Monday, September 30, 2019

Final research HND Business Essay

By The Name Allah the Most Merciful and Almighty Executive Summary Of Research on Basant or Spring Festival Event for the research was decided as â€Å"Basant or Spring Festival Lahore†. Basant was started 1300-1400 hundred century. But in near past the event was become controversial. Some religious activist called it Hinduism while some people in taking lead in kite-flying start taking lives of people and this activity was banned. Its was business event too and contributing national income. Was a beneficial for hotel and food industry etc. Our research was too found out the reasons for banning it. The beneficiaries of the festival and out put from the event and Myths regarding the events as well as give some recommendation. For the purpose a detailed proposal were made and presented to supervisor after approval of the proposal. Work was started on research. Literature was reviewed for facts finding. A questionnaire were made and distributed in 500 people and collected, interviews were conducted from different stake holders and other techniques of data collection were applied. Data were organized and presented in percentage and graphically. Analysis was made. The research findings were that basant or spring festival is better business activity accepted people of the country and encouraged by the business community. Basant has nothing with religion. It is celebrated with seasonal change. Some religious groups are against it because of the immoral & un-ethical musical and dance shows during the festival. Some people use alcohol in public places and commit crime these should be stopped. Kite-flying with harmful wires should be banned as it takes lives as well as damages electricity lines etc. The events mainly benefits hotel, food, garments, transport, music, traitor industry and overall positively affect the market of Lahore. Government can provide better law & order situation too public and Lahore is feasible in security prospective for spring festival. Literature Review Of Basant or Spring Festival Basant is centuries old cultural festival of Punjab. It was started in 1300-1400 century. But in near past got controversial as the some religious groups called it sign of Hinduism and show zero tolerance over it. According to Dr. B. S. Nijjar’s book, â€Å"Punjab under the Later Mughals†. According to him, when Zakariya Khan (1707-1759) was the governor of Punjab, a Hindu of Sialkot, by the name of Hakeekat Rai Bakhmal Puri spoke words of disrespect for the Prophet Muhammad (saw) and his daughter Fatima (ra). He was arrested and sent to Lahore to await trial. The non-Muslim population was stirred to request Zakariya Khan to lift the death sentence given to Hakeekat Rai but he did not accede to their request. Eventually the death penalty was carried out and the entire non-Muslim population went into mourning. As a tribute to his memory, a prosperous Hindu, Kalu Ram initiated the Basant ‘mela’ in (Marrhi) Kot Khwaja Saeed (Khoje Shahi) in Lahore. (This place is now known as Baway di marrhi. ) It is the last stop on the route of Wagon no. 60 from Bhati Gate. Dr. B. S. Nijjar states on Page no. 279 of his book that the Basant ‘mela’ is celebrated in memory of Hakeekat Rai. Another myth about Basant is â€Å"It is said that Nizamuddin Auliya had no children. He had adopted his nephew who died at the age of 20. Amir Khusro tried to cheer the bereaved Nizamuddin, but in vain. One day while Amir Khusro was walking in the fields, he saw some young women dressed in yellow clothes and celebrating Basant. Khusro donned a yellow ghagra ad covered himself with a chunni and sang the qawwali — Sakal basant aayo ri. Seeing he dressed in yellow clothes, Nizamuddin became cheerful. † But majority of the society consider all the as myth and has opinion that It is a seasonal festival of indo-Pak and has no religious aspects. It is celebrated at spring on starting of winter on fourth or fifth day of lunar month (Magh). Yellow is mainly used for basant as its is narrated for wheat row and mustard blossoms in the seasons. Yellow color is considered as the color of Spring. Yellow outfits are worn in these days mostly. In pre-partition India Hindus, Muslims and Sikhs all celebrated Basant. Basant festivals held in all major cities of Punjab. Yellow clothes were worn; men wore yellow turbans and women yellow dupattas and saris. It was common to sway swings among Hindu, Muslim and Sikh women together and Basant’s traditional songs were sung that reflected the liveliness and romance of life in Punjab. Kite flying was common but on a small scale with decency. Kite flying is also part of the festival. Most of kite flyers are illiterate and labor class. They mostly use unethical ways for winning kites competition which leads to deaths of valuable lives. This factor decrease the color of this great festival from last 50 Years and the slogan is shouting Celebrate Basant- but don’t snatch away lives. Gallup Pakistan Survey: Basant as Business activity Basant is high appreciated business activity as people from the whole country rush towards Lahore and hotel industry , food industry , music and other tourism industry boost up with the festival. It is highly encouraged by business community of Lahore. According to a survey 11% of the whole year business is three days of basant in Hotel and Food industry. Same effects brought on other industries. Research Back Ground In our country every business activity is banned due to some accident or religious pressure groups same controversy is with spring or Basant festival. I want to find out the financial benefits from this type of festival and the aim of pressure groups. As part of the academic requirement, in the Higher National Diploma program in IPS, Peshawar; for completing diploma of Business Studies the students are required to write a eport for each one of their core units, this one being Research Project. This subject gives us an opportunity to learn how we can write a detailed research report in a given word limit on a business organization. Our choice of Topic will be Basant Festival or Spring Festival Lahore. In the research we will address the questions 1. Effects of Spring Festival on Business Community of Lahore. 2. Finding financial beneficiary of Spring Festival Lahore. 3. Finding good and bad of Basant or Spring Festival. 4. Are Basant Festival suits our Law and Order situation? 5. Why our Religious activists are against the Festival? 