Monday, December 30, 2019

1984 Essay examples - 1091 Words

The book 1984 tells a story of a world that is undergoing a totalitarian rule, whereby the freedom of human beings is removed and there is injustice present to all by the loss of privacy. It is a world where information can be changed and influenced in order to favour the Great Powers, I believe that this world of 1984 is possible for its looming signs are present worldwide. I believe that the chances of such a situation occurring depends on the societies capacity to do it, or in other words if the technology to bring about such a situation is available then the chance of this occurring is equally likely. Of course we see in our present day world that technology has taken a huge upheaval. Our technology in terms of privacy is now far†¦show more content†¦The manipulation of information in 1984 is a significant factor of its continual submission of its citizens to the Great Power. Changing information may also lead to the power of changing the past. This is obvious and an intention of Big Brother, his continual success is bleakly based upon his power to lie. There are scenarios we see today that perfectly incorporate to 1984. `The children overboard crisis. This is a situation where asylum seekers coming into Australia were refused aid when their boats were sinking. The media had covered the footage of this incident occurring, although there were twists in the story that were in favour of the government or there was incredibly strong bias in the circumstances. Nationwide the people saw refugee children being thrown overboard by their parents; the media headlined this as being a desperate attempt of the adults to get the attention of the Australian Government to receive aid. But the reason why such an action was undergone was solely intended for the governments sheer willingness to receive the citizens trust and remain in lead and control. So how is this situation different from the similar actions shown in 1984? The answer is that it is not. The governments have undergone the same actions of changing the truth in order to remain in control just like Big Brothers attempts to change his malevolent past thro ugh to morally remain in power. But in 1984 there is aShow MoreRelatedThe Presidential Election Of 19841339 Words   |  6 Pages The United States presidential election of 1984 was the 50th quadrennial presidential election. It was held on Tuesday, November 6, 1984. The presidential race was between the incumbent Republican candidate, President Ronald Reagan, and former Vice President Democratic candidate, Walter Mondale. Reagan was helped in the election by a strong economic recovery from the deep recession of 1981–1982. Reagan carried 49 of the 50 states, becoming only the second presidential candidate to do so after RichardRead MoreAnalysis Of George Orwell s 19841450 Words   |  6 PagesThose familiar with George Orwell’s â€Å"1984† will recall that â€Å"Newspeak was designed not to extend but to diminish the range of thought.† I recently felt the weight of this Orwellian ethos when many of my students sent emails to inform me, and perhaps warn me, that my name appears on the Professor Watchlist, a new website created by a conservative youth group known as Turning Point USA. I could sense the gravity in those email messages, a sense of relaying what is to come. The Professor Watchlist’sRead MoreThe Case of Malcolm Farley1275 Words   |  5 Pagesapprehending a criminal they were after for a long time. The role of paint analysis in this case was enormous and to date it is one of the cases people refer to when discussing the relationship between forensic science and crime (Smith, 2005). In 1984, Bedfordshire and Buckinghamshire residents suffered sleepless nights with fear and terror in their homes. Armed burglaries, rape as well as indecent and uncouth sexual assaults became the order of the day. The residents barred their windows, the policeRead MoreThe 1984 Anti-Sikh Riots in India1175 Words   |  5 PagesThe 1984 Anti-Sikh Riots in India The Anti-Sikh riots in the 1984 year of riots had been anything in particular. People are aggrieved when they hear of the incident and narrate stories of how runaway crime could have increased on Sikhs during the time. The main reason for the advent of the riots was the shooting down of Mrs. Indira Gandhi in morning of 31 October 1984. The riots had started off in the evening just after her morning death. The information of the riots was already taken by GiyaniRead MoreComparison Of 1984 And 19841089 Words   |  5 Pagesâ€Å"It really is as if he got hold of an early copy of the novel and used it as a blueprint.† The novel, 1984 by George Orwell, is a dystopian novel published in 1949. This novel is based in London, Oceania. This was Orwell’s prediction of what future societies would be like. North Korea is a country located in East Asia that is ruled by Kim Jong-Un. Kim Il-Sung set up the government they have now, around the same time as Orwell wrote his novel. Many similarities and differences are present betweenRead More1984817 Words   |  4 PagesGeorge Orwell s 1984 is an exemplary work of dystopia. Although written in 1940s, 1984 is a vivid depiction of China during the Cultural Revolution and Soviet Union during the Elimination of Counterrevolutionaries. Dystopia came into being after the World War â… ¡, when the world was at a loss about its future. Although the world was purged of fascism, personality cult and communist dictatorship arose to take its place.Dystopia is characterized by an authoritarian and totalitarian regime that oppressesRead MoreAnalysis Of 1984 s 1984 1317 Words   |  6 PagesLiterature and Composition Summer Project 1984 Ms. Shaw 1. 1984 The title 1984 is significant to the some of the themes throughout the novel which are developing technology, propaganda, and the ability to manipulate the truth. Developing technology is shown throughout the novel when telescreens and bombs become commonly used within society; these are examples of the technology modernizing throughout this time period. A second theme significant to the novel 1984 is propaganda led by using an exampleRead MoreSimilarities Between 1984 And 1984963 Words   |  4 Pages1984 Essay Although modern society may not be a totalitarian society, 1984 reflects many of modern society’s circumstances. Such as psychological understanding, surveillance technology, and wealth distribution. As a result of this, the society of 1984 may not be as far off from today as would seem, from 1984 societys wealth to standard of living, both places share many similarities. Both 1984 and modern society has developed a deep psychological understanding. 