Featured Post

Cause and Effects of Eating Disorders free essay sample

Dopamine in a concoction that is found in the cerebrum and it is associated with weight and taking care of practices. Recouping anorexics sh...

Monday, September 30, 2019

Naukri.Com

NAUKRI. COM Industry- eBusiness is the integration of a company's business including products, procedures, and services over the Internet. [pic] †¢ You turn your company from a business into an eBusiness when you integrate your sales, marketing, accounting, manufacturing, and operations with your web site activities. †¢ An eBusiness uses the Internet as a center for all business activities. †¢ eCommerce is the online component of an eBusiness. †¢ E-business may be defined as the conduct of industry,trade,and commerce using the computer networks. †¢ Naukri. om is an Indian job search engine operating in India founded by Sanjeev Bikhchandani in March1997. †¢ This employment site allows businesses to place job announcements and look through resumes. People looking for employement can post their resumes, ad links to their home page and browse the ads and look at potential employer's home pages as well. †¢ The site was established in 1997 by Info Edge (I ndia) Ltd. Info Edge is a listed company on the Bombay Stock Exchange and National Stock Exchange. It went public in November 2006. As of March 31, 2011 Naukri. om had a database of about 25 million registered job seekers and over 80,000 live job listings from Corporate Customers. During the Fiscal year 2010-11 Naukri. com serviced approximately 42,000 Corporate Customers, an average of about 12,000 resumes were added while about 72,000 were modified daily in the Naukri. com database in Fiscal year 2010-11. Overview †¢ In India Naukri. com has been ranked at 22nd spot as per Alexa traffic rankings. It has a global ranking of 452. 2,480 sites share their links in the job portal. Usually almost 9 minutes is spent by each viewer in the site nd every page is viewed almost 42 second approximately. Naukri is the leading job site in India and is the premier brand of Info Edge. It has single-handedly given a new dimension to the concept of employment in the country. †¢ After it wa s found the company has left behind every competitor. Naukri. com as a recruitment agency offers employment related services to both regular job seekers and leading placement agencies and recruiters and corporate houses. Its services are available in both India as well as outside the country. The jobsite offers a wide range of services such as Response Management Tools and Resume Database Access.Among its major services is recruiter branding solutions, Naukri PayCheck, Naukri. com Magazine, Resdex, Naukri on Mobile and Chat and job postings. The site has, at any time, 200,000 jobs and serves almost 35,500 corporate houses. It also publishes a useful report named Naukri JobSpeak, which is brought out on a monthly basis. Corporate strategy Vision †¢ Vision is to create a platform where, in 20 years time, every Indian who is looking for a job can find one. Mission †¢ Every person looking for a Job should get one. Initial Strategy (1997-2000) †¢ The initial marketing stra tegy was geared towards fulfilling two objectives.The first objective was to get the companies and placement consultants to list their jobs on the web site and the second one was to get job seekers to visit the site. Towards achieving the first objective, an intensive search exercise was carried out. The team went through the previous issues of several newspapers and magazines, went to libraries, scanned Yellow Pages and built a mailing list that contained names and addresses of approximately twenty four thousand companies and placement consultants who had placed an advertisement for jobs in the last five years.Letters were mailed out to them with information about the service. At the same time, another list of newspapers and magazines was compiled. Letters were also sent to these newspapers and magazines informing them of the introduction of this unique service. Advertising was also done but on a very small scale. It was restricted to small-classified displays in newspapers. In eff ect, initially, the marketing strategy of Naukri. com was based on direct mailing and it was actually a very low cost one. Current Strategy (2001-2004) †¢ The marketing strategy currently being followed by Naukri. om is â€Å"two pronged† one, in the words of their marketing manager Ayesha Kapur. Naukri. com reaches out to two segments primarily – the job seekers and the employers. To reach out to recruiters, Naukri. com has a 130-140 strong sales force across the country that go around and meet the clients face to face, introduce them to the products and explain them. The mechanism adopted to reach out to the other segment, that is, the job seekers, is aggressive advertising. The aggressive advertising has kept momentum only during the last year (2003-2004). Naukri. om has been advertising on television and the print media and is now exploring radio as a medium for advertising its services and products. Advertisement on television has included promotion during th e India–Australia cricket game series telecast on the national T. V. network, Doordarshan, in the year 2001. Environmental factors †¢ The major external forces are: †¢ SUPPLY AND DEMAND †¢ If the company has a demand for more professionals and there is limited supply in the market for the professionals demanded by the company, then the company will have to depend upon internal sources by providing them special training and development programs.In this case naukri. com has to supply more resumes and employable people. †¢ Labour market If there is surplus of manpower at the time of recruitment, even informal attempts at the time of recruiting like notice boards display of the requisition or announcement in the meeting etc will attract more than enough applicants. †¢ IMAGE / GOODWILL †¢ Image of a company is based on what organization does and affected by industry. Good companies looking for candidates at naukri. com will increase the number of peop le joining the site for future searches. POLITICAL-SOCIAL- LEGAL ENVIRONMENT †¢ Various government regulations prohibiting discrimination in hiring and employment have direct impact on recruitment practices. any law or regulation will affect the number of resumes forwarded by naukri. com for example if there are reserved seats for SC/ST in a company then naukri. com will have to filter out those matching this criteria. †¢ COMPETITORS †¢ To face the competition, many a times the organizations have to change their recruitment policies according to the policies being followed by the competitors. Naukri. om has to follow with company’s policies and update its website with same on real time basis. Business Process [pic] †¢ Naukri. com is currently positioned in the online recruitment and job search space. †¢ It can define its business based on products and services delivered or customer functions fulfilled. †¢ A possible list of definitions could incl ude online advertising site for vacancies; Internet based recruitment related products and services business; online resume source; online information source for job seekers on available jobs; online job application method; online resume services for job-seekers, etc. Another way of defining a firm’s business is to base the definition on the firm’s core competencies. †¢ Naukri. com has developed competencies in creating and running a website and associated technologies. †¢ The firm is competent at facilitating matches between the job providers and the job seekers using its website and the power of Internet and e-mail. †¢ This definition enables the firm to diversify in the future to any product category where the firm can facilitate matches between two or more sets of parties using a website, the Internet, and e-mail through its proprietary technology and databases. A visit to naukri. com website indicates that the firm is already experimenting with matr imonial matches and matches involving owners of building plots, houses, and apartments with those seeking to purchase or rent property. Problem definition As the number of unemployable people is rising we need a method by which Just in time approach for finding the jobs by unemployable people and finding of employees by the company becomes efficient. Requirement analysis As Is |To be | |Notice boards, print ads, word of mouth |Web portal | |Results oriented |Process oriented | |Low level coverage of notice |Wide area coverage of information | |JIT process efficiency is low |JIT process becomes efficient | |Difficult in access to information |Easy access to live employment opportunities | |Low records of database of searchers and recruiters |Large records updated daily | |Public access, private access not possible |Private access possible | Technology †¢ The database collection. †¢ World Wide Web †¢ iFind Technology The iFind algorithm is powered to find what y ou mean, not just what you type. This increases the volume of relevant resumes available to you to choose from. †¢ The ION platform is fitted with security features to cover: User authentication †¢ Safe platform administration †¢ Secure communication protocols †¢ Additionally, the platform is compatible with standard security features, such as the ones related to the setup of secure networks (in particular VPN technology, firewalls/routers NAT configurations, SSH connections). †¢ E-apps application for employers to manage responses. †¢ applicant tracking system (ATS) †¢ DSS [pic] Technologies used and their preference with increasing volumeAttributes and Characteristics †¢ Faster search †¢ Secured access †¢ Personalized data †¢ Customization of data †¢ Privacy protocol †¢ Huge records for recruiter and applicant to search from †¢ Cost effective †¢ Global reach †¢ Reduction in recruitment time by 60% Usab ility from stakeholder points of view For job hunters †¢ Ease of access to millions of jobs. †¢ Personalized format †¢ Secure login †¢ Global reach †¢ Application time is reduced †¢ Resume developments For employers †¢ Connectivity to millions of job hunters †¢ Real time information updates †¢ Relevant search †¢ E apps to manage resonses †¢ Ease in passing information For government †¢ Increase in GDP †¢ Increase in tax revenues Low unemployable rate IT Infrastructure requirement [pic] 5 layer model of naukri. com infrastructure [pic] Firewall It is a software application mounted on a server at the point where a company is connected to the internet. Its purpose is to prevent unauthorized access into the company from outsiders Demiliterized zone In a DMZ configuration, most computers on the LAN run behind a firewall connected to a public network like the internet. One or more computers also run outside the firewall in t he DMZ. Cost benefit analysis They made the market more efficient by reducing ‘search cost’ and ‘transaction cost’ thus making it attractive to get into this market.It is important to understand the reasons for naukri. com and other similar websites registering excellent growth. The job market existed before but naukri. com and other similar websites took initiatives to facilitate certain activities performed in this market. They made the market more efficient by reducing ‘search cost’ and ‘transaction cost’ thus making it attractive to get into this market. In this case, the efficiency in the market also brings in effectiveness as the cycle time to close the transaction becomes short leading to increased satisfaction. That is, when market becomes more efficient, ‘trapped value’ is released which means a new revenue stream for the business organization.Trapped value is also released when a ‘new value systemâ€⠄¢ gets created, for example, the value of a new found ‘community’ of recruiters and job seekers—they existed earlier but as standalone entities. This leads to savings in cost to search the talent. For recruiters the cost advantage comes from reducing the cost of print ads and other traditional methods. Also they get the great talent quickly so that they can hire the person for the position and continue their operations. For job hunters it saves their cost of running around for hunting down the required jobs. Challenges in Naukri. com business [pic] People- Convenience and connectivity ensures people are just click away to get the right kind of job.The ease of accessing the database for application for the jobs has made it easier for people to search the jobs which suit them. However with increasing number of applicants the increasing database makes it difficult to manage the large pool of offers. Moreover some co-success factors support both efficiency and effec tiveness: communities as parts of e-customer relationship management programs improve customer retention , thus avoiding high costs of acquiring new customers. Implementation It's easy to describe e-commerce and the benefits resulting from its implementation. It's not so easy to develop and deploy e-commerce systems. Companies have faced significant hurdles in these efforts: Cost.E-commerce requires sophisticated, distributed systems based on new technologies that can touch many of a company's core business processes. As with all major business systems, e-commerce systems require significant investments in hardware, software, staffing, and training. Businesses need comprehensive solutions that are easy to use and thus help enable cost-effective deployment. Value. Businesses want to know that their investments in e-commerce systems will produce a return. They deploy e-commerce systems to achieve business objectives such as lead generation, business process automation, and cost reduct ion. They want to ensure that these objectives are met.Businesses also need flexible solutions so that they can easily adapt a system to meet changing business conditions. Security. Because the Internet provides almost universal access, a company's assets must be protected against misuse, whether accidental or malicious. At the same time, that protection should not compromise a site's usability or performance nor make its development too complex. There is an additional security issue: Because e-commerce systems enable the collection and usage of sensitive information about individual customers, companies also need to protect the privacy of their customers. Existing Systems. Companies need to be able to harness the functionality of existing applications into e-commerce systems.Most companies new to e-commerce already use information technology to conduct business in non-Internet environments— in existing marketing, order management, billing, inventory, distribution, and custom er service systems. The Internet represents an alternative and complementary way to do business. It's imperative that Internet e-commerce systems integrate existing systems in a manner that avoids duplicate function and maintains usability, performance, and reliability. Interoperability. Interoperability here means the linking of trading partners' applications in order to exchange business documents. These systems must work together well in order to achieve business objectives. For example, the order-management application of a business partner must interoperate with the inventory applications of its suppliers.Interoperation between businesses reduces costs and improves performance. It enables the implementation of more dynamic value chains. Business partners Brijj- professional networking Merination- study material Jeevansaathi- Indian matrimonial site Allcheck deals- real estate in india Zomato- food guide 99 acres- real estate in india Shiksha- education and career Mydala. com- d eal offering site PEST Analysis POLITICAL: 1. Government support for increasing Internet penetration in India. 2. Tax benefits to corporate. 3. Government policy to increase jobs 4. Pumping money in the infrastructure ECONOMICAL 1. Booming Indian economy. 2. Increase in Indian GDP 3.Increase in ratio of Employed to unemployed people 4. Base of internet users multiplied by 10 to 11 times in last 6 years. SOCIAL 1. People spend more time on internet 2. Rise of social networking site 3. High priority on time and convenience. 4. Improving usage of Broadband and high computer literacy. TECHNOLOGICAL 1. increase in broadband services 2. Increasing penetration rate of broadband and wireless internet. 3. Better managed E business site for ease, privacy and advancements in net banking. SWOT Analysis †¢ naukri. com has the first mover advantage. It is still paying off till date with naukri having the best brand recall in terms of job portals. The site design has received great acceptance among Indians. (better than monster and timesjobs) †¢ It has the experience of being in the market for almost a decade. †¢ It has a large market share while monsterindia and Timesjobs are far behind. †¢ It ranked as India’s number one job site on all parameters — page view, reach, and traffic. †¢ It has the advantage of a clear revenue model since its inception. While it has a few services that are free to both job seekers and job providers, the majority of their services are paid for by the recruiters. †¢ It has a very committed team. This is clear from the visits made by them to establish contact. It is known to have one of the best work atmospheres. Weaknesses †¢ It has a large number of employees and hence the company incurs a high cost for managing salesforce. †¢ There is a high level of attrition. †¢ Employer Branding on Naukri. com is hardly visible which is a major product flaw on the portal Opportunities †¢ Interne t users are increasing day by day. Approximately, 7. 5 million urban Indians are using the net. †¢ Further, with broadband infrastructure being rolled out, there are more opportunities on the net. †¢ The scope of online recruitment is, therefore, increasing. Like any other online recruitment company, it has the advantage of being a low cost medium of recruitment. †¢ SHIKSHA. om and JEEVANSAATHI. com are the group portals of naukri. com and have great potential †¢ The online opportunity for hiring in India is growing at 80-90 per cent each year. THREATS †¢ Chances are that many more potential competitors may gain entry into the market. †¢ It is quite possible that any one of the players may also provide value-added services to clients like conducting preliminary interviews, etc. †¢ Sabotaging the existing clients of naukri. com by its competitors recently and luring them with more listing and other value-added services at slightly more premium can h ave a long term negative impact. While this issue can be tack-led out by naukri. om, if it continues, it may result in erosion of market advantage and loss of customer confidence on a single job portal i. e Naukri and hence loss of brand loyalty. Ethical Issues 1) Web tracking: E-businesses draw information on how visitors use a site through log files. Analysis of log file means turning log data into application service or installing software that can pluck relevant information from files in-house. 2) Privacy: Most Electronic Payment Systems knows the identity of the buyer. So it is necessary to protect the identity of a buyer who uses Electronic Payment System. References http://www. slideshare. net/dipaliqween/infoedge