6. How much basant Festival contributing to which industry and National Income. Data Collection Primary Data: For the purpose of collection of primary Data, Spring Festival was observed. Interviews were arranged with different community members and life class as well as with Business community of Lahore. Hotel Managers, Restaurant owners, Visitors were also interviewed. For the same purpose a Questionnaire were also made and distributed in different groups of community as well as to religious groups. Collect back and analyzed. Secondary Data: Secondary data collection were made trough news paper , magazine and mainly from internet sources , where we found that government banned kite flying not the Festival while Religious groups pretending it as Hinduism but Business community appreciate it. Research Methodology We have used different methodologies for our report taught in the course book. During This report, we used both the primary as well as the secondary data. Major sources are primary data and some of it is secondary date sources. Most of information will be through personal observations and interviews. Other information was gathered through mystery shopping during the visit to the different Areas of Lahore During Spring Festival. Additional will be through questionnaires and surveys, brochures studies, telephonic interviews, newspaper, magazines and Internet sites search.. The major aim of this report was to study the about Festival as Business activity. Research techniques and Results Observation: A visit were made to Lahore during Basant Festival and observed the event 3 days. It was noticed that people of the country and business community Lahore really encourage the festival. But some citizen has the view that kite-flying should be minus from the festival as it take many lives every year and damage government property as people use harmful wires for kite-flying. Some religious groups are against it and want to ban dance parties and music shows in the festival. But large number of people supports it. Interviews: Interviews from different from different groups of community were made including government officials. Hotel Industry stakeholders, Food Industry Stake Holders, visitors and Religious groups. Interview questions were mainly same as questionnaire and including some general discussion. 50 people were taken interview including students, business man, government officials, religious activists and other community members. The questions ; result of the interview was as below. Results and Graphical Representation of Interviews: Q. 1: Are You in the favor of Basant or Spring Festival in Pakistan? Result: YES was the answer of 80% people and NO was the answer of 20% people. Graphical Representation: Q. 2: Basant Festival has any relation with religion? Result: Yes was the answer of 20% people and No was the answer of 70% while 10% people said that they don’t know about the Issue. Graphical Representation: Q. 3: Basant Festival Effects on Business Community of Lahore. Result: NAGATIVE was the answer of 8% while POSITIVE was the answer of 92%. Graphical Representation: Q. 4: Is Basant Festival suits our Law and Order situation in Lahore? Result: YES was the answer of 60% people and NO was the answer of 30% while 10% people said that they don’t know. Graphical Representation: Q. 5: Basant Festival Favor National Income? Result: 87% People answered as YES and 11% as NO while 2% has no comments. Graphical Representation:. Positives of Basant are more heavy than negative? Result: YES was the Answer of 78% People while NO was the answer 22% People during interviews. Graphical Representation: Q. 7: Kite Flying Should is banned? Result: YES was the answer of 67% People while NO was the answer of 20% and 13% People has no comments on the question. Graphical Representation: Q. 8: Basant Festival Should is kept Banned? Result: YES was the answer of 20% while 80% was NO. Graphical Representation: Questionnaire: Questionnaire was used to for distance stake holders. They people who were not easily reachable. Result of Question Number 7: YES: 66% NO: 34% Graphical Representation: Result of Question Number 8: YES : 20% NO : 80% Graphical Representation: Internet Search: Internet Search was used as Secondary data findings. We found some writings on Basant and Spring Festival and analyzed accordingly. These writings has two stories about basant one supporting the festival as cultural festival and No relation with Hinduism while the other showing it has extreme hindu festival and against the religious values of Muslims. While most of writings shows it a healthy financial activity with some bad strings attached with it as it make many damages to human lives , electricity lines etc in regard of kite-flying and moral ; ethical values in Music and Dance parties. Findings Basant or Spring Festival is acceptable to majority with some changes. Law and Order situation is better in Lahore for Festival. Kite-Flying Should is kept banned. Religious groups are extreme against it and called it Hinduism. Government is ready to allow it in business aspect. Moral ; Ethical Values should follow. Hotel and Food industry mainly is the beneficiary of the festival. Youngsters are the main supporters of the festival. Most of supporters are Muslim. It is given out put financial growth of the country. It’s an organized festival after Eid. Analysis After that data was organized and analyzed with different techniques of Data Analysis. Mainly the pie chart and Bar Chart method were used for Data Analysis. And result was produced for implementation. All the data formats and findings Shows that all stakeholders are in the favor of Basant or spring festival in Lahore as healthy business activity with some changes is the format of Festival. Mainly Hotel and food industry is beneficiary of the festival while Music, film and traitor industry also earning good from this festival. Garments and Fashion is industry is the indirect beneficiary of the event. Transporters, SME’s and general labor and working also get good benefits from the festival. Conclusion ; Recommendations Basant or Spring Festival is healthy Business activity. Government should allow the Basant or Spring Festival as per demand of Business community and higher percentage of public. Kite-Flying should ban or allowed outside of walled city. Better security should be provided. Religious groups should convince and their guanine demands should be fulfilled. Harmful wire should completely ban from manufacturing. Un-ethical and Immoral acts should be discouraged. People from other parts of the country should be properly entertained to encourage the business. Proper promotion and Public Awareness campaign should be initiated to guide the people from stopping bad of Basant. Spring Festival and other Festival should be celebrated as it warm up different businesses.

