Monday, September 30, 2019

Cyber Security Policies in the Private and Public Sector

Cyber Security Policies in the Private and Public Sector Cyber Security Vulnerabilities and Associated Threats of Cloud-Computing 16-03-2013   Cloud computing is a technology through which the information services are provided on demand basis. It is like service oriented architecture. End-users access the services through the cloud as per the requirement. The cloud term basically refers internet, so services are provided through Internet. Cloud computing reduces the total cost of accessing the application.The applications are developed by the third party and the users pay per service to the third party for accessing the service. But there are lots of security risks associated with the cloud-computing. These relates to the data privacy, other vulnerabilities and associated threats. These vulnerabilities and the associated threats will be discussed in this paper. Effective Policies and procedures will also be defined in this paper which will help in managing the estimated risk of the threats. Cyber Security Vulnerabilities and Associated Threats of Cloud-Computing Cloud-ComputingThe information technology is growing these days and the managers are trying to reduce the total cost of development of the services using various means due to a number of business reasons. Cloud-computing is a technique which helps the management in reducing the total cost of development. The required resources are configured in a cloud and the users access these services through the cloud. In case of in-house development, the complete process is done inside the company premises and using the resources of the organization. So the organization has to pay for the complete resource to the vendor even if full service is not required.The license to use the product is also very costly. The organization has to pay for the complete product even if a part of the service is required. In the case of cloud computing, the users need not to pay for the entire service or product, he will pay only for the part of the service. For example, a service is created for user-id creation and as most of the organization needs this policy, so this policy is created and configured in the shared pool of resources. Now the different organizations can access the service as per their use. This helps in overall reduction of the total cost of accessing the service.These resources are configured in a shared pool of resources. These shared resources include the servers, storage, networks, services, etc. Cloud computing has many forms and these forms are mainly as described here: â€Å"Software as a Service†, â€Å"Platform as a Service†, and â€Å"Infrastructure as a service†. This technology has many advantages but it has some disadvantages too. As discussed above, that the services are provided by a third party vendor, so the responsibility to provide support and maintenance is also taken care by the third party service provider.When a company access the service using cloud- computing, the crucial business data resides in remote servers provided by the third party so there are lot of risk related to data privacy and confidentiality. The research related to analyzing the vulnerabilities and associated threats is going on and suitable actions are being taken to control the risk level. Cyber Security Vulnerabilities, Threats and Actions Vulnerabilities refer to the loop holes in the system or the flaws in the system. When an organization has decided to move on the cloud, then it should also consider the associated vulnerabilities and the threats.Some of the major vulnerabilities are discussed below: Session Hijacking It means that the cloud or the required service is hacked by the hackers using a valid session key. This key is used to gain the unauthorized access on the critical resources of the organization. Once hacked, the hackers can have the complete access on the systems, and they can perform any malicious activity they want to do, to hit the company resources. If proper and effective security measures are not followed in the infrastructure then it may cause a heavy business loss in terms of financial terms as well as the reputation of the organization.Probability of Occurrence The probability of occurrence of these types of attack is generally high. The reason being is that the attackers keep on continuously scan the system to find out the vulnerabilities in it. Once they gain the access, they just execute their jobs. Effective Policies & Procedures To mitigate this kind of risk, firewalls should be implemented in the system at the right places. Firewalls prevent unauthorized access of data. Rules and policies should be configured to protect the session keys. To increase the awareness among employees, a proper training should be given to them.For example, session monitoring should be done to keep a check on the malicious activities. Virtual Machine Access In this technology, the servers uses same resources like operating syste m, business applications, etc which are used by the virtual machines & other servers. If the attacker is successful in to gaining the unauthorized access to any of these system resources, then the whole system can be compromised easily. If other virtual machines are also located in the same configuration zone then there is a high risk of compromising other virtual machines too.This may directly hit the operating system and the host server and hence all the services hosted by the server. Probability of Occurrence The probability of occurrence of these types of attack is also high. As the flaws in the software or hardware becomes the root cause of these types of attacks. The bugs or flaws in the software are identified at a later stage and regular updates or patches needs to be applied on the software. Effective Policies & Procedures The software should be regularly updated and patches should be applied on it.Hardware flaws should be filled up using various tools. An effective network configuration is very important to mitigate this type of attacks. Service Availability This is a major weakness in cloud computing technology. No company can afford the unavailability of the required service. The company has to suffer from a huge business loss in case of downtime. The services offered by the cloud are not much reliable, any outage in the system may cause the services to stop working and hence the services will not be accessible. And this would be again responsible for a major loss to the company.Service Level Agreements (SLA) must be well defined and signed by both the involved parties and the above mentioned issues should be discussed and taken care using the SLAs. Backup plans should be carefully designed and implemented so that the risk level can be controlled. In case of any outage, let’s say electricity outage, can be taken care by switching to electricity generators or other back-up devices. Probability of Occurrence The probability of occurrence of th ese types of attack is generally low. This types of issues rarely occur in any organization.Service providers mostly keep the backup resources so that the system working remains continuous. And in case of some issues, switches to the ready back-up resources can be easily done. Effective Policies & Procedures To mitigate this kind of risk, firewalls should be implemented in the system at the right places. Firewalls prevent unauthorized access of data. Rules and policies should be configured to protect the session keys. To increase the awareness among employees, a Cryptography Flaws This flaw refers to the weakness in the cryptography techniques implemented in the cloud based system.Hackers can easily decode the encoding mechanism used in the system if there are some security gaps, for example if the key used in the encryption mechanism is not secure and strong enough then the attacker can easily gain the access to the key and hence they can easily decode the encrypted message to the original text form. Probability of Occurrence The probability of occurrence of these types of attack is generally medium. The reason being is that most of the times, attackers could not find out the key used to encrypt the data or it is difficult to decode the encoded data.Effective Policies & Procedures To mitigate this kind of risk, strong cryptography techniques should be used. Ethical hacking can be done intentionally just to test the security level of the complete system. This test will help in analyzing the security gaps in the system and then these loop holes can be filled with effective security procedures. Data Privacy When the data resides in third party servers, then this risk of data privacy always persists. As the crucial data is handled and managed by the third party, so there are high chances of risks to data privacy and confidentiality.Basically an agreement is signed-off between the parties for accessing the services. It should also include the issues related to mai ntaining privacy of data. Suppose the contract gets completed, now what would happen to the data which is stored in the third part servers? Probability of Occurrence The probability of occurrence of these types of attack is generally high. The reason being is that the data is always accessible to the service provider. Service providers take care of the support and maintenance of the data too. This risk is generally high.Research is going on so that this issue can be sort out. Effective Policies & Procedures These kinds of issues should be openly discussed with the service provider before signing any agreement. Vendor’s Technique As the technology is growing, there are lots of vendors coming up in this industry. Sometimes these vendors are immature and they follow the platform specific techniques which cause trouble in migrating to the new service or integrating with other services. The developed technology will be of no use if it cannot be updated or integrated with other ser vices as per the requirement.Probability of Occurrence The probability of occurrence of these types of attack is generally medium, as it varies with the knowledge and experience of the service provider. Effective Policies & Procedures Proper research should be done before finalizing the right vendor. The initial requirements should be crystal clear so that both the parties should understand what actually needs to be done. There should not be any communication gap between both the parties so that in case of some issues, the right action can be taken immediately to fill the gaps.Dependency on Internet As discussed above, the services are accessed through a cloud of shared resources. This cloud refers to internet. So in other word we can say that the services are accessed through the internet which means that the services are highly dependent on internet. Suppose internet goes down then the client will not be able to access the required services. Probability of Occurrence The probabili ty of occurrence of these types of attack is generally low. The reason is that backup plans are ready for the service in case of some emergency.As the service provider also realizes the importance of internet so enough resources are used so that the system does not suffer from any kind of outages. Effective Policies & Procedures To mitigate this kind of risk, backup plans should be ready and available all the time so that if at any time, the system disrupts, the backup plans can be used so that the functioning of the system does not affect in any way. There are other important security threats too which are associated with cyber-security. These are discussed below: Denial of Service (DOS) Attack Denial of Service attacks are also known as DOS attacks.Due to these attacks, the legitimate requests of the end users are not completed due to heavy loading of the host server caused by the fake calls. Attackers may hit the routers or over flood the host server using the fake calls and this prevents the legitimate calls to execute. This may cause the complete disruption in the system. Appropriate rules and filters should be configured in the firewall to mitigate the risk associated with these attacks. Customer Satisfaction Customer satisfaction increases with the implementation of the above mentioned policies and procedures.The implementation basically helps in the availability of the service in a secure environment. And customers would be happy to gain access to the required service whenever they need and as per their requirement and that too in a secure environment. Hence we can say that the implementation of the above mentioned policies and procedures helps in increasing the customer’s satisfaction level. Conclusion In this research paper, various security vulnerabilities and the associated threats related to cloud computing are discussed.Cloud computing really helps in reducing the overall cost of accessing a service. But the security risk associated with t his technology cannot be ignored. Proper security measures should be implemented in the system. Secure protocols should be designed and configured so that a balance can be achieved between the cost and the security level. References 1. Blaisdell, R. (2011, February 24). How Much Can You Save On Your Cloud Computing Implementation? Retrieved from Ezinearticles. com: http://ezinearticles. com/? How-Much-Can-You-Save-On-Your-Cloud-Computing-Implementation? amp;id=5989672 2. European Network and Information Security Agency. (2009). Cloud Computing – Benefits, risks and recommendations for information assurance. Heraklion: European Network and Information Security Agency. 3. Mell, P. , & Grance, T. (2011, September). The NIST Definition of Cloud Computing. Retrieved from US Department of Commerce National Institute of Standards and Technology, Special Publication 800-145: http://csrc. nist. gov/publications/nistpubs/800-145/SP800-145. pdf 4. Meiko Jensen ,Jorg Sehwenk et al. , â⠂¬Å"On Technical Security, Issues in cloud

Sunday, September 29, 2019

Should there be separation of church and state?