1984 expressed this understandingRead MoreThe Themes Of 1984 And George Orwells 19841237 Words   |  5 Pagestopics in his book, 1984. In 1984, George Orwell illustrates what a totalitarian society would be like. At the time that he wrote this book, many citizens of England were afraid of their government having too much power over them. Orwell wrote 1984 to warn the public of what a powerful government can lead to. Even currently, 1984 can be related to different places or events in our world. The purpose of this paper will be to show how the past and present connect to George Orwell’s 1984. The misuse of powerRead More1984 Research Paper On 1984 Essay1026 Words   |  5 PagesOllie Pearson Mr Funk English 2 HN 2 October 2017 1984 Research Paper Thomas Jefferson once said that â€Å"Everyone has the unalienable rights of life, liberty, and the pursuit of happiness.† If the government spied on its citizens, the citizens would carry the burden of having the government constantly watch every move being made, interfering with citizens pursuit of happiness. With that being said, if a citizen’s privacy was invaded then their pursuit of happiness would be demolished. The government

Sunday, December 22, 2019

Analysis Of The Poem Indian Summer - 1391 Words

III. Second Body Paragraph Parker uses voice to demonstrate her feelings about how she refuses to conform society’s expectations. For example, her poem â€Å"Indian Summer† she uses a confident and powerful voice to compliment her theme of the poem. She writes, â€Å"And if you do not like me so/To hell, my love, with you!†(lines 7-8). Parker describes how she has changed as a woman. Parker learned that being herself is more important than what her relationships expected from her.Critic Breese writes, â€Å" â€Å"It is her style, her art, her many-sided humor, her irony, her sarcasm, her tenderness, her pathos that readers pay attention to . . . . Parker s attitude toward human folly was satiric; her poems mock and undermine as they unfold through repetitions that underscore and heighten her satirical intent† (Breese). Breese is explaining that Parker used satire and sarcasm to show her feelings about people who do not accept her for who she is. Parker knew she defied most standards and she did not care what others thought about her. Her attitude proves she does not care about being judged for using her intellect and being independent. Parker uses voice to emphasize her attitude of people who do not agree with the feminist views. For example, in her poem â€Å"Iseult of Brittany† A bitterness to me! (line 8). Parker ends her romantically written poem with a blunt line at the end. This represents Parker’s sass and confidence of being independent and free. She does not care about pleasing aShow MoreRelatedSarojini Naidu1131 Words   |  5 PagesThe Indian English poetry that flourished in the late nineteenth and early twentieth centuries was largely an imitation of the English Romantic poetry both in its form and matter. No attempt was made to project the essence and nuances of the rich culture and tradition of India. The Westerners inturn wished for a glmpse of Indian life and customs through the literature of the t ime. As Edmund Gosse says in his introduction to Sarojini Naidu’s The Bird of Time (1912) : What we wished to receive wasRead MoreA Literary Analysis On The Shall I Compare Thee? Essay784 Words   |  4 PagesLiterary Analysis on the â€Å"Shall I Compare Thee?† (Sonnet XVIII) by William Shakespeare and the â€Å"To his Coy Mistress† Poem by Andrew Marvell This article compares the poems â€Å"Shall I Compare Thee?† (Sonnet XVIII) with â€Å"To his Coy Mistress† and examines the purposes of the poems and their implemented poetry techniques to convey their poets ideas. On first look it seems both poems are sharing the common ideas of â€Å"Love† but by analyzing the poems, it becomes clear that the purposes of the two poems are notRead MoreThe Lotus by Toru Dutt1493 Words   |  6 Pages THE LOTUS A poem by Toru Dutt Love came to Flora asking for a flower That would of flowers be undisputed queen, The lily and the rose, long, long had been Rivals for that high honour. Bards of power Had sung their claims. The rose can never tower Like the pale lily with her Juno mien-- But is the lily lovelier? Thus between Flower-factions rang the strife in Psyches bower. Give me a flower delicious as the rose And stately as the lily inRead MoreNostalgia in the Poems by Kamaladas3364 Words   |  14 PagesPen name | Madhavikkutty | Occupation | Poet, short story writer | Nationality | Indian | Genres | Poetry, Short story | Notable award(s) | Ezhuthachchan Puraskaram, Vayalar Award, Sahitya Akademi Award, Asan World Prize, Asian Poetry Prize, Kent Award | Spouse(s) | Madhava Das | Kamala Suraiyya (b. Kamala Madhavikutty) (Malayalam à ´â€¢Ã  ´ ®Ã  ´ ²Ã  ´ ¾ à ´ ¸Ã  µ Ã  ´ °Ã  ´ ¯Ã  µ Ã  ´ ¯ / à ´ ®Ã  ´ ¾Ã  ´ §Ã  ´ µÃ  ´ ¿Ã  ´â€¢Ã  µ Ã  ´â€¢Ã  µ Ã  ´Å¸Ã  µ Ã  ´Å¸Ã  ´ ¿) (31 March 1934 – 31 May 2009) was a major Indian English poet and literateur and at the same time a leading Malayalam author. Her popularityRead MoreConfessional Mode in Poetry of Kamala Das3267 Words   |  14 Pagesof writing has its virtual origin in the mid50s in America. It is hybrid mode of poetry which means objective, analytical or even clinical observation of incidents from one’s own life. Confessional poems are intensely personal and highly subjective. There is no ‘persona’ in the poems. ‘I’ in the poems is the poet and nobody else. The themes are nakedly embarrassing and focus too exclusively upon the pain, anguish and ugliness of life at the expense of its pleasure and beauty. Confessional poets didRead MoreHenry David Thoreau4404 Words   |  18 PagesThoreau, advising the young man and introducing him to a circle of local writers and thinkers, including Ellery Channing, Margaret Fuller, Bronson Alcott, and Nathaniel Hawthorne and his son Julian Hawthorne, who was a boy at the time. The best analysis of Thoreaus character was Emersons funeral elegy for him. Emerson was well aware of Thoreaus devotion to his principles and said that he had a perfect probity. Emerson also realized, perhaps better than anyone else, that Thoreau gave an edgeRead MoreThe Role of Nature4799 Words   |  20 Pagesthe way it can and should be perceived is not the same. I would like to argue that Coleridge considers a sort of intuitive faculty, whereas Pope thinks that a reasonable examination of Nature unveils the divine order of the universe. The present analysis will spotlight Popes Essay On Man and Coleridges Rime of an Ancient Mariner. First, I want to show that Coleridge and Pope advocate a pantheistic and a deistic conception of Nature, respectively. This should be the general framework through whichRead MoreWhat Aspects Of Human Life Remain The Same Across All Three Groups2974 Words   |  12 Pagespatriarchy in early Indian societies. What is the Lawbook of Manu and how does it relate to gender roles? Men may cook or weave or dress dolls or hunt. 4. What are the Vedas and the Upanishads? What do they teach us about early Indian societies?The Vedas are the most ancient known texts of Hinduism.The Upanishads are philosophical texts that came after the Vedas. 