Sunday, September 29, 2019

Managing Human Resources in H&SC Essay

Rules and regulations: Plagiarism is presenting somebody else’s work as your own. It includes: copying information directly from the Web or books without referencing the material; submitting joint coursework as an individual effort; copying another student’s coursework; stealing coursework from another student and submitting it as your own work. Suspected plagiarism will be investigated and if found to have occurred will be dealt with according to the procedures set down by the College. Please see your student handbook for further details of what is / isn’t plagiarism. Coursework Regulations 1 You are required to submit your coursework on-line through online e-learning system http://stponline.org.uk. Detailed information about this  is available in the student handbook submission 2 Details of submission procedures and penalty fees can be obtained from Academic Administration or the general student handbook. 3 Late coursework will be accepted by Academic Admin Office and marked according to the guidelines given in your Student Handbook for this year. 4 If you need an extension (even for one day) for a valid reason, you must request one, using a coursework extension request form available from the Academic Admin Office. Do not ask the lecturers responsible for the course – they are not authorised to award an extension. The completed form must be accompanied by evidence such as a medical certificate in the event of you being sick. 5 General guidelines for submission of coursework: a All work must be word-processed and must be of â€Å"good† standard. b Document margins shall not be more than 2.5cm or less than 1.5cm c Font size in the range of 11 to 14 points distributed to including headings and body text. Preferred typeface to be of a common standard such as Arial or Times New Roman for the main text. d Any computer files generated such as program code (software), graphic files that form part of the course work must be submitted either online with the documentation. e The copy of the course work submitted may not be returned to you after marking and you are advised to have your personal copy for your reference. f All work completed, including any software constructed may not be used for any purpose other than the purpose of intended study without prior written permission from St Patrick’s International College. Outcomes and assessment requirements Outcomes Assessment criteria for pass To achieve each outcome a learner must demonstrate the ability to: LO1 Understand processes for recruiting individuals to work in health and social care 1.1 Explain the factors to be considered when planning the recruitment of individuals to work in health and social care 1.2 Explain how relevant legislative and policy frameworks of the home country influence the selection, recruitment and employment of individuals 1.3 Evaluate different approaches that may be used to ensure the selection of the best individuals for work in health and social care LO2 Understand strategies for building effective teams for working in health and social care 2.1 Explain theories of how individuals interact in groups in relation to the types of teams that work in health and social care 2.2 Evaluate approaches that may be used to develop effective team working in health and social care LO3 Understand systems for monitoring and promoting the development of individuals working in health and social care 3.1 Explain ways in which the performance of individuals working in health and social care can be monitored 3.2 Assess how individual training and development needs can be identified 3.3 Analyse different strategies for promoting the continuing development of individuals in the health and social care workplace LO4 Understand approaches for managing people working in health and social care. 4.1 Explain theories of leadership that apply to the health and social care workplace 4.2 Analyse how working relationships may be managed 4.3 Evaluate how own development has been influenced by management approaches encountered in own experience. Case Scenario – St – Patrick’s Nursing Home You have recently been appointed as a trainee Human Resources Officer at  St-Patrick’s Nursing Home located in central London. During the first formal meeting with the Board of Directors you were told about the recent expansion of the nursing home by your HR Director. You were also informed about the various problems that St Patrick’s Nursing Home have been experiencing, such as the high rate of employee turnover(caused by low pay, poor working conditions, long hours, not enough benefits or a negative atmosphere from management, fixed/inflexible contracts; inadequate salaries; recruitment based on favoritismetc.). Alsocomplaints from residents and families about the quality of care, and staff errors due toInsufficient knowledge or application of clinical-care standards and protocols; lack ofguidelines; inadequate supervisionthat compromised the safety and efficiency of care. The HR Director is under pressure to increase staff retention in order to reduce future traini ng and recruitment costs. She believes that the current recruitment and selection policies of St-Patrick’s Nursing Home are partly responsible for the turnover problem. The HR Director also suggested that care workers’ performance, satisfaction and commitment to the organisation depend on collaborative team-working. She mentioned that staff members were often blamed for not communicating important messages to one another whilst on shift, not handing over effectively at the end of their shift, and coming to work â€Å"just to do their shift and go home†. As part of your job, you are required to ensure that the recruitment planning and selection approaches are used effectively and that the relevant legislative and policy framework of the home country are implemented during this process; andprepare a comprehensive and appropriate Performance Evaluation Plan for all of the employees working in your organisation; also you should to make some recommendations on the types of training nursing staff will require considering their current level of competence and future development requirements. At the end of the training, the employees will acquire the knowledge and skills to enable them apply the core standards set by the Care Quality Commission. You have been asked by your boss to arrange a training session for the care staff in order to enlighten them about the techniques and leadership skills that you have used and applied over the period of time in managing and leading people at the workplace, and which they can apply to their roles. You r training session also needs to educate them about the relevance and application of different  leadership theories in leading people and managing relationships with peers and subordinates. Finally, make them aware how you have been continuously updating your knowledge and developing yourself throughout, and what the benefits of ‘investing in yourself’ were. A grand party would be organizedby your HR director praising all your hard work and achievements you would have accomplished in a short span of time working at St-Patrick’s Nursing Home. More information can be accessed from the following websites: www.CQC.org.uk., www.legislation.gov.uk, www.acas.org.uk, www.cipd.co.uk Assignment: Based on the scenario above you are required to complete an ESSAY of 3,000 words (this is an indicative word limit).You should refer to the assessment criteria and the relevant unit content, when preparing your evidence of assessment. The essay is formed of the following four sections below which relate to the learning outcomes. Learning Outcome 1 (1.1, 1.2, 1.3) 1.1 Explain the factors that need to be considered when planning the recruitment of individuals to work at St-Patrick’s Nursing Home. (M1) 1.2 Explain how relevant legislative and policy frameworks of the home country influence the selection, recruitment and employment of individuals to work in St-Patrick’s Nursing Home(M1 and D1) 1.3 Evaluate the different approaches that may be used to ensure the selection of the best individuals, and make recommendations for St-Patrick’s Nursing Home (M1 and D1) Learning Outcome 2 (2.1, 2.2) 2.1 Explain the theories of how individuals interact in groups in relation to the types of teams that work in health and social care (M2 and D2) 2.2 Evaluate the approaches that may be used by staff at different levels to develop and promote effective team working at St-Patrick’s Nursing Home (M2 and D2) Learning Outcome 3 (3.1, 3.2, 3.3,) 3.1 Explain the ways in which the performance of individuals working in health and social care can be appraised(M3 and D3) 3.2 Assess of how individual training and development needs can be identified at St-Patrick’s Nursing Home (M3 and D3) 3.3 Analyse the different strategies for promoting the continuing development of individuals in the health and social care workplace (M3 and D3) Learning Outcome 4 (4.1, 4.2, 4.3,) 4.1 Explain theories of leadership that apply to the health and social care workplace (M2 and D2) 4.2 Analyse how working relationships may be managed at St-Patrick’s Nursing Home (M3) 4.3Evaluate how your own development has been influenced by management approaches that you encountered in your own experience (M3 and D3) Formative Submission How and why will formative assessment take place? Formative assessment will take place to advise you on your progress within the term (during 4th and 8th week) and the ways in which you could improve before the final (summative) submission. The feedback is for your benefit and is not part of your final grade for the unit. Formative feedback may however not be as detailed as the final feedback you receive, and may be in verbal and/or written form (at the teacher’s discretion). You will be asked to submit your work for formative feedbackin electronic form to your teacher or as hard copy, to which you will receive verbal and/or written feedback. Final (Summative) Submission You need to submit all of the documents relating to your final assignment covering all learning outcomes i.e. LO1, LO2, LO3 and LO4 via stponline.co.uk on or before 12TH April 2014 latest by 23:55. Merit Descriptors Indicative characteristics Contextualised Indicative characteristics (All the characteristics need to be achieved) M1 Identify and apply strategies to find appropriate solutions Complex problems with more than one variable have beenexplored. Has demonstrated an understanding of therelevant legislation and policies framework of the home country andknowledge of the different approachesthat may be used to ensure the selection of the best individuals to work in health and social careLO 1.1 1.2,1.3 M2 Select/design and apply appropriate methods/techniques The application of relevant theories, techniques and methods, and also justifying all sources of information. Has shown the understanding of the Leadership and team theories and applied them by developing the effective team and workingrelations.LO2.1,2.2,LO4.1 M3 Present and communicate appropriate findings The appropriate structure and approach has been used Has identified the appropriate method of performance appraisal and evaluated the correct staff training and development needsLO3.1, 3.2 Distinction Descriptors Indicative characteristics Contextualised Indicative characteristics (All the characteristics need to be achieved) D1 Use critical reflection to evaluate own work and justify valid conclusions Conclusions have been arrived at through synthesis of ideas and have been justified Has critically evaluated their work and drawn conclusions with justification on how the conclusions were arrived at in relation to the different approaches used to ensure the selection of the best individuals for work in health and social careLO 1.3 D2 Take responsibility of managing and organising activities Independent thinking has been demonstrated and all activities have been managed. Has applied the different leadership and team theories for team management and workingrelationships.LO4.1 4.2 D3 Demonstrate convergent/lateral/creative thinking Self-evaluation has taken place. Has critically evaluatedhow their own development has been influenced by management approaches. LO4.3

