Monday, December 23, 2019

Gender Stereotypes And Gender Roles - 1246 Words

Gender roles are defined as the â€Å"widely accepted societal expectations about how males and females should behave† (Rathus, 2010). From gender roles, we, the people of society, are able to determine whether someone identifies as a male or a female. Both biological and social factors tend to determine what gender roles a person takes on. However, there are also gender stereotypes, which are â€Å"the fixed and oversimplified beliefs about the ways in which men and women ought to behave† (Rathus, 2010). Often times, gender stereotypes are related back to the traditional beliefs of when women were responsible for staying home and being the caregivers and men were responsible for going out to work and bringing home the food, supplies, and money that the family needed (Rathus, 2010). There are four main differences between the genders: physical, cognitive, personality, and behaviors. Physical differences are the most obvious differences between genders. Those differences come from the primary and secondary sex characteristics. The primary sex characteristics of females are their ovaries and males have testes. As far as secondary sex characteristics, females tend to have wider hips and smaller bodies and males tend to have more facial hair and deeper voices. Some cognitive differences between males and females are that males are often more superior in visual-spatial abilities used in math, science, and map reading, and females are often more superior at writing, reading, and foreignShow MoreRelatedGender Stereotypes And Gender Roles Essay1415 Words   |  6 PagesRoles are often assigned to boys and girls in accordance with the sex assigned at birth. We refer to these as gender roles. Gender roles begin to be imposed as early as birth. The nursery in the hospital assigns either a blue name plate for a boy or a pink name plate for a girl. These roles are continuously reinforced by family. Children learn at an early age that boys and girls are different. Children observe gender roles and in many cases these roles are eventually accepted as an unquestionableRead MoreGender Stereotypes And Gender Roles954 Words   |  4 Pages Gender can be a hot topic within cultures; a male or female does not want to be told that they can or cannot do something based on their gender. Every culture views gender roles differently, and some cultures are more serious about gender than others. Many times, male and female actions are determined by what a person has been taught is right; furthermore, gender roles are a set of societal norms that are the behaviors that a sex is generally known to do and what is considered accepted of a personRead MoreGender Roles And Gender Stereotypes Essay1449 Words   |  6 PagesProspectus: Gender roles and gender stereotypes in advertising My position: I believe advertisements that reinforce female gender roles and stereotypes are damaging to society. 2. Non-favorable Incidents: The examination of the â€Å"Victoria’s Secret† ad for a line of undergarments labeled â€Å"The Showstopper.† The headline is â€Å"Show nothing but your shape,† and the image is a thin woman with big breasts staring seductively. The image clearly sets a tone that this is what is a stand of ideal beauty. AndRead MoreGender Stereotypes And Gender Roles1261 Words   |  6 Pagesbeen expected to act a certain way depending on their sex. These societal expectations are called gender roles. (Rathus, 2010, p.447). These roles begin to develop even before a child is even out of the womb. A mother may decorate their nursery pink if they are having a daughter because â€Å"girls like pink,† and â€Å"boys like blue.† Gender roles should not be confused with gender stereotypes. A gender stereotype is a narrow way of thinking about how men and woman are obligated to behave. For example, men haveRead MoreGender Stereotypes And Gender Roles1241 Words   |  5 PagesWe will never be able to control how gender stereotypes are formed. Gender roles were naturally created as a result of human evolution and the different modes of living that were adopted by humans. Humans, however remain the driving force behind reinforcing gender roles and stereotypes with different mediums. Such as television, art, and writing. In order to understand how gender is portrayed in contemporary American comedy this paper will analyze the characters from the television show, It’s AlwaysRead MoreGender Roles And Gender Stereotypes1102 Words   |  5 PagesDefined Gender Roles Creating a Lack of Reality in Children’s Literature Distinction is a concept that is learned at a very young age. It is used as a tool to distinguish between race, religion, language, age and especially gender. Where certain topics regarding race and religion may be considered more taboo, the definition of gender is always open for discussion but it is not always depicted in all forms of the word. Children can feel isolated if they cannot relate to individuals they look up toRead MoreGender Stereotypes And Gender Roles1845 Words   |  8 PagesTimes have changed; gender roles are no longer clearly defined Traditionally, gender has been defined as the state of being male or female but, recently society has begun to understand that gender is not the biological sex that you were born with but how you identify and express yourself. A persons gender can be male, female, neither, both or something completely different. People tend to see gender as black or white, or a box you can tick but gender does not have to conform to what our modern societyRead MoreGender Stereotypes And Gender Roles1389 Words   |  6 PagesGender roles are set of societal norms dictating the types of behavior which are genrally considered acceptable , appropriate for people based on their actual or perceived sex or sexuality. Gender roles are also determined by the prevailing cultural norms. The attitudes and expectations surrounding gender roles are not typically based on any inherent or natural gender differences, but on gender stereotypes, or oversimplified notions about the attitudes, traits, and behavior patte rns of males andRead MoreGender Stereotypes And Gender Roles1076 Words   |  5 PagesGender stereotypes and gender roles are a largely contested issue in the modern world. Countries around the world have very different gender norms, though there are some recurrent patterns between many cultures. For most recurrent patterns there is a culture who does not abide by those gender norms. There is typically many good reasons for each recurrent pattern that makes sense from an evolutionary standpoint. There is also a significant difference in the way men and women are treated. This is causedRead MoreGender Stereotypes And Gender Roles Essay2036 Words   |  9 Pagesalong the development of gender stereotypes and gender roles that have an impact on how children come to understand their own gender identity. Environmental factors such as peers, the media, and even parents perpetuate stereotypes through their own actions. Children come to understand gender during development through experie nces that are shaped by their environment and perpetuated by their culture, which ultimately encourages gender stereotypes and conformity to gender roles. Children are born into

Sunday, December 15, 2019

Mannerist Portraits of the 16th Century Free Essays

The sixteenth century was a period of intense political and military. The 1500s were also a period of religious change. The Italian painter Parmigianino was a pioneer of the mannerist style, which his work shows an essentially decorative emphasis and accomplished smoothness. We will write a custom essay sample on Mannerist Portraits of the 16th Century or any similar topic only for you Order Now They had a nickname for Parmigianino which was â€Å"little man from Parma†. At the age of 19 Parmigianino was commission to frescoes for the Parma Cathedral. Now the painting that I’ve chose from the Mannerist portraits of the 16th is Parmigianino’s Madonna and child with Angels, which is also Madonna of the Long Neck. Now the reason they call it Madonna of the long Neck is because how long her neck is in the painting. The Madonna, in particular, has an elongated neck and tilted head. Her movement flows into the spatial twist of the torso and legs, Mary dress, in contrast to the usual blue and red. Parmigianino’s painting exemplifies the elongation that the Mannerists gave their figures. They made the stretching the human body in some ways the Mannerist artists seemed to be ahead of everyone else. This is one of the most popular subjects in Christian art. It has been painted by hundreds of painters over the centuries to be placed in a church or chapel as an altarpiece. Some of the effects that are in the picture is the faces are more realistic and not idealized. The baby Jesus is less of a small man and more like a child. An attempt at creating depth has been attempted to place two background angels and through the use of linear perspective in the throne. Modeling is clearly visible as the light source is coming from the left of the painting. Madonna drapery has larger and more naturalistic folds that shape her body. The way Madonna look had her head tilted and how her hand was on her chest in the picture was like she was in the royal family or had royal blood, and how the mannerism had a different style of painting the baby was bigger than the normal size baby. In the picture is see five angels looking at Madonna and the baby. They use Oil on panel, and if you pay attention to the floor there is a little man looking away from a scroll. As you can see that the painting is taking place in a room, but in the background you can see a background of outside, and they used like a brownish colors to make it look like the sun is going down or coming up. If you look at Madonna and the angels cheeks, they have all have red blush on their cheeks. If you look close you can see that Madonna’s stomach is sticking out a little because the scene of the painting makes it look like she just had a baby. How to cite Mannerist Portraits of the 16th Century, Papers