5. Trace the origins of the caste system, making sure to include a discussion of varna and jati. How do early Indian religious texts seemRead MorePoems: City Planners15330 Words   |  62 PagesThe Poems analysed are: The City Planners, Margaret Atwood and The Planners, Boey Kim Cheng. These are taken from the IGCSE Cambridge Poetry Anthology, but may be interesting for unseen poetry too. Question Set How do these poets use language and structure to get across their theme? I wrote this in about half an hour. Both poems are very similar, and have the same topic - City Planning - as shown in their titles. Structurally, they are different though, and the tone differs in places. IveRead MoreImpacts of Historical Globalization.6706 Words   |  27 Pagesthis? What might be the results of this policy? Think about these questions as you complete the activities below. 1. Read the quotation by Duncan Campbell Scott, Deputy Superintendent of Indian Affairs from 1913-1932 on page181 of your text Perspectives on Globalization. What was his point of view about â€Å"Indians†? (Use a people’s own name for themselves if you know it or the term First Nations is preferable when referring to all First Nations people in Canada?) Why do you think he had this viewpoint

Saturday, December 14, 2019

Hiv Prevention Strategy In Nigeria Health And Social Care Essay Free Essays

string(63) " high degree of cognition about HIV / AIDS bar among teachers\." Nigeria ‘s population of 140 million is the largest in Africa with 1 in 6 Africans being Nigerian. The information from the 2005 HIV study indicates that approximately 4.4 % of Nigerians are infected with HIV. We will write a custom essay sample on Hiv Prevention Strategy In Nigeria Health And Social Care Essay or any similar topic only for you Order Now The prevalence exhibits province broad disparity of between 1.6 % in Ekiti province ( south West ) and 10 % in Benue province ( north cardinal ) . ( Figure 1 ; NACA, 2007 ) While the infection rate is slower than some other African states, issues about HIV are still high on the docket because of the states high population. ( Figure 2 ; Jennifer Kates, Alyssa Wilson Leggoe, 2005 ) The Antenatal information shows that immature grownups appear most affected with 3.6 % amongst pregnant 15-19 twelvemonth olds and 4.7 % amongst 20-24 twelvemonth olds ( Figure 3 ; Technical Report National HIV/Syphilis Sero-Prevalence Sentinel Survey, 2005 ) This fact highlights the demand for a good co-ordinated National HIV/AIDS bar plan to farther decelerate down the infection rate and cut down incidence. ( NACA, 2007 ) Figure 1: HIV Prevalence by State ( 2005 ) www.naca.gov.ng Figure2 a ) Percentage of Adults estimated to be populating with HIV/AIDS and B ) Number of People estimated to be populating with HIV/AIDS. Beginning: HIV/AIDS Fact sheet, 2005 Figure 3: HIV Prevalence by Age group ( Old ages ) 2005 www.naca.gov.ng Drivers of the HIV Epidemic in Nigeria Informal Transactional Sexual activity: While commercial sex workers ( CSWs ) have long been identified as critical in impacting the spread of the HIV/AIDS epidemic rubber usage among them is high. A cardinal driver nevertheless is informal commercial sex among the general population ( J. Robinson, 2008 ; NACA, 2007 ) Low Risk Percept: 67 % of Nigerians perceive themselves to be at no hazard of undertaking HIV while 29 % perceive themselves to be at low hazard and merely 2 % rated their opportunities of infection high ( NARHS, 2005 ; NACA, 2007 ) Multiple Partnerships: In Nigeria, spiritual beliefs tend to back up the publicity of common fidelity ; NDHS ( 2003 ) nevertheless proved that multiple sexual partnerships are common particularly amongst sexually active work forces. About 30 % and 24 % single and married work forces severally reported holding more than one sexual spouse in the past twelvemonth ( NDHS 2003, NACA 2007 ) . While work forces with multiple spouses have a 60 % increased hazard, adult females are 10 % higher than work forces. ( NARHS, 2005 ) Lack of established STD Programming for Most at Risk Population ( MARP ) : Package of services provided to MARPs is limited. Linkages to HIV guidance and testing, STD direction and intervention are weak and have relied chiefly on referrals. Continuing Risky Behaviour of males in General Population: Hazardous behavior in the general population is more prevailing among work forces than adult females. 26 % of work forces report holding more than one sex spouse in the last twelvemonth as against 2 % in adult females. ( NARHS, 2005 ) Gender Inequalities: Underliing causes and effects of HIV/AIDS infections in work forces and adult females varies reflecting differences in biological science, sexual behavior, societal attitudes, economic power, exposure, and cultural attitudes that discourages safe sex dialogue. ( NACA, 2007 ) Economic Drivers: HIV impoverishes persons and communities through losingss of human resources. Poverty brings about low degrees of instruction associated with illiteracy and by and large hapless wellness position. These conditions result in hapless acceptance of behavior alteration which exposes the population to HIV infection. ( NACA, 2007 ) Equally shortly as an epidemic of HIV/AIDS was noticed in the state, Nigeria mounted a national response, which was expanded in 2000 with the constitution of the Presidential Council on AIDS ( PCA ) and the National Agency for the control of AIDS ( NACA ) . This allowed for a co-ordinated attempt to supply bar, intervention, attention and support services through policy preparation, development of programs and execution. NACA ‘s authorization provinces that: -A A 1.A A A Coordinate and prolong protagonism by all sectors and at all degrees for HIV/AIDS/STD expanded responses in Nigeria.A 2.A A A Develop the model for coaction and support from all stakeholders for a multi-sector and multi-disciplinary response to HIV/AIDS in Nigeria. 3.A A A Develop and present to the PCA, all programs on HIV/AIDS in Nigeria for policy determinations. 