Tuesday, December 24, 2019

Mandel A Symbol For Justice, Equality, And Dignity

Nelson Mandela was a symbol for justice, equality, and dignity. He spent the entirety of his life fighting for the things he was most passionate about. He often risked his life for his cause, and even spent decades in prison. In this paper, I will argue the relevance of Mandela’s passion and how individuals in todays society can learn from his activism. Mandela was born and raised in South Africa, which was a country that, up until 1994, was full of racial oppression and apartheid. Much like the Jim Crow laws in America, apartheid affected the lives of many African Americans and other people of color. At this time in South Africa, people of color were only allowed access to certain homes, schools, and jobs. The government stripped these†¦show more content†¦Mandela did not really understand everything his teacher was saying at the time, but this information would later fuel his resolve for an independent South Africa (Hyde Park Citizen). When Mandela finished high sch ool he was sent to a university at Fort Hare (Hyde Park Citizen). This was the only university in the area for people of color (Hyde Park Citizen). While in college, he studied an array of subjects: English, History, Politics, Roman Dutch Law, Native Administration and Anthropology (Hyde Park Citizen). Mandela decided to focus on Roman Dutch Law to later work in civil service, which was the best profession a black man could obtain at the time (Hyde Park Citizen). In his sophomore year, he was elected a seat on the Student Representative Council, but declined the position because he did not agree with the way the elections were run (Hyde Park Citizen). The school ended up giving him an ultimatum, where he had to either take the seat he was given or face expulsion (Hyde Park Citizen). Mandela could not compromise his beliefs and morals, so he decided to leave the university (Hyde Park Citizen). His guardian was furious with his decision, and tried to force him into an arranged marriag e. He, and his cousin ended up running away to Johannesburg where he worked for a few years as a security officer of a mine. He eventually completed his Bachelors degree and went on to study law further at a different university (Hyde ParkShow MoreRelatedOrganisational Theory230255 Words   |  922 PagesNeo-modernist organization theory: surfing the new wave? Postmodernist organization theory: new organizational forms for a new millennium? Postmodernism as a philosophy: the ultimate challenge to organization theory? Reflective organization theory: symbols, meanings and interpretations Reflexive organization theory: critical theory and psychoanalysis The evolution of management as reflected through the lens of modernist organization theory Perspectives and challenges 2 54 100 148 198 242 282 330

Sunday, December 15, 2019

The Effects of Short Term and Long Term Stress on Physiological Processes Free Essays

The Effects of Short Term and Long Term Stress on Physiological processes Stress can have many definitions, the NHS describes it as: stress is the feeling of being under too much mental or emotional pressure (2012) and some may describe it as when our demands outweigh our response. A stressor is anything that is likely to ‘set off’ your stress levels, when a person is feeling overwhelmed or they cannot cope with an event or situation (whether it be physical or psychological). During the 1920’s Walter Cannon began to recognise chain of rapidly occurring reactions in one’s body in response to acute stress. We will write a custom essay sample on The Effects of Short Term and Long Term Stress on Physiological Processes or any similar topic only for you Order Now He described this reaction as the fight or flight response which will prepare the body to either fight or flee from a threatening situation (real or imaginary). Cannon discovered that during this response a series of physiological reactions will take place such as heart and respiratory rate will increase to allow for more oxygen to be pumped around the body to prepare the muscles for action. Blood pressure will increase as the blood vessels will constrict to enable to blood to move faster and more smoothly around the body. Pupils will dilate as they allow more light into the eye therefore allowing a boarder view of the situation. Our sympathetic nervous response to stress is our immediate response, this is an uncontrollable reflex to a stressful situation. Our hypothalamus send signals through our nerve cells to our pituitary gland to our adrenal glands, specifically our adrenal medulla. Here, the hormone adrenaline is pumped into the bloodstream causing the many physiological changes in our body. Also, noradrenaline will be release causing the non-essential systems to either shut down or slow down e. g. digestive system and immune system. As the adrenaline is coursing through our body it triggers the release of sugar from our temporary stores supplying energy around the body. Originally founded by Seyle in 1956, general adaptation syndrome refers to the three stage reaction to stress and our adaptation to dealing and living with it. Stage one is the sympathetic nervous response: an immediate alarm reaction to a stress and our fight/slight response. Stage two is the stage of resistance (adaptation) where a prolong exposure to stress has occurred causing our body to become adjusted to the stressor and the increased amount of hormones in our body (adrenaline/adrenocorticotropic). As a way of conserving energy and for optimum nutrient absorption a person may feel reduced desire for physical activity. The final stage is the exhaustion stage, as there has been an increased amount of corticosteroids in the body, the immune system will have become much weaker making a person much more susceptible to chronic illness/heart attacks/severe infection as our bodies are much less capable of an immune response. If a person has GAS then there body will be in the process of the parasympathetic nervous response, it differs to the sympathetic response as hypothalamus signals to the pituitary gland to release adrenocorticotropic hormone. This hormone will trigger corticosteroids into the blood from the adrenal cortex which suppresses the immune system and converts glycogen in muscles and the liver into sugar. In 1997, Marmot conducted a study into low job control and the risk of coronary heart disease. It was determined that low job control did increase the risk of heart disease. How to cite The Effects of Short Term and Long Term Stress on Physiological Processes, Papers