Saturday, December 7, 2019

Foundations of Nursing for Communication - myassignmenthelp.com

Question: Write about theFoundations of Nursing for Communication and Documentation. Answer: The Australian commission have developed some standards in response to the extensive public and stakeholder consultation. These are recognised as National Safety and Quality Health Service Standards, and ensure the safety and quality of wide variety of health care services. The paper focuses on the sixth standard, which refers to clinical handover. This standard describes the systems and strategies for effective clinical communication whenever accountability and responsibility for a patients care is transferred. The intention of this standard is to ensure relevant clinical handover, on time and in structured manner, that will support the patient care. The purpose of this paper is to outline the nurses responsibilities in regards to effective patient handover, communication and documentation. According to the standard on clinical handover, it is the process of transferring the patients responsibility to another person for some or all aspects of care either temporarily or permanently. The clinical handover may change based on the patients situation. For instance there are different situation of handover such as during patients admission, due to change in shift time, transfer of patient to intra and inter hospital. There are different methods of handover including face-to-face, through written orders, or via telephone or through electronic handover tools. The handover can take place at the patients bedside, in a common staff area, clinic reception or at hospital. Nurses must be highly responsible at the time of clinical handover as the current processes are highly variable. These variations may be unreliable leading to risk for patient safety. Thus, nurses must use standardised process and fit the clinical handover solutions for the purpose. It will increase the likelihood of the critical information to be transferred and acted upon (Bain et al., 2013). To ensure safe transfer of the patient information, the nurses can use the ISBAR tool. It stands for Identify, Situation, Background, Assessment and Recommendation. This tool also allows the accurate identification of the patient and of those participating in hand over. The situation refers to the condition of the patient in current moment. Background informs of the factors that led to the situation. Assessment includes knowing what caused the problem followed by recommending on way to improve the situation (Kitney et al., 2016). As per literature review, this tool has been found effective in safe transfer of patient information in both clinical and non-clinical situation. It acts as teaching tool for the patient and the family to handle the illness. According to Sujan et al., (2015) the tool gives an opportunity for the health care team to discuss with the patients and decide the information that is necessary to be transferred. For instance, loss of excess blood from the surgical pa tient can be mentioned in the hand over. This tool is simple, memorable and logically structured. It prevents poor communication as the tool is designed to collaborate with the medical officers, health mangers, allied health professionals, rural and remote area staff, inpatient staff in addition to nurses and midwifes. Such structured content is necessary to reduce patient clinical management errors (Johnson et al., 2016). According to Kitney et al., (2016) the adaptation to ISBAR involves changes and to manage the change, the nurse can follow the eight steps of John P Kotter. Kotter had put forward eight steps for change management. The principles of change management align with the actions required to introduce ISBAR framework. Most importantly, the nurses must be able to identify the need for clinical communication intervention and know the rationale for intervention. Secondly, the nurse must use the critical thinking skills to identify the leader or cultural influencers so that it becomes easy to use the tool. Good leadership skills are essential to allow the handover to occur at correct time. It is the responsibility of the nurses to use the relevant policies and procedures in the concerned organisation and take an action to maximise the effectiveness of these policies and protocol meant for safe handover. It is the responsibility of the nurse to execute the documented structured process. Nurses must set appropriate location and time for handover, and simultaneously maintain and continue patient care. The nurse must exhibit high level of awareness of the patient needs and the clinical context (Sujan et al., 2015). The result of effective handover is the transfer of accountability and responsibility of care. To ensure effective handover the nurses must regularly evaluate the process of clinical handover and must monitor continuously. Drach?Zahavy Hadid, (2015) argued that collaborative effort on the part of the nurses is required to communicate with the carers, clinician and the patients to review the local processes of clinical handover. Without effective communication s kills, the collaboration would be weak. Nurse may fail to engage other patients and nurses with poor communication skills. Consequently, the transfer of critical information and documentation to the patient is hampered. Nurses must regularly take an action based on the outcomes of reviews. If necessary, nurses must report the outcomes to the executive level of governance. Based on the outcomes of review nurses must take action to increase the involvement of patients and carers. Nurses can take various precautions for effective handover. For effective handover to take place from nurse to nurse, a nurse may start her shift time 15 minutes early and allow the night shift nurse to deliver all the relevant information. When using technical language nurse may invest time to explain, the same to other nurses as well as patients family. Nurses must ensure that the handover occurs at ward office and at bedside to maintain confidentiality and privacy of the patients information. Bedside handover is highly effective then ward office for preventing breach of information (Scovell, 2010). Emotional support can be undermined by use of taped handover and thus must be avoided. Face-to-face handover is considered effective than the taped or written format. The written documentation may be problematic for nurse in the incoming shift to understand. It may not be possible for the new nurse to immediately acquaint with the patient. Similarly, when documenting to the patient, ISB AR tool would be easy to comprehend than any other mode. Therefore passing information from one shift to other must consider the limitations and improve the handover (Tobiano et al., 2015). In conclusion, giving effective handover and documentation cannot be taught. It is the process that a nurse must learn by collaborating with mentors, leaders, peers and clinicians to recognise the handover as a social and emotional support system and teaching tool for nursing care and communicating patient information. Nurses must use the evidenced based process such as ISBAR to handover and documentation to fulfil the purpose of handover. In addition nurses are obliged to follow the policies and other protocol of the organisation to effectively communicate the patient information both to the patient and the other health care professional and ensure safety and quality of care. References Bain, C. A., Bucknall, T., Weir-Phyland, J., Metcalf, S., Ingram, P., Nie, L. (2013). Meeting National Safety and Quality Health Service Standards-The Role of the Point-of-Care (POC) Audit Application.International Journal of e-Education, e-Business, e-Management and e-Learning,3(6), 507. Drach?Zahavy, A., Hadid, N. (2015). Nursing handovers as resilient points of care: linking handover strategies to treatment errors in the patient care in the following shift.Journal of advanced nursing,71(5), 1135-1145. Johnson, M., Sanchez, P., Zheng, C. (2016). Reducing patient clinical management errors using structured content and electronic nursing handover.Journal of nursing care quality,31(3), 245-253. Kitney, P., Tam, R., Bennett, P., Buttigieg, D., Bramley, D., Wang, W. (2016). Handover between anaesthetists and post-anaesthetic care unit nursing staff using ISBAR principles: A quality improvement study.ACORN: The Journal of Perioperative Nursing in Australia,29(1), 30. Scovell, S. (2010). Role of the nurse-to-nurse handover in patient care.Nursing Standard,24(20), 35-39. Sujan, M., Spurgeon, P., Cooke, M. (2015). The role of dynamic trade-offs in creating safetyA qualitative study of handover across care boundaries in emergency care.Reliability Engineering System Safety,141, 54-62. Tobiano, G., Bucknall, T., Marshall, A., Guinane, J., Chaboyer, W. (2015). Nurses' views of patient participation in nursing care.Journal of advanced nursing,71(12), 2741-2752.