Ancient Greek civilization and culture continues to be one of the landmarks of world history because of the invaluable contribution that the Greeks have made in virtually all areas of human endeavor. However, civilization is not static and Greek society was swept into the same historical process that led all societies to the modern world of capitalism. What is distinct about Greek society today is the direct role that the church plays in the realm of politics, where most other countries have developed forms of government that excluded the direct participation of religious entities. What is the church’s role in the Greek state of affairs? Should there be a separation of powers of church and state in the context of Greece? The Orthodox Church in Greek Society The Orthodox Church traces its roots to the Orthodox Church based in Constantinople. It is the most dominant religion in Greece, claiming influence over 90% of the country’s population, a very wide political base that could determine the winner in national elections.   The subsequent nationalization of the Church further institutionalized its political power and created a culture/national identity where traditional church values are the core (Geographic 2004). Like most church hierarchies, the Greek Orthodox Church has always played as a conservative political force. It supported the monarchy and also aligned itself with the right wing military junta in the 1960’s in order to wage a common battle against a common threat – communism (Maniatis 2002). It also perceives pluralism and other liberal ideas as a challenge to its monopoly in the cultural sphere and has vigorously opposed such influences. It’s involvement in politics resulted in factionalism but nevertheless, it has undeniable influence over government policies and programs (Geographic 2004). Currently, Orthodox Church officials are actually employed by the government through the Ministry of National Education and Religious Affairs which incidentally, also manages the properties of the church (BBC 2005). Recently, scandals rocked the Orthodox Church with allegations of embezzlement, smuggling and bribing of judges. On the Separation of Church and State From the perspective of a person outside looking in, I believe that there should be a separation of church and state. This position is based on the premises that the Church (or religion in general), especially if it is conservative promotes an ideology that preserves the traditional way of life and the status quo in society. If the church is part of governance, naturally it ensures the consistency of laws, policies and programs with the tenets of the church. For instance, because homosexuality and divorce is contrary to Church teachings, it leaves out the agenda of women and gay’s rights. Because the Orthodox Church opposes multi-culturalism, it promotes religious and cultural discrimination to governance. Because science is contrary to church teachings, how then can scientific study be actively promoted by government institutions? As such, government can not effectively respond to the breadth of social issues first through objective study followed by the institution of measures appropriate with empirical evidence if there is no actual separation of church and state. Finally, if the church also functions as part of Civil Society, or as a check and balance to government, it can not do so if it is employed by that institution with its officials actually receiving salary from it. It would be a case of conflict of interest and undermines the interest of the public. List of References Geographic (2004) Greek Church and State.  [18 February 2008] BBC One Minute News: Europe (2005) Greek Church Plans Scandal Summit. Available   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   from

Saturday, September 28, 2019

Looking for Alabrandi and the Simple Gift Essay

Good morning teachers and fellow students. The idea that we continue on as we are: unchanged, unchanging is unbelievably illogical. In a time and world where things are constantly changing, it is impossible to be in existence without being affected by the process of change. Changes are inevitable, and they are happening everywhere around us. This idea is portrayed in the Prescribed film â€Å"Looking for Alibrandi† and my ORT The Simple Gift by Steven Herrick. The meeting of two personalities is like the contact of two chemical substances if there is a reaction, both are transformed. This quote by Psychologist Carl Jung is clearly evident in both texts looking for Alibrandi and The Simple Gift. During the opening scene of the film looking for Alibrandi there is a Qantas plane taking off or departing likewise in the Simple Gift the symbol of Change is more dramatic with Billy illegally riding the freight train out of town; he is unsure where he will end up. This is very contrasting to the symbolism of leaving in looking for Alibrandi where Josie believes she knows exactly what she wants to do, where she wants to go and who she wants to marry. Josie Meets Jacob Coote from cook high at a public speaking event, the two have an instant reaction it could even be described by chemical. Josie and Jacob are portrayed as opposites Josie’s believes that she is better than Jacob. When the Sydney schools have the first social event of the year Josie looks to John Barton (the son of the national liberal party leader) But john never asks her it is Jacob that asks her to dance, Jacob Says â€Å"It’s a pity you’re not school captain we could have been perfect† this highlights that Jacob is aware of Josie’s views towards him. In The Simple Gift Billy’s life changes significantly, as does Old Bill’s. When readers first get to know Old Bill, the technique of recounting is used as we learn why he is a homeless man. When Billy enters Old Bill’s life, he is prompted to change the way he lives. At first, Old Bill opposes these changes, as he swears â€Å"piss off kid†. He then begins to accept the changes as we observe him getting up early, having showers and quitting drinking. Old Bill’s attitudes towards change develop through the novel and by the end, he looks forward to change as he deals with his past When Billy first becomes homeless I believe that this moment is the catalyst for change in Billy’s life. Billy meets many challenges in this new place, such as where to sleep and where to find food. He meets these challenges head up, as he is determined to enter this new world and make a new life for himself. He sleeps in an old train carriage, and most of his meals are scraps from McDonalds. His attitude towards this change is enthusiastic and he feels that this change is beneficial for him. Josie meets thernominal challenges also with the death of John Barton, Josie’s world is thrown into turmoil and Josie seeks answers as to why someone like John Barton with all the things he had going for him would commit suicide. And asks the rhetorical question â€Å"I wonder what his parents will do with the sheets, will they throw them away or will they scrub and scrub so that they can always sleep on them. † Josie is in an emotional state for quite a while. One day on the train Josie and Jacob cross paths and Josie has a break down, Jacob comforts her. I believe that this is the catalyst of change for Josie between her and Jacob. Josie’s Initial reaction to her father Michael Andretti coming back into her life was nothing short of her dismissing him as a useless selfish object. This is parallel with the reaction of Billy towards his father. This is supported by the extracts ‘soulless tyranny’ of â€Å"the old bastard’ his father. This technique of expletive language is used to depict the poor relationship he shared with his father. I believe that Josie chooses to have a positive relationship with her father when she calls him after Josie hits Carly with one of her ancient history textbook. Michael gets Josie out of trouble at school and also changes Josie’s perception about fathers Josie now believes that fathers have a use, she is also growing quite fond of her father. Josie now stays at her father apartment on Sydney harbor on most weekends and enjoys spending time with her father. In the closing scene of the film it is exactly one year later on tomato day again and the picture quality is a lot sharper this conveys that Josie is clear about her decision to be there and even invites her friends over this time. The key idea conveyed in both â€Å"Looking for Alibrandi† and â€Å"The simple Gift† is quite nicely summed up by â€Å"The meeting of two personalities is like the contact of two chemical substances if there is a reaction, both are transformed† this is clearly evident in both with Josie’s relationships with Jacob Coote and her father Michael Andretti and Also for Billy with his relationships with Old Bill and Caitlin.

Friday, September 27, 2019

Supporting People with Depression Essay Example | Topics and Well Written Essays - 2500 words

Supporting People with Depression - Essay Example There are varied causes of depression, and for the case of Hattie, the possible causes are the loss of her parents, joblessness, and loneliness. Â  Depression can be a simple as being in low moods if it is mild, but for severe cases, it needs treatment because it can be suicidal (The British Psychological Society, 2009). This work discusses nursing practice, health surveillance and health promotion and sociological aspects of health and disease concerning the case. The work also describes the principles and concepts of health monitoring and health promotion related to mental health management. There is also an illustration of the application of theoretical aspects of fundamental nursing for the case and the relationship between applied sciences and health. Through the implementation of the theories discussed, the work outlines how nurses should care for depressed patients. Â  Clinical Depression has two core features, which form essential symptoms. The patient typically has lowered moods accompanied with disinterest and or displeasure in usual activities. Hattie possesses both signs, which call for diagnosis. The first stage of my diagnosis will be to find out the extent of her depression through asking her clinically designed questions and discussing the symptoms with her. I can also use the International Classification of Disease (ICD-10) to determine symptoms likely to suggest that she is depressed. For instance, the two mentioned symptoms and others (World Health Organization, 2004). I will try to find out from Hattie about her concentration levels, level of self-esteem and self-confidence, time of sleeping, and change in weight or appetite. There are other symptoms such as feelings of worthlessness or guilt, agitation, pessimism or hopelessness or suicidal thoughts and acts.

Thursday, September 26, 2019

Relationships Essay Example | Topics and Well Written Essays - 1500 words

Relationships - Essay Example Whole of her life she had to burn in the desire to unite with her lover and also had to see her lover with someone else .This pain was killing her inside, but she found no way to express her despair and distress to anyone and kept everything to herself. Celie on other hand is a black woman, who had to undergo sexual assault from the hands of her step father and feel dejected and exploited at her own home. Moreover, she had lost her children from her step- father and had to undergo the agony of a mother who lost her children .She was then married to a man called Albert who also disrespectful towards her and abused her greatly which left a black mark on her mental and physical health. She felt being victimized by men in all phases of her young life and wanted to escape from this traumatizing environment. How are Tita and Celie are different? Tita is naive and loving Mexican girl who is submissive and head over heels in love with her neighbor. All she wanted in her life was the love of her lover but was finding her mother as an obstacle to possess him. Tita is a delicate woman and had no expression of feminine strength and endurance to suffer all the pain and agony she was going through because of her lost love. She has her charms but she is not able to do anything because of the restriction she faced from her mother. She has been asked to serve her mother till death and forbidden from marrying her lover. She is very romantic and creative but loses her identity because of her arrogant and self – centered mother. Tita achieves the union with her lover very late in her life and also loses him the very day they became physically close. Celie is a black woman who has not seen the happier side of life, since her childhood. She actually does not have any self confidence or self – identity. She was subject to oppression from men since her childhood and also had to bear children from sexual assault. She lost trust in herself and had no hope in life and the o nly relief she had the love she had for God. She also got married to a man she never loved and had to be a victim of abuse and assault from him too. Through all these bad experience she lost her self confidence and her sexuality and felt that she had no dreams and hopes from life. But later with the help of her friend, she realizes that she had lot more strength and will power left in her to bring back positive changes in her life. She molds herself to be independent business women and regain the power as well established black women that most of women desired for. Elements Tita and Celie needed to be Stronger Tita is a young woman who has no moral or emotional support from anyone in her family or outside. She should have fought with her mother to acquire her lover as her mother was being cruel and ignorant to her. She should have developed some courage to speak for herself and obtain what she wanted most in her life. Being naive and innocent is not a bad quality but being suppresse d and exploited is also not a quality worth praising. A woman should be strong and determined enough to explore her desires and choices in life and standby it at any cost. Tita’s mother was threatening her and black mailing and if she would have been strong willed she could have achieved her lover whom she loved passionately and