Saturday, December 7, 2019

Medical Imaging and Technology Alliance †MyAssignmenthelp.com

Question: Discuss about the Medical Imaging and Technology Alliance. Answer: Introduction Information security involves protection of information systems against security threats. Threats are either intended or accidently cause harm to information systems. Deliberate actions affecting security are usually aimed to attack information assets. However, some security implications are not intended but happen accidentally because of certain human actions or other events. This research paper would explore various types of accidental and deliberate threats that Victorian government is likely to face. The government has developed The Victorian Protective Data Security Framework (VPDSF) for protection of the data security that defines security standards, assurance model, security guides, and supporting resources. Objectives of the framework include identification of information and determination of the owner of that information, assessment of the value of the information, identification and management of data risks, application of security measures, creation of a security culture, and maturing of data security capabilities. Risks can be business specific, legal, technology related or technical. In case of any type risk, a question has to be asked whether the risk can be fixed with the acquired technology and in case it cannot, appropriate steps have to be taken to enhance protection. Comparative analysis of Threats Threats can either be accidental or deliberate. Accidental Threats are caused by users or situations accidently causing risks to information systems. Some examples of accidental threats include: Natural disasters such as earthquake, hurricanes, tornadoes, cyclones, etc. causing damage to infrastructure and thus, cause loss of data Technical failures caused by breakdown of hardware Errors or mistakes done by humans such as loss of devices, opening of emails from unknown sources, lowering of security level, download of unsafe files, etc. Some people may end up using social engineering by trying to trick some into providing confidential information. This may not be a deliberate threat to cause harm but it does pose risk to the person whose data is revealed(AlKalbani, Deng, Kam, 2015). Certain ways these accidental threats can be avoided or their impacts can be mitigated include: Any changes that are made to the critical data of an organization must be monitored and the permissions to access or modify the data should only be with specific designated people. For controlling access, user manuals can be developed. All the print outs that are obtained for the management must be shredded after use People with different job functions should have differential access to information. For example, a programmer may not be provided with an access to the storage systems. The data that is being exchanged online can be encrypted(S, 2016) IT auditors may be hired for checking if the company systems are secure such that their guidance can help in improving security of the company. Transaction logs of the usage can be stored to check who has used or seen which programs in the system(Anderson, 1994) Deliberate Threats are those intended to cause security harm to a system and it can be in various forms such as espionage, extortion, sabotage, data theft, and software attacks such as Trojan, virus, worm, denial of service, phishing, key logger, spyware, malware and spam ware. Risk rating model is based on the likelihood of the occurrence of a risk and its impact on an organization. The determination of rating factors that cause these risks can be broken down into steps including risk identification, likelihood estimation, impact estimation, determination of severity of risk, decision on what to fix and customization of the risk model based on it(Brey, 2007). Risk Identification: The first step to risk ranking is risk identification. In case of the Victorian government, various risks that can occur include: Power failure Network failure or errors Technology Obsolescence Hardware failure or errors Operational issues Communication interception Repudiation Espionage Infiltration Social Engineering Technical Failures Data theft Misuse of resources(CGI, 2013) Staff shortage Unauthorized communication User Errors Sabotage Quality deviations Environmental Threats Intellectual property compromise(ESET, 2016) Incomplete or missing data Faulty planning Financial Fraud Equipment Theft Terrorism Natural Disasters(Shahri Ismail, 2012) In the next step, likelihood is estimated which measures the probability that a vulnerability in the information system would be exploited by an attacker. There is a set of agent factors and vulnerability factors that can be used for this calculation such that each factor is given a rating between 0 and 9. Agent factors include level of skills of the threat agents, motive of attack, resources and opportunity requirement, size of the threat group. Vulnerability factors include ease of the discovery of the vulnerability, ease of exploitation, awareness of the vulnerability to the agent, and likelihood of an exploit getting detected(CenturyLink Solutions Consulting, 2014). After estimating this likelihood, the factors of impact are also rated on the scale of 0 to 9. These factors include technical impacts like loss of confidentiality, integrity, availability and accountability and business impacts like financial damage, reputation damage, non-compliance, and privacy violation(Engine Yard, Inc., 2014). The likelihood of occurrence and the impact factors are put together to assess the severity of the impact of the risk which could be low, medium, high or critical. Based on this severity, risks are categorized and given priority for resolution(Chen Zhao, 2012). Risk severity can be: Low: When Likelihood is medium and impact is low and when likelihood is low but impact is medium. Medium: When Likelihood is Low and impact is High, when both are medium and when likelihood is high but impact is low. High: When Likelihood is medium and impact is high and when likelihood is high but impact is medium. Critical: When both Likelihood and impact are high then the risk can be considered as critical(Gopinath, 2011). The risks are decided to fix based on this categorization from critical to high, medium and lastly, low. Based on these factors, the risk model of Victorian Government can be modified with addition of certain factors, tuning the model based on risks, and customizing testing options. The table below presents the calculation of all the risk factors and the overall risk ranking for all the identified risks for the case of Victoria. As the table above shows, the risks can be categorized into critical, high risk, medium risk, and low risk. Terrorism is found to be a critical risk while sabotage is a high risk. Most other risks were found to be showing medium level of severity except a few that were low in severity including operational issues, user errors, environmental threats and natural disasters. The operational issues may not directly affect the security posture of the company if the security management is outsourced(TrustSphere, 2012). The user errors could be minor errors done by customers of the company and these can be handled by exceptions or can be easily mitigated. Environmental threats and natural calamity may not have a direct impact on the companys information system unless the physical damage happens to data in which case a backup can be obtained from the disaster recovery system there by resolving the risk impact on the company and thus, would not affect the security posture of Victorian governme nt(Shahri Ismail, 2012). Challenges of security/risk management approach Risk management or security management can either be established internally by developing and using internal governance procedures and security policies or the same can be outsourced to a third party security service provider. Initially, organizations used to establish their own security systems but in past decade, many of them are outsourcing security management to third party contractors. There are two key reasons behind this change(MYOB, 2016): With increase in competition, it becomes imperative for organization employees to focus on their core work. Security management is non-core support system and thus, can be outsourced to experts in security by the companies while companys internal employees only focus on the core systems(Hu, Hart, Cooke, 2007). Because of increasing threats and sophistication in them day by day, costs of establishing and updating security systems have drastically increased. Moreover, there are many areas of work that have hidden costs needed for preventing personnel and information resources from security threats(Chen, Longstaff, Carley, 2004). However, there are some concerns that cause challenges while taking decisions on whether to outsource their security operations. Security directors of organizations are highly concerned about outsourcing as the organization would then have less control over the security program. Organizations would have to do an extensive background check of the security service provider before the system is put in their control. However, organizations are looking for outsourcing as an option as it can help a company improve its security posture(HP Enterprise, 2015). There are certain advantages of using contract arrangement for security management such as Reduced overheads on office, administrative and operational costs Increasing efficiency as well as productiveness of the security systems with the focus of contractor on security as a core function Assess the benefits that supplier of security services may have such as experience of using best practices, professional training, screening of professionals, payrolls management, operations, and so on. More flexibility to change security posture and business conditions based on the need of the time(MYOB, 2016). Sharing of risks and the liability as multiple companies may be using the same systems and thus, finding solutions would attract a combined effort. Companies can leverage on the expertise, resources, and experience of the service provider Reduction in the cost that would otherwise be incurred in establishing the security infrastructure for the organization(MYOB, 2016) Risk and Uncertainty Uncertainty is a potential outcome which is unpredictable and uncontrollable while risk occurs when actions are taken despite the uncertainty of the outcome from the action. Risk is a situation in which there is a possibility of facing a loss as an outcome while uncertainty is a situation where the outcome is not clear. The comparison between the two can be made clear using a comparison table as shown below: Table B: Uncertainty vs Risk (NIST, 2014) Basis of comparison Uncertainty Risk Meaning Situation where the outcome cannot be predicted Probability that the outcome would be a loss or a victory Outcome Unknown Known Probabilities Assigned Not assigned Ascertainment Cannot measure Can measure Minimization No Yes Control Cannot be controlled Can be controlled(Xero, 2016) A risk can be systematic such as market and inflation risks or unsystematic such as business or financial risk(NIST, 2014). Riskcontrol and mitigation For controlling and mitigating risks, the security data framework of VIC can be used. For controlling the risks, the preventive measures can be taken using the guidelines given in the security protocols defined in the framework. This includes: Study of evolving security risks in the information systems and updating the security framework accordingly Recording of risks identified in the risk register Monitoring and reviewing of all the risks recorded in the register Implementation of the security requirements in the policies and procedures of the organization, access management system, business continuity management, contract services, service agreements, sharing practices, personnel management, ICT management, and physical management of the company(Cisco, 2013) Embedding security functions in routine functions as well as activities in the organization Identification and enforcement of the obligations all the people in the company considering security aspects Monitoring and review of all security requirements to identify possibility for improvement or updating(OECD, 2008). Creating awareness program and providing training on security to personnel Implementation, monitoring and review of incident management system Conducting annual assessment for security compliance for review(DHS, 2009) The response and mitigation to the risks would be decided based on the severity of each risk. Risks that are critical or high impact must be avoided but in case they still occur, immediate actions have to be taken on priority. As in the case of VIC, terrorism and sabotage are the critical and high risk categories, they have to be avoided which may not be possible and thus, in case such a situation occurs, an immediate action would be warranted. For risks that are of medium severity, a mitigation plan for reduction of the impact of the risk on the security posture of the organization can be taken. In case of the low severity risks, they can be avoided without any advanced actions but if they occur then decision can be taken on whether to accept them or mitigate their impacts depending on the actual rating of the severity of the risk identified(Security Awareness Program Special Interest Group, 2014). Recommendations Based on the study of risks and uncertainties that are likely to be faced by VIC organization while managing its security framework, certain recommendations can be made for the company for enhancing its security posture such as: The company can outsource its security and risk management to a third party which would save on the cost of security personnel, management as well as provide them access to an expertise of the security expert consultancy. The company can provide training to the staff on the security frameworks and unintentional risks such that the probability of posing such risks can be reduced with the increased awareness in the staff The company should keep its security systems updated with the latest happening such that latest threats can be tackled for which the security audit can be conducted yearly to identify loopholes for updating A regular and monitoring of the security systems and the risk register must be done so that it can be ensured that security systems are working as expected and in case of problems, they can be resolved fast. A number of different factors can be used for the assessment of risks for each type of risk such that the severity of each risk can be known and accordingly a plan for managing risks can be made including mitigation and control strategies. The risks with medium level of the severity must be avoided with appropriate control procedures implemented but in case they are still not prevented, mitigation actions can be taken based on the level of severity such that high severity risks would be tackled on priority. The company should create a culture of security by embedding security considerations in all its operations such that security risks are better prevented than mitigated leaving company with lower probability of facing any major problems. Conclusion This paper was written to explore the current security posture of VIC upon studying its security framework that is implemented in the organization. The paper explored the ideas of unintended risks, deliberate risks, and uncertainties. It also identified various types of the security risks that the company can face and identified their ranking based on the security of each of the risks. It was found that there are a number of risk likelihood forming factors that can contribute to the severity of risk such as threat agent factors like skill, motivation, opportunity and size of threat agent, vulnerability factors like ease of discovery or exploration, awareness of user, and intrusion detection capabilities. Some impact factors were also identified including technical impact factors like loss of confidentiality, integrity, availability or accountability and business impact factors like financial damage, reputation damage, non-compliance and privacy violation. Based on these insights obta ined in the study, certain recommendations were made for VIC such as embedding of security considerations in all business processes, outsourcing of security and risk management systems to a third party service provider, and so on. References AlKalbani, A., Deng, H., Kam, B. (2015). Organizational Security Culture And Information Security Ccompliance For E-government Development: The Moderating Effect Of Social Pressure. RMIT University. Anderson, R. J. (1994). Liability and Computer Security: Nine Principles. CL. Brey, P. (2007). Ethical Aspects of Information Security and Privacy. Springer Berlin Heidelberg. CenturyLink Solutions Consulting. (2014). CenturyLink Assessments: seCurity,infrAstruCture And disAster reCovery. CenturyLink Technology Solutions. CGI. (2013). Developing a Framework to Improve Critical Infrastructure Cybersecurity. CGI. Chen, D., Zhao, H. (2012). Data Security and Privacy Protection Issues in Cloud Computing. Shenyang, China: International Conference on Computer Science and Electronics Engineering. Chen, L.-C., Longstaff, T. A., Carley, K. M. (2004). The Economic Incentives Of Providing Network Security Services On The Internet Infrastructure. Carnegie Mellon University. Cisco. (2013). Australian Government Cyber Security Review. Cisco. DHS. (2009). A Roadmap for Cybersecurity Research. DHS. Engine Yard, Inc. (2014). Security, Risk, and Compliance. Engine Yard. ESET. (2016). Trends 2016 (IN) Security Everywhere. ESET. Gopinath, S. (2011). Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds. Mumbai: Reserve Bank of India . HP Enterprise. (2015). Cybersecurity Challenges, Risks, Trends, and Impacts: Survey Findings. MIT. Hu, Q., Hart, P., Cooke, D. (2007). on information systems security a on information systems security a neo-institutional perspective. Journal of Strategic Information Systems , 16, 153172. IBM Global Technology Services . (2011). Security and high availability in cloud computing environments. IBM Corporation. ISC. (2010). The Pursuit of Integrity, Honor and Trust in Information Security. ISC. James, C. (2016). Cyber Security Threats, Challenges and Opportunities. ACS. JIRA Security and Privacy Committee (SPC) . (2007). Information Security Risk Management for Healthcare Systems . MITA (Medical Imaging Technology Alliance) . Jurimae, T. (2010). Risk management in the procurement of innovation: Concepts and empirical evidence in the European Union. European Commission . Khan, R., Wanner, R. (2010). Practical Approaches to Organizational Information Security Management. SANS Institute. MYOB. (2016, September 13). Company file security. Retrieved from MYOB: https://help.myob.com/wiki/display/ar/Company+file+security MYOB. (2016, September 13). Protecting your confidential information. Retrieved from MYOB: https://myob.com.au/myob/australia/myob-security-recommendations-1257829253909 NIST. (2014). Framework for Improving Critical Infrastructure Cybersecurity. National Institute of Standards and Technology. OECD. (2008). Malicious Software (Malware): A security Threat to Internet Economy. OECD. S, S. (2016). Difference Between Risk and Uncertainty. Keydifferences. Security Awareness Program Special Interest Group. (2014). Best Practices for Implementing a Security Awareness Program. PCI. Shahri, A. B., Ismail, Z. (2012). A Tree Model for Identification of Threats as the First Stage of Risk Assessment in HIS . Journal of Information Security , 3, 169-176 . TrustSphere. (2012). Advanced Security Methods for eFraud and Messaging. TrustSphere. Xero. (2016, September 13). Your data is safe with multiple layers of security. Retrieved from Xero: https://www.xero.com/accounting-software/security/