Saturday, November 30, 2019

Marketing Strategy

Executive summary The basis of this report is information on the shoes used by trainees to achieve success of maintaining personal fitness. The report involves evaluating the marketing strategy used by Guangzhou Kala health shoes Technology Company Limited in China.Advertising We will write a custom assessment sample on Marketing Strategy specifically for you for only $16.05 $11/page Learn More It suggests solutions for ensuring development and improvement of the company. The purpose of this report is to investigate and analyze the marketing strategy using marketing tools and techniques, SWOT analyzes, market segmentation and positioning, competitors performance and marketing mix of the company. It will also recommend the changes in marketing strategy to be made by the firm to improve the competitive position of the firm in the industry. It also shows the benefits of marketing tactics and strategies of other successful organizations. Introduction Gang Li u owns Guangzhou Kala health shoes Technology Company Limited. The company specializes in the manufacture, retailing and distributor of height increasing shoes, massage slipper, healthy slipper and sandal boots in its main markets in North America, Eastern Europe and South East Asia among others worldwide (Made in china, 2011, par.1). The company has more than 1000 employees specialized in research, development, production and marketing of health shoes. It has been in the market for over 10 years with the brand names of Nike, Reebok, Puma, Adidas and K-Swiss. It has 180 stores in china (Venture navigator 2010, par.1). Current Strategies The company has been offering its products or services to the market for ten years. The analyst had to ensure that the company had already established its own market internationally and had the capability of surviving in the market. The marketing strategy evaluation and analysis suggests the ideal progress of the company and recommendations are to im prove the company’s performance and competitiveness.Advertising Looking for assessment on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Their volume of annual sales had improved drastically given increased product distribution hence evidence that it will continue penetrating into the market and make more profits (Made in china, 2011, par.1). Objectives of the Company The firm has various objectives including provision of quality products and services that attract and maintain more customers from their competitors by satisfying and ensuring their customers hence maintaining the relationship and meeting expectations. The company aims at using technology and innovation that improves modern enterprise management systems by developing unique products and services and increasing customer awareness. Lastly, it aims at establishing people-oriented concepts by learning and understanding customer needs and while increasing its value (Made in china, 2011, par.1). Situational Analysis.  Pestle Analysis.  Political factors The company’s location in China has created many issues and changes in the company due to the laws and regulations, global changes, data protection and the legislation of the country. There is a lot of corruption and collapse of the government representatives to the laws and regulations set by the government. The government representatives unite with the criminals to cause crimes to the expatriates and property thus limiting growth and development of the company. There is no transparency in the government laws and regulations forcing the company to be alert on the laws and regulations surrounding the company and to learn from the experience of other companies to avoid additional operational costs especially in research. The government imposes restrictions on exports and imports using measures such as high taxation on smuggled goods to protect business investments. The count ry experiences frequent natural disasters leading to losses whenever the company is affected.Advertising We will write a custom assessment sample on Marketing Strategy specifically for you for only $16.05 $11/page Learn More Economic factors People in modern areas have a higher disposable income than those in the rural areas limiting the market share of the company to the urban centre. Unequal GDP and development in the country reduces the development and growth of the company operations due to low turnover and revenue. The prices of goods and services are very high due to increased costs of transportation and raw materials. The national income comes from high taxation of businesses because most of the people in the country face financial hardships and are unable to generate enough revenue to cater for the government expenditure. Social-cultural factors There is high rural-urban migration leading to high unemployment and insecurity in urban areas in Chi na. The workers are unpaid for their services and refute free labor unions and channels of appeal. These problems have led to frequent protests and demonstrations in urban areas disrupting business operations. The country has a big gap between the rich and the poor resulting to a wide gap in education and living standards. There are high-income earners in the country who have the potential of purchasing goods without financial limitations. The country has a variety of customs and beliefs that are essential for the growth of the company. Increased insecurity in the country limits foreign investors thus reducing competition in the market. Technological Factors The country is facing difficulties of water and power shortages. Power rationing measures occur when there is high demand for products and services thus minimizing utilization of production resources. The low level of education limits technology development in the country. Only the few educated are able to carry out technical ac tivities. SWOT Analysis Strengths The company motivates its workers by paying their salaries fairly and as required. It produces a variety of unique and quality personal fitness shoes that are affordable by all classes of people.Advertising Looking for assessment on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More It has created good reputation in the country and internationally due to its good relationship between the consumers, other companies, and the local government safeguarding its image during disputes and marketing activities. The company is able to hire qualified and skilled employees. It has 1000 expertise in investigation, improvement and invention of its products and services. The company has a total annual sales volume of US$ 50 to 100million and an export percentage of 61% to 70% (Made in china, 2011, par.1). Weaknesses Guangzhou Kala health shoes Technology Company Ltd is able to produce only height increasing shoes, massage slippers, healthy slippers, and sandal boots hence the need to innovate more brands to meet customer needs and wants (Made in china, 2011, par.1). Opportunities The company can easily grow due to its market establishment in developed countries such as the North America. Its brand names are famous and prosperous among many nations thus enhancing its brand im age. The restrictions of the government laws on smuggling goods gives the company an advantage over its competitors since its quality of products and services maintains. There is increased need for personal fitness globally hence; the company has a greater chance of improving its profits (Made in china, 2011, par.1). Threats The poor economic status of the country and the high taxation of revenue by the government reduce the company’s profits and capabilities. There is increased competition from other personal fitness shoes producers in the world by producing better products and services and establishing dominant markets for example, the Reebok Company (Made in china, 2011, par.1). Differential advantage/competitive edge (USP) The company produces unique and quality products that differentiate the company products and services from its competitors. Their products are very important in personal fitness trainer’s institutions since they reflect a lot in customer benefits . Its efforts to understand consumer needs and wants of personal fitness globally has generated a bigger market share and advanced the profits of the company (Made in china, 2011, par.1). Segmentation targeting and Positioning (STP) Segmentation Segmentation divides the company’s target markets into different sectors. Segmentation is important to the company to improve its profits and market strategies by understanding their customer needs that attract and maintain them from the company’s competitors. The company’s establishment and progress has majored on behavioral and geographic segmentation (Doole, 2008, p.197). Behavioral Segmentation A good example for this form is a case in which customers make purchases based on the benefits they get from the product, level of usage of the product, level of loyalty, user status and level of their readiness to purchase (Doole, 2008, p.198). The company has discovered the rising need and demand for personal fitness in many countries due to the increased health problems and activities. They used shoes since personal fitness shoes are much different from the normal unhealthy shoes. This has led to the increase in their penetration in the market since the consumers are willing to buy the shoes at any cost and time. The personal fitness trainers also advise their customers on the shoes to use to keep fit (Dance, 2009, par.1). Geographic Segmentation The company has its main markets in North America, Eastern Europe, South East Asia, Africa and Mid East Asia. This segmentation has enabled the company to develop appropriate marketing strategies and decisions regarding its brands and multinational business progress. It has established 180 stores in China (Made in china, 2011, para.2). Positioning The idea of positioning is relates to the way consumers perceive and evaluate products and services. Consumers rank the features and attributes of the product against those of the competitors. The company’s a bility to identify the need for shoes personal fitness has enabled the company to be different from its competitors. The company uses shoes to attract consumers who seek personal training and making them get comfort and the necessary fitness they need. This has enabled the company to attract and maintain their own customers and that of competitors through the benefits derived from the product. The company has established international markets that are in developed countries enabling the company to maximize its profits. This has enabled the company to increase its total sales volume drastically (Made in china, 2011, par.2). Marketing Objectives and Goals (SMART) The company aims at enlarging its market worldwide by ensuring accessibility to products and communication. It evaluates and analyzes its markets to reflect on the changes necessary in the business. Individual branding differentiates their products through creating a products image and unique identity. This helps to distingui sh its products from that of the competitors. The company keeps on evaluating and understanding the government laws and regulations to make investment decisions to avoid disagreements during their market operations. This helps the company to reduce unnecessary costs on losses. The company wants to increase awareness of its products through advertisement and public relations. It started with trade shows in the end of October to the beginning of November 2011. Marketing Strategies and Programmes (4P’s) Marketing mix designs to respond to the cultural diversity and complexity resulting from the marketing environment. Due to the challenges experienced and threats of perception as a less competitive producer, the marketer requires creating a program that registers the maximum possible impact in its target markets (Doole 2008, p.187) Price The company uses variable pricing and promotional pricing. The variable pricing helps the organization to set prices according to the level of d emand and quality of the product. Since the product is for leisure, the prices are slightly higher than prices of other essential products due to the high demand and lower than the price of competitors due to the sensitivity of market. Promotional pricing is a technical pricing reduction process used by the company to give discounts, special offers, vouchers, pay later and interest free credit to their customers. This company is determined to maximize its current profits to grow globally, maintain price leadership to compete effectively with competitors in the market to ensure its survival and penetration into the global market (Made in china, 2011, par.3). Product The product’s quality has attracted the attention of consumers. Due to the increased competition in the market for personal fitness shoes, the company has taken into consideration creating unique and quality products. The company responds to the customer needs and preferences by designing height-increasing shoes to be used for personal fitness training. The customers have responded by increasing their purchase of the products as indicated by the increase in the total annual sales volume (Made in china, 2011, par.3). Place The company exports more than 60% of its products making it an international company. This makes decisions more complex for the company hence demands for more coordination of the flow of goods and raw materials across the target markets to ensure superior customer service in foreign and local markets. The company has reporting offices, foreign branches and retailers to ensure control of its markets (Made in china, 2011, par.3). Promotions The company attends to diverse issues that affect effective communication about its brands in foreign and local markets. The company understands legal and segmentation constraints in its target markets to make promotion decisions. The company uses promotional tools such as giving out toys as gifts and research on the progress of the company . They use techniques such as trade shows, website promotions, email marketing, press releases, and newsletters for example, â€Å"The New York Times† (Marketing Find, 2005, para.1). Conclusion The company has tried to penetrate the market quickly since it has only ten tears since its establishment and has managed to be a global corporation. Its products are essential to the society in helping its consumers keep fit. Health benefits are one of the most important things in consumers hence the company has higher chances of greater market share in the future. The poor economic status of China has encouraged the company to seek international markets in order to improve its profit. The company uses a uniform global focus for all its markets to attain a global market perception and image irrespective of the origin of the product. Recommendations The company should make minor adjustments on the packaging and labeling of its products to cater for the diversity of languages, culture a nd climate. The company should focus on producing and availing its products to the target market to attract and maintain more customers from its competitors. The company should conduct frequent and effective evaluation and analysis of their target market segments in order to make informed decisions on productivity and operations in the markets (Ferrel, 2008, p.311). The company should also understand the right mode of entry to use while venturing into foreign and local market in order to determine the amount of control they have on those markets. This would enable the company to focus on its SWOT analysis to create a superior advantage over its market and competitors (Bennett, 2002, p. 194). The company should approach its target markets in a gradual manner to reduce the risks of losses and increase its knowledge and performance of the target markets. The company should analyze its marketing mix to facilitate effective participation in the target markets to ensure survival and susta inability in the local and foreign market (Hoffman, 2008, p. 3). Marketers should be in a position to face the challenges of ensuring high levels of competitiveness in the foreign markets. This pressure for globalization presents an image of a highly globalized producer. While confronting these challenges, the marketer increases the knowledge and understanding of the target market enabling the firm to create marketing programs and plans of the local cultural conditions that shape the needs and wants of their customers (Haasen, 2003, p. 26). The company should be careful in allocating part of its budgets to ensure all its activities compete effectively to avoid loosing its customers to the competitors. The product marks the starting point of the procedures of the business hence it should reflect the customers’ expectations and be able to attract the attention of customers in the market. The company should use vivid advertisement to create awareness to reach a vast number of pe ople at the same time. This helps to boost customer turnover very fast if communication is good and effective. The employees of the firm should get involved in creation of effective marketing programs to enable them understand their roles within the marketing process (Kotler, 2008, p.29). The marketing programs should include motivation, coordination, education, and communication of the company’s employees. The company should focus on the key elements of the exchange process to create customer satisfaction, the organization and even the society. This helps to bring out the desired objectives and determine the implementation of the trading programs by enhancing the knowledge of the company’s products or services mix, increasing the pride of the company’s products and services, creating awareness of the opportunities for new products and services and business development, and helps improve the company’s marketing skills (Turner, 2003, p.105). It is importan t that the company embrace control and consistency in its markets to ensure successful programs, for example, successful promotional programs achieves because of an integrated marketing programs and definition of marketing and communication objectives (Barker, 2005, p.183). The marketer should understand the cultural expectations of their customers to allow them to adapt quickly to the product characteristics. The company should maintain and improve its technology and innovation to ensure it keeps pace with the changes and demands of its customers. It is important for marketing managers to understand different customer attitudes towards price and perception of quality in determining price levels. This is because consumers rely heavily on price to make judgment on quality of a product or service when they have little or no information about the product (Hoffman. 2007, p. 2). The company should pass promotional messages frequently to inform, educate, and remind customers of their prod ucts and services. The marketers should analyze the information from the market and evaluate each marketing mix element with a view of indicating the relevant areas where adjustments are required. Marketers are keen at this stage to utilize resources to attain the maximum favorable impact within the specified periods (Hoffman, 2008, p. 2). References Barker, R. 2005, Integrated organizational communication, London: Juta and Company Limited, p.183. Bennett, R. 2002, International marketing: strategy planning, market entry implementation, New York: Kogan Page Publishers, p. 194. Dance, 2009, Adult dance fitness and performing arts. Dance 101, Atlanta. Web. Doole, I. 2008, International marketing strategy: analysis, development and implementation, Dublin City: Cengage Learning EMEA. p. 187. Ferrel, O. 2008, Marketing strategy, New York: Cengage Learning. p. 311. Haasen, A. 2003, New corporate cultures that motivate, Westport: Greenwood Publishing Group. p. 26. Hoffman, S. 2007, How Do Motivation and Leadership Affect the Corporate Culture of Multinational Firms, Black Rock City: GRIN Verlag. p. 2. Hoffman, S. 2008, Are the four p’s of international marketing of equal importance to all firms. What factors might cause some to more or less important than others: a short article, Black Rock City: GRIN Verlag. p. 2, 3. Kotler, P. 2011, Marketing insights from A to Z: 80 concepts every manager needs to know, New York: John Wiley and sons, p. 26, 29. Made in china, 2011, Connecting buyers with china suppliers, Focus Technology Company Limited, Oklahoma City. Web. Marketing Find, 2005, Web marketing promotional tools and techniques. Marketing Find Inc, Oklahoma City. Web. Turner, P. 2003, Organizational communication: the role of the HR professional, Birmingham: CIPD Publishing. p. 105. Venture navigator, 2010, Individual branding, The Business Edge Consortium, Kansas City. Web. This assessment on Marketing Strategy was written and submitted by user Olivia Watkins to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here. Marketing Strategy