Sunday, September 29, 2019

Personal Protective Equipment Essay

Personal Protective Equipment is of major significance in workplaces all over the world. As the use of personal protective equipment is important, it’s only an extra form of protection, necessary where all hazards haven’t been controlled through other means. Personal protective equipment consists of a range of clothing and equipment, which is to shield worker’s bodies from workplace hazards. It is widely used to decrease the exposure of employees to hazards, and to avoid employees from illness or injuries while at work. Employees are accountable for wearing the personal protective equipment properly and using the necessary protection for their tasks. Although there are several types of personal protective equipment used in a workplace, three of which are very essential and should be used correctly in order for the employee to have the ideal protection. They are protection to your eyes, head and ears (noise). Loud, extreme noise can damage an employee’s hearing ability if he or she is not using the right type of protection to prevent the noise. It is extremely important to have the right kind of personal protective equipment for your ears to protect them from the loud noises. There are three main types of ear protection used in a workplace. Earplugs are the most frequently used to help keep the noise level down. Some of which are disposable that are made to fit into the ear canal just right, and reusable earplugs, which tend to be more dependable than the disposable ear plugs. Types of pre-formed earplugs, called canal caps, are also used vastly. They are usually attached to a headpiece because they might get lost if they were not properly attached. Earmuffs for hardhats are also a good form of ear protection. When employees are in extremely loud and noisy places, they have a tendency to wear the earplugs and earmuffs at the same time. Ear protection generally filters out the stable unnecessary noise; making is safer to work in loud workplaces. Some people do not understand how loud the noise actually is to them, and how dangerous the noise could be when exposed to them without the appropriate type of protection. That is why it is very important to be wearing the right kind of ear protection in certain situations where it is loud in the workplace. Another main kind of personal protective equipment is protection for the  eyes. It is very important for people to avoid damage to their eyes, so it is essential to have the correct form of eye protection while in a workplace that may be dangerous to the eyes. There are several different types of eye protection, some of which include; goggles, safety glasses, face shields and helmets. For those people who wear glasses, they are able to get prescription safety eyewear so they can see well and still have safety to their eyes. Since there are different potential dangers to a person’s eyes, such as chemical splashes, and light rays, employees have to be sure to wear the correct type of eye protection while in their workplace. A person’s eyes can be severely damaged at a work place if they are not wearing the appropriate type of eye protection for the specific task in which they are doing. It is also very important to follow the safety steps while using the eye protection and doing your job. The chief kind of protection and injuries that all employees should be aware of is head protection and injuries to the head and how to avoid them. A key type of protection for an employee’s head is a hard head. A hard hat is a hat that has an outer shell to seize things that are going to strike you and an inner suspension system that absorbs the force to further protect your head. It is widely necessary for employees to wear protection on their head at all times while in their workplace. People can be hospitalized or even killed from head injuries, just from something falling out of nowhere and hitting someone on the head. A hard hat is the most widely used protection for the head, but there are also several different types of head protection available for different types of work and jobs. An employee doing a type of work dealing with flames and sparks, they tend to wear a skullcap that is flame resistant and protects the person from sparks that might fly up. When an employee is working in a place with close corners, they would normally wear a bump cap. A bump cap is lightweight and is not as big as the hard hats and do not protect your head from heavy things that might fall on it. Overall, personal protective equipment is very important in workplaces all over the world. Knowing what type of protection to use in certain areas of work and how to use it is also very important. Personal protective equipment is a major part of safety for employees and helps them avoid hazards as well  as injuries. There are many forms of personal protective equipment that helps to protect a worker’s body from hazards that might occur in a workplace. The employer is responsible for determining which type of personal protective equipment their employees will wear for their job. OSHA gives a list of personal protective equipment required for each job, listed in the Code of Federal Regulations, therefore employees should know exactly what type of protection to use, and how it will protect them from the dangerous hazards that might occur. Knowing the importance of personal protective equipment in a job will result in avoiding injuries and hazards and may save lives for those wh o use it and use it properly.