4.A A A Develop and joint a strategic program for an Expanded National Response to HIV/AIDS in Nigeria.A 5.A A A Coordinate, proctor and measure the execution of the Strategic National Plan for the control of HIV/AIDS/STDs in Nigeria and all other approved policies.A 6.A A A Coordinate and ease the mobilisation of resources for an effectual and sustainable response to HIV/AIDS/STDs in Nigeria.A 7.A A A Undertake any other responsibilities as assigned by the PCA from clip to clip. ( NACA, 2007 ) The National HIV/AIDS Strategic Framework for Action ( 2005-2009 ) provides a strong and comprehensive model for bar attempts including a balanced â€Å" ABC † attack. In this model, in-school young persons were marked as a mark population group. Sexual activity instruction is a major constituent of bar and one of the tools in minimal bundle required for HIV bar. Political issues environing it include Resistance to arouse instruction and rubber publicity by Faith Based Organizations ( FBO ) , Religious leaders and other stakeholders Inadequate accomplishments on rubber usage and dialogue Misconception about sex instruction and low credence Availability, handiness and affordability Lack of policy environing sexual instruction in secondary schools ( NACA, 2007 ) A survey done in Nigeria analyzing the sexual behavior of secondary school striplings showed that the average age at first intercourse was 12 old ages with a scope of 6-19 old ages ; many of the participants had multiple sexual spouses and a hapless perceptual experience of the hazard of STD including HIV. It was recommended that a structured sexual instruction course of study be instituted for all schools get downing at an early age. ( A.T. Owolabi, A.A. Onayade et Al, 2005 ) Other surveies have examined how instructors feel about go throughing their cognition on HIV / AIDS bar steps to their pupils in the context of their cultural and societal norms that restrict unfastened treatment of sex.A The consequences showed a high degree of cognition about HIV / AIDS bar among teachers. You read "Hiv Prevention Strategy In Nigeria Health And Social Care Essay" in category "Essay examples"A Nevertheless, instructors do non go through on this cognition because of cultural and societal taboos.A In add-on, instructors do non have proper preparation and motive on information, instruction and communicating on HIV / AIDS and sex instruction. ( Daniel C. Oshi et Al, 2005 ) It is hence necessary to increase handiness of sexual wellness services, create societal support for sex instruction in schools and build capacity on appropriate sex instruction. Previous efforts at supplying sex instruction were interfered by spiritual and cultural resistance. In 2000 a new course of study was introduced for comprehensive sex instruction for 10-18 twelvemonth olds which concentrated on bettering pupil ‘s cognition and attitudes to sexual wellness and cut downing hazardous sexual behavior. However the execution of the undertaking was a entire failure and has since been abandoned. ( Avert, 2010 ) In a state where issues such as confidentiality around HIV proving is non covered by statute law, where no action is taken when human rights are broken in relation to HIV infection and stigmatisation. It seems the destiny of the immature people are in their custodies, owing to the absence of generative wellness ( RH ) institutes and deficiency of separate Torahs or statute law for immature people in relation to HIV bar. ( United Nations Global Coalition on Women and AIDS, 2004 ) POLICY AGENDA Setting To accomplish this wellness policy, one must see the histrions that would be involved and analyze all stakeholders- so as to understand their behavior, purposes, inter-relations and involvements: and to measure the influence and resources they bring to bear on decision-making or execution procedure. ( Varvasovszky Z. , Brugha R. 2000 ) Stakeholder/ Actor analysis will place the type of people to interview, utilizing sweet sand verbena techniques, reappraisal questionnaires etc. It is of import to plan a semi-structured/ condense interview inquiries. Interviews will let comparison across cultural groups and faith ; and yet be sensitive to specific contexts. Stake holder ‘s position has to be transformed into one that utilizes indexs to exemplify the extent of the job. They need to be informed of graduated table, tendencies and likely future class of HIV epidemic in their part or territory and within specific subgroups of the population. Table 1: Stakeholders Analysis Stakeholders Engagement in the issue Interest in the issue Influence/ Power Position Impact of issue on histrion Parents Participate in Child Sexual Education and can act upon their kids ‘s determination Medium Low Non-mobilized High Media Industry Promote stakeholder ‘s positions and can act upon determination shapers by supplying dependable information High High Supportive Low Ministry of Health Promote healthy generative picks, direction of STIs and HIV related unwellnesss High Medium Supportive High Presidential Council on AIDS Survey policy proposals and do determinations on them Medium High Non-mobilized Medium School Administration Participate in policy Execution High Medium Opposed High Ministry of Education Ensure sex instruction is integrated in national course of study and implemented Training of staff Policy Implementation and Evaluation High High Supportive High Bilateral Organizations Provide support and proficient support High High Supportive High Religious Leaderships Influence the population through spiritual, moral and cultural beliefs High High Opposed Medium Importers, Manufacturers and Sellers of the merchandise e.g. rubbers, text editions Provide low-cost and high quality merchandise Engagement in distribution High Low Supportive High NACA Develop and present to PCA all programs on HIV/AIDS in Nigeria for policy determinations High High Supportive High Documentary/ Content analysis would be undertaken to place the grade of consistence between the present policies in the state. It would besides cover how far policy shapers draw on research findings in addresss during policy preparation and execution phases. The information beginnings would include research publications and studies, statute law, administrative/executive ordinances or orders, reimbursement agreements, guidelines and advice, meeting studies and proceedingss, policy statements, addresss, and articles. An economic rating will be considered to measure and construe the value of this wellness intercession. This will mensurate the results in pecuniary footings every bit good as in wellness units. For this policy a cost effectivity analysis ( CEA ) will be more good in order to besiege the quandary