Monday, November 25, 2019

Spring and Fall Essays

Spring and Fall Essays Spring and Fall Essay Spring and Fall Essay Spring and Fall, written by Gerard Manley Hopkins, is a simple and graceful poem that has a powerful religious theme. It is about changing seasons and mankinds mortality. The poem addresses Margaret, which is generally assumed to be a young girl. We assume this based on the use of the word Golden grove, which can mean a simple, dream-like, play-world. The narrator asks the young girl why Golden grove is unleaving, or losing its leaves. This falling of the leaves occurs in the autumn as winter approaches. Its clear that Margarets reality of Golden grove is nearly as important to her as the reality of the world. She is in a state of emotional shock as she realizes that the beautiful trees around her are experiencing a form of death and decay. The poem opens with a question to a child: â€Å"Margaret, with her â€Å"fresh thoughts,† cares about the leaves as much as about â€Å"the things of man. † The speaker reflects that age will alter this innocent response, and that later whole â€Å"worlds† of forest will lie in leafless disarray (â€Å"leafmeal,† like â€Å"piecemeal†) without arousing Margaret’s sympathy. The child will weep then, too, but for a more conscious reason. However, the source of this knowing sadness will be the same as that of her childish grief- for â€Å"sorrow’s springs are the same. † That is, though neither her mouth nor her mind can yet articulate the fact as clearly as her adult self will, Margaret is already mourning over her own mortality. The title of the poem invites us to associate the young girl, Margaret, in her freshness, innocence, and directness of emotion, with the springtime. Hopkins’s choice of the American word â€Å"fall† rather than the British â€Å"autumn† is deliberate; it links the idea of autumnal decline or decay with the biblical Fall of man from grace. That primordial episode of loss initiated human mortality and suffering; in contrast, the life of a young child, as Hopkins suggests (and as so many poets have before him- particularly the Romantics), approximates the Edenic state of man before the Fall. Margaret lives in a state of harmony with nature that allows her to relate to her paradisal â€Å"Goldengrove† with the same sympathy she bears for human beings or, put more cynically, for â€Å"the things of man. † Margaret experiences an emotional crisis when confronted with the fact of death and decay that the falling leaves represent. What interests the speaker about her grief is that it represents such a singular (and precious) phase in the development of a human being’s understanding about death and loss; only because Margaret has already reached a certain level of maturity can she feel sorrow at the onset of autumn. The speaker knows what she does not, namely, that as she grows older she will continue to experience this same grief, but with more self-consciousness about its real meaning (â€Å"you will weep, and know why†), and without the same mediating (and admittedly endearing) sympathy for inanimate objects (â€Å"nor spare a sigh, / Though worlds of wanwood leafmeal lie†). This eighth line is perhaps one of the most beautiful in all of Hopkins’s work: The word â€Å"worlds† suggests a devastation and decline that spreads without end, well beyond the bounds of the little â€Å"Goldengrove† that seems so vast and significant to a child’s perception. Loss is basic to the human experience, and it is absolute and all-consuming. â€Å"Wanwood† carries the suggestion of pallor and sickness in the word â€Å"wan,† and also provides a nice description of the fading colors of the earth as winter dormancy approaches. The word â€Å"leafmeal,† which Hopkins coined by analogy with â€Å"piecemeal,† expresses with poignancy the sense of wholesale havoc with which the sight of strewn fallen leaves might strike a naive and sensitive mind. In the final, and heaviest, movement of the poem, Hopkins goes on to identify what this sorrow is that Margaret feels and will, he assures us, continue to feel, although in different ways. The statement in line 11 that â€Å"Sorrow’s springs are the same† suggests not only that all sorrows have the same source, but also that Margaret, who is associated with springtime, represents a stage all people go through in coming to understand mortality and loss. What is so remarkable about this stage is that while the â€Å"mouth† cannot say what the grief is for, nor the mind even articulate it silently, a kind of understanding nevertheless materializes. It is a whisper to the heart, something â€Å"guessed† at by the â€Å"ghost† or spirit- a purely intuitive notion of the fact that all grieving points back to the self: to one’s own suffering of losses, and ultimately to one’s own mortality. Though the narrator’s tone toward the child is tender and sympathetic, he does not try to comfort her. Nor are his reflections really addressed to her because they are beyond her level of understanding. We suspect that the poet has at some point gone through the same ruminations that he now observes in Margaret; and that his once-intuitive grief then led to these more conscious reflections. Her way of confronting loss is emotional and vague; his is philosophical, poetical, and generalizing, and we see that this is his more mature- and â€Å"colder†- way of likewise mourning for his own mortality. The speaker reflects that age will alter this innocent response, and that later whole â€Å"worlds† of forest will lie in leafless disarray (â€Å"leafmeal,† like â€Å"piecemeal†) without arousing Margaret’s sympathy. The child will weep then, too, but for a more conscious reason. However, the source of this knowing sadness will be the same as that of her childish grief- for â€Å"sorrow’s springs are the same. † That is, though neither her mouth nor her mind can yet articulate the fact as clearly as her adult self will, Margaret is already mourning over her own mortality.

Friday, November 22, 2019

A comparison of freud, jung and adlers key issues

A comparison of freud, jung and adlers key issues Freud, Jung and Adler are influential theorists that have specific positions across human nature, problem formation, change and techniques as it relates to personality theories. Freud’s theory is referred to as psycho-analysis, Jung’s is analytical psychology and Adler’s is individual psychology. All theories have similarities and differences as they seek to describe what factors contribute to the development, nurture and shapes of one’s personality. The theories of Freud, Jung and Alder â€Å"attempt to answer basic questions about the nature of personality† and examine whether we were born with a specific personality, whether the personality is a learnt behavior or whether it is influenced by unconscious or conscious forces (Schultz these are recurring modes of action that set in motion and produces a psychological state, the end result is a behavior that ultimately obtains pleasure. Adler’s view on human nature states that every individu al is unique and there is eccentricity and distinctiveness in human personality. His view on human nature differs from that of Freud’s and Jung’s concerning the idea of inherited personality components as a â€Å"superstition† (Erwin, 2010). Adler doesn’t believe that innate instincts motivate behavior like Freud and Jung; instead it is his opinion that goals and the preferred way of achieving them are selected by the human. Jung’s view of human nature is deterministic, spiritual and comprises of free will. He is of the opinion that humans are conflicted with opposing forces for example for every positive thought unconsciously there must be a negative one behind it. Freud’s view is similar in that it is also deterministic. He is of the opinion that no behavior by a human is a mistake; there is a specific reason for all actions. Freud, like Jung also believes that the unconscious mind influences behavior, however his stance differs somewhat b ecause his theory suggests that behavior is motivated through the unconscious mind. Adler’s view of human nature differs from that of Freud’s and Jung’s, his view is that feelings of inferiority and inadequacy motivate a person to strive for success. This drives continues throughout life and becomes the motivator of behavior and continues to influence goals. Freud defines the structure of personality using a topographic model that consists of the unconscious, the preconscious and the conscious. Jung’s idea on the structure of personality is similar to that of Freud’s, he too believes in the conscious and unconscious. However Jung’s differ in that he is of the opinion that difficulties and trying situations that develop in the unconscious mind exhibits itself in the conscious mind and alters the personality of an individual, at times the conscious and unconscious components may fuse together rather than remaining seperate and distinct (Erwin, 2010). On the other hand, Adler is of the assumption that personality does not have a specific structure but instead an â€Å"indivisible unity†. Adler does not agree with Freud and Jung that the majority of our personality is embedded within the unconscious, he believes that whatever thoughts and behaviors are stored in the unconscious are things that we wish to avoid, evade or don’t quite understand. Thus in the opinion of Adler, the conscious and the unconscious work hand in hand to comprehend and achieves one’s goals established by the being.