Saturday, September 28, 2019

Hospitality Business Development Essay

Hospitality business development of hospitality industry analyses the aspects of the business growth and evaluate the developing process of the industry. In the eyes of Hassanien et al (2010), â€Å"Hospitality business development is a procedure of using external and internal resources of an organization to bring out some new product in the market for the customer. In the essay all points are discussed and argued on developing the hospitality industry by referencing through secondary data which includes books, journals and educational and websites has relates to the topic. Moreover, in the essay the research is systematically paragraphed, introduced issues are customer role, market research, and analysis of business development, designing of new products in the market and customers satisfaction for organizations in the hospitality industry. According to Jones & Merricks (1994), a customer is one who buys a product or consumes a service in terms of monetary exchange from any Organization or a company. According to Chervonnaya. o (2003) A set of behavoiur of the ustomer is concludes through its experience and effective interaction and effective performance of an individual which help them to achieve and fulfill the desire goal which defined as role of the customer in developing the business. The customer is the main focal point of any organization as in the increase competitive market. The feedback of the customer is very important, as they are the end users of the product. A long-term relationship with a customer creates a very good trust essentially, w hich is very important both for the customer and for the organization. It lows its transaction cost on the both side where as the wining a new customer cause more than maintaining and expanding the relationship with its existing customer. Thus, Hyatt’s groups of hotels offered to their regular guest a program, name as Gold Passport, which provide the guest accounts for 20% discount of all Hyatt room nights worldwide. According to Zeithanal. V. A. etal (1997) the role of a customer in developing the business as a productive resource, contributive to the quality of a product, satisfaction and the value of the product and services. Lastly, they are the only competitor of the organization. According to Jones and Merriccks (1994) The resources used by those who supply goods and services to keep themselves in contact with the requirements and desires of the customer those who purchase and utilize goods and services. The process of market research includes the following steps such as finding out the information required, preplanning goals. Internal secondary research the goals and the organization detail of the research goal in brief. The resource plan systematically collecting data from the market with the help of secondary and primary research analyzing the data lastly preparing the report. According to Michael J. Croft (1994), separated products could target Market segmentation, which is the process of identifying different customer group’s users with in a market share similar level of interest in sets of needs. Market segmentation is an important part of any organization because it helps in the organization to satisfy the different kind of customer and their needs. Introducing new product in the market to bring more choices for the customer. The new segments can forecast with cost, profit and investment return of any company on demand of new segments in the market. It helps the company to achieve the goal by analyzing and forecasting all information of market segmentation According to D. Hoyer & J. Macinns(2009), consumer behaviour imitate the entirety of consumer decision with admiration to the attainment, utilization of products and character of goods, services activities in the market, experiences of people and ideas by decision making. Consumer behaviour is more than purchasing tangible goods from the market; it also includes services experience and having new ideas. It involves customer time consumption and choice. Marketing of Organizations always try to offer new product, idea, and services to the customer. Consumer can acquire, buy, and dispose the offering new products. It occurs a reason that sometimes offering new products meets customers’ needs, value, and goals. The organization now get to know the understanding that what, when and which products consumer acquire and buy and when they dispose it before offering new products in the market. This refers to customer satisfaction in means of quality and availability of products with good services in the market that includes tangible and intangible elements also. Customers have many expectations about the products in the market. According to Parasuraman et. al (1988) owing to a standard involvement in the expectation, customer could judge the service providers performance and quality service. Analyzing the customer expectations and needs plays an important role. According to Zeithanal et. al (1993) that customer service expectation can be divided into two parts or level which are desire and adequate. In desire, the customer is willing or wanting services provided by the suppliers. In this customer behaviour customer, use the combination of ‘can be’ and ‘should be’. In adequate level customer expectation have very low faith on the services offered to them and they believe these services as it ‘will be’. Thus, the Taj group of hotels within the aim of targeting the corporate tourist within the budget hotels sectors the new idea of Ginger a low budget hotels has effectively well matched with the requirements and needs of such kind of customers. Competition is practically excludes for the consideration set when customer feels so strongly that you can meet his or her important wants and supplies and the consumer buy nearly exclusively from you. According to Anderson and Jacobsen (2000) â€Å"Is in point of fact that achievement of desired goal of an organization creates a benefit for a purchaser so with the purpose they will sustain or enlarge their purchase from the organization. † Maintain customer reliability is clearly a key goal for any business. Loyal customers mean a dependable revenue flow and a constant profit. Not surprisingly, then, the subject of how you maintain customer loyalty has been one that many researchers have looked into. If a business owner or manager, there is a variety of theories on customer loyalty that he/she should be aware of, as building, a base of loyal customers is key to the growth of a company. To improve the loyalty of the customer it is very important to building up the customer satisfaction in the terms of providing good quality products and services. This process should do continuously. Taking feedback and analyzing what the customer needs and what the customer wanted to see the improvement in the product and services. Building trust plays an important role in customer. Regularity of the customer is the source of profit gaining for any organization. Profit will not earn before customer repeatedly come to buy or purchase the products and services. Kotler (2000) referred that customer satisfaction as â€Å"a person’s view of satisfaction or dissatisfaction. Ensuing as of evaluate manufactured goods is apparent presentation in relative to their prospect. Customer satisfaction refers to the level of customers in which they are pleased with the supply of the products and services provide by an industry in the market. According to Hoyer and McInnis (2001), satisfied customers are the form organization of any Successful company. Customer pleasure, which leads to replicate purchase, product reliability, and affirmative statement. Customer satisfaction levels can calculate by analysis technique and questionnaire. In advance elevated levels of customer satisfaction is especially significant for the business because satisfied customers are mainly expected to be reliable and to create repeat orders and to use a extensive range of services presented by a company.. Therefore, in the essay conclude that growth of a successful business is depending upon some important stream of positive factors. These factors conclude the developing strength and the significant prospective that can move forward the growth of an organization and leads forward to accomplishment of the goals. Each feature of the stream of factors are interlinked to each other, which means one function cannot run not including the other. Customers and potential customers are the definitive goal of a rising firm. In order to accomplish those, organization requires to exposed strike to their competitors by means of certain advertising, customer-centric strategies and further such tools. Thus, organizations would-be customer pleasure, development, and stay competitive in the market require to watch executing the earlier mention factors before they be able to predict success.

Friday, September 27, 2019

Poems Essay Example | Topics and Well Written Essays - 500 words - 1

Poems - Essay Example John Keat’s poem entitled To Autumn illustrates this season with three different descriptions. The first stanza describes autumn with specific, concrete, and vivid images of what happens during autumn. Keats describes autumn as a season of activity when, with the sun’s help, it bend apple trees with the abundance of their fruits, â€Å"fill all fruit with ripeness to the core,† â€Å"swell the gourd,† and â€Å"plump the hazel shells.† The second stanza depicts a different picture of autumn as a reaper or harvester who accomplished some of his activity but now stands still. In contrast to the active autumn described in the first stanza, the second denotes inactivity and near completion. The third stanza contrasts summer which is known as the season of rebirth to autumn which is the season of death. Here, the death of autumn is illustrated as a â€Å"soft-dying day† which is depicted favorably as this death also creates beauty. This poem by Emily Dickinson talks about the death of a man in â€Å"the opposite house.† This documents the chronology after the death and the different reactions of individuals in the country town where it happens. The third line states the commotion in the house as neighbors rustle in and out perhaps doing what they think will help. The fourth line signifies hopelessness as the doctor drives away. The dead must have been sick for a long time as the window which has been closed is now abruptly opened. A mattress is flung raising the curiosity of the children who â€Å"wonder if It’d died on that.† The writer adds that shed use to feel the same way when she was a child implying that it is a natural human reaction. The minister then comes in order to bless the dead and â€Å"goes stiffly in as if the house were his.† Dickinson then states that the minister â€Å"owned all the mourners now, and the little boys beside, and then the milliner and the man of the

Thursday, September 26, 2019

Polis Essay Example | Topics and Well Written Essays - 500 words

Polis - Essay Example However, by the 12th century BC, they started living as nomadic or sedentary tribes. By the 8th century BC, these tribes grew into political entities that revolved around trade and commerce. From here, the Polis was born, spurred on by the need for common protection and organization among these entities. The Polis was not a structure that was bound by territory as much as it was bound by political, religious, or tribal affiliation of the members. A polis would be composed of several tribes, or demes; foreigners, or metics; and slaves. Only the demes would be truly considered as citizens and would have the right to participate in the polis' government. The polis, being a small city-state (Sparta was the largest at only 3000 square miles), allowed for much political experimentation. At the beginning, various structures were employed by the Greek states - monarchies (rule by kings), oligarchies (rule by a few), timocracies (rule by the wealthy), tyrannies (rule by tyrants or usurpers) and democracies (rule by the people). The states adopted the structure that they saw most fit for the crises they encountered. One other advantage of a polis was its size. Since the polis was a small city-based entity, it was easier to manage, organize.