Revised Progress Report Assignment Example | Topics and Well Written Essays - 1000 words

Revised Progress Report - Assignment Example In the case of Chopsticks Express, they are targeting only the small amount of Chinese consumers, who are the students of the State College. My efforts would be to make consumers aware of the Chinese foods in the market along with highlighting how the local customers could be attracted towards Chinese foods. The role of supervisor has been important for this project, and I have been guided by my supervisor throughout the project and this has helped in improving the quality. I have been incorporating the feedback of the supervisor and will continue doing so. After receiving further feedback, the research will continue in steps for the submission of its final draft of the proposal. Work Completed I have received the approval and feedback from my instructor concerning my research based on my course, which includes supply and demand analysis in order to understand the competition in the restaurant market. The feedback from my instructor included instructions of carrying out my research a nd his instructions have been helpful in improving the work. Based on the feedback, I came to know by surveying the downtown area that Chinese restaurants are facing some direct competition from other Asian and American restaurants because some of the Chinese restaurants offer American or Asian based cuisine at lunch time. The draft proposal was due from 10th June and after purifying my research according to the feedback received, I submitted my final proposal on 19th June with my final topic of Research Information of Chinese Restaurants in State College. My research included the analysis of Chinese restaurants. 13 Asian and 8 Chinese restaurants are located in State College Downtown. Among the Chinese restaurants Chopsticks Express offers the authentic cuisine of Chinese. Chopsticks Express, which is situated at the central in the state downtown, has an advantage because it could attract more customers apart from the local Chinese customers. But the reason for not influencing othe r customers of the region, which I figured out from my survey, was that Chopsticks Express has a very crude environment. I found that majority of the people do not visit Chopsticks Express because of its unpopularity. The main weakness of the restaurant is that it does not have a welcoming environment and why would anyone want to visit a restaurant which does not have a welcoming environment? I read case studies about the restaurants, analyzed the competitive market of restaurants by supply and demand analysis. In the ending days of June, I was supposed to work on the demography part. Demography includes the study of population size. The study included sample size of 800 customers who received a questionnaire; these 800 people were those who belonged not only to the area of downtown but also those who visit downtown. The questionnaire was also conducted from the managers of the Chinese restaurants operating in the State College downtown area. The responses from the questionnaire I c onducted helped me to learn the importance of information; information plays an important role in terms of restaurant market. The responses suggested that awareness of Chinese food in the US is relatively low and only local customers like Chinese students prefer Chinese cuisine in the US. For determining the possible solutions for the Chinese resta

Wednesday, September 25, 2019

Why were American politicians unable to fashion a compromise, as they Essay

Why were American politicians unable to fashion a compromise, as they had done in the past, to avoid a civil war in 1860 and 186 - Essay Example Most authors have tried to give an explanation as to why American politicians were unable to avoid the occurrence of the war in the year 1860 and 1861. This leads to a number of questions. Why and how did the status of middle class women change between the years1776 and 1876? What militaries or ideas inspired and influenced antebellum reform remake and change of American society during the antebellum years? What made Southern nations to secede from the unification in the year1860 and 1861? This essay answers these three questions, hence outlining the reasons why American politicians were unable to avoid civil war in 1860 and 1861. Northern Middle-Class Women The change of lives and status of Northern middle class women between 1776 and 1876 really influenced the occurrence of the civil war. Women with delegate credentials such Lucretia Mott were denied access to the national assembly of the World Antislavery Convention (WAC) in London (Blackstone 5). This highly resulted in protests due to rejection of gender equality. Some of the angered delegates such as Mott stormed from this gender dissatisfaction to support the protests, which contributed to the civil war (DBQ #11, Doc. #3). During this era, women were unable to occupy the ethnically fashionable â€Å"separate sphere† hence this led to gender equality violence. ... #6). Antebellum Reforms The efforts and notions, which enthused and aggravated the antebellum reforms highly influenced the occurrence of the 1860 civil war. There is not period in the history of America that had superior efforts to change society than the preceding four years before the Civil War (DBQ #9, Doc. #1). During these four decades, there was a diversity of social problems, which came under attack (Blackstone 7). The most prominent reformer of the antebellum reform was Horace Mann. Throughout the years 1837 to 1848, this reformer (Mann) was the leader of the Massachusetts Board of Education. During his leadership, Mann was a tireless supporter of education and stated that, if the civic failed to prepare the children to be effective citizens, then the republic was to undergo destruction like other nations (DBQ #11, Doc. #4). During these years, many Americans worked tirelessly to construct public schools, improve healthcare facilities, promote women’s rights, and chan ge criminal integrity system, and battle drunkenness and poverty. By the 1850’s, abolitionism, which was an attempt to end slavery in American became the greatest issue of the antebellum reform movement (DBQ #9, Doc. #1). According to President Jackson’s statement, â€Å"I deem man can be prominent†¦Ã¢â‚¬  quoted from (Alice 22), people are more godlike, and they were capable of eliminating any challenge and governing themselves through perfecting the institutions in order to perfect the American democracy (DBQ #11, Doc. #1). In the American history, antebellum reform comprised of frantic efforts to eradicate evils and right wrongs, which soon resulted to wars (McCutchen 33). William started publishing The Liberator in the year 1831whose aim was to motivate people to lift up the

Tuesday, September 24, 2019

Argument Essay - should school be separated by gender

Argument - should school be separated by gender - Essay Example These trends continued in many institutions that were slow to change, or believed that gender-segregation created a more functional scholastic environment. This essay argues that gender segregation in the scholastic environment is a misguided policy because of the nature of school as used for student development, the problem of stereotypes, the learning experience, and the undemocratic process of such segregation. A counter perspective is also considered. Large amounts of people reject the notion that schools should be segregated along gender lines. There are a variety of reasons that support this perspective. One of the prominent reasons in this mode of understanding is that the scholastic environment does not simply function as a means of promoting education, but also operates as a means of preparing students for the real world and the democratic process. In these regards, restricting school to one gender creates an artificial environment that is not at all reflective of the real world. When this notion is considered on a deeper level one also understands that the process of the scholastic environment functions on a developmental level as well. For instance, children learn how to interact with the opposite sex in romantic and platonic ways. For an individual to successfully function in the real world it becomes necessary for them to learn to navigate such relationships (Barton & Cohen). Individuals that support gender segregation t hen are shortsighted in that they fail to recognize the strong amount of learning that occurs between classes. Within the understanding of students’ development, one also considers the nature of stereotypes. Proponents of gender segregation in the classroom have argued that because of gender differences learning can be more effective and efficient in a gender-segregated classroom. While such theories are rooted in educational theory, a number of people have challenged such

Monday, September 23, 2019

Learning Objectives Term Paper Example | Topics and Well Written Essays - 250 words

Learning Objectives - Term Paper Example It contrasts with the learning outcome: the students will reliably determine the ability to use the conventions of grammar when creating a  paragraph  in that; the behavioural objective is a statement of intent unlike the learning outcome which is a  demonstration  of performance. The learning outcome is an  achievement  of  various  learning experiences where as the behavioural objective is a  description  of a specific,  detailed  behaviour  which is identifying the rules of grammar (Arreola 3). Considering the learning objective: after the class, the learner will be able to  describe  affirmative action and to  describe  three factors, which promote affirmative action, in the work place, with the learning outcome: that at the end of the lecture, the student will  achieve  the ability to  demonstrate  and develop affirmative action programs within a work place environment (Arreola 5).  The learning objective clearly a statement of intent, and again it clearly specifies the  ability, and  skill  the student will  achieve  which is to  define  and  promote  the affirmative action. On the other hand, the learning outcome is a  demonstration  of  performance  whereby the learner can  develop  affirmative  actions in the working environment (Arreola