Wednesday, November 20, 2019

Breast Cancer Essay Example | Topics and Well Written Essays - 750 words

Breast Cancer - Essay Example little more than 2.47 million women who had experienced having breast cancer, women should be informed the proper way of conducting a self-breast examination as a way of increasing their chances of survival. For this study, the student nurse will discuss the importance of breast cancer screening followed by explaining the proper way to screen breast cancer and the step-by-step physical assessment to enable women detect early signs of breast cancer. Healthy women should undergo the most common screening test like mammogram at least once a year in order to detect signs of breast cancer at an early stage. (Breast Cancer, 2009a) Early detection of breast cancer is important since women can have higher chances of survival. This is because of the fact that early stage cancer is easier to treat as compared to late stage breast cancer. (Breast Cancer, 2008g) Aside from the use of mammogram test, other ways to screen signs of early stage breast cancer is through the use of other imaging test like the magnetic resonance imaging (MRI) (Breast Cancer, 2008c). The blood marker tests can also be considered when screening a patient. In case cancer protein or blood markers like CA 15.3, TRU-QUANT, CA 27.29, CA125, and carcinoembryonic antigen (CEA) is present in the blood (Breast Cancer, 2008a), there is a strong possibility that the patient has a breast cancer. Because of the limitations of mammogram when screening for breast cancer, the use of digital tomosynthesis is now being considered as the best alternative for mammograms (Breast Cancer, 2008d). Although a lot of physicians believe that the use of mammography is the best method for detecting breast cancer, the Mayo Clinic 2008 study result suggest that the use of molecular breast imaging (MBI) is better than mammography in terms of detecting tumors in the breast (Breast Cancer, 2008f). Also highly recommended for women who have high risk of developing breast cancer, a new technique known as the ductal lavage can be

Tuesday, November 19, 2019

Aviation Safety Program Essay Example | Topics and Well Written Essays - 2500 words

Aviation Safety Program - Essay Example The security blunder that took thousands of lives on that fateful day is still a cause for debate. How could a few terrorists manage to walk through security, and after hijacking the planes, crash them into prominent, high-security areas in New York and Washington D.C This security lapse may well go down in history as the biggest human error to be recorded in the modern times. The airport security got it all wrong. This factor is applicable to other fields as well. The risk of deliberate acts of terrorism, sabotage, vandalism and theft can cause the release of highly hazardous chemicals and biological gases from a process facility. This could have severs repercussion. Unless managed properly, the result could have catastrophic impact on civilization. The risk from such acts must be assessed to determine if existing security measures and safeguards are adequate or need improvement. Risk assessment is the heart of a security program (Human Factors and Human Error Analysis, http://www.primatech.com/consulting/services/human_factors_and_human_error_analysis.htm) People are key components of the process. They are involved in process design, production, operation, maintenance, and security. No step in the process life cycle is complete without some human involvement. Also, processes are generally not well-protected from human errors since many safeguards are directly focused on equipment failure. This is evidenced by the number of major accidents that have been attributed to this cause. Aviation is no different. Technical flaws, mechanical malfunctions, security lapses, and human error have all been attributed to aviation accidents. The human factor is perhaps the major cause for concern in safety procedures. It is vital that the factors influencing the likelihood of errors be identified and assessed to determine where, and if improvements in design of a process are needed. Surprising but true, human factor is most poorly understood in safety management. However, the standards from regulatory agencies and industry groups have underscored the importance of addressing human factors in process safety and risk management programs. This is motivating more companies to evaluate and address human factors issues in their facilities. Improving the human factors design of a process can produce not only improvements in safety, but also gains in quality, productivity and job satisfaction (Human Factors and Human Error Analysis, http://www.primatech.com/consulting/services/human_factors_and_human_error_analysis.htm) 2.0 Introduction "The Human Factors Analysis and Classification System (HFACS), is a general human error framework developed and tested within the U.S. military as a tool for investigating and analyzing the human causes of aviation accidents. Based on Reason's (1990) model of latent and active failures, HFACS addresses human error at all levels of the system, including the condition of aircrew and organizational factors. This was used to analyze human error data associated with commercial aviation accidents that occurred between

Saturday, November 16, 2019

Military Discipline Essay Example for Free

Military Discipline Essay Bring out uniformity in cooperating for the attainment of a common goal. This uniformity is obtained when an individual understands how to fit into an organization as a whole. To understand one another through the sharing of common goals. To ensure effectively of a group not only for specified purposes but also for emergencies. To install responses automatically without panic in an emergency. D. Principles of Effective Discipline Men fell wore secure if they knew that reward and punishment come to them because of behavior and not because of an officers word, mood or preference. An officer must be loyal to his men and worthy, takes an interest in them and makes sure they are granted rights and privileges. An officer commands publicly and reproves and reprimand privately. He gains the confidence of his men and is worthy of it. An officer/leader must set an example. E. Military Courtesy it is the accepted form of politeness in the military service. The foremost of this special form of courtesy is the salute. It is the expression or manifestation of consideration for others. F. Whom to Salute Commissioned officers of the AFP, National Flag, Colors, and standard not cased. Officers of foreign Armed Forces whose government is recognized by the republic of the Philippines. All civilians who are entitled by the custom to the salute. G. Proper Manner of Saluting Except when walking one should always be at attention when saluting. The right hand is raised smartly until the tip of the forefinger touches the lower part of the headgear or forehead and slightly to the right eye. Thumb and finger are extended and joined. The palm is turned slightly in front of the body. The forearm is inclined at 45 degrees angle and the hand and wrist are in straight line. The first position of the hand salute or the nearest point of approach is more or less six paces. The first position of the salute should be held until the person saluted to have passed or the salute is returned. The hand salute under the naval custom is accompanied by a word of greeting such as good morning, Sir/Maam depending on the time of day. Naval custom permits saluting with left hand when a salute cannot be rendered by the right hand. H. Major Fault in Saluting Bowing the head as the salute is given. Dropping the hand salute before it has been returned. Holding the hand awkwardly high or letting it sag too low. Saluting while on the double time. Avoiding the gaze of the person saluted to. Saluting with a pipe, cigar, or cigarette in the mouth or in hand. I. Honors to the Colors and Anthem Whenever the National Anthem is played and you are not on formation and not in a vehicle, come to attention and at the first note, face the flag and render the prescribed salute. If no flag is nearer, face the music and salute. Vehicles in motion are brought to halt. Troop formations, riding in vehicles do not disembark. If outdoors and uncovered, attend at attention and face the flag. If indoor, officers and enlisted men will stand at attention. The passing of being passed by an uncased color, which is being paraded, presented or in its own formal display, a salute at six paces before and until it has passed you. In uncovered, stand at attention when passing by uncased color. The marks of respect above are also rendered to the national anthem of any friendly country when played upon an official occasion. Discipline 1. Training to act in accordance with rules; drill. 2. Activity, exercise, or a regimen that develops or improves a skill; training 3. Punishment inflicted by way of correction and training. 4. The rigor or training effect of experience, adversity 5. Behavior in accord with rules of conduct; behavior and order maintained by training and control

Thursday, November 14, 2019

The Future of Print and Cyberculture Essay -- Writing Writers Technolo

The Future of Print and Cyberculture As our class learned from the last assignment in which we created a writing technology, the introduction of new technology can change the way that people operate on a day-to-day basis. Inventions like the automobile and the television, for example, have forever changed the culture in many countries. However, no invention has changed the world more than the computer. In fact it has been the computer that has made the most recent technological phenomenon, the Internet, possible. While the Internet has made obvious changes in the way people communicate, it has also changed how we perform other functions that are as fundamental to us as reading and writing. One of the issues the Internet and similar technologies have forced upon us is the switch from reading from textbooks to reading what is referred to as "hypertext" on the computer screen. Because the Internet has turned into such an extensive source of information, many people find themselves reading from the screen what they normally would have read from plain text in the past. Although this is a process that a lot of people are uncomfortable with, James Sosnoski, author of the essay Hyper-readers and their Reading Engines, believes that reading from computer screens will soon become commonplace. "Though I readily acknowledge that many persons do not like to read from their screens at this time, I assume that over a period of time, the practice will become so habitual that it will seem 'natural' - just as it now seems customary to use a computer rather than a typewriter," he said (404). Reading hypertext is different from the reading that we are accustomed to for a variety of reason s, one of which being that people tend to be more selec... ...de Web is a vast (hyper) text that we read with such increasing frequency that it has become increasingly difficult as the day wears on to dial up one’s account in order to access the Web because so many of its readers are already online," (401). Bringing publishing opportunities to the masses and having speed and convenience applied to written communication sure sounds like an enhancement to me. Works Cited: Landow, George. "Twenty Minutes into the Future, or How Are We Moving Beyond the Book?" Writing Material: Readings from Plato the Digital Age. New York: Longman, 2003. 214-226. Lesser, Wendy. "The Conversation." Writing Material: Readings from Plato the Digital Age. New York: Longman, 2003. 227-233. Sosnoski, James. "Hyper-readers and their Reading Engines." Writing Material: Readings from Plato the Digital Age. New York: Longman, 2003. 400-417