Saturday, November 30, 2019

The Gap free essay sample

An analysis of the marketing strategy of clothes retailer, The Gap. The Gap is among the most successful retailers in the North American market, with sales of over $13.8 billion in 2001 and close to 4,500 stores worldwide. This paper provides a historical picture of The Gaps marketing strategy over the years, analyzes the strengths, weaknesses and outcomes of the approach, and describes recommendations for improvement. The Gap has had a number of innovative successful advertising campaigns. The 1988 Individuals of Style image campaign was extremely successful (Sommers, et.al., 1998) in promoting its basic clothing and illustrating how individuals could personalize the merchandise. This campaign featured black-and-white photos in print and outdoor ads. This campaign was replicated in 2001, but did not receive the degree of popularity and media attention that the earlier version received. The 1997 Khakis Swing campaign provided another successful advertising endeavor through television ads that were complemented by print ads in a similar style. We will write a custom essay sample on The Gap or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page According to a USA Today poll (n.d.), approximately one-third of all respondents polled gave the campaign the highest possible rating for likability and effectiveness, ten percentage points higher than the average. The Gap free essay sample The sun barely shines through the dense leaves; the old tree filled up as much space as the apartment buildings allowed. It grew as tall as the buildings and sat leisurely on a raised platform. There was a huge gap between its concrete walled planter and the road. As I sat on my bike I stared at the gap and paused, I thought to myself you can make it. My hands tightly gripped the handle bar; without another thought I raced down the street. Gameboy, a popular gaming device, is the dream of any eight year old Chinese boy. However, I lived with my grandparents, and when it comes to the word â€Å"popular†, grandparents are not the most updated. With a limited allowance to buy snacks, I never had my hands on one of them. Instead, I had my modest collection of airsoft guns, roller blades, and my bike. Rather than sitting insipidly in front of a screen, I spent most of my childhood jumping over gaps with my bike and climbing outside the window of a ten story apartment. We will write a custom essay sample on The Gap or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Yet, no â€Å"gap† was bigger than my move to America. It wasn’t anything but a casual phone call between my mom and me that decided my emigration. My mom lived in Switzerland for as long as I can remember; when she decided to move to America she asked me to go with her. For me it was not a big deal except that I had to learn a new language and make entirely new friends. Though when the plane took off, the irreversible nature of the situation sneaked its way into my mind. Growing up with four different homes, I experienced educational diversity. While my grandmother raised my social awareness, my grandfather showed me the importance of knowledge. However, when it came to my aunt, discipline was the most important. Although I discovered the cuisines of France through hours of television, I was introduced to a dramatically new culture for the first time during my trip to Europe at a young age. Not only was I able to taste the creamy and delicious Swiss Chocolate, but I also witnessed the exquisite Mona Lisa in Louvre. To me, these adventures have never meant anything but excitements and new possibilities, and that is exactly how I looked at America. The communication difficulties in a foreign country was a fair price to pay for the much less amount of homework I had to do in school. Though I had to constantly struggle to understand my favorite cartoons on Cartoon Network I knew soon I’ll be reading books like The Art of War in English. I told myself to always keep an open mind. It didn’t matter that I wasn’t able to pronounce the word zucchini, because I know that I will say it right next time. Nor did I feel embarrassed for asking what a piece of cake meant, because I knew I would not learn otherwise. It never occurred to me that something is impossible; it was only a matter of time. I am no longer afraid of difficulties. I know that the only thing of importance is to keep a positive outlook, and just like the day I jumped the gap with my bike, I will not be intimidated but instead to strive, with patience, for the best.