of puting pecuniary value on human lives. It will compare the value of resources spent on the intercession to the measure of wellness gained as a consequence. ( David Wonderling et Al, 2005 ) A thorough apprehension of consistence of old policies with research findings, the grade of influence of research on policy docket scene, preparation and execution would be needed to guarantee a high degree of wellness research use in the determination devising of this wellness policy. CLARITY OF MESSAGE HIV bar, peculiarly sex instruction demands strong grounds in order to be recommended for consideration and broad spread execution. Hall ‘s theoretical account of docket puting claims that the strength of this grounds depends on the issue ‘s Legitimacy, Feasibility and Support. ( Kent Buse, 2005 ) The issue at manus is legitimate as the HIV epidemic continues to harry the state, heterosexual sex being the most reported signifier of transmittal and high rate among immature people. It is executable since the policy will be implemented logistically through already bing systems, cost and resources will hence be reduced. Support can be generated through act uponing the population with the usage of media, raising consciousness and advancing rubber usage, affecting FBOs in policy execution. There is besides no grounds that sex instruction or rubber handiness in schools will increase promiscuousness or cut down the age of first sexual intercourse of in school young person, hence this policy has no potency for inauspicious consequence. This policy ‘s acceptableness might be of concern, as there will be resistance from spiritual leaders and other involvement groups. This policy besides has other societal and wellness benefits, as the usage of rubbers will besides cut down other STIs, cut down unwanted gestations and the complications from illegal abortions, thereby cut downing maternal mortality. Previous work in Nigeria has shown that equal instruction works in HIV bar and this is soon being used to advance abstention and be faithful intercession plans. Kingdom ‘s Model proposes that there are 3 watercourses of policy procedure and they need to cross for policies to be considered. ( Kent Buse, 2005 ) Problem watercourse: High prevalence of HIV among in school young person, with the highest signifier of transmittal being heterosexual sex Politicss watercourse: The National HIV bar work program promotes condom scheduling and there have been ongoing arguments around this issue. In 2000, sex instruction was integrated into National course of study but was ne’er implemented. Meanwhile the prevalence amongst in school young person since so has increased. Policy watercourse: Following the 2005 National HIV/Syphilis Sero prevalence lookout study for pregnant adult females go toing Ante-natal clinics in Nigeria. NACA has mounted more response to HIV bar. More support for HIV bar is being provided by bilateral organisations and NACA has become unfastened to execution of policies through FBOs and CSOs. Interventions are now being chosen and funded based on scientific grounds research. POLICY FORMULATION AND IMPLEMENTATION Legislators are influenced by media and runs, cultural beliefs, lobbyists, political parts and support every bit good as grounds based research. It is hence of import to guarantee they have adequate information from researches, prevalence of HIV and alternate solutions. The function of the media and other organisations can non be over emphatic. This policy proposes the debut of structured sex instruction with condom publicity in secondary schools across Nigeria It aims to cut down the prevalence of HIV/AIDS among in-school young persons Aims To better the cognition about HIV/AIDS amongst young person To raise the age of first sexual brush amongst in-school young person by 5 old ages in 10 old ages To promote rubber usage among in-school young person To increase the figure of in school young person seeking intervention and attention for other STIs by 20 % in 5 old ages To cut down teenage gestations by half in 5 old ages Resistance to this policy ‘s credence could be limited by ab initio influencing policy alteration in southern urban parts where it will be more acceptable and if successful, scaled up to other less urban countries utilizing traditional and spiritual leaders to act upon credence. A broad web and model of HIV/AIDS bar is soon on land in Nigeria, a assorted scanning attack will be ideal. A rational attack for explicating policies and go throughing the measure, which will be instantly diffused through the Ministry of Health to all schools An incremental attack by ab initio increasing the cognition of in-school young person on HIV/AIDS by presenting sex instruction into the school course of study, presenting text editions and stuffs that educate pupils on HIV/AIDS and subsequently up-scaling to include RH clinics to turn to early intervention and bar of STIs. Formation of in-school HIV nines and groups will supply a forum for pupils to aerate their positions on abstention, sexual exposure and bar patterns and eventually condom handiness and distribution. Cost will be reduced by utilizing bing resources and adult male power. Increased cognition of HIV/AIDS in the population with capacity edifice for instructors and in school young person will let for easy execution. A elaborate and careful pilot testing could be done in the relevant mark group to let for appropriate rating and alteration before broad spread execution. A underside up attack should besides be used to let for more engagement by implementers and uninterrupted rating and redefining of aims or schemes. Evaluation HIV bar intercessions are complex. There are legion intercessions and schemes to take from. The content and quality of intercessions may differ well from one another and intercessions may be implemented in different ways by different people. Specific intercessions may be interactive or even counter and yet most programmes will unite several intercession schemes, doing rating of the effects of specific intercessions or constituents within the programme bundle hard or impossible to extricate. ( UNAIDS, 2008 ) In measuring the effectivity of the policy, elaborate grounds on the existent procedure of bringing of the intercession that establishes the extent and quality of bringing will be gathered. Facility audit is besides of import to supply information on adequateness of substructure, equipment, proficient and operational guidelines. The success of the policy execution will besides be evaluated utilizing the five key United Nations General Assembly Special Session ( UNGASS ) ends. ( WHO Technical study series, 