Saturday, September 28, 2019

Strategic Choice and Evaluation Essay Example | Topics and Well Written Essays - 750 words

Strategic Choice and Evaluation - Essay Example This paper will look at alternatives Medtronic’s should consider to realize growth. The paper will assess the best value discipline, generic strategy, and grand strategy for the organization. The paper will conclude by recommending a combination of strategies the organization should put into practice. The best value discipline Medtronic’s should consider to realize growth is customer intimacy. This means that Medtronic’s will concentrate on providing services and products required by a particular client and not what is required by the whole market. Organizations, which are customer-intimate, develop relationships with their clients and are not after one time dealings. They dedicate their selves in satisfying distinctive needs, which frequently only they, by virtue of their profound knowledge, and intimate relationship with clients acknowledge (Grant, 2008). Therefore, for Medtronic’s to realize growth, their suggestion to the clients should be to provide t he best solution for them and offer all the assistance necessary so as to realize the best outcomes and at total minimal cost. The best generic strategy to be employed by Medtronic’s should be the cost leadership strategy. Generic strategies illustrate the techniques of attaining competitive advantage. This explains the techniques employed to establish the upper hand that gets the organization the sale and takes it away from rivals in the sector. There are two ways Medtronic’s may realize this by utilizing the cost leadership strategy. One, Medtronic’s may enhance earnings by minimizing expenses while utilizing industry-average costs. Two, Medtronic’s may augment market share by imposing reduced costs, while at the same time making a realistic profit on every services offered and of product sold because Medtronic’s will have decreased costs. One should bear in mind that cost leadership concerns lessening the cost to the organization of providing se rvices and products. Also, it should be noted that the price or cost paid by the client is a distinct matter. The cost leadership strategy entails being the leader with regard to cost in the market or industry. Being among the lowest-cost producers is simply not sufficient as Medtronic’s will leave itself wide open to competition by other organizations who offer services and products at a lower cost and, consequently, may emasculate Medtronic’s prices and, therefore, hinder its capacity to realize growth. Therefore, Medtronic’s needs to have confidence in attaining and retaining the leaders position prior to selecting the cost leadership strategy. Nonetheless, organizations that successfully realize the cost leadership strategy typically contain extremely adequate logistics, access to the funds required to invest in technology which will help lessen costs, and a reduced cost base, and a strategy of efficiently reducing costs beneath those of its rivals (Olsen, 2 012). The grand strategy that Medtronic’s should consider to realize growth is product development. Product development entails investing immensely in research and development so as to fashion innovative and new product offerings. Product development is fundamentally the reverse of market development. Pro

Friday, September 27, 2019

Paper 5 Essay Example | Topics and Well Written Essays - 500 words

Paper 5 - Essay Example us that his â€Å"home is beyond the mountains† (144) but he is not; he is in the white man’s world a world where trees are planted in â€Å"military rows† (144) and although all living things are beautiful â€Å"it is the beauty of captivity.† His prison is the â€Å"bluff of being civilized† a place where he has â€Å"to do everything [he doesn’t] want to do† a place where he â€Å"never [does] anything† he wants. (144) The narrator of â€Å"She’s Free’ on the other hand, is a negro and has lived life in a white man’s world as a slave subjected â€Å"by law †¦[to] torture and chain† (line 1) solely because of the color of her skin, â€Å"the hue of her face.† (line 2) Thus her enslavement is existent and tangible – she bears the signs of â€Å"bondage and blood †¦ scourges and chains,† (line 7) whereas the Indian bears no physical signs of enslavement and is allowed t o move around and exist without abuse, in his view he is imprisoned â€Å"dancing to the strings of customs and traditions.† (144) Both narrators seek escape from their imprisonment, he by returning to his homeland and people and she by escaping and running away. The difference however is that he is escaping to the familiarity and safety of his family and his people but she, â€Å"with her arm on her child† (line 3) is escaping into the unknown world where â€Å"the danger was fearful [and] the pathway was wild.†(line 4) She is resolute in her journey preferring to be free from oppression even though her future is unknown; she is determined and tenacious in coping with what may come before her â€Å"poverty, danger and death she can brave† (line 13) for the freedom of her child, â€Å"for the child of her love is no loner a slave.† (line 14) The Indian however is not so unwavering. Although still â€Å"twenty miles from home† (146) he begins to feel concern and â€Å"afraid of being looked on as a stranger by [his] own people.† (146) He states that he doesn’t fit in either world, â€Å"certainly not