Globalizations affect the labour of North America Essay

Globalizations affect the labour of North America - Essay Example Manzella says "offshoring created 90,000 new IT jobs in the United States. in 2003". American companies have become more profitable and globally competitive because of low cost labor from overseas. Two-thirds of the economic benefits, such as monetary savings generated from hiring employees overseas are reinvested. It is not all about cheap labor. While low skilled jobs are often sent overseas, professionals will be in great demand over the next decade. There will be a need for architects, accountants, commercial/industrial designers and paralegals by as much as 29%. Even low end jobs such as customer service representatives will increase by 24% by 2012. As North American companies pursue the global market in an effort to make a profit, they have to focus on product design, branding strategies, productivity and respond to customers' needs. (Francis-Smith, 2005). Globalization represents a commitment and desire to create a better future. It conveys optimism, and offers endless possibilities for growth, renewal, and revitalization for every all involved. It brings a sense of connectivity, interdependence, and integration in the global community. Extending benefits and responsibilities on a global scale, it provides commonalities without overlooking differences. Globalization gives a company the ability to conduct business across borders in an open market, maximizing organizational benefits without causing social damage by violating the human rights of other cultures (Ali, 2001). The United Parcel Service (UPS) has seen global profits. The company has taken advantage of globalization with its purchase of the British carrier Lynx Express for $96.5 million and has established domestic services in China. As a result, last year UPS's net profit of $986 million has shown strength in all phases of the company's expanding empire. It is not only UPS but numerous American companies are able to reap huge profits due to the enormous cost savings. Companies can save by reducing their capital investment requirements, lowering the cost of parts and components, thereby achieving unprecedented economies of scales, and benefit from government incentives (Stalk, 2004). Providing the most saving, labor costs, contributes to about 60% of the total cost advantage. For example, a worker in the United States normally cost $15 to $30 per hour while a worker in China earns less than a $1 per hour. What a savings! An English speaking Indian employee typically costs 50%-60% less than the United States employee. An accountant in the United States might cost a business $26 to $30 per hour while a qualified accountant would only cost $10-$12 per hour in India. Low capital investment cost account for a 25% cost advantage. Though not much, every cent saved increases a company's profits. For instance, the costs to build and provide equipment for a factory in China would be much less than in the U.S. Reported savings are as much as 60%-70% because to build a factory in the United States would cost $50 million while in a low cost country it would only cost $15-$20 million. Such savings gives a company the ability to recover its investment quicker, and increase its capability for growth. Product design is another source

Wednesday, September 25, 2019

Nutrition and the relationship to athletic performance Essay

Nutrition and the relationship to athletic performance - Essay Example Proper eating habits play an integral role in fueling the body to operate effectively. Even the well conditioned and best trained athlete will have a hard time performing at peak level if improperly nourished. Also, it is essential for the athlete to understand that a balanced diet is critical not only for athletic excellence but also to maintain tissues that have been damaged during physical activity and, more importantly, for the young athlete who will need the additional nutrients to allow for continued growth and bone development. Carbohydrate is the most efficient and recommended source of glucose that the body needs to produce energy. Once ingested, the body converts carbohydrates into glucose that will give the athlete power and stamina to endure high intensity, short duration activities. Excess glucose, called glycogen, is absorbed in the liver and muscle tissues for later use. If the body lacks sources of carbohydrates, the body is forced to convert fat and protein into energy resulting in poor performance and increased fatigue. Carbohydrates are divided into two groups, the simple and complex carbohydrates. The simple carbohydrates, sometimes also referred to as the "bad carbs", are commonly found in refined or packaged food such as sugar, candy, chips, milk, honey and, fruit juices. Although, these types of carbohydrates are easily digested, they lack essential vitamins and nutrients that can normally be found in food sources containing complex carbohydrates. They are so-called because, unlike the simple carbohydrates, complex carbohydrates take longer to digest but it brings with it the essential vitamins and minerals that the body needs on a daily basis. This type of carbohydrate is commonly found in fresh fruits and vegetables, oatmeal, rice, bread, cereal, pita, pretzel, muffins and, pasta dishes. Although there are many recommendations on the amount of carbohydrate to be taken daily, most experts agree that carbohydrate consumption should consist of at the most two-thirds (2/3) of any given meal, roughly 3 to 4 times of a persons' weight in pounds. This means, for example, a person weighing 160 pounds should consume about 480-640 grams of carbohydrate everyday to maintain his energy level. And as exercise and training increase, carbohydrate consumption should be increased appropriately. According to the studies made by Leslie Bonci M.P.H., R.D., the following increase in carbohydrate intake is recommended for the active athlete: 3 grams/lb body weight for 1 hour of training 4.5 grams/kg body weight for 2 hours training 5 grams/kg body weight for 3 hours training, and 6 grams/kg body weight for 4+ hours of training (Bonci, n.d.a, Carbohydrate Needs section, par.1) Another technique used by endurance athletes, like bicyclers, swimmers and long-distance runners is "carbohydrate loading" or commonly referred to as

Tuesday, September 24, 2019

Ethical Guidelines Essay Example | Topics and Well Written Essays - 500 words - 1

Ethical Guidelines - Essay Example The American Statistical Association on their part should ensure that everybody using statistical practices is well informed on the Ethical guidelines for statistical practices. The importance of statistical analyses in our current society cannot go unnoticed. Statistical practices are employed in various sectors in the economy such as health sector, education, environment, agriculture, industry and many other sectors. Therefore, an ethical decision-making in statistics practices in inevitable. Before making any statistical decision, proper professionalism must be adhered to. The decision maker has to ensure relevance before making the final statistical decision. For instance, before making any policies that may arise from statistical results, statisticians have to take into consideration the long-term effects that the policy will have on the general public. The ethical guidelines require that the researcher should ensure that adequate statistical and subject-matter expertise in both applied to any planned study. Therefore it is unethical for somebody who is experienced on agriculture to undertaken research on a medical field where he/she has no expertise. In terms of responsibility, the guidelines clearly states that a person should maintain personal responsibility for all the work bearing his/her name. This will ensure that plagiarism is avoided at all cost. The field of statistics is characterized by many stakeholders. This is because many people have personal or public interests in the results of the statistical practices. The most likely stakeholders in statistical studies are funders, clients and employers. Funders are those who sponsor the entire study and are mostly interested on the positive results from the study. They may use the results to make policies that may serve their interest or the general public’s. In most cases NGOs and

Monday, September 23, 2019

What effect did the Rise of Science have on theories of Educational Essay

What effect did the Rise of Science have on theories of Educational Practice - Essay Example Education empowers individuals to lead their lives autonomously, participate in the community activities, and pursue their goals. Through education children acquire culture, which ultimately helps them orient their social conduct in the right direction. School is just another and a superficial means, of education. A large proportion of education is ingrained from other agencies (Dewey, 1926:4-5). Education and learning are closely related and are, at times, used synonymously. History of education can be dichotomized as the development of curricula and development of learning and teaching In the primordial world, education concerned only with cultural transmission. Since there was little that changed in everyday life, education too changed and deviated little, from set standards. The aim of education was merely to make the children fit enough to take up their roles in tribes. In those societies education was achieved through oral instruction or imitation. As the human life became more complex, there arose the need to impart education in vocational skills like hunting, farming, and animal husbandry. During the rise of ancient civilizations and development of languages, education became more formal and complex. The birth of formal education system is variously attributed to the Egyptian, Chinese, and Mesopotamian Civilizations between 3000 and 1500 B.C. In the Egyptian society, education was only carried out by priestly class that held sway in the society and enjoyed political clout as well. The priests dispensed, to a group of elite students, esoteric knowledge of subjects like science, medicine, and mathematics. Mesopotamian civilization had a tradition of teaching children belonging to the upper crust of the society. Education consisted of learning subjects like law, mathematics, and astrology. In the ancient Chinese civilization, education was about development of secular values, moral uprightness, use of rituals, and music. Later, toward the 1st