Tuesday, November 26, 2019

Computer Science Research Paper Topics

Computer Science Research Paper Topics Today the world runs on computers and the demand for qualified personnel is endless. As a result, universities present Computer Science degrees to equip the students for their careers. Computer science is a challenging subject to study. Students face problems when writing Computer science papers coupled with all the other tasks they have do as well. Often they do not know where to begin with their papers. Computer science is a broad field, which requires students to have a lot of knowledge in a wide variety of subjects, and these are mostly complex and detailed. The student must not only know theoretical descriptions of the subject but also programming and other details related to the subject. Collection of data, going through it, filtering the relevant points, adding authorial comments, researching and other tasks is all very demanding. Therefore when writing a computer science paper the important part is choosing the topic. Alternatively, if you are given a topic to be able to rese arch it and present it in a professional way. This takes skill. There are some popular computer science research paper topics. The choices are many and here are some you could consider working with: Programming is a field all on its own. It is basically dealing with how you can write your own programs. You would need to narrow it down. Computer language is a field of importance. Anyone studying computer science will be introduced to the fact that computers use their own language. Again it provides a good topic to research. Software is the very essence that enables a computer to function. The machine without software is useless. The software field covers a wide variety of choice for topics. Hardware is the whole other side of computing. The design and building of hardware compatible to the developing software is vital. Computers come in a variety of kinds and functions. They come as PCs and laptops used in homes and small businesses. They stand alone or can be networked. Others control and assist pilots to fly jets, captains to sail ships or use submarines, launch weapons systems. Computers are used in space exploration and in medical treatments. The list of topics is plentiful, with the main difficulty of choosing topics narrow enough. Computer science papers need to be written with skill to be able to get good grades. Many students realize they need qualified assistance and turn to online professional academic services. If you do then you will receive personal attention. Our writers will choose your topic and write a high quality Computer Science research paper for you. It will be original, use sound relevant and up to date information. It is guaranteed to be plagiarism free and our prices are affordable. All you need to do is place your order on our site and we will do the rest.

Friday, November 22, 2019

Advertising Alcohol Essay Example for Free

Advertising Alcohol Essay ? Alcohol has appeared in UK as well as around the world for many years. It plays a significant rule in the life of human. As British Medical Association in 2009, people in UK is the most of alcohol users in Europe. However, like other addictive substances, abuse of alcohol will bring a lot of bad consequences for people. Timms (2013) claimed that alcohol is the cause of psychosis, dementia, and physical problem. There are some people who claimed that government is not authorized to control the advertising of alcohol stricter than other products, but some were in the other idea that government should do it because of the bad impact from alcohol advertising to those who watch it, especially young people. This essay is aim to clarify the opinion that alcohol will result negative effect for human heath as well as social life and its advertising need to be restricted by government. Firstly, except useful of alcohol to people life, alcohol is cause of many negative problems. It is a fact that alcohol was used in to many industries such as food, heath service, and research also. Alcohol may good for heath with a limit amount. With reference from NIH (2003), in a great number of male surveyed, those who drank more than three times a week will have fewer heath risk than others who just drank less than once a week. However, according to Kenny (2012), people should not drink alcohol too much everyday. For instance, the limit of alcohol, which accepted by government, is 150–200ml for men and 100-150ml for women. Base on each habitus, drinking more than that unit may lead to sign of headache, dizzy, sickness, loss of control, etc. To reference from Hall’s research last year, 25% of deaths increase in the last ten years was caused by alcohol. It showed that most of people cannot control their drinking, and this number is increasing day by day. Thus, it is important to limit alcohol use. Secondly, alcoholics are threatening to the social life. It may be noted that drinking alcohol is dangerous not only for people but also their family. A lot of social evil and family violence are come from drunken people. When drinking too much wine or beer, the phenomenon of losing control will appear. Then, the drinker may have negative activities to people around. For example, according to Aquarius, 30% of sexual harassments were affected by alcohol. Furthermore, unfortunately, almost alcoholic was the cause of increasing unemployment (Macpherson, 1988). Then it tends to the thievery when alcoholics do not have money to buy alcohol. From those reasons, it is clear to see that alcohol is truly a hazard to people. Turning to the other side, advertising of alcohol will also bring the bad effect to people. Alcohol advertisement, like other product’s advertisement, is aim to approach people and persuade them to buy as much as possible. Actually, most of alcohol advertising content was received great evaluation from people under 23 years old (Jernigan, 2010). On the other hand, although people know the negative of using alcohol, promotion by any way will make them tend to use it naturally. Wilby (2008) claimed that people are strong affected by advertising of alcohol because they are easily to receive information provided by this advertisement. Advertising of alcohol makes people, especially the youth, image that it is the daily product. Moreover, Jernigan (2010) believed that almost alcohol companies tried to insert the combination of unmeasured features relative to cultural, religious and regulatory context on their advertising. Thus, they try using it everyday like the case that they saw on advertising. In British Medical Association (2009), researchers said â€Å"alcohol advertising and promotion increases the likelihood that adolescents will start to use alcohol and to drink more if they are already using alcohol†. Therefore, if alcohol companies are all free to do advertising by their own way, it will be dangerous for customer insight. Finally, alcohol advertising needs to be limited to protect customer from the wrong perception about wine or beer. In fact, alcohol companies have right to do advertise like other product in market. The more alcohol that they sold, the more money of tax government can earn. Follow HMRC (2013), alcohol products brought a huge number of revenue to UK, which is ? 3,323m from April to July 2013. This number illustrated for the great tax revenue that government earned from alcohol companies. However, the damage to people heath and life are bigger than that. Government had to pay more for the accident and medical insurance that come from effect of drinking too much alcohol. Therefore, limitation to the advertising content of alcohol is really necessary. In practice, government represents for the right of people, so they need to intervene to alcohol advertising for protecting customer. Although government cannot absolutely ban all the advertising of alcohol, they need to control it. For example, Hall (2012) believed that alcohol marketing â€Å"require that ads not link alcohol with sex, social success, youth culture or juvenile behavior†. In conclusion, the essay focused on difference points of whether alcohol advertising should be restricted or not, and the role of government in this situation. Obviously, whether drinking alcohol is good or not depends largely on the awareness of people who use it. Nevertheless, advertising this product widely on media will cause many bad impacts. For that reason, the strict guidelines and regulation for alcohol advertising is really needed. The government should strictly control this kind of product as well as develop propagandize for people about using alcohol in the right way. Apart from that, government also can impose more heavy taxes upon alcohol goods. This can force customer to use less alcohol and increase national income at the same time. References AQUARIUS (n. d. ) Alcohol and Violence [WWW] Aquarius. Available from: http://www. aquarius. org. uk/alcoholandviolence [Accessed 02/09/2013]. BRITISH MEDICAL ASSOCIATION (2009) Under the influence: the damaging effect of alcohol marketing on young people [WWW] Available from: http://www.alcohollearningcentre. org. uk/_library/undertheinfluence_tcm41-1900621. pdf [Accessed 24/08/13]. HALL, E. (2012) Sobering up the U. K. proves difficult. Advertising Age, 83 (17), pp. 9. HMRC (2013) Tax and Duty Bulletins [WWW] HM Revenue & Customs. Available from: https://www. uktradeinfo. com/Statistics/Pages/TaxAndDutybulletins. aspx [Accessed 01/09/2013]. JERNIGAN, D. (2010) The extent of global alcohol marketing and its impact on youth. Contemporary Drug Problems, 37 (1), pp. 57-89. MACPHERSON, N (1988) The Effect of Alcoholism on Earning Capacity [WWW] Economica. Available from: http://www. economica. ca/ew03_2p1. htm [Accessed 02/09/2013]. NIH (2003) Frequency of Light-to-Moderate Drinking Reduces Heart Disease Risk in Men [WWW] NIH. Available from: http://www. nih. gov/news/pr/jan2003/niaaa-08. htm [Accessed 31/08/2013]. Timms, P. (2013) Alcohol and depression [WWW] Royal College of Psychiatrists’ Public Education Editorial Board. Available from: http://www. rcpsych. ac. uk/mentalhealthinfoforall/problems/alcoholanddrugs/alcoholdepression. aspx [Accessed 31/08/2013]. WILBY, P. (2008) Under the influence. New Statesman, 137 (4887), pp. 17. Advertising Alcohol. (2017, Feb 23).