Sunday, September 22, 2019

Satyam Computer Services Essay Example for Free

Satyam Computer Services Essay In early 2009 the chairman of Satyam Computer Services admitted publicly to a fraud taking place in the company. Satyam reported in the financial statements billions of dollars in profits and cash assets that never existed. The public auditor’s responsible for auditing the financial statements of Satyam Computer Services at the time was PW India, an affiliate of Pricewaterhouse Coopers. The Securities and Exchange Commission determined that Satyam was able to commit the financial statement fraud due to the negligence of the audit team. The audit team tasked with auditing the records of Satyam failed to confirm cash balances in bank accounts which were grossly over represented. Later it was determined that the more than one billion dollars Satyam claimed to have was actually no more than sixty-six million. During the audits of Satyam Computer Services, the audit team at PW India never sought confirmations for the cash balances that management asserted which is a clear violation of auditing standards. The SEC, during the investigation, determined that many audit teams in PW India accepted cash confirmations directly from the management of their clients and almost never questioned the reliability of the confirmations received. It was also revealed that sometimes the banks would send statements directly to the auditors even though they weren’t directed to do so. Even though the bank statements showed different balances then those given to the auditors by management, the audit team never questioned the differences in amount. Procedures, for reviewing audits, were put into place to assure that all audits are completed with the highest degree of professional care. The Satyam audit team was warned by a partner from a different Pricewaterhouse Coopers firm that their cash confirmation procedures were deficient, but nothing was done to correct the deficiency. Due to this deficiency the Satyam fraud was not uncovered. As a result Satyam Computer Services was fined 10 million dollars by the SEC for fraud and PW India was fined 7. million dollars by the SEC and PCAOB. The critical issue in this case is that PWC India did not act in accordance with PCAOB or AICPA standards and codes of professional conduct. The critical factors are as follows: * The auditors did not act with due professional care. * The auditors did not appropriately assess the risks of material misstatements. * The audit team did not exercise professional skepticism. * The auditors did not act with integrity or in the best interest of the users of the financial statements. Due professional care, as required by the PCAOB, require the auditors to maintain professional knowledge and skill at the level required to ensure that clients receive competent professional service and to act in accordance with professional standards. This is the most vital part of the audit process to make certain that the audit will be handled with, ultimately, the users of the financial statements best interest in mind. PWC India, in their audit of Satyam, had completely disregarded this fundamental requirement of auditors. By relying on the confirmations given to them by management, the auditors did not provide the users of the financial statements with the skill and professionalism they are trusted with. As a result, they completely missed an obvious fraud taking place at Satyam and if the executive of Satyam hadn’t admitted to the fraud PWC India’s controls would have never caught the overstatement. Another relevant issue here is that the audit team did not appropriately assess the risks of material misstatements which resulted in the fraud. Before an audit, in the planning stage, the audit team should have identified accounts, transactions, and disclosures that could affect the financial statements significantly if they were materially misstated. The auditors at PWC India did not properly identify that the risk that the assertions of management about the cash accounts would result in a high risk of material misstatement. Cash accounts regardless of industry should require a special attention during an audit. The professional judgment of the auditors was lacking in the audit of Satyam’s cash balances. When evaluating the risks of certain accounts the auditors should have asked themselves whether there is a risk of fraud, whether there is subjectivity in measuring the financial information, and whether there is any unusual balances in the accounts. The answer to these questions should have all been yes in this case and there is no reason why they shouldn’t have properly confirmed the cash balances. One of the many requirements of an auditor is to exercise professional skepticism. The auditor must take what’s given to him with a ‘grain of salt’ and also question and confirm the existence, occurrence, and accuracy of account balances. In the audit of Satyam, the auditors acted with no professional skepticism whatsoever. If the auditors are not doing their due diligence, the audit risk will rise due to the increase in detection risk. Management took advantage of the fact that the auditors procedures of detecting material misstatements were lacking. This article’s relevance to the auditing profession is enormous. From here, auditors should learn to not take anything for granted and to always question what is put in front of you, unless it is from a completely objective source. The auditors at PWC India did not follow the basic requirements of an audit engagement which resulted in a major fraud. Even when the banks sent account confirmations directly to the auditors, despite not being requested to do so, the auditors still did not question the discrepancies. The gross negligence in this case should be an example to all auditors; do not take anything for granted. The quality control review also failed in this case. Auditors need to heed the advice of the review team. Here, the audit team ignored the recommendations of the review team to confirm cash balances with the banks. Quality control reviews are very significant to an engagement and auditors should not take recommendations without due consideration.

Saturday, September 21, 2019

A Study Of HIV And Aids Health Essay

A Study Of HIV And Aids Health Essay HIV stands for Human Immunodeficiency Virus. It is the virus that causes AIDS. HIV is not like other viruses and different from other, the reason is it attacks the immune system. HIV discovers and destroys a form of white blood cell, T-cells or CD4 cells, which the immune system must have to fight diseases. AIDS stands for Acquired Immunodeficiency Syndrome and it is the final phase of HIV infection. Possibly, it can take many years to a person get infected from this disease called HIV to get at this stage. With the problem of AIDS refers to that the virus has damaged the immune system to the point at which the human body has a tough time fighting with infections. When some person has one or more than one particular infections, specific cancers or a very low number of T-cells, the person is regarded as a patient of AIDS. HIV transmission can take place when blood, semen, pre-seminal fluid, vaginal fluid, or breast milk from an infected individual comes into the body of an uninfected individual. HIV can come in the body all through a vein, the lining of the anus or rectum, the lining of the vagina, the opening to the penis, the mouth, the eyes, the nose, or cuts and slashes. The most ordinary methods that HIV is transmitted from one individual to another individual is be having sex (anal, vaginal or oral) with an HIV infected individual, or by sharing an infected needles with an HIV, or from if mother is infected from HIV, than the baby also gets infected during birth or through breastfeeding after birth. HIV can also be passed on through receipt of infected blood. Though, from the year 1985, all donated blood in the United States must be tested for HIV. So, the chances of infection all through transfusion of blood or products related to blood is extremely low down. Some healthcare workers have become infected after being stuck with needles containing HIV-infected blood or when infected blood comes in contact with a workers open cut or is splashed into a workers eyes or inside their nose. There has been only one instance of a patient being infected by an HIV-infected dentist to his patient. HIV attacks the immune system. The immune system is a group of cells and organs that protect your body by fighting disease. The human immune system usually finds and kills viruses fairly quickly. However, different viruses attack different parts of the body. HIV attacks a special type of immune system cell known as a CD4 lymphocyte. HIV has many ways of evading the bodys defenses including the ability to rapidly mutate. This means that once HIV has taken hold, the immune system can never fully get rid of it. In the situation, if left is not treated, then HIV will ultimately weaken the immune system to the extent that an individual will become sick with different types of infections, known as opportunistic infections. AIDS defining illness are considered to be as most serious opportunistic infections. When an individual becomes sick with one of the AIDS defining illness, he is said to have AIDS. There isnt any way to tell just by looking if someones been infected by HIV. In fact, a person infected with HIV may look and feel perfectly well for many years and may not know that they are infected. However, as the persons immune system weakens, they become increasingly vulnerable to illnesses. The only reliable way to tell whether someone has HIV is for them to take a simple blood test, which can detect infection within just a few weeks after the virus enters the body. The most important type of treatment for HIV or AIDS is known as antiretroviral treatment. This treatment comprises of drugs that should be taken every single day for the remaining life. The main motive of antiretroviral treatment is to remain the proportion of HIV in the human body at very low level. This also discontinues weakening of the immune system and permits the immune system to get better from any damage that HIV possibly has caused by now. If an individual is taking two or more than two antiretroviral drugs at the same time, that is called combination therapy. By taking a combination of three or more anti-HIV drugs is a little referred to as HAART. HAART stands for Highly Active Antiretroviral Therapy. Luckily, there are more than 20 approved antiretroviral drugs accessible and unluckily, there is no list licensed or available in each and every country. Initially, the combination of drugs that an individual is given is called first-line therapy. If after some time, HIV becomes opposed to this combination or if there will be any side effects, a move to second line therapy is suggested. Second line therapy consists of at least of three new drugs so as to increase success. Apart from this, there are many other things through which you can decrease the risk of catching HIV or passing it along to someone else. The simplest is to withdraw or abstain from sex like so not have oral, anal or vaginal. Until, you should have love or relationship with only one person or having sex with only each other and both of you should be familiar with each others HIV status. If any of you have HIV, use protection like condoms to avoid other sexually transmitted diseases and likely infections with a different damage of HIV. If only one of you has HIV, use a latex condom and lubricant every time you have sex. If you have, or plan to have, more than one sex partner, get tested for HIV. If you are a man who has had sex with other men, get tested at least once a year. If you are a woman who is planning to get pregnant or who is pregnant, get tested as soon as possible before you have your baby. Talk about HIV and other STDs with each partner before you have sex. Learn as much as you can about each partners past behavior, including sex and drug use, and consider the risks to your health before you have sex. Ask your partners if they have recently been tested for HIV, and encourage those who have not been tested to do so. Use a latex condom and lubricant every time you have sex. If you think you may have been exposed to another STD, such as gonorrhea, syphilis, or Chlamydia, get treatment. These STDs can increase your risk of getting HIV. Get vaccinated against the hepatitis B virus. Even if you think you ha ve a low risk for HIV infection, get tested whenever you have a regular medical check-up. Do not inject illicit drugs. You can get HIV through needles, syringes, and other paraphernalia if they are contaminated with the blood of someone who has HIV. Drugs also cloud your judgment, which may result in riskier sex. If you do inject drugs, use only clean needles and syringes, and never share needles or syringes. Be careful not to expose yourself to another persons blood. Get tested for HIV at least once a year. Also, consider getting counseling and treatment for your drug use, and get vaccinated against hepatitis A and B. Fortunately, there are numerous organizations that assist HIV/AIDS victims and are constantly working to find a cure. One of these organizations is the Global AIDS Alliance (GAA). The goal of the GAA is to stop the global AIDS crisis and to limit the impact it has on poor countries that are hit hardest by the epidemic. The GAA was founded in 2001 and plays a critical role in shaping the AIDS policy debate and campaigns to speed the global response to HIV/AIDS. In just a few years, the GAA has achieved considerable success in increasing funding and influencing AIDS policy. In the future, the GAA plans to achieve universal access to HIV/AIDS prevention, treatment, and care by 2010. Works Cited AIDS/HIV. About.com. Jan. 2009. 11 Jan. 2009 . Global Aids Alliance. 2008. 11 Jan. 2009 . HIV/AIDS. Centers for Disease Control and Prevention. Jan. 2009. Department of Health and Human Services. 11 Jan. 2009 . Mulvihill, M. L., M. Zelman, P. Holdaway, E. Tompary, and J. Raymond. Instructors Resource Manual: Human Diseases: A Systemic Approach. 6th ed. Upper Saddle River, NJ: Pearson Prentice Hall, 2006. What is Aids? Avert: Averting HIV and AIDS. Dec. 2008. 11 Jan. 2009 .