Thursday, September 26, 2019

Journal Entry Essay Example | Topics and Well Written Essays - 500 words - 5

Journal Entry - Essay Example These and many other issues have made it necessary that all stakeholders in the nursing fraternity should seek to be active when it comes to developing health regulations and policies. This is contrary to the existing scenario in which government policy makers and not healthcare professionals are developing them. With the increasing complex landscape of patient care, it is the role of the nurses and nurse leaders to devise measures of providing the required care. This is because nurses are the healthcare professionals who execute all the roles required to foster faster and better recovery of patients. Additionally, they spend the most time beside patients’ beds. One of the major ways of addressing this is by implementing the all-round foci as taught in nursing school that range from preventive care, patient communication, improving efficiency, cost containment, and more importantly preventing relapse and costly returns to healthcare institutions by the patients. In a nutshell, the nurse can only be able to implement such if they become active in developing health policies and regulations since they understand the patients’ needs and welfare than do the federal and state bodies. The landscape of patient care is expanding and varying rapidly, and efficient strategies such those m entioned can only be identified and customized for the good of patients if healthcare professionals are allowed the necessary support and freedom. Nurses should take up the challenge of being politically active because it is a sacrifice required to bring a better healthcare system into existence. Political skills are required in addition to energy, time, will, and resources of power. One way to become politically active is by providing first-person perspectives on matters healthcare by highlighting the impacts that certain regulations, bills, or decisions are bound to affect the healthcare fraternity. This includes patients and

Wednesday, September 25, 2019

Denver International Airport (DIA) Essay Example | Topics and Well Written Essays - 3500 words

Denver International Airport (DIA) - Essay Example DIA engineers use MapGuide to keep tabs on its massive underground utility systems including 11,365 miles of copper cable – enough to link the U.S to Argentina. The largest airport in the world is King Fahd International Airport in Saudi Arabia. Canada’s Montreal-Mirabel Airport is ranked second. The United States of America’s Denver International Airport occupies third spot (Wikipedia.org, 2007). Denver International Airport {commonly referred to as DIA} is situated in the northeastern area of Denver in the state of Colorado. Its airfield, passenger and cargo facilities cover a massive land area of 54 square miles {140 square kilometers} (Wikipedia.org, 2007). DIA has an unusual signature white colored tension fabric roof that evokes memories of the snow-covered Rocky Mountains during winter (Wikipedia.org, 2007) – Denver lies at the rim of the Great Plains at the foot of the Rocky Mountains (Castellino, p.7). The tallest point of the roof extends 126 feet above floor level. The huge weight of the roof is borne by 34 vertical poles and 10 miles of steel wire (Datawarehouse.com, 2007). DIA is also famous for its unique pedestrian bridge that links its terminal to one of the Concourses; it affords a wonderful view of airplanes taxiing on the tarmac below (Wikipedia.org, 2007). The massive 33 storey, 327 foot high Control Tower was designed by Leo A. Daly and constructed by M.A. Mortensen Co.’s Federal Contracting Group (Flydenver.com, 2007). DIA was constructed primarily as a replacement for Stapleton International Airport that has since been decommissioned. The U.S. Federal government allocated an initial amount of $ 60 million to build DIA in September 1989 (Wikipedia.org, 2007). Hispanic Mayor Federico Pena {term as Mayor: 1983 to 1991} easily the most active, capable and farsighted Mayor of Denver, was in office at that time (Castellino, p.33). Although scheduled to be ready in four years’ time, the project extended to five

Tuesday, September 24, 2019

Labor Essay Example | Topics and Well Written Essays - 250 words - 2

Labor - Essay Example While the responsibility for providing a safe work environment falls onto the employer and its Human Resources management team, it is the responsibility of the employee to comply with the rules that are required to ensure a safe working environment. In this brief outline, the phenomenon of Labor Unions will be critically analyzed and explored, discussing the purpose of a union, experience with unions from a Human Resource perspective, Good Faith, and a number of associated terms that bring clarity to the whole labor union movement. Since before the 1950’s, United States employees have been fighting for equity, fairness, and to be treated with dignity and respect. It is through the labor union movement that the AFL-CIO was able to form and demand fair practices and acceptable working conditions on job sites all across America. The reasons why many workers from various industries came to join a union, and continue to do so to this day, is to ensure that their rights are preserved and that their health and safety are protected. In many cases, currently and historically, there are unfair practices going on around the world. American union members are now encouraging laborers in other countries to organize unions in order to do the same thing. Dressler states that as many as 14.7 million U.S. workers belong to unions, about 11.9% of the total (Dressler, 2013, p. 496) (Dessler, Human Resource Management, 13th Edition). The views of this outline concerning labor unions have more to do with the theoretical discourse that is ascertained through reading both historical and current events. Its perspective is also influenced by images in the news media of labor union strikes displaying angry blue collar workers and picketers marching and shouting in front of their place of employment, or at least the corporate office. It has much less to do with the limited knowledge and experience on a professional level. With that caveat being

Monday, September 23, 2019

Information Systems Management Essay Example | Topics and Well Written Essays - 6000 words