Wednesday, November 20, 2019

Autobiographical Paper on Religious Affiliation Essay

Autobiographical Paper on Religious Affiliation - Essay Example I was baptized and grew up in a middle-class Catholic family in New Orleans where I thought almost everyone is Catholic as I grew up, and I never felt that we were a "minority within a minority" (Carey, P. in Phelps, 1997, p.7). I had an uncle who is a Catholic priest, and the way he lived his life as a servant of Christ in the Church had an impact on me. His kindness towards others made me see a bit of how Jesus was when he walked this earth two thousand years ago. His preaching, his life of prayer, and his dedication to his flock drove home the message that there was something, and someone, greater and beyond this life. Of course, my young mind never looked at events from a theological or religious view, because to me he was just my uncle who would visit and shower us with cheer and tell us stories about where he'd been, what he'd done, and the thousand and one things that a priest is supposed to be doing. My parents were a huge influence on my beliefs. The way they cared for me taught me how to love and use my heart and mind to face the mysteries of this world. How they loved each other despite the trials and joys of family life were for me a sign of how God takes care of us. They taught me how to pray, and more importantly, they told me why. Allow me to briefly discuss one case in point: the Trinity as a Family where God is a Father, Jesus is the Son and my brother, and the Holy Spirit is Love. I can never explain fully how there can be three Persons in One God, but I understood as I grew up that maybe God is a family too where everyone loves each other, just as we did in my family. We did things together: prayed at home and went to Sunday Mass; spent time having fun, laughing and talking and enjoying each other's company. Maybe God has been doing it for all eternity, and that is why He is happy and wants us to share in that happiness (Mt. 11: 25-30). My Mom and I also prayed the Holy Rosary at home to honor Mary, the mother of Jesus. Many non-Catholics never understood the Rosary, because they think it is a form of worship, but it is not (Cavendish, 2000). Like people in love who never tire of saying the same things to one another, we Catholics who love the mother of Jesus also do the same. We show her honor, not worship, in the same way I show mom and dad the honor they deserve for being good parents. Novenas and other devotions to the saints are the same thing. We see them as paths to God, the same way that if we want to get a job we ask the help of someone close to us so that we do not have much of a hard time. Going to the saints and to Mary is the same thing. Of course, some people get carried away and give too much time to Mary and the saints that they forget Jesus, but the Catholic Church keeps on reminding us about this danger. So yes, my religious upbringing had a strong impact on my faith, helped by the examples my mom, dad, and uncle showed me that we can be happy doing the good things we enjoy, being men and women of virtue, prayer, and faith (Copeland, 2000). Search for Meaning Hunt et al. (1975) discussed the presence of a religious factor in secular achievement of African-Americans and investigated the presence of Protestant and Catholic

Tuesday, November 19, 2019

Obamacare , AKA the Affordable Care Act Research Paper - 1

Obamacare , AKA the Affordable Care Act - Research Paper Example However, this new health reform has been protested against by many as it may raise costs for pharmacies and businesses, a penalty will apply to those who do not buy coverage, and some low-wage workers would still find it unaffordable (ObamaCare Facts; Amadeo; Tozzi 2013). Basically, Obamacare has made it compulsory for all those Americans without a health insurance to get one. An important thing to note is that Obamacare does not replace Medicaid, Medicare or private insurance- it is a separate reform, although it has expanded Medicare. The law requires business companies to provide their employees with premiums, which will be less than 9.5 percent of the employees’ incomes. However, this only applies to businesses with less than fifty employees. The larger companies will receive tax credits in order to help its employees pay premiums. Obamacare also allows children to be put on their parents’ health insurance plans up to the age of twenty six. In addition, insurance companies are not allowed to deny insurance to individuals who are already suffering from a health problem. Those individuals who do not buy these premiums or health insurance will be subject to a new penalty of $95 or one percent of income, which will come in effect from 2 014-this penalty will keep increasing every year. Another part of Obamacare is the national menu labeling law, which requires restaurant chains with more than twenty branches to post calorie counts for each standard menu item (ObamaCare Facts; Amadeo; Shen 2013). Ever since President Obama introduced this health care reform, more than a hundred million Americans have already benefitted from it. According to statistics posted by the official White House site, about fifty million Americans are covered for preventive services, and approximately thirty three million Americans with Medicare use a free preventive service. This is because Obamacare has eliminated any additional cost, such as

Saturday, November 16, 2019

Software engineers Essay Example for Free

Software engineers Essay There have also been improvements in the protocols applied by the internet. In its inception the type and the capacity of data that could be passed through the internet was limited because the mechanism that enable its functioning, referred to as protocols, could not support complex data formats and large data sizes. Software engineers, web designers and application designers have worked so hard over the years that it is currently easy to pass data over the internet in almost all existing formats. The most common web browsers support the sending of multimedia over the internet, furthermore the live streaming of videos and clips is possible with the protocol applied with the latest versions of browsers (Jayne, 1999). It is even possible to chat with friend over the internet and the teleconferencing mechanism that the internet technology has been targeting for so long is now in place. Education is an aspect that requires creativity and integration of various modes of data delivery, the use of plain text, videos, audio streaming, visual aid and real life examples characterises the current American educational system. Volume and integration of various data makes education material quite voluminous, moreover the interaction between the tutor and the student at a personal level is a key characteristic of a good learning session. Therefore, the improvement in the internet protocols that have made it possible to transfer large amounts of data, multimedia and even hold chart sessions is an aspect of the development in the internet technology that has really had a positive impact on the development of e- learning. Security has been a key area of concern with regard to the development of internet and its usage (Tanenbaum, 2001). The well known protocols employed by the internet, the rapid rate of improvement in the internet technology that are hard to keep up with in terms of security protocols and the nature of internet, especially the aspect of an infinite number of potential access point and the lack of a body that is charged with the implementation of policies that govern its usage, are some of the factors that have made the realisation of internet security a designers nightmare (Keeton, 2002). The number of conmen operating in the net is considerable and thus security has always been an issue. The protocols employed by the recent versions of browsers make it possible to integrate security devices or software that increases the level of security. The use of firewalls and implementation of good security mechanisms by most internet providers has in a way developed some sense of security in internet usage. Security in an education system aids the smooth flow of information to the students. Furthermore, the emergence of electronic payment methods that implement watertight security mechanism has made it possible to transfer money from one corner of the globe to the other in a matter of seconds without having to worry so much about it finding its way into someone elses hand (Kwok-Wing, 2001). A secure system is surely a psychological boost to the student and will thus promote learning and transfer of money between the knowledge seeker and provider. The use of computers depends on three major components: Hardware, user and software. Considerable improvements have been noted in all the three areas over the years and are seen as some of the factors that have made it easy for the transfer of data over the internet and the use of such data by the intended end user. The hardware in computers refers to the physical parts that make up the computer system. Some of the hardware in a computer system is the monitor, mouse, keyboard, hard disk and RAM. Initially computers used to cover large spaces and had large power consumption rates (Thelin, 2004). The current generation of computers are built under the consideration of convenience, performance and user friendliness.