Friday, September 20, 2019

Artrow of God :: essays research papers

Colonialism is seen as a difficult arrangement that prevents even the best people from acting for the common good. Chapters in which the British officials discuss with one another reveal that while they are not the worst of their type, racism and ignorant condescension more or less come with the territory. On page 174 is a great example â€Å"The white man watched Ezuelu with something like amusement on his face. When the interpreter finished he tightened up his face and began again. He rebuked Ezeulu for showing disrespect for the order of the government and warned him that if he showed such disrespect again he would be severely punished.† The British master plan for governing the Igbo, a plan with which Winterbottom, a seasoned colonial ruler, strongly opposes because it invites exploitation and corruption. The plan is to set up certain African leaders as British spectators. This novel is intercultural because it’s dealing with two different civilizations of society. The two components that exist are modern versus tradition. Achebe is concerned with the toll taken on Igbo people by the replacing of their old beliefs. A lesser son of Ezeulu, Oduchi, is chosen to go a Christian school more or less as a mole to keep his father informed. In a literal and misguided interpretation of scripture, he decides he must crush the head of one of the pythons that are sacred creatures to the Igbo. Achebe is very depictive when writing themes of descriptions of most marriages between characters. He displays this genuine love that exists between the husband and the favored wife, as in the tenderly drawn marriage between Obika and Okuata. On the other hand, the wealthy, greedy Nwaka who opposes Ezeulu at the outset of the book has acquired five wives by the book's end. The position of women within Igbo society is perceived to compromise with polygamy. Older wives often express jealousy of new ones but worse possibilities occur because of the corruption of colonialism. One African elevated to a position of status by the British is said to take any woman he wants without paying the bride price. Within the Igbo culture, women are at highly protected. This is a perfect example of how the language and writing technique communicates to outside readers by using emotions that inform the relations between the races. This novels theme is universal and is capable to relate to readers outside of Africa.

Thursday, September 19, 2019

Scenarios of Stereotypes Essay -- Illustrative Stereotyping Stereotype

Scenarios of Stereotypes Stereotypes can have excessive damage and it can have a very negative effect on the person in view or as a whole group. Stereotyping is not just another form of making fun of people, it also encourages rejection and outcast. Stereotyping is not only cruel and harmful to people, it can also have major effects on how a person behaves and acts towards other people. It also makes who ever is stereotyping look like a fool. It also forms barriers in communication and everyday life. In this essay I’m gonna give senario’s that will give evidence to what I’m trying to say. But first let me give you a short definition of stereotyping. Stereotyping is putting a label on someone or a group who is different in a way that society looks down upon, Like looks, beliefs, an...

Wednesday, September 18, 2019

Dawsons Creek Value :: essays research papers

A seminal one-hour drama series, â€Å"Dawson’s Creek† chronicles with wry humor the undeniably intense period of awakening known as the teenage years. A startlingly fresh and realistic approach to adolescence, bringing an edgy, keen perception to the turmoil of that time in life, â€Å"Dawson’s Creek† in its first two seasons ranked as one of the highest-rated shows among female teen viewers. Set in a picture-postcard Boston suburb, just off of the Atlantic Ocean, this coming-of-age series explores the blooming self-awareness and growing pains that go hand-in-hand with the triumphs of growing up. Wisely intelligent and yet naively open, four teens are at the heart of this drama as they unknowingly embark on the road less traveled, going against the norm in the paths they choose. Together in this passage from adolescence to young adulthood, the series stars James Van Der Beek (â€Å"Varsity Blues†), Katie Holmes (â€Å"GO!,† â€Å"Disturbing Behavior,† â€Å"Teaching Mrs. Tingle†), Joshua Jackson (â€Å"The Skulls,† â€Å"Urban Legend†) and Michelle Williams (â€Å"Dick,† â€Å"Halloween: H20†). John Wesley Shipp (â€Å"Sisters†), Mary-Margaret Humes (â€Å"History of the World, Part I†), Nina Repeta (â€Å"Radioland Murders†), Mary Beth Peil (â€Å"The King and I† on Broadway), Meredith Monroe (â€Å"Dangerous Minds† the series) and Kerr Smith (â€Å"Flight 180†) also star. Oblivious to how well he is growing into his good looks, Dawson Leery (Van Der Beek) is a teenaged Steven Spielberg fanatic who is charmingly obsessive and passionate about his love of movies. As he returns to Capeside for his junior year of high school after spending the entire summer in Philadelphia with his mom (Humes), Dawson must face the rift with his longtime best friend. Joey Potter (Holmes), the tomboy and emerging beauty who lives down the creek with her sister Bessie (Repeta), is still reeling from her break-up with Dawson and what she perceives as his ultimate betrayal in turning in her father for dealing drugs. While Dawson tries to embrace a newfound devil-may-care lease on life, the ever-sarcastic Pacey Witter (Jackson) has been grounded somewhat by his tumultuous relationship last year with Rhode Island transplant Andie McPhee (Monroe). Next door to Dawson, Jen Lindley (Williams) has moved back home with her Grams (Peil), along with Andie’s brother Jack (Smith). On the home front, Dawson’s dad (Shipp) starts a new position as Capeside High School’s new varsity football coach. Together, these friends learn that growing up is never as easy as it seems in the movies. Blindly testing the waters towards young adulthood, the astute teens shed their childlike innocence and endure the compromise of morality that accompanies so-called maturity.

Tuesday, September 17, 2019

Future Me

How I see myself in 2012 is what I believe we all want a happy and uncomplicated, A life where the economic, social, and health problems do not have place. I see myself see myself as the most successful person the world has seen. I will have graduated college, majoring in mechanical engineering in cu Denver. In CU I will meet a beautiful woman that just became a doctor. After being married for a few years we will have two kids. I want to have the perfect house, neither too big nor too small, with a pool and a very large yard where I can play soccer with my kids or have a cookout with family and friends.I also going to have a decent size pond behind the house where we could fish, swim and whatever I know all of these life successes will take a lot of time and effort. I hope my life is very different from what it is now, is not that I hate the life I have now but my parents taught me that they worked very hard to give me a better life than the one they had and I want to give the same t o my future family. By getting married and having a family I believe will bring joy into my life.I believe it can bring a joy that no one can know unless they experience it for themselves. My job will be there for me to help support my family, financially but I want to be able to raise them in a good neighborhood. I want to make sure my own family is happy. It is beautiful to watch your children grow up before your eyes and this is what I want. I believe, as well as most people, that you are successful in life if you have raised a family. I’m not sure of what my dream job would be but I know that it would be perfect.Being a Mechanical engineer means that I would be working with the both thing I love more motor and math and any job that mixes both would be perfect. In 2012 I hope to have enough wisdom to not get carried away by envy or lust and only pursue happiness, mine and those around me. My happiness in what I do is also a goal for me I my life. There is no way someone ca n become successful if they are not happy with what they are doing with their life. It is clear that to be happy you don’t need money or live in luxury; you need only to be happy

Monday, September 16, 2019

Introduction to Organizational Politics Essay

This piece consists heavily of quotations from and adaptations of material from several sources (see references at the end). There still may be some unreferenced quotations because I have lost track of their genesis over many years of moving content through various notes. I don’t claim originality, other than the choice and organizing of material – Rex Mitchell. Pfeffer (1992, p. 30) defined politics as â€Å"the processes, the actions, the behaviors through which potential power is utilized and realized†. Another author (Dubrin, 2001 , p. 92) defined organizational politics as â€Å"informal approaches to gaining power through means other than merit or luck†. It could be argued that politics are used primarily to achieve power, either directly or indirectly, e. g. , by being promoted, receiving a larger budget or other resources, or gaining desirable assignments. Many people regard organizational politics as something negative (e. g. , pursuing selflnterests at the expense of others) and something to be minimized. Consequently, although most people know that organizational politics are common, they avoid saying so when it concerns one=s own ehavior. It is more common to talk about politics when complaining about a loss to a friend than it is in the context of one’s own political maneuvering. When we win on an issue, we call it leadership; when we lose, we call it politics. In many organizations, politics is a taboo subject, which makes it difficult for individuals to deal with this crucially important aspect of organizational reality. I believe a leader must skillfully use organizational politics to acquire and retain power and to accomplish major goals. Therefore, it would be a mistake to pretend that politics does not exist or to antasize that a leader can be effective without appropriate (and ethical, I would add) use of politics. As Pericles wrote over 2500 years ago, â€Å"Just because you do not take an interest in politics doesn’t mean politics won’t take an interest in you. † I regard organizational politics as neither good nor bad, per se, although it is important for us to distinguish between ethical and unethical political behavior.