2006 ) Provide appropriate information to immature people and grounds of betterments in their resulting cognition Provide appropriate accomplishments developing to immature people and grounds of their ability to show these accomplishments, and utilize these accomplishments to diminish their hazard of going infected Supply appropriate skills-based preparation, equipment and supplies to implementers and grounds of this ensuing in increased bringing of effectual, high quality wellness services to immature people. Provide grounds of reduced exposure of HIV among immature people, such as alterations in the attitudes and behaviors of immature people Provide grounds of a decrease in HIV prevalence among immature people that can be attributed to the intercession Donabedian ‘s model for measuring health care conceptualizes â€Å" Inputs, Process and Outcome † . ( Kent Buse et Al, 2005 ) Table 2: Policy Implementation and Evaluation Undertaking IMPLEMENTATION Undertaking EVALUATION INPUT/RESOURCES ACTIVITIES/INTERVENTION SERVICE End product OUTCOME/IMPACT MEASUREMENT METHOD/INDICATORS Staff Monitoring and rating preparation for plan directors and implementers Training of school nurses and instructors Training of spouses and stakeholders on young person and HIV Media preparation on Sexual activity instruction and Condom publicity Capacity edifice for implementers Change in supplier behavior in relation to school young person Change in supplier behavior in relation to describing systems Improvement in administrative and describing systems Experimental surveies Number of instructors and school nurses trained in supplying sexual instruction and wellness services to school young person Number of stakeholders trained on HIV and the young person Quality appraisal of describing systems Media support Awareness creative activity for rubber publicity to interrupt barriers Commission and air jangles on the impact of sex instruction on school young person. Media run aiming socio cultural issues disaggregated by age, sex and location. Media run on inter-generational sex Harmonization of stuff development, distribution and usage Increase consciousness on sex instruction and rubber rebranding Sexual activity instruction and sex literacy as a societal norm Condom usage as a societal norm Behavioural surveillance study Condom handiness and handiness Stigmatization around sex instruction and rubber usage Number of jangles aired on sex instruction and rubber usage among school young person Education Production and distribution of IEC Materials Production of text editions integrated with cognition of STI and HIV Development and version of course of study on sex instruction Sexual instruction Sessionss in schools Condom dialogue accomplishments developing for school young person Improve school young persons consciousness on HIV/AIDS Improve rubber negociating accomplishments among school young person Improve rubber usage among school young person Reduce STI incidence Reduce HIV morbidity and mortality Reduce teenage gestations and it ‘s complications Reduce maternal mortality associated with teenage gestations Annual National HI/AIDS sero-prevalence lookouts study among in school young person Prevalence of STI and HIV among school young person Number of teenage gestations and maternal deceases related to them No of rubber distributed No of school young person who used rubbers in their last sexual brush Facilities Handiness of friendly accessible service Centres for school young person within and outside the school Build effectual linkage/referral systems for STI direction in communities Establish regional offices through the Ministry of Education to supervise disposal and M A ; E Increase entree to RH services Promote dealingss among assorted organisations involved Allow easy monitoring and rating of execution School young person will be able to entree RH services without stigmatisation Provide utile information on execution procedure and success Behavioural surveillance study No of young person accessing RH services before and after intercession No of RH services available to youth No of young person referred through linkage systems Research Population based study on Sexual activity instruction, rubber usage and publicity in school young person Increase cognition base on sex instruction and rubber scheduling Increase cognition on the young person ‘s sexual hazard behavior Making future sex instruction programming policies based on grounds based scientific research Experimental surveies Number of research proposals and surveies carried out on sex instruction, hazard behaviors, rubber scheduling and usage among school young person Community Mobilization Battle of FBOs, CSOs, community and spiritual groups and parents on HIV/AIDS cognition Skills and services community mobilisation for HIV Sensitization of community leaders against stigmatising or opposing sexual instruction among school young person Increase consciousness of FBOs, NGOs and parents on HIV and the young person Promote rubbers as a double method Rebrand rubber usage as a positive thing Engagement of policy execution at grass root degree Improve community consciousness and integrity in the battle against HIV/AIDS Enable societal and cultural credence about sex instruction Constitution of young person groups Experimental surveies Number of young person groups on HIV/AIDS advancing sex literacy and rubber usage Number of community stakeholders involved in young person groups Number of outreach events advancing sex instruction Advocacy/policy Recommending for policy reforms on socio-cultural and economic issues that promote HIV transmittal, stigma and favoritism among young person Increase consciousness of stakeholders on HIV and young person HIV and youth issues get on the policy docket Laws on HIV and young person, stigma and favoritism enacted Experimental surveies Nature and type of issues incorporated into the National Youth policy No of public hearings on the bill of exchange measure and Young person policy Decision The immature can non talk for themselves in doing lawful determinations that impact their ain lives. Their determinations are influenced by parents, the community, equal force per unit area, and their personal cognition. It is hence of import that the cognition they have is sufficient and diverse to enable them do informed determinations refering their sexual wellness. Surveies done have shown adequate grounds that sexual instruction addition in-school young person ‘s consciousness of HIV/AIDS and can act upon their attitude or do behaviour alteration. Health system research findings in the Nigeria will stay impotent unless translated into public wellness action through effectual public policy-making. ( Shamsuzzoha B Syed et al.,2008 ) Policy docket scene, preparation, execution and rating are all necessary phases in achieving policy alteration. In world, they all happen at the same time and can be revisited and changed while the procedure is ongoing. Stakeholder ‘s influence is really important in policy devising and acceptance. The media is a really powerful tool which should be used suitably. Policy execution should be done carefully without rigidness utilizing bottom up attacks. Evaluation is necessary in order to mensurate the success of the plan and larn more for future policy executions. Reducing HIV/AIDS prevalence amongst in-school young person goes a long manner in cut downing prevalence in the general population and promises a healthier brighter hereafter, free from HIV/AIDS. How to cite Hiv Prevention Strategy In Nigeria Health And Social Care Essay, Essay examples