Thursday, November 14, 2019

The Deaths of Antigone and Creon :: Free Essay Writer

The Deaths of Antigone and Creon Antigone and Creon are the main characters of the play Antigone written by Sophocles. Antigone is the daughter of Oedipus, who was a major figure of ancient Greek myth. Oedipus accidentally killed his father and married his mother. Because of that act, Oedipus ended up cursing his family and died a horrible death. After his death, his sons inherited his kingdom and in a power struggle ended up killing each other. One of the sons, Polynices attacked the city to try and claim power from his brother. But since both of the brothers died and the city was not taken Polynices was labeled as a traitor whereas the other brother who died defending the city was celebrated as a hero. Creon decreed at the beginning of the play Antigone that no one was to bury the body of traitorous Polynices. Antigone felt that it was here responsibility to bury the body because he was still a member of her family. This led to a huge argument with Creon who felt he shouldn’t be crossed because he was the leader of the state. Eventually both Creon and Antigone are destroyed by the gods (and by each other) through their own actions. Antigone is a powerful character, strong-willed, determined and at times self-righteous. She is contrasted by her sister Ismene, who is weak and powerless. Though Antigone is a powerful character, she has no real political power and is dominated by one man, Creon. Creon is both the ruler of the state as well as the patriarch of her family. Antigone was raised by Creon’s house after her own father went in to exile. Antigone is betrothed to Creon’s son, Haemon, further cementing Creon’s power over her. There is one aspect of life that Antigone does have legitimate power in and that is her family, especially her blood line. In ancient-Greek culture the women’s place was in the home, she was responsible for household things and often wasn’t even allowed to leave the house. It is because of this responsibility that Antigone needed to bury her brother Polynices even though it went against the decree of Creon. Antigone also had the gods on her side. It was an unwritten rule of ancient Greek society that the dead must be buried, otherwise bad things may happen. This rule, because it was unwritten and therefore innate, was protected by the gods, specifically Hades, the god of the underworld and family. The Deaths of Antigone and Creon :: Free Essay Writer The Deaths of Antigone and Creon Antigone and Creon are the main characters of the play Antigone written by Sophocles. Antigone is the daughter of Oedipus, who was a major figure of ancient Greek myth. Oedipus accidentally killed his father and married his mother. Because of that act, Oedipus ended up cursing his family and died a horrible death. After his death, his sons inherited his kingdom and in a power struggle ended up killing each other. One of the sons, Polynices attacked the city to try and claim power from his brother. But since both of the brothers died and the city was not taken Polynices was labeled as a traitor whereas the other brother who died defending the city was celebrated as a hero. Creon decreed at the beginning of the play Antigone that no one was to bury the body of traitorous Polynices. Antigone felt that it was here responsibility to bury the body because he was still a member of her family. This led to a huge argument with Creon who felt he shouldn’t be crossed because he was the leader of the state. Eventually both Creon and Antigone are destroyed by the gods (and by each other) through their own actions. Antigone is a powerful character, strong-willed, determined and at times self-righteous. She is contrasted by her sister Ismene, who is weak and powerless. Though Antigone is a powerful character, she has no real political power and is dominated by one man, Creon. Creon is both the ruler of the state as well as the patriarch of her family. Antigone was raised by Creon’s house after her own father went in to exile. Antigone is betrothed to Creon’s son, Haemon, further cementing Creon’s power over her. There is one aspect of life that Antigone does have legitimate power in and that is her family, especially her blood line. In ancient-Greek culture the women’s place was in the home, she was responsible for household things and often wasn’t even allowed to leave the house. It is because of this responsibility that Antigone needed to bury her brother Polynices even though it went against the decree of Creon. Antigone also had the gods on her side. It was an unwritten rule of ancient Greek society that the dead must be buried, otherwise bad things may happen. This rule, because it was unwritten and therefore innate, was protected by the gods, specifically Hades, the god of the underworld and family.

Monday, November 11, 2019

Impotance of Discipline Essay

Discipline is the basis of the whole universe. The Earth, the Sun, the Moon and other plane s, all are governed by a set of laws to maintain perfect harmony and beauty. There will be chaos without this order. Similarly, discipline is one of the basic requirements of a civilized life. Every society has to set certain norms for its people to maintain peace and order. The strength of a nation lies in discipline. It helps to make progress, fight external invasion and maintain national unity. Citizens of a disciplined nation work in a spirit of cooperation and utility. History tells us that whenever a country is torsi by internal strife, its morale drops and opportunist neighbour often takes advantage of the situation. However, discipline does not mean negation of personal liberty. It means a self- imposed discipline. In a democratic country like India, if people object to a certain law, then they can mobilize public opinion and force the Government to withdraw it. But it is possible only if they do not take the law in their own hands. They must act with restrain and organize peaceful agitation; otherwise there is every possibility of violence and threat to public and national property. The importance of discipline in educational institutions is well-recognized. Unfortunately, we notice that discipline in our schools and colleges has considerably declined, Students are disrespectful to their teachers; they misbehave in the classrooms organize strikes; take the law into their hands. This is certainly an alarming trend. Undoubtedly, it is discontentment that leads to breakdown of law and order. The urgent need of the hour is to make an in-depth study of the education system whether it is still relevant to our needs and growing population. In order to improve the atmosphere in the educational institutions the government must look into the genuine grievances of the teachers and the students. Over-crowded classrooms, poor teaching, poor salaries of the teachers all contribute to indiscipline and discontentment. The rapid growth in our population has led to more students seeking admission. The number of schools and colleges has not increased proportionately. Besides, to check the students from flocking to colleges, there is a need to vocationally education at the 10+2 stage, offer facilities for industrial and technical training after school to help them become self-reliant. This will also check the rising unemployment. Teaching, being a grossly under played job, does not attract the best and dedicated people. This affects the quality of teaching and makes students feel disillusioned. As a result they become restless and start cutting classes. The government has recently taken certain concrete steps to improve the situation. Discipline is the life -breath of the army. Military discipline imposes upon members of the armed forces a certain code of conduct. It demands of its officer’s loyalty to the country, a spirit of fellowship and a readiness to cope with an emergency. No army can fight successfully without discipline. The importance of discipline in the social and political life of a nation is also very great. An element of apathy and resignation has been the cause of our country still being so backward. We have made so much progress in technology and science, but still as people we have not been able to shake off our backwardness. Indians are known for their warmth and friendliness, yet they are narrow-minded, bigoted and indifferent One has only to go to government offices to see it. Workers shirk their duty, they are indifferent to their responsibilities, spend their office hours in canteen and pay no attention either to the long queues of people waiting or to the rising pile of unattended urgent files. Thus, the work accumulates. Both the public and the government suffer for their negligence. It is only when they will impose self-discipline and perform their duty with dedication that things will improve. People create chaos even in public places by their indiscipline behaviour. They show utter lack of order while boarding buses, trains. Out ¬side cinema halls, they promote malpractices in the form of black-marketing of tickets. Eve-teas ¬ing is another example of irresponsible behav ¬iour on the part of our youth. Today, women don’t feel safe in our cities because of unruly behaviour of goondas. In the political sphere also there is a need for discipline. Personal ambition and petty jealousy are the driving force for the men in power. This is a source of great pain to the people. The ruling party itself is divided by internal politics. It cannot set an example for the nation to follow. This has lowered the image of the ruling party in the eyes of the common man. The government must take immediate steps to improve its image and restore people’s faith in the party. This can be achieved only if each party member follows a certain code of ethics. Discipline is important even in the domestic life. Parents must raise their children in congenial atmosphere and teach them the right values. They should set an example for their children by leading orderly and peaceful lives. It is often seen that children from broken homes become very aggressive and indiscipline. They pose a danger to the society. Children must grow in secure, happy homes to become balanced adults, Perhaps the best service to the country lies in an effort of parents to bring up their children in a disciplined manner. Discipline though difficult is essential for personal growth as well as national prosperity. Absence of it can lead to failure, defeat and backwardness. Today in society, it is very important to learn to live in harmony with fellow human beings in a spirit of co-operation and mutual co-existence. All this is possible only if every individual follows a personal code of ethics and the one laid by the law for the prosperity of the nation and the progress of the society.