Monday, November 11, 2019

Hypocritical Holden Essay

Hypocrisy is found in all of us. Many of us have things about ourselves that we don’t want to share with others, and try to hide; perhaps we are trying to hide our hypocrisy. In The Catcher in the Rye, J. D. Salinger expresses through Holden Caulfield that hypocrisy results from not being able to connect with others. Although Holden accuses others of being phony, in reality, Holden is a phony himself and as a result of his hypocrisy, he is unable to connect with others, suggesting that to connect with others one must be able to accept other people’s flaws. Holden defines others as phonies because he is critical and has a negative utlook on the world and the people in it. When Holden makes observations of other people he often defines them as phony. For example, when Holden goes to the movies he observes a lady sitting next to him who is crying during the movie, â€Å"The part that got me was, there was a lady sitting next to me that cried all through the goddam picture. The phonier it got, the more she cried†¦ she had this little kid with her that was bored as hell and had to go to the bathroom but she wouldn’t take him†¦ You take somebody that cries their goddam eyes out over phony stuff in the movies, and nine times out of ten they’re mean bastards at heart.  I’m not kidding† (181). Holden thinks that the woman crying is a phony because she is emotional about a movie which is fake, yet she does not feel bad for the kid who is sitting next to her in real life, who has to go to the bathroom. A woman crying at a movie is what Holden observes and defines as phony behavior. Holden’s negative outlook on the world and the people in it just pushes Holden farther and farther away from people. He is isolating himself. In addition, Holden thinks some words or phrases are phony. When Holden is talking on the phone with a girl he knows, Sally, who says something that Holden thinks is phony. â€Å"I’d love to. Grand. † Grand. If there’s one word I hate, it’s grand. It’s so phony†(106). Holden thinks that the word grand is phony, which may be true to Holden; although the more energy he spends on pointing out â€Å"phonies† the more isolated and unhappy he becomes. Holden is a hypocrite because he is sometimes aware that he is being a phony himself. Holden thinks that he needs to hide his true self from people in order to â€Å"survive†. When Holden is out at Ernie’s and meets up with a girl he knows, Lillian, Holden says something to the Navy guy who was with Lillian that Holden considers phony. Holden addresses the reader, â€Å"I’m always saying â€Å"Glad to’ve met you† to somebody I’m not at all glad I met. If you want to stay alive, you have to say that stuff, though† (87). Holden lies to the navy guy, and also says that he lies to other people when saying this phrase. Although Holden is acting phony, and therefore hypocritical, he is aware of it. He acts phony because he is afraid that sharing his true self with others will interfere with him connecting with others; Holden thinks that he will turn people away because he is different. Holden is different because he is critical, and also eeply caring and emotional. Holden is trying to act like a regular guy so people will like him and be willing to talk with him. Holden is striving to make a connection with someone; anyone. He is just looking for anyone to talk to and make a connection with, but he is afraid to open up to them. Holden tries to fit in with others by being phony when in reality, he hates how most people act. Holden tries not to show his hatred of phonies because then, people would soon realize that Holden is a phony himself. At Ernie’s when Holden meets up with the navy guy, introduced to him by Lillian, Holden hares his true thoughts about the navy guy’s actions with the reader. Holden says, â€Å"He was one of those guys that think they’re being a pansy if they don’t break around forty of your fingers when they shake hands with you. God, I hate that stuff† (86-87). Holden doesn’t like the expectations put on men to act tough; this makes Holden feel insecure. Holden feels that he must hide that he is caring and emotional by being phony. In addition, Holden is sometimes unaware that he is being phony. For example, when he asks his taxi driver Horwitz a question, Holden is unaware that he is being phony. â€Å"Hey, Horwitz,† I said. â€Å"You ever pass by the lagoon in central park? Down by central park south? †Ã¢â‚¬ ¦ â€Å"Well, you know the ducks that swim around in it? In the springtime and all? Do you happen to know where they go in the wintertime, by any chance (81)? †Ã¢â‚¬â„¢ Holden asks Horwitz where the ducks go in the winter time because he is unknowingly comparing his situation to the ducks in the lagoon; Holden wants to know where he goes now that it is â€Å"winter time† and his lagoon, Pencey prep, has frozen. Throughout the book, Holden struggles to find a place where he belongs. He also strives to connect with people. Holden is reluctant to share his true self with people. Asking Horwitz where the ducks go is one of Holden’s â€Å"phony† attempts at making a connection with someone. When Holden acts phony, he shields his true self from people which keeps him from connecting with others. Holden dislikes phonies, and he often criticizes people for being phony, although Holden acts phony himself because he is insecure about himself, which leads to Holden acting phony. J. D. Salinger expresses through Holden that when trying to connect with others, one must act like themselves. Hypocrisy is often inevitable; all of us exhibit hypocrisy.

Saturday, November 9, 2019

Organizational Security and Expansion Assessment Essay

As director of security for this company I will ensure a threat and vulnerability assessment to protect the company and remain profitable in business. In preparing to expand my security company in the Middle East and Africa there are several things that I must consider. Some of them are threats, threats of other security companies trying to buy me out, internet hacking, surveillance system, personnel, and how to secure the perimeter when a natural disaster strikes. When it comes to human threats you have to worry about your staff who is working for the company that you are security. What kind of staff do you have? Can they be trusted? Some staff member may use your security system to block up other things that don’t pertain to your security business. By using the computer to look at other sites you are leaving your sites open to other websites that don’t pertain to your job. They may be able to log in to your security system to find out about it. If your staff member don’t do this, they may be asked by a member of the working company staff to do it. They may offer to pay them a lot of money or to do favors to get what they want from the security staff. Secondly, there are threats of other security companies trying to buy you out. They may place a bid to that same company you are trying buy out. Their bid maybe lower company than yours or they may promise better security for the company. They may say that theirs is better because they offer more. Their ways of securing the company from threat than you. Their technology maybe more up to date than yours, with extra features. They may say that not only can they charge you less, but that they can use less people on the staff to get the job done. There is also the threat of other people or companies hacking your security system. There are people who sit at their and keep putting in codes until they can open it, they go in to see what kind of damage they can do your system to hurt your company or representation. Next, you will have to deal with your surveillance system. Is your system strong enough to keep out hackers, threats from other humans or terrorists? How can you keep out these unwanted threats? You have to make sure that your system is able to pick up the smallest thing that may go wrong at that company. Make sure that your security system covers enough of the outer perimeter, as well as enough surveillance to cover the inside of the perimeter. Make sure that there is nothing that may keep your motion sensors from working properly. Be sure the company has adequate amounts of air blowing to keep your system working properly. Let the company know that your security personnel is your 24/7 force, and your video monitoring system and motion detector will be alarm at all times, which will be for business hours, weekends, and holidays. Your security personnel will do routine perimeter checks on the inside, as well as the outside of this company. Finally, another threat of securing a company in the Middle East and Africa is securing the company during natural disasters. By natural disaster I’m referring to floods, tornadoes, hurricanes, earthquakes, and when lightning strikes. Some companies consider fires air quality, and medical outbreaks as a natural disaster. With any kind of natural disaster there is the chance of losing your security system or other important information. Your systems maybe destroyed because no backup power outage, damage to the building structure, equipment, inventory, and other parts of the property. While a fire is considered a natural disaster, they may also be considered an accident. Depending on what type of company you are securing, there may be chemical that can destroy your security system. Fires and combustible chemicals may cause internal damage, injury or death. To be successful when it comes to natural disaster, you should have a plan of approach to counter act these threats. This may also lead to a smooth flow of operations for your security system. In conclusion, there are many threats that you may consider when trying to start a security business in the Middle East and Africa. Some of these threats are natural disaster, your surveillance system, internet hacking, threats by humans, from other security your system and the company in general. A natural disaster can be anything from a tornado, to a flood, a hurricane, or when lightning strikes. A fire is considered both an accident and a natural disaster. Damaging winds may cause damage the company as well as your security system. These natural disasters may also cause harm or damage to the company, injury or death. My surveillance system is equipped for video surveillance and it has motion sensors. These are important when securing a company. With this quality in a surveillance system, I’m able to secure both inner and outer perimeter. Also to help combat the threat of my surveillance system, I will have security personnel on 24/7. My security personnel will work on weekends, business hours, and holidays to secure the company. They will also make inner and outer perimeter checks routinely. Also to combat the surveillance of my security system, my personnel will make routine check of the system. With my security system of the Middle East and Africa, the security personnel will not be allowed to surf the web. If they are caught doing it they will be reprimand, fired, or both. This will keep other internet surfers from hacking into the security system. It will also keep other website users from opening up the company desktop and keep the security system from network infections. The personnel will not be able to share any information with other co-workers or any personnel of the company. Another threat to a security to a security system in the Middle East and Africa is human threat. By human threat I mean internal employees, contract employees, and visitors to the facility. Employees can get hired who may get mad with the owner. Thinking that by selling products or important information about the company they make more money, even get back at the owner. There are also risk of accidents on the job. Human threats can happen with trained and untrained staff members. It may be either intentional or non-intentional. Accidents may cause a great deal of damage and cost to the employer of a company. They can also cost the security system a lot of money. Humans also may cause the threat of bombing a company. Other security companies a threat by under biding you for security of the company. They may offer equipment or security that you don’t have. Sometimes this is helpful to the company and sometimes it is not. No person or persons will have access to the company pass the lobby of the B uilding without an appropriate employees or visitor badge. The badges will be color coded, depending on the level of clearance granted to them. The visitors will require an escort unless they are approved or cleared through security ahead of time. The badges will be programmed to only allow access to those with proper clearance for restricted areas. The employees of my security system will be subject to random searches, drug screenings, and a thorough background investigation check before and after employment. Personnel who bring electronic devices into the facility without prior approval from the security manager will not be allowed. Security personnel will be prohibited from bringing any cell phones, tablets, cameras, flash drives, or any electronic devices that may hurt my security system. I will also monitor my employee’s internet access to combat any type of cyber-attacks. When it comes to my security system I will make sure that only the security manager and the security supervisor will have access to security information. This security information will be kept in a safe place. Only the security manage and the security supervisor will be given the combination to the safe. By understanding what kind of threats your security system may face in Africa or Middle East, I can find ways to better stop this from happening. I may even be able to eliminate others from counteracting them. The company will also implement an employee health and wellness programs. My security system will always keep up with latest antivirus software and will monitor for internal and external cyber- attacks.