Sunday, September 22, 2019

Disadvantages of science Essay Example for Free

Disadvantages of science Essay How Science and Technology Affects Humans Life Science and technology are two things related to each other. Science is a systematic knowledge base, where a series of steps is followed in order to reliably predict the type of outcome. It is all about theories and focused on analysis. Science is the key by which man go anywhere at any time in the space. It has brought about several outstanding advantages to mankind. Technology, on the other hand, is more of an applied science. It is where tools and knowledge are used for the study of a particular science. It is all about process. What is life without science and technology? Nowadays, people can’t imagine their lives without technology. Anywhere they go and whatever they do, there are many things related to science. These are humans inventions and innovations or various technologies surround them that provide their needs. Even in their daily activities or simple tasks, they are already using those technologies. Refrigerators, microwaves, televisions, cellular phones, laptops, digital cameras, cars, computers and lights are some technologies that human uses in their daily lives. These technologies really provide them many advantages. It is easy to think about the advantages however, for your information technology has also disadvantages. Science and Technology helps human beings make their lives easier in such a way that it helps them in every sector. Like in transportation, through cars, airplanes or trains, they can travel faster to their desired places. From inventions and innovations of great minds, robots and machines are made to help people make lesser mistakes. Because of technology, man can save his time, efforts and give him a quality to his works. Moreover, technology increases production. People can create multiple materials in a short period of time because of modern machines. Most of all, one of the most important advantages of technology is through the field of medical science or human health. Because of the inventions of technology for surgical operations and discoveries of many medicines, human’s life span will be lengthened and will save innocent lives. Science and Technology also changed human’s way of communicating. From telephones to cellular phones, then came the computers and Internets which gave them information. Through these, now they can do video conferences to their love ones at abroad or chatting their friends. Satellite communication is another important dimension of technology. Satellite TV s and satellite radios have eased the broadcasting of events across the globe. Computers can store, organize and manage huge amounts of data. They can process large amounts of information. Computers have given rise to the software industry, one of the most progressive industries of the world. Gadgets can give entertainment not only to teenagers but to everyone. In addition technology also gives assurance or for emergency use. On the other hand, with the advancement in the field of latest technology, people face many disadvantages out of the benefit of modern technology. It can harm our environment. New transportation technology causes pollution by the smoke or gas from factories and cars. Most people lost their job because companies took up automatic machines to improve their production with accuracy. Yet, the answers or discoveries that technology gave may not be always correct. These machines look inexpensive and its good to use but once there are technical problems occur in machines, it took much time to fix it and also it can be more expensive. There are also side effects of technology in our health. This can cause growth of eye disease, increase of body weight and can cause cancer because of radiation of specific technology. Science and Technology can cause peoples communication poor. According to Lauren Nelson, when communicating face to face, nonverbal behaviors provide context clues for the words we use. Unfortunately, the Wall Street Journal found that technologies like email, texting and instant messaging remove these important context clues, and can lead to misunderstandings. Sarcasm and jokes without nonverbal context cues can cause frustration. Though smiley faces with different expressions called emoticons are sometimes used to substitute traditional nonverbal cues, they fall far short of what face-to-face communication can provide. He also states that as more students buy cell phones, iPods, and gaming systems, technologys impact on effective communication is becoming more pronounced. As the District Chronicles reports, teachers attempting to convey messages about lessons and textbooks find students are texting, playing, or listening to music. Not only does this mitigate the teachers ability to communicate lessons, but it hurts future communicative interaction between the teacher and student because of the lack of respect it conveys. The youth has also been very much addicted to gadgets that they get to spend too much time with it and creates their own world. Technology can make people lazy. Many people are already dependent and embrace this technology. Like students playing computer games instead of going to school or study. Technology also brings us privacy issues. From cell phone signal interceptions to email hacking, people are now worried about their once private information becoming public knowledge and making profit out of video scandals. Advanced technology has also created thousands of cases of cyber crimes, cheating and fraud. And most of all because of the new technology, the world may be facing terrorists threat and all of us are afraid of nuclear war. If people of the world use these inventions and innovations in a right way, we are all going to be benefited out of these but if the motive of a human being is not positive, surely they will face the technologys disadvantages.

Saturday, September 21, 2019

The Development Of Cyber Stalking

The Development Of Cyber Stalking Stalking is a criminal act that occurs when the offender repeatedly imposes unwanted disturbances and communications to victims by using premeditation to the extent of provoking fear for their safety (Pathe Mullen, 1997). Oddly, at first these acts can be seen as kind towards the victim, from an observers point of view. For example, it does not appear to be threatening at all when someone leaves messages, sends gifts and shows up in places where the victim habitually hangs around (Purcell, Pathe Mullen, 2004). However, if a person is trying to build-up a relationship that another person does not want to experience, (such as with a former partner, a famous person, or a professional) this results in intimidation and is considered as stalking (Regehr, n.d.). Stalking varies from harassing and threatening victims by following and tracking them, appearing at their doorstep or workplace, collecting photos and or videos of the target, making unwanted phone calls, sending gifts, letters and e-mails, intercepting any mail, and vandalizing property. Unluckily in the worst of cases stalking includes the threatening of victims families and friends, physical assault, and the kidnapping and holding of hostages (Regehr, n.d.). With the advances in technology and innovative equipment that fills our daily lives, crime is infiltrating into society by using cyberspace. The traditional stalker is now a cyber-stalker and essentially his/her grounds are limitless. In addition, the stalker now has no face because the comfort of using Information Technology enables the criminal to quietly stay indoors and carry-on with ones crimes anonymously and at a low cost. Although cyber stalking still uses the harassment principles as in traditional stalking, their victims are now found online. The cyber stalker now uses emails, internet, and chat rooms as his/her hunting grounds (Thapa, Kumar, 2011) and the growing social networks which many users subscribe to such as Facebook are the sources of feed which stalkers are looking for (Regehr, n.d.). This ease of internet tools at disposal and the belief that cyber stalkers cannot be physically touched in cyberspace (Jaishankar Sankary, 2006) has increased this crime. This is because the internet provides a vast choice of suitable targets, and a low chance of being caught or tracked down due to lack of guardianship online. Thus, the motivated offender is likely to engage in cyber stalking as the routine activity theory explains (Pitarro, 2011). Cyber stalking Bocjj (2002) defines cyber stalking as: A group of behaviours in which an individual, group of individuals or organisation, uses information and communications technology to harass another individual, group of individuals or organisation. Such behaviours may include, but are not limited to, the transmission of threats and false accusations, damage to data or equipment, identity theft, data theft, computer monitoring, the solicitation of minors for sexual purposes and any form of aggression. There are three subcategories of cyber stalking: e-mail stalking, internet stalking, and computer stalking. E-mail stalking is the act of repetitively sending hate, obscene, or threatening mail, or in other cases involves the sending of viruses and electronic junk mail. This results in an unwelcome and intimidating invasion into private space. Internet stalking on the other hand goes rather public, since it consists of using the web in-order to stalk. Computer stalking is the act of using the internet and other software in-order to obtain control of the victims computer. In this type of stalking, the stalker communicates directly as soon as the target computer uses the internet, forcing the victim to disconnect and/or reconnect through a new line if s/he wants to evade the harassment (Ogilvie, 2000). Stalker characteristics, types, and motives The stalker may be on the other side of the earth, a neighbour, or even a relative. In addition, cyber stalkers are usually mature in age, have a good educational level, a stable job, and are usually Caucasian (Bocij McFarlane, 2002). Research literature also suggests that many cyber stalkers have a prior criminal record, a history of substance abuse, or a personality disorder that directly or partly contributes to, and increases the likelihood of, such antisocial behaviours (Pitarro, 2011, in Hutton Haantz, 2003; Reno, 1999). However, this does not mean that all cyber stalkers are like this, in fact the evidence is somewhat inconclusive. Different stalkers, engage in stalking for various reasons like for sexual harassment. Another motive could be the obsession for love. This occurs when one of the partners in a love relation decides to end it, the other does not accept it and thus continues to harass the other partner. One of the main problems with obsessional stalking is that since many times the stalking comes after a real relationship, the stalker has at ones disposal much of the information s/he needs about the victim. Revenge and hate is another major cause for stalking, and many times results after an argument that has gone out of hand. In this case, the stalker does not necessarily need to know the victim but could be just picking on him/her only to let out pent up stress. Finally, a stalker might just want to be able to show-off ones skills for ego boost and show of power (Cyber Crime in India, 2000). Types of stalkers include the rejected stalker, the intimacy seeker, the incompetent suitor, the resentful stalker, and the predatory stalker. Rejected stalkers are characterised by a mix of revenge and desire to reconcile with the victim who is usually a partner or a family member. Intimacy seekers on the other hand try to achieve a relationship with a person that can be a complete stranger and think s/he is reciprocating their affection. Incompetent suitors being socially incompetent try to build a relationship that goes against social courtship rules whilst predatory stalkers gather information in preparation for sexual attachment. Lastly, resentful stalkers specifically harass victims to cause fear and uneasiness as a form of revenge for a supposed humiliation (Mullen, Pathe, Purcell, Stuart, 1999). However, these are not the only types of stalkers. Other types include the delusional stalker, the erotomaniac stalker, the harasser, the love rat, and the trolls. Delusional stalkers many times suffer from a mental illness, usually schizophrenia or manic depression. These due to stoppage of medication may be unable to distinguish between reality and fantasy, and thus their victims are usually also in-danger of losing their sanity as a result of being taken into the stalkers world. This might occur if the stalker knows how to play the part well and appears to be normal. Erotomaniac stalkers are also mentally ill and build up a relationship in their heads. Although not specifically considered as stalkers, harassers are attention-seekers and might victimise anyone who is kind enough to give them attention. Love rats usually come up with a fictitious identity and surf the cyberspace with the intent to start a relationship although having other secret affairs. Trolls like to invent sense less stories/events that are meant to waste the victims time, hurt their feelings, and play victims against each other (Issues related to bullying, 2002). Impact of stalking on victims The victims of stalking are mainly picked because they might be inferior to the stalker, since many stalkers want to be in control (Regehr, n.d.). Victims are many times ex-partners of the stalker (especially if the stalker is a woman) although in cyber stalking 50% of the victims are complete strangers. The preferred victims of a cyber-stalker are women and children, who might be emotionally weak or unstable, but most of all those that are inexperienced with the rules of cyberspace (Thapa, Kumar, 2011). Furthermore, studies show that 83% of stalking victims are females, this mainly is because there are more females online, and many stalkers might seek romance with them. Then if the female ends the relationship, the male stalker may be left with the thirst for revenge. The typical victim is therefore a Caucasian female of between 18 to 32 years. Being part of a minority group such as ethnic/racial minorities, homosexuals, and religious minorities may also cause one to be targeted (T hapa, Kumar, 2011; McFarlane Bocij, 2003). Impacts on stalking victims can be physical, psychological, occupational, and social. It is important to note that although cyber stalking many times consists of the last three, escalation into offline stalking and face-to-face confrontation may cause physical injuries to occur. Victims constantly feel in danger of being attacked. This imposed fear is a result of the tactics that the stalker implements to harass his/her victim (Regehr, n.d.). Fear, anxiety, and apprehension nearing paranoia are the feelings which all victim share. Other victims show symptoms of anger, depression, and helplessness, which might lead to suicidal thoughts (McEwan, Mullen, Purcell, 2007). The victims become hyper vigilant to keep an eye out for the stalker and start to change their habitual routines. When easiness wears away and stress comes into play, the victims anxiety is heightened. S/he will start to be easily startled by minimum movements or noises. Both during the night and during the day, images of the stalker start to engulf the victims thoughts and dreams. The victim will eventually fall into self-reclusion by avoiding communication and by refraining from carrying out activities such as not answering calls or messages, and not venturing outside the house. Long-term stalking will result in further symptoms, this time physical. Sleep disturbances, nausea, upset stomachs, general fatigue, frequent headaches, and the aggravation of pre-existing conditions such as asthma may be also present (Regehr, n.d.). Pathe and Mullen (1997) conducted a study on 100 stalking victims. Damages to property ranging from cars to houses were reported in 36 of the studied cases. In addition to this, 50% of the cases consisted of threats in direct harm to the victims, or their families or friends. However, the victims were assaulted by the stalker in one-third of the cases. Findings also indicated that over 50% of the victims start to drop their attendance records from work or school, some even cease to attend at all. According to the National Violence Against Women Survey conducted by the U.S. Department of Justice (1998), 30% of female and 20% of male victims end-up seeking psychological counselling due to the trauma suffered during victimization (Tjaden Thoennes, 1998). Socially, the victims status is affected negatively especially due to poor attendance, or focus at work. This will eventually cause family or friends to intervene and accompany the victim, at work or at home. With time, the other persons involved, will show symptoms of anger since they are not able to return to their normal lives. This will cause further uneasiness because the anger that should be projected towards the criminal justice systems for being better equipped to counteract this crime is taken on the victim him/herself for being in their current situation (Regehr, n.d.). Laws, law enforcement and safety strategies There are various safety strategies that one can adopt to avoid being stalked. Choosing gender and age ambiguous usernames, not posting personal information online, not sharing passwords, downloading antispyware programs, locking windows and doors, parking cars in illuminated areas, avoiding habitual travelling patterns, and having meetings with unknown persons in public areas, may all minimise the possibility of becoming a victim (Petrocelli, 2005). If these methods are ineffective, victims should always tell the stalker that the communication is undesirable, keep record of any emails, telephone calls, and letters received, contact law enforcement agencies or victim support groups, and change email addresses and telephone numbers (Jaishankar Sankary, 2006). The most important advice is however to never confront the stalker as this will make matters worse. Unfortunately, incidents of stalking and cyber stalking are underreported. This may be due to various reasons such as not being aware that the acts suffered are illegal, the fear of being blamed, fear that the stalker may turn to other family members and friends, threats by the stalker, and believing that nothing can be done (MacKenzie, McEwan, Pathà ©, James, Ogloff, Mullen, 2011). In addition, according to Reno (1999), victims may not seek help because they feel either that certain behaviours suffered from stalking are not serious enough to be reported to law enforcement agencies, or they think that the police force will not take matters seriously. Furthermore, sometimes law enforcement agencies perceive cyber stalking as relatively harmless unless it involves physical contact or threatening behaviour offline, and thus many times just tell victims to switch off computers or abandon computer use and dismiss the victims preoccupations as nuisance (Reno, 1999). Sometimes however, it is not the police agencies fault since unlike in stalking, the evidence in cyber stalking is many times not enough to trace the perpetrator. In addition, many websites do not authenticate user information, and a number of email servers offer stalkers the opportunity to remove identity data for a small fee, thus making it almost impossible for law enforcement to trace the accounts (Reno, 1999). Nowadays, although many countries have set up law enforcement units to deal with cybercrime such as The Cybercrime Unit of the Malta Police Force, the laws still provide many limitations. Jurisdiction limitations make it difficult for law enforcement to investigate the crime if it involves suspects from other countries (Petrocelli, 2005). Another obstacle for the police force is that stalking in itself is not considered a crime under Maltese law and thus certain behaviour cannot be punished if it does not involve; threat, harassment, trespassing, vandalism, physical violence contact, or computer misuse. In addition for an action to be considered a crime, two elements must be present: actus reus and mens rea. Therefore, prosecutors must prove that the culprit had the intent to cause harm. Except for cases when the stalking is done on an ex-partner, this is difficult to prove (Dennison Thomson, 2002). As the technology continues to develop, so will crime such as cyber stalking. Thus since the Internet is becoming more and more integrated into almost every part of human life, simple solutions such as turning off computers will not solve the problem. Instead, the frequent training of law enforcement agencies and the continuous updating of laws will prove to be better countermeasures to such newly developed crimes. Citizens must also learn to protect themselves from the dangers of such crimes by attending educational talks and seminars, cooperating with criminal justice agencies, or even using the computer itself to keep updated with new trends so as to avoid becoming victims of crime.