Sunday, September 15, 2019

Quality of Patient Care: Nursing-Sensitive Indicators Essay

Nursing-sensitive indicators play a large role in bedside nursing today. They encompass the care given to patients, how it is given, policies, procedures, and different levels of staffing, education, and experience (ANA). They also provide a means to measure patient satisfaction. Not all involved with patient care will share the same knowledge and experience as can be seen in the scenario of Mr. J. How could nursing-sensitive indicators have changed his outcome? How can data collected on nursing-sensitive indicators advance quality care for all patients? One of the risk factors for acquiring a pressure ulcer, a deep vein thrombosis, or hospital acquired pneumonia is immobility. There can be several causes of immobility and in this case it is the use of restraints. Mr. J has developed a pressure ulcer due to lying flat on his back in bed restrained. When the nurse’s aide assisted him back to bed, lying on his back again, she showed she did not have a clear understanding of a pressure ulcer as a nursing-sensitive indicator. She should have propped him up with pillows so the reddened area was relieved of pressure. Had she or the nurse possessed that knowledge they would have been assessing his skin frequently and repositioning him in bed often enough so as to prevent such an event from occurring. The patient’s need for restraints could be reassessed as well. Is he trying to get out of bed unassisted and is considered a fall risk due to his hip fracture and mild dementia? Perhaps a bed alarm or a sitter would have been better alternatives. Either would have allowed Mr. J to move independently in bed and he would have been less likely to develop a pressure ulcer. Restraints are often used without considering alternatives  first. They can cause more injury than good and decrease patient satisfaction. In this case, it may be difficult to gauge Mr. J’s satisfaction but his daughter certainly wasn’t satisfied with his care. It is possible his hospital length of stay has been increased by the staff’s lack of knowledge regarding nursing-sensitive indicators. At this point the staff must take action to correct the situation and hopefully heal the pressure ulcer. How can hospitals use data collected based on nursing-sensitive indicators to increase the quality of patient care? Hospitals measure certain occurrences such as falls and pressure ulcers. Nursing care directly impacts these. If the number is higher than the national average, for example, a hospital may perform a study to determine the cause and then implement interventions to try to reduce the occurrence of falls or pressure ulcers. By analyzing data collected after an intervention was applied, the hospital can determine if the outcome was achieved or not. Once an intervention proves successful a new policy can be implemented throughout the hospital, decreasing falls or pressure ulcers, leading to improved quality care for all patients and greater patient satisfaction (AmericanSentinelUniversityBlog). Another nursing-sensitive indicator is patient satisfaction with overall care. In Mr. J’s scenario I would say the patient’s family was completely dissatisfied. As a Jewish rabbi he requested a kosher meal and was served pork cutlet due to an error with his order. Were he not mildly demented he may have noticed what he had been served, but he did not and ate it. When the daughter was notified the next evening she discovered the nursing staff had kept it from her and that the nurse was not sensitive to the needs of her father. This was just another complaint in several that had occurred over the last six months. The physician and administrator were notified. This is a serious offense and may prompt the Jewish community to seek care at another hospital. In order to resolve this issue and keep Mr. J’s trust and that of his daughter, several things must take place. The nurse and physician caring for the patient should acknowledge the error and offer a heartfelt apology. They should also assure the family, steps are being taken  to prevent this from reoccurring. If the orders are entered through an electronic health record, IT may need to get involved to determine where the error is occurring in the order process in order to have it filled correctly. The dietary supervisor should be notified and perhaps find a new way to indicate clearly if a tray contains a kosher meal. A sign on the patient’s door could indicate his meal preference so that all entering, whether it is a dietary tech, a nurse’s aide, or the nurse, will clearly see it. That way, even if the patient is confused and alone, as Mr. J was, there will be no mistake made. The issue here is patient satisfaction. Mr. J’s family may still leave dissatisfied but this event may help implement new policies respecting ethnic preferences and the incorporation of them in a patient’s care. In healthcare today, nursing-sensitive indicators are important to hospitals in that they provide a gauge to measure the quality of care patient’s receive. The more knowledge a nurse has of nursing-sensitive indicators, the greater quality care she can provide to produce better outcomes for her patients, resulting in their improved satisfaction. Reference Page American Nurses Association. (2015, January). Nursing-Sensitive Indicators. Retrieved March 12, 2015, from Nursing World: http://www.nursingworld.org/mainmenucategories/ThePracticeofProfessionalNurses/Research-Measurement/The-National-Database/Nursing-Sensitive-Indicators_1 American Sentinel University Blog. (2011, November 02). Health Care On Call. Retrieved March 12, 2015, from American Sentinel University Blog: http://www.americansentinel.edu/blog/2011/11/02what-are-nursing-sensitive-quality-indicators-anyway/ .

Saturday, September 14, 2019

Public Examination Should Not Be Abolished Essay

While several states are implementing some form of standards-based reform, there is very little empirical evidence to prove that standards, assessment, and high-stakes accountability programs are effective in improving public schools. In many states, such as California, attempts to implement standards-based reform are inconsistently or carelessly aligned with quality research. The following are some of the shortcomings of standards-based reform. 1. Recent reports on the standards-based reform movement in New York suggest that in many schools the careless implementation of standards and assessment may have negative consequences for students. Vague and unclear standards in several subject areas in several states complicate matters and do not serve as concrete standards defining what students should know and be able to do. 3. Top-down standards imposed by the federal or state government are also problematic. They impose content specifications without taking into account the different needs, opportunities to learn, and skills that may be appropriate for specific districts or regions. Table 1: Advantages of SBA compared with external examinations Point Characteristics of SBA Characteristics of Exams Scope Extends the range and diversity of assessment collection opportunities, task types and assessors Much narrower range of assessment opportunities: less diverse assessment; one exam per year Authenticity Assessment done by students’ own teacher; less possibility of cheating as teacher knows student capabilities; assessments more likely to be realistic Removes assessment entirely from teaching and learning; stressful conditions may lead to students not demonstrating real capacities Validity Improves validity through assessing factors that cannot be included in public exam settings Limits validity by limiting scope of assessment, e. g. difficult to assess interaction skills in exam environment Reliability Improves reliability by having more than one assessment by a teacher who is familiar with the student; allows for multiple opportunities for assessor reflection/standardisation Even with double marking, examiners’ judgments can be affected by various factors (task difficulty, topic, interest level, tiredness, etc); little opportunity for assessor reflection / review Fairness Fairness is achieved by following commonly-agreed processes, outcomes and standards; teacher assumptions about students and their oral language levels is made explicit through collaborative sharing and discussion with other teachers Fairness can only be achieved by treating everyone the same, i. e. setting the same task at the same time for all students. Feedback Students can receive constructive feedback immediately after the assessment has finished, hence improving learning The only feedback is usually a grade at the end of the course; no opportunities for interaction with assessor; no chance to ask how to improve Positive washback (beneficial influence on teaching and learning) Ongoing assessment encourages students to work consistently; provides important data for evaluation of teaching and assessment practices in general Examination is purely summative, and does not serve any teaching-related purpose; effects on teaching and learning may even be negative; may encourage teaching to the test and a focus on exam technique, rather than outcomes. Teacher and student empowerment Teachers and students become part of the assessment process; collaboration and sharing of expertise take place within and across schools Teachers play little to no role in assessment of their students and have no opportunity to share their expertise or knowledge of their students; students treated as numbers Professional development Builds teacher assessment skills, which can be transferred to other areas of the curriculum Teachers have no opportunity to build their assessment skills; get little or no feedback on how to improve as teachers

Friday, September 13, 2019

Performance Management Essay Example | Topics and Well Written Essays - 2250 words - 3

Performance Management - Essay Example This paper presents a performance management system for retail sales associates of a clothing and fashion accessories retail store. The ultimate goal of the system is to help improve revenue and customer satisfaction. By virtue of you role, you will be the first contact the customer makes when they enter the store. As such, you will be required to possess adequate knowledge of the companys products. Your role will include, but not be limited to, the following: For a start, you will be remunerated at the rate of $8.00 per hour. However, based on your performance, this rate could be increased in the future. In addition, you’ll receive a bonus every time you exceed your weekly sales target by at least fifty percent. Several key behaviors are necessary first for successful job performance of sales associates then for the realization of the goal of the performance management system(Haines III & St-Onge, 2012). Three of them are discussed here. The first is the habit of the sales associate updating their knowledge of the company’s products. Clients are impressed by sales associates who demonstrate deep knowledge of the products they seek to sell. This impression goes a long way toward influencing the customer’s decision to buy. By contrast, sales associates who exhibit ignorance of their company’s products are a put-off. Given that that the company carries new brands of merchandise from time to time, it will be necessary that every sales associate acquaints themselves with these brands. The second desirable behavior is the habit of going the extra mile(Grffin & Moorhead, 2010). Most sales associates will be happy and satisfied with simply helping the client locate the product they ask for when they enter the shop. It is a well-recognized fact that with a little calculated â€Å"guidance† of the sales associate, the client is likely to end up buying more items than they had intended. For instance,

Thursday, September 12, 2019

Martin Luther the Hero of the Reformation 1483 to 1546 Essay - 1

Martin Luther the Hero of the Reformation 1483 to 1546 - Essay Example This paper illustrates that Martin Luther’s parents were so devoted to teaching him the ways and the fear of God from his childhood. In the year 1517, during the day of All Saints, and he was then a theology professor at the University of Wittenberg, he made a posting of 95 theses on the door of the church. His major concern in the theses was the disposal of indulgences in the afterlife as depicted by the papal grants and the inclusion of purgatory releases. The present research has identified that Martin Luther first wrote the theses in Latin but translated the whole work into German. This work of the theses prompted a summoning by the church for an explanation to the authorities. The paper tells that Martin Luther would later get involved in more controversy and in the year 1520, he made writings about papacy's corruption, the supremacy of faith as compared to the good works and the acknowledgment of only two out of seven sacraments' validity. Due to this, in 1521 he was mad e to appear before the then emperor Charles the 5TH. The conclusion from this study states that Martin Luther, despite all the summoning and his open criticism of the church, he was not to recant these writings. The result was his banning under the Worms Edict. According to the research findings, it can, therefore, be said that it was his numerous disagreements with the Roman Catholic Church’s doctrines that sparked many events and within a few years marred the unity of German religion.