Saturday, November 9, 2019

Impact of Fdi to Farmers in India

Shanmuga sundaram. S (MBA 1st year student Garden City College) ABSTRACT The goal of this paper is to examine the opportunities, challenges, responsibilities and recommendations for Foreign Direct Investment (FDI) impact on farmers in India. Since last two decades India is the attractive and profit oriented market for the investment to developed countries.FDI is an easy path to enter the market of developing countries as India which has vast consumer market, big retail sector, reach aggregate demand, inadequate domestic supply, weak infrastructure, lack in technological background, political instability, low GDP, poor management skill, sick investment promotion strategies, government outlook towards investment, inadequate finance and unemployment all these factors are responsible for the attraction of developed countries about FDI in India.This paper will give a brief explanations regarding how FDI is going to help farmers in India in sectors like Agriculture, Seed production and Retail sector in India and the conclusion part will show that India needs FD I but it must help everyone in India to be benefited.KEY WORDS; FDI, Agriculture, Seed production, Consumer market, Aggregate demand, GDP,1. INTRODUCTIONToday the hot most debated topic and emotive reactions are because of FDI in India is one of the most stirring and promising markets in the globe. Technical and Skilled human resources are the finest available in the world.Private sector is the lifeblood of economic activity in India which is energetic and well spirited. Middle class population of India is greater than the population of the USA or the European Union which provide India a key place in International competition. Starting from a baseline of less than $1 billion in 1990, India reached more than $24. 2 billion to FDI in 2010. A recent UNCTAD survey projected, India as the second most important FDI destination (after China) for transnational corporations during 2010–2012. The significance of FDI is rising heavily due to its all round contributions to the growth of economy.FDI in developing countries like India will help to improve the current GDP. And in India Agriculture is an important sector of Indian economy and accounts for 15% of the Indian gross domestic product (GDP) Agriculture is the backbone of Indian economy if farmers are happy the entire country will move to a success path ahead the role of FDI must benefit the farmers as to go to a strong economic path the farmers must not only produce and sell their product but must make a value added product and the role of FDI must make farmers of India to turn as an entrepreneurs.2. FDI IN AGRICULTURE The FDI inflows to Agriculture services are allowed up to 100% and allowed through the automatic route covering horticulture, floriculture, development of seeds, animal husbandry, pisciculture, aqua culture, cultivation of vegetables, mushroom and services related to agro and allied sectors. Agriculture is the main stay of the Indian economy as it form the backbone of rural India which inhabit ants more than 70% of total Indian population. Only in tea sector 100% FDI is allowed with prior permission.In a statement the department of industry policy and promotion in the ministry of commerce and industry said that FDI policy vide press note 4(2006series) dated February 10 2006 was rationalised. Further it requires company divestment of 26% equity in favour of the Indian partner or Indian public within a maximum period of five years. This also requires approval from the concerned state government in case of change in use of land for such activities.3. ALLOWANCE BY INDIAN GOVERNMENT Farm credit target of 2’25’000 crore for the year 2007-08 has been set with an addition of 50 lakh new farmers to the banking system. * 35 projects have been completed in 2006-07 and addition irrigation potential of 900000 hectares to be created and training of farmers arranged. * A programme for delivering subsidy directly to farmers has been arranged. * Loan facilitation through Agr icultural insurance and NABARD has also been facilitated * Corpus of rural infrastructure development fund has been arranged.4. FDI IN RETAIL (PROS&CONS TO FARMERS) FDI in multi brand retail will boost investment in cold chain facilities and bring down post harvest losses which benefits farmers. India is 2nd largest vegetables producer and 3rd fruit producer if FDI steps in to India the post harvest loss will be in control so to prevent the losses we need investment in the cold chain so more investment to set up such facilities will come with entry of FDI this will benefit both farmers and consumers. 3% of fruits and vegetables have been wasted in India where in Australia are the worlds No 1 in this where only 1% is wasted. India has only 5,300 cold storages so by increasing the well organised supply chain management the wastage can be controlled. So after giant retail companies stepping up to India the problem can be reduced. The company like Wal-Mart supply chain management is hug e and perfect so the losses can be prevented 5. ADVANTAGES India has 600 million farmer’s 1,200 million consumers and 5 million traders both the consumer is benefited by FDI. In Mandi system does not favour farmers because they lose 5% of the value in transportation,10% in broker commission and 10% in quality parameters so direct purchase by large retailers will solve this problemMany village farmers face very difficult to market their product because it takes long distance to travel which includes expenses like transport and labour problem is growing very high so to stop this FDI will make a change.People acquire goods and services at low prices, Savings are possible from routine transactions and Deposit increases from domestic. Good flow of money certainly lead towards sound position of host country.The role of FDI in job creation and conservation is found more favourable . Good inflow of FDI creates new employments in industries and market sectors of host country.FDI incre ases the industrial productivity. With the step of large output, India will boosts exports where the foreign exchange will be high.FDI improves the GDP rate better GDP rate repairs living standard of peoples in host country. If farmers get the money immediately after the harvest they can get ready for the next cycle of production.With the entry of foreign direct investment, the Indian organized retail market has become more competitive in terms of implementing newer business models on the operational format and pricing and reinventing and improving the supply chain.6. DISADVANTAGES If directly taken from farmers what products will come to local market.Foreign companies always try to achieve quick and large refunds on their invested capital. They take interest only in profit oriented ventures and neglect domestic and traditional business from investmentProblem of employment in rural area is not adequately solved. Most of the population of India is lived with unemployment in rural reg ion. FDI favours only urban regions for the investment and neglect rural & backward regions.Indian political environment is not constant. Business policies are affected with the change of political environment. It will not create smooth and fine running FDI policies and benefits to farmer.India will become a slave to foreign countries.7. AGRICULTURAL RETAILINGAs a 2008 ICRIES study of the impact of organised (but Indian owned) found for example, Average price realisation for vegetables is if farmers are selling directly to organised retail is about 25% higher than their products sold to the regulated government mandi. The companies like Bharti Wal-Mart direct purchase from farmers also believed to have augmented incomes by 7 to 10%. Indian government and farmers work alone will not be enough retail chains will have to work with agricultural scientists and farming communities and determine the type and quality of production that will be appropriate for their markets.There will be a p rocess of mutual learning for example in Gujarat the sourcing of certain types of potatoes by Mceain foods using contract farming arrangements is an indicator of opportunities. There has been a lack of investment in the logistics of the retail chain, leading to an inefficient market mechanism in the economy. Though India is the second largest producer of fruits and vegetables (about 180 million MT/annum), it has a very limited integrated cold-chain infrastructure, with only 5386 stand-alone cold storages having a total capacity of 23. million MT. where 80% of this is used only for potatoes.The chain is highly fragmented and hence, perishable horticultural commodities find it difficult to link to distant markets, including overseas markets, round the year. Storage infrastructure is necessary for carrying over the agricultural produce from production periods to the rest of the year and to prevent distress sales. Lack of adequate storage facilities cause heavy losses to farmers in term s of wastage as well as selling price.8. FDI IN SEED PRODUCTIONIn Agriculture sector FDI is permitted in the development and production of seeds 100% FDI is allowed in fertilizer under automatic route in India. FDI inflows to fertilizers are beneficial for the expansion of the seeds and fertilizer industry in India. But in India the impact of seed companies have created huge loss to the farmers. The genetically modified seeds which is allowed in India since the year 2002.9. IMPACT OF BT SEEDS The entry of BT (Bacillus thuringiensis) seeds has created huge loss to the Indian Agriculture and Farming society. The genetically modified BT seeds which has capable to produce its own insecticide.After the entry of BT to India the poverty and many death rate of farmers increased particularly after the entry of the MNC company (Monsanto) in 2002 for every 30 minutes a farmer in India dies especially after the introduction of BT cotton . Compared to traditional seed genetically engineered seed s are very expensive and have to be repurchased every planting season. Genetically engineered plants require more water for growth and more pesticides than hybrid or traditional cotton seeds. This seeds were heavily marketed in India using film stars and with a price tag 4 to 10 times expensive than hybrid seeds.The total percentage of FDI Inflows to Fertilizers industry in India stood at 0. 26% out of the total foreign direct investment in the country during August 1991 to December2005. Prior to hybrids Farmers were able to harvest their own seeds from each crop to be planted next season. However many genetically engineered seeds contain terminator technology, meaning they have been genetically modified so that the resulting crops don’t produce viable seeds of their own. So as result new seeds must be purchased from the top companies. As a result farmers pay high price because the farmers thinks that they can save the money on pesticides.India has a traditional farming techn iques were India have taught great farming techniques to the entire world. But so far now 2 lakh farmers have been committed suicide particularly the highest in Maharashtra state. The entry of Monsanto an American based multinational company has destroyed 25% of farmers living in India. The most important is the turnover of Monsanto is 25 thousand crores which is high than India’s agricultural budget. So if we allow this type of companies like Monsanto through FDI after few years the total Indian economy will be in trouble. Table 1Source: Face sheet of Foreign Direct Investment (FDI) from April 2000 to March 201110. CONCLUSION To conclude this paper on FDI impact on farmers is likely to ensure adequate flow of capital into rural economy in a manner likely to promote the welfare of all sections of society, particularly farmers and consumers. It will bring about improvements in farmer income and agricultural growth and assist in lowering consumer price inflation due to the curr ent scenario of inefficient supply chain, lack of proper storage facilities and presence of multi-level intermediaries between farmers and direct consumers.FDI- driven â€Å"modern retailing† being a direct interface between farmers and retailers trigger a series of reactions which in the long run rural sphere can be one of the justifications for introducing FDI in agricultural retailing but the government should put in place an exclusive regulatory framework.11. REFERENCES Economic Reforms, Foreign Direct Investment and its Economic Effects in India by Chandana Chakraborty Peter Nunnenkamp March 2006Reserve bank of India online databases on FDI in farming Retrieved from (https://reservebank. rg. in/cdbmsi/servlet/login/)Retrieved from blog’s at Economic time’s news paper.Retrieved from publications at dipp. nic. in.Retrieved from tamilnadu agricultural university Coimbatore publications at www. tnau. ac. in/.D. Gupta, â€Å"Whither the Indian Village, â€Å"E conomic and Political Weakly, February2005.P Shivakumar and S Senthilkumar, ‘Growing Prospective of Retail Industry in and around India†, Advances in Management, Vol 4(2), 2011.