Friday, September 20, 2019

Pathophysiology Of Multiple Sclerosis Health And Social Care Essay

Pathophysiology Of Multiple Sclerosis Health And Social Care Essay Multiple Sclerosis (MS) is an autoimmune disease that affects the central nervous system (CNS) and its characterized mainly by demylination of the myelin sheath (CALABRESI, 2004). There are specific types of MS which are; relapsing-remitting type of MS (RRMS), secondary progressive MS (SPMS), primary progressive MS (PPMS), in addition to other types of MS but they are very rare such as progressive-relapsing MS (Norris, wells, 2007). There are many symptoms that specify MS. these symptoms can be categorized into the initial symptoms, the prodromal symptoms, and the symptoms that come along the course of MS (W.B Matthews, 1992). The recent methods of treatment for MS are mainly focusing at slowing the progression of the disease and keeping the symptoms under control, this can be achieved by using combinations of different medications (MCW Health link, 2007). Patients with MS usually have compromised balance (Fjeldstad, 2009). This can be caused by lesions located in the cerebellum that may lead to ataxia, or it could be as a secondary problem to diplopia, muscular weakness of the trunk or the limbs, vestibular problems, decreased sensory feedback and lower limbs spasticity (Fjeldstad, 2009). One of the new methods discovered to treat and help people with balance problems is the Wii-Fit. Many studies proved that the use of the Wii-Fit improves balance problems and helps people with diseases that may influence balance. Thus the research question of this paper is; is the Wii-Fit helpful in patients with MS who suffer from balance disorders. Incident MS was first discovered in 1849, although the first known description of a person with MS was from the fourteenth century in Holland (NINDS, 2007). MS is three times more common in women compared to men (NCEZID, DHQP, 2010). However, in patients who develop the MS symptoms later in life, the gender ratio is more equalized (NINDS, 2007). MS is not known as a childhood disorder because the statistics show that only 2 to 5% of the cases start before the age of 16. In addition, many of the MS symptoms are parallel to those of pediatric neurological disorders like metabolic disorders and leukodystrophies (NCEZID, DHQP, 2010). Finally, there is no universally acknowledged diagnostic criterion to diagnose MS in childhood (NCEZID, DHQP, 2010). There are no recent statistics that show specifically how many people have MS in the world, but there are 250,000 to 350,000 patients with MS in the United States diagnosed directly by the physician (NINDS, 2007). This single statistic estimates that 200 new cases are diagnosed each week. The majority of patients with MS experience their initial symptoms between the ages of 20 and 40. Symptoms are rarely seen before the age of 15 or after the age of 60 (NINDS, 2007). Caucasians are two times more susceptible to the disease than any other race (NINDS, 2007). Furthermore, MS is five times more common in temperate climates such as Canada, northern United States, and Europe than in hot and humid region (NINDS, 2007). Scientists have periodically received reports of MS epidemics, and the result was that the Faeroe Islands north of Scotland during World War II had the highest clusters of patients with MS ever. Yet there is no sufficient evidence that there is a direct relationship between the environmental factor and the increasing risk of MS. On the other hand, there is definitive evidence that the risk of developing or even worsening the condition of the disease is greater after acute viral infection (NINDS, 2007). Pathophysiology of MS MS is an autoimmune inflammatory disease that affects the central nervous system (CNS) (CALABRESI, 2004). It has no underlying cause and its characterized by axonal demyelination followed by degeneration (CALABRESI, 2004). The demylination specifically affects the myelin sheath, which is a shielding fatty rich protein insulator that covers the axons (Norris, wells, 2007). The myelin sheath aids in the rhythmic flow of the nerve impulses and the transmission of action potentials, which allows the communication between the brain and the different parts of the body (Norris, wells, 2007). However, in patients with MS the myelin sheath is destroyed by the bodys immune system. The immune system, which is the bodys defense system is malfunctioned in patients with MS, it fails to differentiate between the bodys own tissues and the foreign bodies, and starts to send diseased fighting cells to the CNS tissues to begin the destruction of the bodys own myelin sheath. When the bodys immune system starts to attack the bodys tissues this is called an autoimmune disease (Norris, wells, 2007). Patients with MS usually experience their first symptoms as young adults (Norris, wells, 2007). Most of the patients are diagnosed with this condition at a young age, because very often at this age patients are going to school, driving a car, or starting a family. While performing the different activities of their life; patients eventually realize that they are not functioning well and there is something they need to be concerned about. Approximately 80 percent of patients with MS have their symptoms in a relapse and remit state; meaning that the symptoms come and go, making both the diagnosis and prognosis difficult (Norris, wells, 2007). MS is considered a non contagious disease and in most cases it does not shorten the patients life span (Norris, wells, 2007). There are specific types of MS; 80 percent of patients begin with the relapsing-remitting type of MS (RRMS), which is characterized by the short-term flare ups or what is commonly called exacerbations or relapses, and it can last up to three months (Norris, wells, 2007). These relapses are followed by a partial or complete recovery or what is called remission. Women are diagnosed with RRMS more than men (Norris, wells, 2007). A significant number of patients go into a period of remission that lasts up to one year or even more, during this period of remission patients might experience mild symptoms that did not fully recover following the exacerbation or they may be symptoms free. However, even if patients do not get worse between the relapses or even if they dont show any symptoms, there will be continuous changes in the CNS (Norris, wells, 2007). More than 90 percent of patients with RRMS will eventually enter a second phase of RRMS if they were not treated suitably. This is called secondary progressive MS (SPMS) (Norris, wells, 2007). SPMS, occurs when the patient is experiencing worsening of the symptoms progressively. Nearly 80 percent of patients with MS are diagnosed with SPMS (Norris, wells, 2007). Most of the other 20 percent are diagnosed with primary progressive MS (PPMS). This type of MS doesnt show a relapsing and remitting state, instead it is characterized by a progressive and steady worsening of the neurological status of the patient (Norris, wells, 2007). PPMS is fairly divided between the genders unlike the RRMS. Additionally, there are other types of MS but they are very rare such as; malignant or fulminant MS, benign MS, and progressive-relapsing MS (Appendix A) (Norris, wells, 2007). There are many diagnostic tools used to evaluate the status of patients with MS. The most common diagnostic tool is magnetic resonance imaging (MRI) and lumbar puncture (Norris, wells, 2007). MRI, which views the lesions of the brain and spine, uses radiofrequency, computer stimulator, and a big electromagnet to contribute in providing a high quality picture of the brain (Norris, wells, 2007). MRI is used with patients with MS to assess the location and size of the lesions (Norris, wells, 2007). However, inflammation can be better assessed with the use of gadolinium-enhancement, which is a type of dye that is injected in the patient before doing the actual MRI (Norris, wells, 2007). Moreover, the other tool that is commonly used with MS is lumbar puncture or spinal tap; where a thin needle is entered at the base of the spinal cord and a small sample of the cerebrospinal fluid (CSF) is collected (Norris, wells, 2007). CSF is the liquid that surrounds both the spinal cord and the brain (Norris, wells, 2007). After taking a small sample of the CSF, laboratory tests are initiated to evaluate the chemical and cellular abnormalities of the sample. The physicians mainly look for oligoclonal bands, which are atypical immune proteins called immunoglobulins. These proteins present in the CSF of nearly 90 percent of patients with MS, but these proteins can also occur with other neurological conditions other than MS (Norris, wells, 2007). When comparing the MRI and lumbar puncture, the MRI is more useful and conclusive tool for diagnosing MS. On the other hand, lumbar puncture can be useful in case the MRI results are normal or indecisive therefore its used less often. Othe r less common diagnostic tools for MS are; magnetic resonance spectroscopy and evoked potential tests (Norris, wells, 2007). Symptoms of MS Symptoms of MS can be divided into three categories, the initial symptoms, the prodromal symptoms, and the symptoms that come along the course of MS (W.B Matthews, 1992). The initial symptoms, which appear in the first episode of MS are often taken by the patient from the history. However, the longer the time between the relapse and the questioning, the more inaccurate the information taken from the patient. Recent review of published reports revealed the incidence of the initial symptoms as follows, weakness in one or more limbs 40%, optic neuritis 22%, paraesthesiae 21%, diplopia 12%, vertigo 5%, and disturbance of micturition 5% (W.B Matthews, 1992). The prodromal symptoms are non specific symptoms that involve fatigue, irritability, limb pains, poor memory, and weight loss. These symptoms may be considered insignificant, because at this stage the abnormalities will not be detected in the cerebrospinal fluid (W.B Matthews, 1992). Furthermore, there are signs and symptoms that appear along the course of MS and in every advanced case of MS such as: weakness, spasticity, ataxia, tremors, sensory loss, visual disturbances and loss of bladder control (W.B Matthews, 1992; MCW health link, 2007). Then again, there are symptoms that are unusually seen with MS patients and it not proven to be associated with MS or any other medical condition that the patient suffers from such as: narcolepsy, spasmodic torticollis, and the restless legs syndrome (W.B Matthews, 1992). One of the constant features of advanced MS is weakness of the limbs; the most common form of distribution is asymmetrical weakness of both lower limbs. The least common forms of distributions are weakness of one lower limb, one lower limb and one upper limb always on the same side, or weakness of one upper limb (W.B Matthews, 1992). Weakness may be attributed to a slowly progressive case of hemi paresis, which begins with one lower limb, and then progressively more to