Thursday, November 7, 2019

Slaves actively resisted slavery essays

Slaves actively resisted slavery essays My closing statement supporting that slaves actively resisted slavery Members of the jury it is now time for you to decide whether slaves were active or passive during slavery. Slaves lived in a time where the brutal and inhumane treatment of fellow human beings should not have been tolerated, nor allowed. The slaves had reacted in many ways to try and escape this type of treatment. Post presenting my evidence, it will clearly show that slaves actively resisted slavery such as running away, forming rebellions, making coded songs and even killing their own children. We have read a lot of exhibits on slavery from both sides. We have read together how badly their masters or overseers as they were sometimes called, treated the slaves. But not one tells of a slave being happy and approving of their treatment. In exhibit #3 The Universal Law of Slavery by George Fitzhugh states ...the Negro race is inferior to the white race, and living in their midst, they would be far outstripped or outwitted in the chaos of free competition. Yet on the other hand in exhibit #1 Follow the Drinking Gourd a code song the slaves came up with and used to make their way to freedom, gives them directions, times, and meeting places for their escape North. Such as the line Follow the drinking gourd, told them to follow the Big Dipper that pointed to the North Star. These exhibits show that the universal law of slavery was wrong because while it states that slaves werent smart enough to live among free people it didnt take into account the fact that slaves were tricking pe ople all the time with their coded songs. Perhaps the masters and/or overseers should have given the slaves much more credit for the wit they possessed. In exhibit #6 A Slave Experience of Being Sold South by Jacob Stroyer describes how slaves reacted when their family and friends were sold. He says slave...

Monday, November 4, 2019

Ethics and Business Research Paper Example | Topics and Well Written Essays - 2000 words

Ethics and Business - Research Paper Example In short, ethical principle differs in different societies. Under such circumstances, it is difficult for a society filled with Muslims and Christians to standardise ethical principles. Business is one area in which ethical principles have relevance. The ultimate objective of many of the business organizations in this world is to make as much as profits possible using all the available means. Such greedy business organizations sacrifice ethical principles in business to generate profits. However, it is difficult for such organizations to survive in the business world in the long run. This is because of the fact that current consumers are valuing and respecting the reputation of the organization more while they take any purchasing decisions. Modern consumers respect organizations which demonstrate their social responsibility. In order to sustain business in the current heavily competitive business world, it is necessary for the organizations to give something back to the community in which they operate. Crane &Matten (2007) pointed out that â€Å"There appears to be good reason to suggest business ethics as a phenomenon, as a subject, but not as an oxymoron† (Crane &Matten, 2007, p.5). Business and ethics are not all contrasting each other. In other words, it is possible to do business in an ethical manner. Business ethics is important in decision making, personal integrity, social responsibility, law etc. This paper analyses the importance of ethics in business. Business Ethics as Ethical Decision Making   One of the fundamental handicaps of business is its misguided tendency to view ethics and business as if they can be treated as separate or separate-able. Business cannot and should not be disentangled from ethics and viewed in isolation any more than operations or marketing can or should be considered without regard for the products or services being inventoried or sold. The economics should not be paramount to ethics in business; if anything, ethic s should be paramount to economics (Elm & Radin, 2012, p.314). Business is part of human life and hence it cannot be viewed in isolation with our social life. In other words, whatever, the ethical principles one may follow in his personal life, should be followed in his professional or business life also. So, whatever the decisions taken in business should be in line with the ethical principles. A business person cannot follow one policy in his personal life and another policy in his business life. It should be noted that most of the parameters we come across in business may come across in our personal life also. Therefore whatever the ethics and morals we follow in our personal life should be followed in business life also. Manpower is one of the major resources needed for business. Unlike machines, man has emotions and feelings. So, a business person cannot treat manpower and machine power in the same manner. He should treat manpower separately and machine power separately. He can not ask an employee to work continuously just like a machine. Same way, in an organization, different employees may have different capabilities. It is difficult for a business person to ask all his employees to demonstrate a particular level of efficiency. In other words, a business person should take decisions based on the circumstances and humanitarian considerations. In short business decisions should be taken based on moral reasoning. â€Å"

Saturday, November 2, 2019

The System of Care for Individuals With a Stroke Research Paper

The System of Care for Individuals With a Stroke - Research Paper Example The research design selected by the researchers is appropriate to answer the research question because they collected first-hand information from the patients when they visit the clinic; hence, not relying on the distorted information.The target population has been specified to include 213 patients from different races and walks of life or people who have different social, cultural and economic background. The eligibility criteria have not been clearly stipulated, but the study indicates that the sample taken is representative of the people who visit the clinic and is suffering from a stroke (Moorley et al. 2014). The type of sampling type that was used in the study was absence/presence sampling plan. The key attributes of the sample are that all the patients suffer from stroke. Secondly, the patients use the similar hospital for treatments.The data in this research was gathered using a survey research where a study of 213 people was conducted on their recovery process of stroke, esp ecially depending on different races (Torbey & Selim, 2013).The authors concluded that Demographic profiling indicated the prevalence of stroke. Additionally, the researchers recommended that attendance figures reflected that people who are at-risk are those in the inner city and the findings from the research can be applied to the similar inner-city populations. The author’s implication for the practice is that people who suffer from stroke do not get the nursing care they deserve because people lack the understanding of the effects of the disease on the individuals social and psychological effects.3. In case a program was introduced to help patients suffering from stroke would the families accept to take their sick family members to such institution without feeling as if they were being neglected?

Thursday, October 31, 2019

Adapting to Workplace Changes in Professionalism Essay - 1

Adapting to Workplace Changes in Professionalism - Essay Example 432). This is because the meaning of culture is said to represent different ethnic, tribal and racial groups leaving the part that addresses how the unique norms, values and beliefs influence the usage of the law or the attributes of the lawyers and the unique traits they share in law practice (Bracey, 2006). In 1975, Lawrence Friedman devised ‘legal culture’ as a concept that emphasized the notion that law is more implicit when described as a product of social forces, a system and a conduct of the same social forces. Friedman moves from the common notion that focuses on law as a set of rules and norms which can either be written or unwritten about the rights and duties of people as well as prescribing the right or wrong behavior, to advocate for a model or a ‘system’ which has a set of processes inputs and structures that send outputs to the environment. The legal culture is based on three components which are; the legal and social forces, the ‘law’ itself such as the rules and the structure, and the effects the law has on the outside world. As such, the legal culture essentially covers the social study of law (Rosen, 2006). The unique attributes shared by the legal practitioners across the globe can be traced to the traditional study of law. Initially, the social scientific study of law was mostly marginalized in universities in America in departments such as social science and law schools. However, the notion of legal culture was introduced by working with a tradition that had little connection to the American universities but some lawyers and jurists from parts of Europe such as Germany. For instance, a German jurist described the practice of law as a manifestation of the ‘spirit of the people’ and described it as an evolving culture. Though describing it from a pragmatic and rather romantic perspective, an American jurist known as Oliver Wendell Holmes also described law as a culture by referring to it as an anthropologic document

Tuesday, October 29, 2019

MANAGING THE HUMAN RESOURCE Case Study Example | Topics and Well Written Essays - 4000 words

MANAGING THE HUMAN RESOURCE - Case Study Example However, entrepreneurial skills vary according the core nature of individual entrepreneurs. For example, Nelson Mandela and Bill Gates have different entrepreneurial skills as former more focuses on social entrepreneurial skills and later have entrepreneurial skills in terms for business and innovation business perspective. Many scholars and critics have presented their views and understating in explaining rationale behind the entrepreneurial skills among the people and at the same time, they have also categorized them in their core orientations. John B. Miner has identified four types of entrepreneurs i.e. â€Å"The Personal Achiever†, â€Å"The Supersalesperson†, â€Å"The Real Managers† and â€Å"The Expert Idea Generator† (Miner, 1996, p.4). On the other hand there are other groups of scholars who have their own perspectives in this regard. As per them, some of other types of entrepreneurs are like social entrepreneurs, lifestyle entrepreneurs, wealth creation entrepreneurs etc. However, there are certain common traits which are present in all types of entrepreneurs and these traits are responsible for shaping their entrepreneurial skills. ... The project describes the management styles used by Murdoch in running his corporations. An analysis has also been provided with regard to the leadership styles followed by him to exercise control over his employees. Rupert Murdoch has been responsible for growing the giant mammoth of the media company, News Corporation from a very small; newspaper in Australia. It became one of the largest and the most influential media groups of the world. Murdoch has been able to gain immense power with the rapid expansion of the global media company. His company includes television, cable network programming, filmed entertainment, book publishing, direct broadcasting, magazines and even newspapers in Australia, United States, UK and Europe. Question 1 Entrepreneurial style of Murdoch and its impact on business Corporate entrepreneurship has lately evoked significant interest among the management practitioners and the academicians in the world. It is referred to as entrepreneurship in the establis hed organisations and firms. It includes the set of activities characterized by proactiveness, risk taking and innovation which manifests themselves as acquisitions and mergers, licensing, franchising, research and development, contacting and divestment among other. Explorations of the theme of entrepreneurships have relevance in this regard as it seeks to identify how organisations are able to attain sustainable growth through this entrepreneurship. Analysis of the above issues provides an advantage for the other organisations for charting out a path (Jauhari, 2004, p.1). The project aims to put forward the conceptual framework of entrepreneurship of