Wednesday, September 11, 2019

The Periclean Ideal Essay Example | Topics and Well Written Essays - 1250 words

The Periclean Ideal - Essay Example Aside from this, they do not only follow the rules and abide by the constitution because they are required but they willingly do it because they want to. Athenians had thus achieved something quite unique - being both ruled and rulers at one and the same time. This had forged a unique type of citizen. Clever, tolerant, and open minded, Although restricted to adult males of local ancestry, Athenian nationality established complete and active involvement in every judgment of the state with no consideration to affluence or class. The Athenians disqualified women, children, resident aliens, and slaves from political life, but the code of equal opportunity in the political population that they invented was the starting point of the contemporary thought of collective egalitarianism that flourished during the French Enlightenment. The Funeral Oration was declared in a battle that was obviously going to persist for some time. Its principal function, even more significant than flattering the deceased, was to make clear why they had been correct to risk their lives and why the living should be willing to do likewise. The deceased armed forces' goal was to safeguard a Constitution and a way of life that was distinctive and commendable of sacrifice. Pericles presented his visualization for Athens and the kind of inhabitant its exceptional constitution and way of life would create. It enclosed an apparent, if repeatedly implied, difference with the Spartan way of life, which so many Greeks accepted but which Pericles regarded as substandard to the Athens he envisioned. One of the strengths of the ideals was emphasis on competition, excellence, or merit and the undying glory that rewarded it. These aristocratic values never lost their powerful attraction to all Greeks, and Pericles claimed them for the Athenian democracy. He rejected the notion that democracy turned its back on excellence, reducing all to equality at a low level. Instead, it opened the competition for excellence and honor to all, removing the accidental barriers imposed in other constitutions and societies. The rewards conferred by these aristocratic virtues are precisely those sought by the epic heroes: greatness, power, honor, fame. For Pericles, Athens itself was a competitor for these prizes in the agon among poleis, past and present. But they are won by and for all the citizens of democratic Athens, and Pericles does not hesitate to assert the superiority of this collective achievement, going so far as to reject the need for an epic poet to guarantee its renown. Another strength of Pericles' ideals is the Athenians value for thought, deliberation, and discussion. Pericles praises the democracy's fondness for debate and discussion. Freedom of speech, extended to each and every citizen, was its hallmark and this freedom was the target of ridicule, not only by aristocrats who thought only those bred in political tradition or formally educated should speak, but also by the admirers of Sparta where decisions were made by acclamation without debate. Here Pericles has identified a critical element of his vision for Athens: its commitment to reason and intelligence. Thought is not a barrier to the achievement of heroic goals. In fact, it is a prerequisite for them, for the brave deeds performed by enraged heroes who give no thought to danger are, by his definition, not brave at all.

Tuesday, September 10, 2019

Case study Example | Topics and Well Written Essays - 500 words - 15

Case Study Example ligence Grid (Natgrid) aims to monitor the activities of private citizens1, a move which presses on the boundaries of a citizen’s fundamental liberties. It’s an echo of Big Brother in the guise of public interest; the concept is noble, but there’s so much opportunity for abuse that it cancels all intended benefits. The Natgrid will surely speed up the functions of the bureaucracy with a centralized intelligence system, but it’ll also make data accessible to a lot of unscrupulous personalities and agencies. Although a data protection law already exists (The Information Technology Act), it only goes so far as to cover an individual’s activity. The individual is set apart from the act. The UPA has to set specific ground rules to ensure both aspects coexist but remain separate. The freedom to information shouldn’t be absolute; there has to be a limit to how much the government can access. The law should protect the individual first and foremost. Everything else follows accordingly. 2. â€Å"Convenient and personal are the flip-side to private and anonymous† according to Greenfield. Indeed, convenience comes at a steep price nowadays, and the technological juggernauts of the Information Age admit it. P3P is an essential component of the Web-browsing experience; it allows users to navigate the byways of the Internet without leaving crumbs for the hounds to sniff and follow. This provides a perfect analogy to the online cookies implanted in your browser’s cache; they’re there to monitor online activities, but the exact coverage of this policy is never fully described. As a measure of courtesy, some sites do live up to their word by restricting their own access to user data. The opportunities exposed by a database of unlimited information is too tempting to resist, though, especially when everything of value is now stored in a remote corner or crevice on the web. The competition for technological supremacy between Google, Microsoft, and everyone else is

Business Strategy and Policy Case Study Example | Topics and Well Written Essays - 1750 words

Business Strategy and Policy - Case Study Example ents are readily available, a majority of those afflicted with the disease go untreated because health insurance companies refuse to pay at all or just part a certain percentage (Walters & Rotgers, 2012).  This makes some of the victims to end up being homeless, while others may die an early death in response to a missed opportunity for treatment due to the health insurance companies’ neglect and discrimination on the issue (Walters & Rotgers, 2012).   Substance abuse comprises of two main types of addictions namely drug addiction and alcoholism.   Drug addiction refers to the dependence on a street drug or on an over the counter medication while alcoholism is the dependence on alcohol. In this context, alcohol is referred to as a drug since it fits the description of a drug, which is defined as any substance that alters normal human homeostasis.   Once an individual is addicted to a substance, he or she cannot avoid using it irrespective of their desires to stop the habit because of the harm it might be causing to them. The American Medical Association (AMA) defines drug addiction and alcoholism as some of the major lifestyle diseases in the 21st century that may be a result of genetics, environment, or upbringing. There are numerous approaches that are applied in administering substance abuse treatment. However, some of these treatment methods are ineffective because they neglect not only the substance abuse dependency but also other causative factors such as comorbid mental illness and or any previous traumatic events that may have occurred in the individuals past that may have contributed to the substance abuse. Applications of such ineffective strategies leave substance abuse victims still struggling to maintain sobriety and have a successful life with stability and security in all aspects. An effective substance abuse treatment in individuals with any other causative factors must be inclusive of all factors and illnesses to be effective not only

Monday, September 9, 2019

Risk Assessment for Non-profit Hospital Essay Example | Topics and Well Written Essays - 1250 words

Risk Assessment for Non-profit Hospital - Essay Example book as a whole provides the readers with a comprehensive view of multiple risk assessment techniques along with a detailed analysis of current methodologies and concepts in risk assessment practices. It clearly defines the concept of risk assessment giving specific focus to the current day ‘messy business’ environment. Hospital Data Project (HDP) is a project initiated by the European Union Health Monitoring Programme (HMP), and it intends ‘to develop comparable hospital utilization data and indicators between Member States (MS)’. This data, loaded into the Commission’s pilot system has turned to be the hub of health information. The document describes the objectives of HDP with regard to data collection methodology and the creation of a pilot data set. This book is an excellent source of information on emerging trends, legal requirements, and challenges associated with internal information transfers and SSH integration. It gives a good account of SSH2 as a reliable tool that complies with the latest standards of communication security norms. This book is a ‘must read’ for learners of advanced risk assessment practices. This excerpt from online encyclopedia gives a brief account of Nessus-one of the most comprehensive vulnerability scanning program available today. It describes how the program helps clients to assess the level of their system’s vulnerability to data theft or virus attack. The website gives very detailed information about the vulnerability scanning tool-Nessus. The site has included several frequently asked questions and their answers along with the basic instructions for its users. One who goes through the site will get a clear idea of the total functions of Nessus. The relevance of this book is clear as it has been stated in the introduction, â€Å"each technical advance brings new security holes†. It reminds us of the incessant threat persisting over the internet which has the potential to assault thousands of computers in no

Sunday, September 8, 2019

MY Major has a Major Problem Essay Example | Topics and Well Written Essays - 1250 words

MY Major has a Major Problem - Essay Example Despite the differences between these flaws, each of them represents a serious threat that needs to be addressed to secure growth, profit and success to firms. Various deficiencies have been noticed in managerial practices that range from problems in human resource management (HRM), business ethics and quality management, failure to understand management theory to the deregulation in the industry and the failure of businesses to join their forces. All these limitations represent a serious obstacle to business growth and endanger its security and success. In this article: â€Å"Spotlight on New Research: A Business Process Approach to Human Resource Management† the researchers find flaws in human resource management very problematic and mainly responsible for most failures in businesses. They consider that this matter has always been a problem for firms and hold it responsible for many bankruptcies (Cakar, Bititci, and MacBryde). The management of resources requires much commit ment and inner qualities, which many people do not possess, and the lack of this quality represents a real threat for firms. Besides, in addition to issues in human resource management, other problems have been identified in similar fields. ... Limitations in human resource management combined with the lack of business ethics and quality management will not guarantee a successful business but lead to a certain downfall. Similarly, some managerial tools and techniques have been found very deficient and not helpful for businesses. Therefore, it belongs to managers to identify the best practices that ensure growth and disregard those that have failed. This study: â€Å"Management Practices Driving Sustained Business Success† indicates that the success of businesses depends on the ability of managers to distinguish between the tools that work from those that do not (Gronholdt and Martensen).Therefore, some managerial tools may cause more problems with serious consequences to firms. Even though all techniques have been set up to secure growth, some practices have been found seriously deficient and not helpful for businesses. It takes much craft and vision for the best managers to recognize the traps of these limited tools and avoid putting them in practice. Among these flaws deregulation takes an important place because it implements unfair competition and endangers the stability of business. This article: â€Å"Integrating Business Processes for Global Alignment and Supply Chain Management† reveals that the lack of a genuine cooperation between firms and the supply chain causes various problems that result in deregulation, which constitutes a serious threat for corporate businesses (McAdam and McCormack). This danger faces firms in many countries where the collaboration between businesses is not secured and clear rules are not implemented. Another major deficiency in managerial practices

Saturday, September 7, 2019

The Influence of Cigarette Smoking all Over the World Research Paper

The Influence of Cigarette Smoking all Over the World - Research Paper Example Cigarette smoking is the inhale of the smoke of burning tobacco encased. Informal smoking is the act of smoking only infrequently, generally in social circumstances or to alleviate tension. A number of health experts consider regular cigarette smoking as a psycho-addiction and having dangerous health effects. The U.S. Food and Drug Administration has stated that cigarettes should be regarded as nicotine delivery devices. Nicotine, the vigorous element in tobacco, is intake into the lungs, where most of it remains. The remainder passes into the bloodstream, and reaches the brain in around 10 seconds and spread all over the body in just 20 seconds. The conditions and the amount of tobacco inhaled, nicotine can act as either refreshment or sedative. This can be described as some people describes that smoking gives them energy and motivates their mental activity, at the same time as others see that cigarette smoking alleviates nervousness and lessen them. Yet, nicotine increases the danger of heart ailment. Nevertheless, when a person smokes, he or she is taking in a lot more than nicotine. Smoke from a cigarette includes many other toxic chemicals, including tar and carbon monoxide. Tar is a sticky matter that accumulates in the lungs, causing lung cancer and respiratory pain. Carbon monoxide restricts the quantity of oxygen that the red blood cells can transmit all over the body. In addition, it may harm the internal walls of the arteries, which lets fats to increase in them. In addition to tar, nicotine, and carbon monoxide, tobacco smoke contains numerous different chemicals. Most of them are considered to be deadly. Nonsmokers who are vulnerable to tobacco smoke also take in these poisonous chemicals. Cigarette smoking is considered as the major preventable source of death, contributing to the deaths of just about 430,700 Americans each year.  