the upper limb of the ipsilateral side. In the cases of hemiplegia in MS; the face is spared and not influenced by the weakness. However, the weakness can reach the respiratory muscles, which may lead to serious complications and even death (W.B Matthews, 1992). Signs of sudden deterioration include restriction of respiratory movement and rapid shallow breathing; these signs are not to be taken for granted especially if the patient is having weakness in both upper limbs. Weakness in the respiratory muscles may lead to an increase in energy consumption during walking and during performing other types of activities; that is called chronic respiratory weakness (W.B Matthews, 1992). Another feature of advanced MS is spasticity (W.B Matthews, 1992; MCW health link, 2007). Spasticity is a disorder of voluntary movement and increased resistance to passive movement (W.B Matthews, 1992). It usually affects the lower limbs more than the upper limbs. Nevertheless, this increase in tone is beneficial for some patients, because the increase in extensor tone can hold the weak knee extended during walking. However, if the tone increases beyond the reasonable limit, the patient will maintain the foot in planter flexion and that will make ambulation even harder and more difficult to the patient (W.B Matthews, 1992). Obtaining the desired tone to facilitate walking was proved impossible to attain. At the progressive stage of the disease there is an increase in the extensor tone, which is also called extensor spasm. This extensor spasm is considered inconvenient more than disabling e.g., it is extremely painful and occurs at night or when the patient gets out of bed in the mor ning. The patient needs several minutes for the spasm to subside (W.B Matthews, 1992). In advanced cases, flexor tone may take over and that will affect patients ability to walk (W.B Matthews, 1992). Patients may experience frequent falling, and it may be impossible to use a wheelchair. Eventually, patients may develop contractures mainly in the hamstrings and iliopsoas muscles (W.B Matthews, 1992). One of the major symptoms that patients with MS complain of is fatigue (W.B Matthews, 1992; MCW health link, 2007). There are two main types of fatigue in patients with MS; the first type is physical fatigue and the other type is psychological fatigue (MCW Health link, 2007). However, in patients with MS its very difficult to distinguish the cause of the complain, is it from fatigue or weakness (W.B Matthews, 1992). The only factor that distinguishes the pathological fatigue of a patient with MS from an ordinary fatigue of a healthy person is the adverse effect of heat, thus it means when the patient gets lethargic and tired when facing the hot and humid weather (W.B Matthews, 1992). Sensory symptoms are also common to occur with this type of patients especially at the onset of the relapse (W.B Matthews, 1992). Usually the abnormal sensation begins in a single foot, then after few days it spread up to involve the whole bilateral lower limbs, perineum, buttock, and different levels of the trunk that vary with each patient. Patients usually describe the feeling as tingling sensation (W.B Matthews, 1992). There are many other signs and symptoms that may affect the MS patients such as urinary frequency, urgency, and incontinence (MCW Health link, 2007). In addition, some patients with MS may complain of pain, restless legs, lhermittes sign, and even mental changes such as dementia, affective disorder, and schizophrenia (W.B Matthews, 1992). Finally, cerebellar dysfunction is a very common feature of advanced MS (W.B Matthews, 1992). This includes nystagmus, cerebellar ataxia, and dysarthria. Cerebellar ataxia can affect the gait. Truncal ataxia, the most common form of cerebellar dysfunction, is observed when the patient is sitting and it contribute to the increasing complaint of poor balance (W.B Matthews, 1992). Conventional treatment The current methods of treatment and medications aim at controlling the symptoms of MS, slowing the progression of the disease itself, and preventing undesirable side effects (MCW Health link, 2007). Significant numbers of people with MS suffer from spasticity (W.B Matthews, 1992; MCW Health link, 2007). Spasticity is often treated with tranquilizers and muscle relaxants such as Baclofen or lioresal, which can be taken orally and in serious cases they are injected into the spinal cord. They are considered the most commonly prescribed medication for spasticity. Other medications that are less commonly used for the treatment of spasticity are Tizanidine or zanaflex, Diazepam or Valium, and clonazepam or Klonopin (MCW Health link, 2007). One of the common problems that patients with MS deal with is visual disturbances (MCW Health link, 2007). Which can recover with time even without any kind of medical intervention, the physician may prescribe a short course of therapy with methylprednisolone (Solu-Medrol) that may be introduced intravenously. In addition, oral steroids are occasionally used (MCW Health link, 2007). Fatigue, which is the most common symptom of MS can be treated according to its type (MCW Health link, 2007). The physical fatigue can be avoided simply by instructing the patient to avoid heat and excessive physical activity. For psychological fatigue, the physician can prescribe anti-depressant medications for the patient. Other medications that can decrease fatigue are pemoline (Cylert), and amantadine (Symmetrel) (MCW Health link, 2007). Many patients with MS may suffer from different kinds of pain (MCW Health link, 2007). Aspirin or acetaminophen can be very helpful in controlling back pain and muscle pain. Additionally, physical therapy is also advantageous in controlling the pain by correcting the improper posture, and strengthening and stretching the muscles (MCW Health link, 2007). Some patients may develop bladder dysfunction and that can lead to urinary infection as the disease progresses (MCW Health link, 2007). Antibiotics are often used in the treatment of urinary tract infections. In addition, the patient may take vitamin C supplements or drink cranberry juice to acidify the urine and thus to decrease the chance of further infections (MCW Health link, 2007). In patients with urinary incontinence bladder pace-maker can be implanted through surgery. It is controlled by a hand-held device that is carried by the patient, allowing the patient to control the muscles that surrounds the bladder, by contracting the m when emptying the bladder and relaxing them in case of urine retention (MCW Health link, 2007). Patients with MS may develop tremors, which can be often challenging during the therapy course because it often makes the therapy difficult and takes a long time. Tremors can be minimally controlled with drugs, or in severe cases it can be treated with surgical intervention, but the best treatment for the tremors associated with MS is by taking physical therapy (MCW Health link, 2007). Finally, physical therapy rehabilitation is an integral part in the treatment of patients with MS (Patricia G, 2007). Its very necessary that the physical therapy team posses the important knowledge, sensitivity, and experience when dealing with these kinds of patients. In addition, they have to appreciate the variety of symptoms that the patient may suffer from, and know how to deal with every emotional, social, vocational, and financial issues that their patients complain of. The physical therapist goals should be focused on the following: educating the patient about the disease and how to deal with it, providing home programs for dealing with symptoms, making the patient independent as much as possible, offering resources for community programs, providing equipments for the patients and their caregivers (Patricia G, 2007). Wii-Fit Treatment The Wii is a software and a hardware game package that belongs to the Nintendo wii, which is designed mainly to improve fitness and balance while in the same time providing entertainment for the users (Williams et al., 2010). Its a video game that basically detects movement that is taking place on a balance board to allow the individual to play a variety of interactive games (Appendix B). The balance board is a flat board that the individual stands on, and it includes pressure sensors to detect any changes in weight shifting and the center of balance (Williams et al., 2010). Recent studies have shown that the Wii-Fit can be used to treat or improve balance in a number of disorders that affect the balance. In 2010, Williams et al., conducted a study to determine if the Nintendo Wii-Fit is a reliable and useful intervention in community dwelling older adults. Older adults over the age of 70 and have high risk of falling were recruited for the study. They participated in computer-based exercises, and during their participation, fear of falling and balance were evaluated at weeks 0, 4, and 12. After the completion of the program, the participants were interviewed to know if the intervention was beneficial for them or not. Nearly 80% of the participants attended 75% or more of the training sessions, after week 12, the Berg Balance scores were obtained from all the participants and it was found that theres a significant decrease in the risk of falling for the participants. The authors concluded that the Wii-Fit exercise program is beneficial and suitable for p eople with high risk of falling and thus, the Wii-Fit has the ability to improve balance (Williams et al., 2010). Another study was conducted on children with Down syndrome (Abdel Rahman, 2010). Its widely known that children with Down syndrome have lower scores on agility and balance tests compared to other children with other mental impairments. The main idea of this study was to examine if the Wii-Fit is helpful in improving balance in children with Down syndrome. Before starting the trial, balance was tested by using the Bruininks-Oseretsky Test of Motor Proficiency for thirty children aged 10 to 13 years with Down syndrome. The children were then equally and randomly divided into two groups; the study group received 6 weeks of Wii-Fit training and the control group received an ordinary physical therapy program. At the end of the program, the study group showed significant improvement in agility and balance compared to the control group. The author recommends that the Wii-Fit games can help in disorders that cause balance problems (Abdel Rahman, 2010). Rationale Based on the literature review of this paper, the use of the Wii-Fit was proven beneficial for patients that have balance problems such as children with Down syndrome and community dwelling older adults that have high risk of falling. In addition, the presented information proved that MS can affect balance significantly. Thus since the Wii-Fit was useful in the cases of Down syndrome and community dwelling older adults, then it is possible that it would be useful in patients with MS that have balance problems. Appendix A Types of MS Appendix B The Wii-Fit package The Balance Board