Information Systems Management - Essay Example The next sections of the paper talks about value chain of Jupiter Business Systems by framing the main operations within the company. Further the SWOT and PEST analysis follow that represent the basic part before coming down to strategy overview. These analyses describe internal and external environment of the company. Later levels of the information management are critically evaluated basing on the information about Jupiter business operations. Finally the information systems strategy is proposed and recommendations for implementations are provided. Jupiter Business Systems is formed by a dedicated team of young and dynamic professionals. JBS offers various high quality end-to-end business management solutions with unique capabilities for business enterprise of all size. The Company provides innovative and easy-to-use applications that help businesses gain better control over business. Jupiter is therefore B2B Company rather than B2C. Its customized solutions support, specific business requirements and aid in identifying critical issues & accessing information at the right time lets to pursue customers' business goals with confidence. The mission of the company is to empower our clients by implementing complete and powerful end-to-end enterprise solutions thus enabling them to answer their present day business challenges and prepare for greater success in the future. Jupiter Company has partnership with multiple leading technology vendors which makes it the one-stop-shop for the very best in IT solutions for business. Possessing a dedicated team of innovative professionals who have worked in various business streams and industries, Jupiter delivers its customers a complete solution with an extra value of business management expertise. Jupiter flagship product the "Jupiter Business Manager" - a suite of business management solutions developed to meet the requirements of business enterprises of all size operating in the UAE and other Middle East countries. Its secure and reliable design accelerates the actual process of business automation while its flexible structure, designed to grow with your business, effectively combines easy functionality (across all key areas of the business) with high scalability. Organizational structure of Jupiter Business Systems is simple, since there are only 15 employees working for the Company, including ten employees in United Arab Emirates and five outsourced to other countries. The graphical representation of oorganizational structure has the following view: Graph 1: Organizational Structure of Jupiter Business Systems Management Structure includes management director and general manager who are owners of the company working since its very creation. Financing Debt is a department dedicated to managing the debt of the company that it has due to comparative novelty on the market. Two people are working at this department. Production team is the

Sunday, September 22, 2019

Antivuris Programs Essay Example for Free

Antivuris Programs Essay Today, people rely on computers to create, store, and manage critical information, many times via a home computer network. Information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer virus found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One Technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patterns of virus code. According to Shelly and Cashman (Antivirus Programs), many vendors of antivirus programs allow registered users to update virus signature files automatically from the Web at no cost for a specified time. Updating the Antivirus program’s signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from computer viruses simply do not exist. Installing, updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.

Saturday, September 21, 2019

Criticisms in “In the Penal Colony” Essay Example for Free

Criticisms in â€Å"In the Penal Colony† Essay The antediluvian apparatus and ancient legal system in Kafka’s â€Å"In the Penal Colony† describes the current state of humanity in the colonial era.   Through the use, along with the circumstances surrounding the machine, Kafka portrays slavery and colonialism in the world and the consequences of failing to abolish such ways. The people of the colony are represented by â€Å"the Soldier†, â€Å"the Officer†, â€Å"the Explorer†, â€Å"the Condemned man†, and â€Å"the Commandant†.   By giving them these names, Kafka has essentially dehumanized them much like those who have been condemned to working in penal colonies; they only have functions, not names.    The harsh bureaucratic ways of the colony can be seen through the punishments handed out as told by the Officer who is: much more interested in the technicalities of the execution than the niceties of legal procedure. The actual execution is to be carried out by a complex apparatus designed by the former Commandant of the penal colony and maintained by the Officer. The machine tortures the condemned man in a process that brutally mimics and transforms the sexual act. The condemned man is strapped naked onto something akin to a bed and the top part of the apparatus, a set of knife-like needles, automatically descends, piercing his body and excreting a fluid that inscribes the sentence upon his flesh. For the first six hours of the writing process, the condemned man suffers only pain (149) but as the needles pierce his internal organs more deeply, he achieves a form of enlightenment that culminates in death. (Kohn 5) The way in which the punishment is filtered through the legal system of the penal colony is also rather questionable.   The Officer says, â€Å"I have been appointed judge in this penal colony†(145) and uses his principle of: Guilt is never to be doubted.   Other courts cannot follow that principle, for they consist of several opinions and have higher courts to scrutinize them.   That is not the case here, or at least, it was not the case in the former Commandant’s time.†(145) to rule over his judgments.   For the condemned man, he has no chance to defend himself and prove his innocence by virtue of the system in place.   They are always going to be found guilty for the sake of being guilty so they can have an execution take place and bring some kind of grotesque excitement where, â€Å"hundreds of spectators—all of them standing on tiptoe†(153) could bear witness to them. Aside from the archaic methods of criminal procedures, Kafka also presents the reliance on antiquated technology through this work in the presentation of execution machine to portray the costs associated with running a penal colony for slave labor during his time.   We first get a glimpse of the harsh realities of the machine and the cost to upkeep it when the soldier breaks the wrist strap and the Officer says, â€Å"This is a very complex machine, it can’t be helped that things are breaking or giving way here and there; but one must not thereby allow oneself to be diverted in one’s general judgment†(151).   He continues saying: the resources for maintaining the machine are now very much reduced.   Under the former Commandant I had free access to a sum of money set aside entirely for this purpose.   There was a store, too, in which spare parts were kept for repairs of all kinds. (151)†¦Now he has taken charge of the machine money himself, and if I send for a new strap they ask for the broken old strap as evidence, and the new strap takes ten days to appear and then is of shoddy material and not much good. (151) There was an entire store dedicated solely to maintaining the machine it much like penal colonies were such a hindrance on the economies of the nations that controlled and maintained them. As the story progresses, we can see how the ways of the penal colony are being phased out when we hear the Officer tell the Explorer: there’s no time to lose, an attack of some kind is impending on my function as judge; conferences are already being held in the Commandant’s office from which I am excluded; even your coming here today seems to me a significant move; they are cowards and use you as a screen, you, a stranger.(153) The Officer views the Explorer with a great deal of clout believing he can restore the penal colony to the greatness that it once enjoyed.   However, the Explorer knows the harsh realities of the colony and refuses to play along with Officer to help him bring the colony back to its previous state.   Instead we see the Explorer as, â€Å"a kind of outsider,†(157) a change in attitudes throughout the world looking in on the colony.   The Officer finally realizes that the Explorer is not there to help him restore what once was, and he submits himself to his own machine.   As the machine is inscribing ‘be just’ into his body, it fails due to its complex nature and failing state, much like the failing state of the colony, and kills him.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Through close readings of â€Å"In the Penal Colony,† we gain an insight as to what Kafka was trying to accomplish with this work.   His nation, Germany, as well as many others in the world at the time had undertaken colonialism and establishing penal colonies to better their nations.   However, Kafka illustrates the failing nature of these establishments through their rudimentary justice systems and monetary reliance on the host nations economies.   Instead of bettering society through what was being provided by the slave labor, the social order of the world was being torn apart keeping them afloat. Works Cited Kohn, Margaret. Kafkas Critique of Colonialism. Theory Event. 8.3 (2005): 5. Print.