Thursday, December 5, 2019

Security Incidents and Hackb Case

Questions: 1.What Was the Problem? 2.How and Why It Occurred? Answers: Security Incidents In the present-day information age, the rules of value have changed and moved from the physical to the intangible. In today's inter-connected and always online world, data is the most important thing any organisation can own (Singh, 2015). Data not only serves as a fertile ground to be tilled for competitive advantage, but some data also come with the responsibility of protecting it. For example, if a company handles credit card details of its users, it is the company's responsibility to ensure the protection of such data, both from outsiders and insiders. It follows that data should be the thing that is stolen most often. Indeed, criminals are now after the data of an organisation. Various attackers like novice and skilled programmers, organised crime groups, activists, terrorists, and governments are interested in compromising an organisation for their goals. The world of information security is wide, and there are many nuances to the methods in which information may be compromised . This report looks into two real-life examples of information security incident. The first portion of the report discusses a breach, while the second one discusses an attack. Breach A breach is an inadvertent exposure of confidential information ("Security Breach", n.d.). In a breach, the parties acting to expose the information are insiders of an organisation. However, there is no malicious intent. Still, any data which is once made public can never recover its private status. This report will discuss a breach which happened from September to December 2015. The public data was searched, and one incident was selected for the purpose of this report. Any decent sized business will have access to personal details of many users. Even if the number of users does not run into millions (as we will see the later portion of this report), thousands of users may have given their personal data to the company. Web sites often request details like full name, phone number, postal address, and email address. The companies want to promote their business, and emails are much cheaper and quicker than postal mail. Thus, every company prefers to send electronic newsletters via email. Beyond a small number of recipients, it is often efficient to use software for the purpose of sending mass emails. The software can take care of sending the emails, handling unsubscribe requests, and work error-free. Now, this software can be developed in-house or bought off-the-shelf and then hosted on company's infrastructure, or subscribed to a third-party using Software as a Service (SaaS). The breach which is being discussed in this report concerns retailer WHSmith (England, 2015). WHSmith specialises in selling books, stationery, magazines, newspapers and entertainment products. Like any business worth its salt, it too has a Contact Us page, which understandably asks for personal details and email address also. On 2nd September 2015, the systems of WHSmith began emailing the contents of the Contact Us page to the entire mailing list of the company (Temperton, 2015). 1. Users have faith in the companies with which they are interacting. An online platform for a company with which a person interacts in the offline world also is often trustworthy. What happened in the case study being discussed, is that instead of routing the contents of the Contact Us page to the company officials, it was being routed instantly to the entire mailing list of the enterprise. The Contact Us form had fields for personal information. Now, the problem was that the form had been by the user under the impression that it will be visible to the eyes of the company officials only. Thus, the user's wording and tone of language may have been biased by that. Secondly, in addition to the message, the personal contact details were broadcast to all the subscribers. Not only was this a breach of privileged information, but also annoying. Twitter was lit up with the discussions of this data breach with a hashtag created to tag the tweets- #whsmithfail (Day, 2015) . 2. WHSmith contracts its email services to a third-party company I-subscribe. The company provides forms which are then embedded into the web pages. The data submitted via the form goes to I-subscribe, which then handles it on behalf of their customer, in this case, WHSmith. What was happening was that the software code at I-subscribe responsible for routing the email messages had a bug, which wrongly routed the Contact Us form submissions. To be clear, a software bug is the mistake of the developer or the company creating the software. As soon as WHSmith was made aware of the issue, they contacted their contractor I-subscribe, and the latter took down the form and started working on fixing the bug. The exact details of why the software bug was present and what conditions triggered it are neither in public domain (as their software is proprietary) nor relevant to the discussion at hand. We know that a software bug caused this data breach. Possible Solutions for Preventing the Breach in Future As far as the retailer WHSmith is concerned, the authors of this paper find it clean. They, after all, hired another company to manage its subscription and forms services, and the contracted company, I-subscribe business function is managing email subscriptions. Thus, we have suggestions for both the client as well as the contractor. The client should get a written Service Level Agreement (SLA) and responsibility in case of a data breach. The contractor should test their software before using it on production servers with