Culture, Identity, and Public Life Course Reader. Worth Publishers, 2013.

Final Case Study Essay Example | Topics and Well Written Essays - 2750 words

Final Case Study - Essay Example In spite of the importance of organizational change for organizations in the contemporary day, few firms are able to come up with leadership and management styles as well as organizational cultures that will enable the organization to maximize on opportunities and minimize the threats it faces in the commercial realms. Waddell et al (2011, p. 34) posit, â€Å"Researchers have proposed that applying organizational development in different countries requires a ‘context-based’ approach to planned change. This involves fitting the change process to the organizations’ cultural context, including values held by members in the particular country or region. Thus, the traditional approaches to planned change may promote management practices that conflict with the values and assumptions of other societies†. This paper will investigate the truth of this statement by analyzing the process of change management in Coca Cola. This will be followed by a thorough analysis of the concepts of organizational development and change management in organizations. At the end of the paper will be a conclusive summary and a list of the references cited herein. Asa Candler established the Coca Cola Company- whose headquarters are at Atlanta, Georgia in the United States of America in the year 1892. The Coca Cola Company is a global manufacturer, retailer and marketers of non-alcoholic beverages. The company is known internally particularly due to its soft drink known as Coca Cola (The Coca Cola Company Press Center, 2013). Currently Coca Cola Company has business operations in more than 200 different nations of the world and produces an estimated 500 brands of beverages and non-beverages. Coca Cola is comprised of business model with two different businesses-the Coca Cola Ltd and Coca Cola Bottling Company (The Coca Cola Company Press Center, 2013). The company has at least 139,600 employees

Tuesday, August 13, 2019

Business Analysis of Southwest Airlines Corporation Essay

Business Analysis of Southwest Airlines Corporation - Essay Example While tangible costs can be indentified directly with a certain project and can be quantified, for example, by the cost of an asset, intangible costs are those that cannot be identified with any particular project, and their nature is not quantifiable, for example, by the value of goodwill in a business. 2) I was forced to decide on whether to enroll for a Master’s program or to take up a job. I sought the motivations behind each decision. In a scale of 1-4, where 1 represents the least important, 2 - important, 3 - more important and 4 represents the most important, I graded the motivation behind my selecting either of the alternatives. I finally decided to take up a job first and enroll for Master’s program at a later date, since there was a higher motivation towards taking a job as compared to Enrolling for Master’s program. Financial reasons Family Viewpoint Personal objectives Social considerations Total scores Enroll for Masters 1 3 2 4 10 Take a job 4 1 4 3 12 Executive Summary This paper is a study of challenges facing Southwest Airlines Co., an airline company based in Dallas, USA. The paper starts by introducing the company which was established in 1961. It has employed 33,000 employees since then. The Airline makes 3,300 flights a day to 72 destinations in 37 states of the USA (Larry). The mission of the company is to provide the best quality services to its customers with a spirit of friendship and respect. It also serves to provide its employees with a steady and conducive working environment. Though it is ranked as the best performing Airline Company within the framework of domestic passenger travels in the USA, the company experiences some challenges that are the basis of this study. The symptoms of these challenges which face the company today include loss of profits, retarded growth rate, cutting down in flights and a decrease in the share value of the company (Ragland, 1990). To accomplish this study, a problem statement w as designed to guide the research undertaken. The problem statement is the following: many analysts see the slumping of the fuel prices as the only cause of the Airlines’ great profit loss. However, they do not take into consideration how the general weakening of the global economy contributed to this scenario (Libby, 1998). Without such considerations the whole phenomena will never be fully understood. Slumping of the oil prices and the general weakening of the global economy are factors worth consideration in demystifying this occurrence (Bailey, 2011). The study is narrowed down to focus on the root causes of the loss in profits of the company. The root causes were found to be the plunging of the global fuel prices because of a general weakening of the global economy. The abovementioned causes resulted in increased operation costs of the company and a reduction in the customer base of the company. As a measure of averting these challenges the study recommends an increased funding of the operations of the company to serve its customers as before and retain their goodwill. A merger or acquisition is also recommended to strengthen the resource base of the company. However, it is feared that this might lead to the loss of identity by the company and a dilution of its customer focused value system (Libby, 1998). The recommendations can be implemented through selecting a company that has similar value system to merge with this company. A flexible fuel hedge program should also be established to eliminate the risks associated with global oil price fluctuations. The success of such recommendations can be measured on a quarterly basis, applying the customer base growth and the increase in revenues of the