Friday, September 20, 2019

Effect of Bring your own Device (BYOD) on Cybersecurity

Effect of Bring your own Device (BYOD) on Cybersecurity Effect of Bring your own Device (BYOD) on Cybersecurity at workplace Introduction Several new trends in information access are impacting organizations ability to control and secure sensitive corporate data. The increase in web applications, cloud computing and Software as a Service (SaaS) offerings, and the Bring Your Own Device (BYOD) phenomenon, means that employees, business partners and customers are increasingly accessing information using a web browser on a device not owned or managed by the organization (Morrow, 2012). Bring your own device (BYOD) is process whereby when individual/ employees can use personal devices for business purposes (Privacy Right, 2013). And the D in BYOD includes more than just smartphones. It also includes employees logging into web applications such as Outlook Web Access and SharePoint, SaaS applications such as CRM systems or healthcare billing applications hosted in cloud services, from home desktop or laptop computers (Morrow, 2012). The concept of bring your own device (BYOD) is a growing trend for business IT. There are a var iety of benefits to allowing users to supply their own PCs and mobile devices, but there are also some concerns (Bradley, 2011). Several studies have also shown that BOYD is one the three biggest cybersecurity threat of 2014 (Singh, 2012). In addition, it is suggested that BYOD, or bring your own device, can no longer be thought of as a fad; it is quickly becoming the new reality. In addition, as this trend grows, all businesses are potentially at risk which can stem from both internal and external threats, including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications (Singh, 2012). In this study, the effect of Bring your own Device (BYOD) on Cybersecurity at workplace will be investigated. Hypothesis It might be concluded that due to using of unauthorized devices such as personal electronic device also known as Bring Your Own Device (BYOD) at workplaces causes intrusion into the company network, thereby causing data loss, stolen intellectual property to mention but few. Arriving at this hypothesis: It was not an easy task, however, following the provided information made it easier. Coming up with the hypothesis, I had to brainstorm and do enough research to come up with a schematic sketch of the variables (independent and dependent) involved in this issue. To ensure the hypothesis is an empirical statement, general phenomenon, plausible, specific, consistent and testable. In this hypothesis, the identified independent variable is the personal electronic device (BYOD) while the dependable variable is the network intrusion, thereby causing data loss, stolen intellectual property. Figure 1: Schematic sketch of identified variables Independent Variable Dependent Variable Use of Personal Electronic Device à ¢Ã¢â‚¬  Ã¢â‚¬â„¢ Network intrusion Figure 1: showing the dependable and independent variables of the hypothesis Findings Studies have shown that one of the biggest challenges for organizations when employees use their own device organizations is that corporate data is being delivered to devices that are not managed by the IT department (Morrow, 2012). This has security implications for data leakage, data theft and regulatory compliance (Morrow, 2012).in addition, the use of unmanaged devices such as BYOD causes enterprises to have less control and visibility, and fewer mitigation options than they do with managed devices (Morrow, 2012). In addition, Laptops, smartphones and tablets that connect to corporate networks significantly increase threats to sensitive data (Morrow, 2012). . Organizations should be concerned about the security state of endpoint devices and the risks to which they are exposed. Key loggers, malware and cyber-attacks have greatly increased the potential for unauthorized access to, and information theft from, endpoints. Potential unintended consequences such as data leakage and mal ware reinforce the need to enhance the security of corporate data. A malicious employee can easily steal company trade secrets, intellectual property or sensitive customer information by saving it locally or to a cloud service, sending it through accounts in Dropbox and you send it or emailing it via a personal webmail account. Organizations must control the data after its delivered to the device to prevent accidental or intentional loss by careless or malicious end users. Studies have also shown that to assess the risks of BYOD computing, everything from data contamination to user habits to the activities of criminal syndicates needs to be considered (Romer, 2014). Some of the security risks to be considered includes: Security as an afterthought: Shows that most mobile devices either lack advanced security features or have them disabled by default. Even basic features such as screen locks are turned off, and most users leave them that way (Romer, 2014). Data contamination: Shows the photos and other content share storage space along with confidential business data. This combining of data introduces new risks to the enterprise. Through carelessly configured back-ups or file copies, personal content might accidentally end up on corporate file servers. Worse, personal files that contain malware might spread to business files and from the mobile device to internal file servers and other enterprise assets (Romer, 2014). New Forms off malware: Shows that New forms of malware targeting mobile devices are on the rise. IBM predicts that mobile malware will grow 15% annually for the next few years (Romer, 2014). Hackers and criminal syndicates realize that most mobile devices are less secure than more traditional devices such as laptops (Romer, 2014). They have begun targeting mobile devices for attacks ranging from mischievous pranks to advanced persistent threats that stealthily copy internal data over many months, transmitting it to remote control centers around the world (Romer, 2014). Phishing attacks that slip past network defenses Shows that many employees routinely catch up on email and work during evenings and weekends, and when they do, they typically use smartphones or tablets (Romer, 2014). Realizing that most of these devices lack AV software and that most email and web traffic accessed remotely bypasses inspection by firewalls and gateways, attackers are now designing phishing attacks and other email exploits to be triggered during non-business hours (Romer, 2014). Lost Devices: Shows that on average, a cellphone is lost in the US every 3.5 seconds.1 Even if a lost smartphone or tablet does not contain confidential data, it still might include apps or cached credentials that make it easier for criminals to infiltrate an enterprise network (Romer, 2014). As workers begin carrying more devices, the likelihood of them losing devices only increases (Romer, 2014). Risky file sharing: shows that to ensure all their devices have the files they need, employees often try out one or more file-sharing services, including free but risky file-sharing apps that run on public clouds (Romer, 2014). Unfortunately, these services, though popular, are usually not secure enough to be trusted with enterprise data (Romer, 2014). Conclusions with recommendations Overall, this study shows that organizations should be concerned about the security state of endpoint devices and the risks to which they are exposed. In addition, key loggers, malware and cyber-attacks have greatly increased the potential for unauthorized access to, and information theft from, endpoints. Potential unintended consequences such as data leakage and malware reinforce the need to enhance the security of corporate data. In addition, to protect valuable information such as intellectual property, organizations need to make data security a top priority. To counter these sophisticated threats, organizations should employ a layered security strategy that provides necessary access to corporate information while minimizing risk and maintaining compliance (Privacy Right, 2013). When it comes to sensitive information, the focus must go beyond authorized and unauthorized users and extend data protection from storage through transport to delivery on the endpoint to prevent sensiti ve data loss (Privacy Right, 2013). Organizations also need to stop making a distinction between devices in the corporate network and devices outside of it, and focus instead on protecting their information (Privacy Right, 2013). They must compartmentalize access to sensitive information, employ better audit logging and log analysis, and deploy security solutions that are designed to support current BYOD strategies, such as those that can control the replication of data (Privacy Right, 2013). In conclusion, organizations must now readdress their corporate policies to ensure that their greatest asset information is being safeguarded on these mobile devices that are outside of their direct control (Gatewood, 2012). References Singh, Niharika. B.Y.O.D. Genie Is Out Of the Bottle Devil Or Angel Journal of Business Management Social Sciences Research (JBMSSR) ISSN No: 2319-5614 Volume 1, No.3, December 2012 Bradley, Tony. Pros and Cons of Bringing Your Own Device to Work. PCWorld. PCWorld, 21 Dec. 2011. Web. 17 Dec. 2016. Privacy Right. Bring Your Own Device (BYOD) . . . at Your Own Risk | Privacy Rights Clearinghouse. Privacy Rights Clearinghouse, 1 Sept. 2013. Web. 17 Dec. 2016. . Morrow, B.BYOD security challenges: Control and protect your most sensitive data(2012) Network Security, 2012 (12), pp. 5-8. Romer, Hormazd. Best Practices for BYOD Security. Computer Fraud Security 2014.1 (2014): 13-15. Web. 17 Dec. 2016. Gatewood, Brent. The nuts and bolts of making BYOD work. Information Management Journal, Nov.-Dec. 2012, p. 26+. Academic OneFile, Accessed 17 Dec. 2016.