Sunday, October 27, 2019

Developing Expected Forwarded Counter (EFW)

Developing Expected Forwarded Counter (EFW) Abstract Wireless mesh networks have emerged as adaptable and low cost networks. Expected forwarded Counter (EFW) is a cross layer metric introduced to deal with the problem of selfish behaviour in order to provide reliable routing. This paper proposes an enhancement to the EFW, by considering congestion incurred due to selecting only high quality paths. The performance of proposed metric is evaluated through simulation. Simulation results show that overall routing performance is increased in terms of throughput and packet delivery ratio. Introduction Wireless Mesh Network (WMN) is a promising technology for the next generation wireless technologies. The Mesh Networks are self-organized, self-configured and easily adaptable to different traffic requirements and network changes. Routing is a challenge in Wireless Mesh Network (WMN) due to unpredictable variations of the wireless environment. Initially, to select a path with highest delivery rate in wireless mesh network, metrics that capture link quality have been introduced. But, most of these metrics are designed by assuming that each wireless mesh router participates honestly in forwarding process. While this assumption may not be valid in presence of selfish routers which may get profit from not forwarding all traffic. Selfish users utilize the network resources for its own benefit but unwilling to spend for others. Such selfish behavior reduces network delivery reliability. Metrics have been introduced to detect and exclude selfish nodes in a route to destination. These metrics do not consider quality of links, hence cannot select best path from source to destination. Cross layer metrics were used to consider both link quality and selfish behaviour of node [2] in order to select a high performance path. This kind of solutions may cause only high quality to get used and other links will get unused. This will make links to be congested seriously and in turn cause performance degradation. In this paper we propose metric that combines link quality and congestion information from MAC layer and forward reliability of node from routing layer. The rest of this paper is structured as follows. Section II discusses related work. Section III illustrates proposed work. Section IV presents results obtained through simulating proposed metric in comparison with ETX and EFW. Related work: Several works presented in the recent research literature focus on reliable data transmission in wireless multi hop networks with selfish participants. In recent years, several routing metrics have been proposed to select the path with the highest delivery rate in wireless mesh networks. The essence of all these metrics lies in the selection of reliable network paths, avoiding lossy wireless links prone to transmission errors. Some of these are discussed below. ETX (Expected Transmission Counter): Routing metrics for wireless mesh networks like ETX adopt a probabilistic model to represent the transmission reliability of a wireless link. Specifically, ETX measures the expected number of transmissions, including retransmissions, needed to correctly send a unicast packet over a wireless link. In order to compute ETX, it is necessary to estimate the packet loss probability in both directions since, in wireless networks based on the IEEE 802.11 protocol, the destination must acknowledge each received data frame Let (i, j)be a wireless link established between node i and j;Pij and pji denote the packet loss probability of the wireless link(i, j) in forward and reverse directions separately. The probability of a successful transmission on the wireless link(i, j)can therefore be computed as Ps,ij= (1−pij)(1−pji). Then, the expected number of transmissions necessary to deliver the data packet, considering both its transmission and the successive acknowledgment as required by the IEEE 802.11 protocol, can be evaluated according to expression Despite the purpose of selecting the most reliable paths, ETX does not model accurately the delivery rate of a network link, since it does not consider the forwarding behavior of the nodes that have established that link. In particular, ETX and its derived metrics do not take into account that a selfish node might discard the packet after its correct reception, if it benefits from not forwarding it EFW: To address the problem caused by the dropping behaviour of selfish participants, we combine the link quality measured by the ETX routing metric with the forwarding reliability of a relaying node j by improving the probabilistic model on which ETX is based. Let pd,ij be the dropping probability of a network node j((1−pd,ij)represents its forwarding probability). Since a network node can drop selectively the traffic sent by its neighbours, the dropping probability of any node j is identified both by the sending node i and the relaying node j. The probability that a packet sent through a node j will be successfully forwarded can be computed as pfwd,ij=ps,ij(1−pd,ij).Then, the expected number of transmissions necessary to have the packet successfully forwarded (Expected Forwarding Counter, EFW) can be measured according to the following equation. The first part of equation, which coincides with the ETX metric, considers the quality of the physical and MAC layers, whereas our contribution takes into account the network layer reliability. Therefore, EFW represents a cross-layer metric that models both the physical conditions of the wireless medium and the selfishness of the node with which the link is established. In addition to detecting the misbehaving nodes, the representation of the link reliability provided by the EFW metric permits to use the network paths with the highest delivery performance, without pruning the alternative routes that contain selfish nodes. Proposed work: The disadvantages of this solution are that nodes wanting to transmit packets will attempt to use the same high quality link and cause it congested seriously. And at the same time other links will get unused. MAC layer metric: Our proposed metric is based on the retransmission mechanism in MAC. The first part of this method is the success rate of transmitting frames based on the average number of retransmissions which we call Frame Transmission Efficiency (FTE) [13]. Fig. 1: Illustration of the retransmission mechanism at the MAC Layer The number of retransmissions of RTS and Data frames for each Successful transmission in MAC layer is supposed to represent the quality of that link and congestion instance. The success rate of sending frames is therefore a good estimate of both the quality and congestion of a link. From it the best quality links may be selected. The success rate of each link (FTE) is updated when a node forwards a Data packet to its neighbour and passes it up to the routing protocol. ACK Failure Count denotes the number of Data retransmission and RTS Failure Count denotes the number of RTS retransmission. The kth packet will send from Node S to Node D. The number of retransmission is assumed as Failure (k) and denotes below: Failure (k) = ACK Failure Count (k) + RTS Failure Count (k) (j) Thus FTE (k) between Node S and Node D is formulized as equation (4). It reflects the link quality and congestion situation of links. FTE (k) = We are using this frame transmission efficiency to represent link quality and congestion. It is MAC layer information. From routing layer we consider forward probability estimation. In cross layer fashion we combine information from both MAC and Routing layer to obtain congestion aware EFW. It is computed as follows Enhanced EFW or congestion aware EFW= Simulation Simulation scenario We performed simulations with NCTUns6.0 simulator that evaluates performance of the metric in comparison with EFW using OSPF (Open Shortest Path First) routing protocol. Performance Evaluation: To evaluate the performance of proposed metric in comparison with existing metrics ETX and EFW, the following variables are analysed Throughput Packet Delivery Rate Drop Rate From fig1. We can observe that the proposed metric has more throughput than the other routing metrics in wireless mesh networks. By this we can understand that the proposed metric selects better path in presence of selfish nodes in comparison with other metrics. From fig2. It seems that congestion aware EFW has more packet delivery rate when compared with other metrics. Conclusion: In this paper we introduced an enhancement to existing cross layer metric called Expected forward counter (EFW). In this metric we replaced link quality metric obtained from ETX metric with Frame Transfer Efficiency (FTE) metric which considers not only link quality but also congestion of link. As the proposed metric in cross layer fashion combines MAC layer observations of link quality and congestion with routing layer observations of forward probability estimation, it gives better performance in comparison with ETX and EFW metrics. Simulations results show that routing performance of OSPF in terms of throughput, packet delivery rate and drop rate has been improved in proposed metric. References: S. Paris, C. Nita-Rotaru, F.Martignon, and A. Capone, †Cross-Layer Metrics for Reliable Routing in Wireless Mesh Networks â€Å", in proc. IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 21, NO. 3, JUNE 2013. N. Nandiraju, D. Nandiraju, L. Santhanam, B. He, J. Wang, and D.P. Agrawal, â€Å"Wireless mesh networks: Current challenges and future directions of web-in-the-sky,† IEEE Wireless Commun., vol. 14, no. 4, pp. 79–89, Aug. 2007. S. Paris, C. Nita-Rotaru, F.Martignon, and A. Capone, â€Å"EFW: A cross layer metric for reliable routing in wireless mesh networks with selfish participants,† in Proc. IEEE INFOCOM, Apr. 2011, pp. 576–580 D.S.J De Couto, D. Aguayo, J. Bicket, and R. Morris. A High-Throughput Path Metric for Multi-Hop Wireless Routing. Wireless Networks, 2005. D. Johnson and G. Hancke, â€Å"Comparison of two routing metrics in OLSR on grid based mesh network,† Ad Hoc Netw., vol. 7, no. 2,pp. 374–387, 2009. Da Guo, Jun Li, Mei Song, Junde Song,â€Å"A Novel Cross-Layer Routing Algorithm in Wireless Mesh Network† in the proc. of IEEE International Conference 2007,pp 1-3,vol-07. Golnaz Karbaschi, A Link-Quality and Congestion aware Cross layer Metric for Multi-Hop Wireless Routing.2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems Washington, DC USA November 2005. M.E.M.Campista, P. M. Esposito, I.M.Moraes,L.H. M. Costa,O. C.M. Duarte, D. G. Passos, C. V. N. de Albuquerque, D. C.M. Saade, and M. G. Rubinstein, â€Å"Routing metrics and protocols for wireless mesh networks,† IEEE Netw., vol. 22, no. 1, pp. 6–12, Jan.–Feb. 2008. OSPF