Friday, September 6, 2019

Education Dialog Essay Example for Free

Education Dialog Essay What does it mean to be an educated person? There is no simple, out-right, correct answer to this question. Everyone will have a slightly, if not very, different answer. â€Å"†¦ ‘What does it mean to be a liberally educated person?’—is misleading, deeply so, because it suggests that one can somehow take a group of courses, or accumulate a certain number of credits, or undergo an obligatory set of learning experiences, and emerge liberally educated at the end of the process. Nothing could be further from the truth†¦Ã¢â‚¬  (William Cronon 5) To me an education is about grasping not specific facts, but concepts as a whole, to gain knowledge of things that can be applied to not just the status quo but things in the future as well. To be properly educated one must keep an open mind, be able to take all the sides of an argument into account and be able to see where they are coming from. To be educated,, is to be free of ignorance, to not let our own emotions and experiences corrupt our view, to be able to think for yourself and think critically at that, but also to comprehend what is being said to you, or what you are reading and understand that your learning will never end. No matter the amount of knowledge you have on a certain topic there will always be more to learn, either on that topic or other topics and an educated person knows that, so they are always striving to learn more. Critical thinking is a huge part of being considered educated. You don’t just listen to hear someone talk, and you don’t read to just see letters form words on a page, you do these things so you can derive meaning from the words written in a book and the words coming from a person’s mouth. How does one measure intelligence? How would you know where you stand compared to others? This is where things get a little tricky. From my own experience in the public education system we were given facts, dates, places and names to be memorized for tests. How much you could memorize directly translated to what grade you would get on a test. Students would cram right before an exam, and their minds would only retain that knowledge for a couple days at most. In my English class my teacher spent the whole year preparing us for one test at the end of the year, one test. We were actually given the test three times before the â€Å"final exam†. You were given the correct answers and all you had to do was memorize it, if you could memorize the answers you would get an A grade. I don’t get how standardized tests are used to measure intelligence since there isn’t a standardized person. I believe standardized tests should be made with essay topics to give students a chan ce to explain their thinking, their â€Å"why’s† I can understand why certain subjects become important when trying to shape a well rounded educated person, such as: math, history, writing and composition. History would be about the only subject in which there could be too much focus on dates and facts, to where they begin to dismiss the â€Å"Why did they do that?† because they’re focusing on the fact that they did do it. We are taught history so we can do our best to prevent repeating it, the facts won’t really help all too much in that, but the critical thinking will. We need to be aware of what’s going on around us, notice when things are beginning to stir. We all must be educated to advance in our world, to learn from our mistakes, to make new mistakes and set forth a course to the ideal of a perfect world or to achieve a perfect education.

Thursday, September 5, 2019

Healthy Settlement of Migratory Workers

Healthy Settlement of Migratory Workers Project on healthy settlement of migratory workers in a town of Gujarat Background: Migration is the inevitable process of any country. People are migrating for the better opportunities and socioeconomic condition. Particularly the workforce migration is more common in last decade due to boom in construction industry in India. This inevitable process should be made safe and healthy by the local and national government. But unfortunately there is no policy of government for such migratory population in country, which force to pay heavy cost for human development. Due to this the migrant population are always neglected and left to mercy of God. They do not have safe hygiene, safe water supply, safe shelter, good education, healthcare or safe food. There are some facts and figures in this context – The Article 19 of Constitution of India gives right to all citizens ‘to move freely throughout the territory of India; to reside and settle in any part of territory of India’. As per NSSO 2007-08, internal migration in India is 28.5% of population. The migration in India is the two types; long term and short term migration. Long term migration results the permanent relocation. Short term migration means seasonal migration around 30% of total migration is short term or seasonal migration. This is the group which is manly belonging to lower sociao economic group and poor vulnerable group. They are schedule casts or schedule tribe with low education, economically weak and lack of resources. Majority of workforce migrate for the opportunity of work. The females are the associated migratory population. This construction industry has the 310,000 Crores INR volumes. And around 82% of workforce is unorganized and unskilled labour. The bigger the city, higher the number of migratory workers with great expectation of the employment. But it doesn’t mean there is no migration to small town. On 28th July 2014, Indian Express reported that CAG reported that only 6% of 12 lack construction workers are registered in Gujarat. This registration is for providing the eight welfare schemes. The eight welfare schemes are educational assistance, maternity benifites, accidental death, medical assistance, housing assistance, Rastriya Swasth Bima Yojana, funeral assistance and training. Looking to these challenges the _______ NGO working in the Gujarat is willing to develop model concept for the government which is easy scalable and cost effective for the settlement of migratory workers in small town and city of the Gujarat. The project for to provide holistic social economic development of migratory population in a town Surendranagar of Gujarat with following objectives – To assess the baseline living condition including education, social, health, hygienic conditions of temporary migratory workers in a town of Gujarat. To develop healthy and hygienic settlement shelter care model for the temporary migratory population. To find out the use of mobile technology for registration and movement of such population. To develop model such a way that they will get all government services and welfare schemes at their door steps. To generate awareness among the builder lobby for the right of construction migratory workers and welfare schemes. Develop self-help group among such workers for self care. Project time:2015-18 About organization HELP TRUST The HELP TRUST was founded in 2006. Some devoted and educated working people got together and decided to start some gainful activities to benefit the society’s economically backward class by providing them social and health equity of all kinds. The main aim of organization is to achieve highest social and health services for deprived communities. Some activities were conducted in year 2010-11 that are as follow: Training for industrial workers about Safety and Health Awareness about Female feticide and ‘Beti Bachao’ Anti tobacco day celebration Awareness about kitchen garden among 4 villages of Viramgam Block, Ahmedabad district Awareness about ante-natal check up among rural women in 8 villages of Surendranager district. World Breast Feeding week celebration among urban slum of city Surendranager and 6 villages of Wadhawan block, district Surendranager. Woman right awareness Shibir in urban areas of district Surendranager and Ahmedabad. Medical camp for children and women Distribution of education kit to poor and needy students. Worm compost training for needy farmers in rural areas of district Surendranager. Awareness about impact of climate change and human health among young students of Surendranager city. Iodized salt promotion Champaign in Wadhawan Block. Along with above activities the organization is working in the field of Tuberculosis and HIV/AIDS for last five years. The organization field workers are observing world tuberculosis day and world AIDS day every year in community and increasing the awareness about disease. (Refer annual report of organization). Organizational resources: Organization has good infrastructure which can be used for project. The organization has field level staff that can help for the project. The travel and other expenses can be bared under scheme. Organisation has TV/VCD for display of various IEC. Population of district:1767377 Migratory population (2011):123716 (if we consider 7% of population) Methodology Project implementation – The project will be conducted phase manner Phase – 1 Baseline survey to find out the actual population, mapping and their problem in local scenario (Year 2015-16) in Surendranagar In phase -1 In the town Surendranagar, all the wards will be screened for the mapping and sociao-demographic mapping of the migratory population with identification of social, economic, health, educational and other problems. This baseline survey will be done in a year. With snow balling method of sampling and all the wards of town will be covered for the assessment. Phase – 2 Implementation of healthy holistic settlement for migratory population in Surendranagar (2016–18) and the feasibility assessment of the model, including use of mobile technology for tracking of the migratory population, temporary shelter with all basic care supply model with token charges, providing health, education and basic facilities with local corporation bodies, self help group development and social support to needy people. The operational and feasibility issues will be identified and resolved over the time. Phase -3 Evaluation and Sharing of experiences with government (2018-19) Evaluation and outcome of the model the outcome will be measured with the help of qualitative and quantitative study of service utilization. The various stakeholders will be interrogated for feasibility and improvement. Lastly wide dissemination of information will be done for the awareness in community and policy makers for further expansion at national level in programme. Financial details ActivitiesUnit costTotal (Rs) 1. Baseline in-depth survey 20,00,000 1 year20,00,000 with mapping 2. Salary of various postfor 4 years 1,95,12,000 a. Programme officer(1) (@60,000*12 = 7,20,000*4= 28,80,000) b. Finance officer (1) (@25,000*12 = 3,00,000*4 = 12,00,000) c. Public health consultant(1) (@50,000*12= 6,00,000*3= 18,00,000) d. Social scientist (1) (@25,000*12 = 3,00,000*4 = 12,00,000) e. Environmental scientist (1) (@30,000*12=3,60,000*3= 10,80,000) e. Software expert(1) (@25,000*12 = 3,00,000*2 = 6,00,000) f. Liaison officer(1) (@25,000*12 = 3,00,000*4 = 12,00,000) g. Field supervisor (4) (@15,000*12*4*4=28,80,000) h. Ward level Field workers (14) (@8,000*12*4*14 =53,76,000) i. Office assistance cum peon (2)(@5,000*12*4 = 2,40,000) j. Honorarium to consultant and expert with travelling (10,56,000) 3. Ward-wise Model shelter home cost (14 * 15 * 1,00,000 such -one time) 4. Maintenance cost of shelter home (15,00,000/year*3) 45,00,000 5. Training and capacity building of various staff(10,00,000/year for 3 years) 30,00,000 6. Development Reproduction of IEC material (5,00,000/y*3)15,00,000 7. Travel expenses(5,00,000/y*3)15,00,000 8. Publication and documentation charges 5,00,000 9. Contingency (5 years) 20,00,000 Total 1