Thursday, September 19, 2019

Scandle in the church :: essays research papers

Headlines were captured in February by the tragic reports that as many as seventy priests in the Archdiocese of Boston, Massachusetts, allegedly have abused young people whom they were consecrated to serve. In the wake this news, allegations of sexual abuse by Catholic priests have sprung up nationwide. It is a huge scandal, one that many people who dislike the Catholic Church because of its moral teachings are using to claim that the Church is hypocritical and that they were right all along. Many people have come up to priests like myself to talk about it. I imagine many others have wanted to but have refrained out of respect or from not wanting to bring up bad news. We need to tackle the issue head-on. We cannot pretend it doesn't exist, and I would like to discuss what our response as faithful Catholics should be to this terrible situation. The Judas syndrome The first thing we need to do is to understand this scandal from the perspective of our faith in the Lord. Before he chose his first disciples, Jesus went up the mountain to pray all night (Luke 6:12). He had many followers at the time. He talked to his Father in prayer about whom he should choose to be his twelve apostles-the twelve whom he would form intimately, the twelve whom he would send out to preach the good news in his name. He gave them power to cast out demons. He gave them power to cure the sick. They watched him work countless miracles. They themselves worked countless others in his name. Yet one of them tuned out to be a traitor. One who had followed the Lord-who had seen him walk on water and raise people from the dead and forgive sinners, one whose feet the Lord had washed-betrayed him. The gospels tells us that Judas allowed Satan to enter into him and then sold the Lord for thirty pieces of silver, handing him over by faking a gesture of love. "Judas," Jesus said to him in the garden of Gethsemane, "would you betray the Son of Man with a kiss?" (Luke 24:48). Jesus didn't choose Judas to betray him. But Judas was always free, and he used his freedom to allow Satan to enter into him, and by his betrayal Jesus was crucified and executed. But God foresaw this evil and used to accomplish the ultimate good: the redemption of the world.

Wednesday, September 18, 2019

Snapshots of Miss Emily in William Faulkners A Rose for Emily Essay

Snapshots of Miss Emily in A Rose for Emily â€Å"A Rose for Miss Emily† by William Faulkner is a story of quiet lonliness and tragedy. The story ends on a surprising note, but one for which the reader is not totally unprepared. Faulkner very cleverly uses changing pictures of Miss Emily’s physical state to give the reader a clue as to what is transpiring inside her. The picture or â€Å"tableau† of Emily in her childhood gives us our first clue into her strange personality. She is â€Å"a slender figure in white in the background, her father a spraddled silhouette in the foreground, his back to her and clutching a horsewhip, the two of them framed by the back-flung front door.† The scene almost blatantly reveals Emily in her youth, constrained by a wildly over-protective father. Her natural attempts to leave home and have relationship with the outside world are thwarted by a dark, mean, even evil-spirited father who refuses to let her leave. Our next view of Miss Emily is some time after her father dies. â€Å"Her hair is cut short,† Faulkner tells us. The strength...