Thursday, September 19, 2019

To Kill a Mockingbird by Harper Lee - jem scout and dills childhood :: To Kill a Mockingbird Essays

To Kill A Mockingbird. The characters Dill, Scout, and Jem in the book â€Å" To Kill A Mockingbird† by Harper Lee live a somewhat diverse childhood as they become aware of the prejudice in their hometown Maycomb and â€Å"learn to climb into other people’s skin and walk around in it†. In the story the children behave as a child would at their time, but their childhood evolves from playful innocence to realizing the pressures of living in a timeframe where prejudice is all around them. Scout, a 6-year-old tom boy, Jem, Scout’s older brother, and Dill a friend, ignore the prejudice issues currently happening in Maycomb until Scout‘s father, Atticus, is assigned to defend Tom Robinson, a black man accused of raping a white woman. Before this incident the children grow unaware of Atticus’ role as their father and his role in the community. Even as Miss Maudie supports Atticus and tells Scout that â€Å"Atticus is someone who does other people‘s unpleasant jobs for them,† the children are not conscious of their own prejudist ways towards Boo Radley, a â€Å"malevolent phantom† that went outside at night when the moon was down, and peeped in windows and when people’s azaleas froze in a cold snap, it was because he breathed on them. At a point Dill is attracted by this monster to the degree where his curiosity cannot be satisfied and spreads among Scout and Jem. As the children grow up, their view of the world around them is changed by the events that occur in Maycomb. Scout is teased at school because her father is defending a black person. Children at school call Atticus a â€Å"nigger-lover†. Scout does not think twice before beating anybody up and standing up for her father until Atticus asks Scout to ignore all the gossip about them and to â€Å"stop beating up kids at school.† Scout decides to listen to Atticus because Atticus rarely ever asked anything from them. This is when Scout starts to learn how to be a lady and Jem grows up to be a man. Aunt Alexandra’s stay with the Finch’s influences Scout and Jem to be well behaved people of their own fine breeding and higher social status. Jem and Scout suffer a traumatic event that could have ended both of their lives. They were attacked by Bob Ewell, but were saved by Boo Radley when Boo killed Bob and carried Jem to the Finch house because Jem was unconscious and had a broken arm.

Wednesday, September 18, 2019

Misleading Fitness and Health Commercials :: Fitness and Health Scams

Some people do not know all that much about exercise and dieting. They do not know healthy ways to eat, and they don’t realize that one can’t get the â€Å"Perfect Body† in just a few days. These people are possibly victims of Fitness Myths. â€Å"In 2002, the Federal Trade Commission released a report that shared a review of 300 weight-loss ads promoting 218 different products. They found the rampant use of false or misleading claims† (FTC, 2003) Misleading fitness products can be particularly damaging. If one is mislead into purchasing a product and the product doesn’t work as it was advertised, not only have you wasted your money, but also the product may have physically hurt your body. FTC chairman Timothy Muris talks about the advertising and promotion tactics of the fitness industry â€Å"ads that make claims and promises that are clearly implausible and patently false run in all forms of media, with the notable exception of network TV† (FTC, 2003). Misleading advertisements are common among all forms of media. Although TV commercials may be more powerful in their persuasion, an obvious reason for this is that TV advertisements show more misleading commercials. A technique frequently used in commercials to make them seem credible is that â€Å"many deceptive ads run in highly respected publications and they are perceived to be credible†(FTC, 2003). Therefore if the TV program you are watching, while the commercial is being played, seems credible, consumers tend to believe that the products advertised during the episode are also trustworthy. One such misleading advertisement was for a product called Skinny Pill for Kids. This diet pill was targeting kids ranging from age 6 to 12. The pill was supposed to help kids lose weight and provide essential daily vitamins, minerals and herbs. â€Å"The marketer of the supplement said her company had not done safety tests on children† (CNN, 2002). It turned out that the product being advertised as a â€Å"miracle† to help children loose weight contained herbs that are diuretics. â€Å"Uva ursi, juniper berry, and buchu leaf all cause the body to lose water. A doctors’ guide to drugs and alternative remedies, states the uva ursi should not be given to children under age 12† (CNN, 2002).