Thursday, November 7, 2019

Machiavelli and Aristotle essays

Machiavelli and Aristotle essays Since pre-school weve been taught to do onto others as you would like them to do to you. Clearly Niccolo Machiavelli missed that lesson! He does however realize how important it is to be a good leader; however he does feel that its necessary to sometimes risk the love of the people in order to achieve greater success. According to Aristotle power and happiness lies in virtue whereas Machiavelli believes that power and happiness lies in not necessarily being virtuous but at least appearing to be. Ultimately, power has nothing to do with happiness for Aristotle; unfortunately power has everything to do with happiness for Machiavelli, where in lies the dramatic difference between the two men. Machiavelli wrote a guide about how to attain political power by whatever means necessary, so you can obviously conclude that the man doesnt have many morals. Hes all about getting to the top no matter what it takes. Its not so much that Machiavelli disagrees with Aristotles views but that in some sense considers them to be naive. Aristotle would want his political leader to be charitable no matter what the costs, however this could possibly leave him broke to uphold his status. Machiavellis idea of a perfect leader is a frugal leader. Instead of giving to everyone, you only give to such people like soldiers, that way you may not be loved by everyone but at least youre not hated and youre not broke either! You never get anywhere in life if you do what everyone wants you to do. Virtue is not always the answer, even if its a good one. As the saying goes, nice guys finish last. Im assuming that by the sound of it, that would be Machiavellis motto. I wish it werent true, but in m ost cases you have to knock someone down to get to the top. However, why is it so important to get to the top? Sure, its all good and well but its not the answer ...

Monday, November 4, 2019

Psychology- Human Development Essay Example | Topics and Well Written Essays - 500 words - 1

Psychology- Human Development - Essay Example The second approach, â€Å"The native perspective† unlike learning theorists minimize the role of the language environment and maximize the role of child’s biologically programmed capacities in explaining language development. The third approach known as â€Å"The Interactionist Perspective† believes that both learning theorists (nurture) and nativists (nature) are correct: Childrens biologically based competencies and their language environment interact to shape the course of language development (Bloom, 1998; Bohannon & Bonvillian, 2005).They emphasize that acquisition of language skills depends on and is related to the acquisition of many other capacities: perceptual, cognitive, motor, social, and emotional. Obviously, there is no doubt that males and females differ biologically. Yet we have to ask ourselves one question, do we form our ideas of gender roles according the influence of our society, or does biological predisposition outweigh the cultural influence? Gender refers to the cultural and social definition of feminine and masculine, it bears no relevance to the biological sex. Rather, it is the socially constructed expectations placed on a person because of their sex. Socialization is defined as the process by which we learn the ways of a given society or social group so that we can function within it. We are born either male or female, but not boy or girl. Femininity and masculinity do not bubble up from our genetic makeup. The distinction between boy and girl is taught. Therefore, gender is a learned identity. From the moment a child is born, (s)he begins the process of gender socialization. There is no nation where men and women are not gendered. The gender system organizes s ociety in such a way that boys and girls are treated differently, and the expectations for boys and girls differ. Family and peer relationships, schools and religious institutions, and media exposure

Saturday, November 2, 2019

Human resources and employment rights Literature review

Human resources and employment rights - Literature review Example Providing value and respect to employees can help the organization to avoid several workplace issues regarding employment rights (Bach, 2003, pp.11-13). The study will provide a theoretical framework about the issues arising to several HR practitioners regarding various employment rights. Literature Review Several global organizations face significant challenges due to the regulation on unfair employee dismissal. According to these rules and regulation, an employer cannot simply terminate the employees based on several unethical reasons. Traditionally, employers recruit new employees based on the competency of the employees and several organizational policies. It is true that several workplace hazards can reduce the ability or physical competency of the employees. In this case, it is the moral right of the employees to expect employment. Few organizations used to terminate them with minimum compensation due to their reduced ability and competency. This issue can hamper the workplace environment of the organization as it can minimize the motivation level of the other employees. According to Gennard and Judge (2005), government of several countries have introduced several legal HR policies in terms of employment rights in order to provide justice to these disabled employees (Gennard and Judge, 2005, p.198). According to Daniels (2004), OECD countries collaboratively have developed employment protection regulation in order to protect the existing jobs of employees (Daniels, 2004, p.22). According to employment protection law, it is the right of all qualified and suitable employees to enjoy several aspects of employments. Old employees or several disable employees cannot be terminated for the sake of low performance and productivity. Several organizations have faced critical challenges due to this issue. Decision to terminate an employee can create huge legal risk for the employers. This employee termination activity needs to fulfil the policy of employment. Severa l workplace conflicts, such as religion, gender, race, ages, disability and national origin issues can violate the organizational culture which can reduce the performance of organization. The HR practitioners can face several issues related to employment rights. Making inadequate, disparaging and false comments about employees can create serious conflict. Inadequate employee or workforce management and emotional distress of employees will violate the employment protection law. In this case, the employees have the right to file a legal case against the management or the organization. According to Bone (2004), violation of privacy of the employees is strictly restricted (Bone, 2004, p.38). In terms of old employees, it is true that the old employees cannot provide similar physical performance comparing to the young and enthusiastic employees. Under the Medical and Family Leave Act, the employees have the right to take leave against appropriate claims. In addition, the employers of the organizations or the HR managers are bound to provide leaves to these employees if the claims are reasonable. HR practitioner cannot terminate them or cut their salary based on these aspects. However, several global organizations are facing various legal issues regarding employment rights. An employer cannot terminate an employee without proper and thorough investigation. In either case, the particular employee can sue the organization legally. If the