live client data. Hack A hack is deliberate attempt to compromise a computer system ("hack", n.d.), and is characterised by malicious intent. The acting parties in a hack are outsiders. The goals of attackers in a hacking attack range from entertainment to undermining the interests of an enemy or nation or opposition organisation (Spivak, 2012). Thus, hacking is performed not only by criminals, programmers, and activists but also nation states using Internet and information systems as a new platform of war against enemy nations. For this report, public information on hacks between 2012 to 2016 was researched, and one was chosen for elaboration. Social networking on the World Wide Web (WWW) is a big business (Tran, 2016). The attack being discussed in this report is a professional social networking site - LinkedIn. LinkedIn is a network where anyone with an email address can join, create his public facing rsum, become friends with other profiles on the site. Additional tools include sending private messages, posting articles using LinkedIn's publishing tools, and other standard facilities which users have come to expect from any social networking site. LinkedIn is a big company, and users who join this site expect their privacy and the data to be protected. In 2012, attackers invaded LinkedIn's systems and stole login credentials (email and password) about 6.5 million users (Schroeder, 2012). Problem Users trust public companies like LinkedIn with their data. Email addresses of active users is a prize in the email spam business, and leaked databases are one of the best sources (Hoffman, 2014). Also, most business owners would like to pry on the online activities of their employees (Ballman, 2013) (Gee, 2017). Thus, professional networking and job search sites have an extra responsibility to keep the data of their users secure. As an illustration, policies of some companies may forbid employees from looking for a new job till they are working in that company. Such a user may begin his search in a private mode. The attack which is being discussed in this report was done by criminals for financial gains (Association, 2016). However, the possibility has been proven that such data is not secure. The problem is that some people were able to overrun all the security procedures of LinkedIn and get away with private data. Later on, in 2016, it turned out that the 2012 revelation was tip o f the iceberg. Within the same attack about 100 million users' details were stolen (Association, 2016), thus raising the total count to about 117 million users (Griffin, 2016). Affected by the Hack and How In this attack, users of LinkedIn who were in the pool of the around 6.5 million database records stolen were affected. The data stolen was put on sale in the black market on the Internet (Rogers, 2016). Now, the aftermath of the attack could have left the millions of users exposed, not only by the criminals but potentially also by prying employers. Nothing would have been off the table since the data was out on the Internet. However, in a professional handling of the incident, LinkedIn came forward and publicly accepted the attack (Silveira, 2012), provided live updates on the Twitter feed, published best-practices articles. Most importantly, LinkedIn promptly deactivated the passwords of all the users whose data was stolen. Follow-up emails were sent to the affected users alerting and advising them on next steps. The act of deactivating the passwords was a prudent one. It significantly reduced the value of the loot for the criminals. They still have access to emails of the people, but still, they cannot access the LinkedIn accounts per se. Some industry experts believe that the haul of the valid email addresses of working professionals may be grabbed by the spam industry (Rogers, 2016). They believe so since the price of the data set is relatively lower. In any case, successful sale of such data will only encourage the attackers to carry on their activities (Zilberman, 2017) (Westervelt, 2014). Attack Carried Out The details of this attack are incomplete. The true picture has not emerged more so since two nations - America and Russia - are in a tug-of-war about the alleged hacker. Still, the public records indicate that the hacker sends a malware to a company employee's computer. Later on, that malware was used to crawl the network and gain deeper access to LinkedIn's systems and finally to the database (RadioLiberty, 2016). Showing responsibility, LinkedIn reset the passwords for the 100 million newly surfaced accounts as soon as it got this new information (Reuters, 2016). Measures Which Can Prevent Such Attacks From what information is available, it appears that the launching pad for this attack was malware. How the hacker was able to install the malware on a computer of the company is not known. It could be a deceptive email, some random website which a LinkedIn employee visited, or any other of the many ways possible to infect any computer connected to the Internet. Also, that malware had the capability to bypass internal security checkpoints, as well send data back to the hacker. Considering these points, it is recommended that stricter rules be put in place to kill any malware suspected incoming data. This malware could be via email, infected web page, or even a flash drive (also known as a pen drive or USB drive). Also, no outside storage media should be allowed in the office premises. Also, firewalls should be updated so as to track outgoing data also. A review of the internal security of an organisation's network is recommended so that any malware is identified. Intrusion Detection S ystem (IDS) and anomaly detection techniques may be helpful in this regard. Conclusion This report looked into publicly available data on breaches and hacks. A data breach concerning the heads of states, and an attack stealing the email addresses and passwords of a popular social networking site were discussed. While the data breach was a case of human error and negligence, the attack was an example of fine programming skill put to illegal use. For both the case studies, the report explored the problem, the affected parties, ways by which the incident happened, and recommendations for preventing such incidents in future. References Association, P. (2016). Hacker advertises details of 117 million LinkedIn users on darknet. The Guardian. Retrieved 1 April 2017, from https://www.theguardian.com/technology/2016/may/18/hacker-advertises-details-of-117-million-linkedin-users-on-darknet Ballman, D. (2013). 10 New (And Legal) Ways Your Employer Is Spying On You. AOL.com. Retrieved 1 April 2017, from https://www.aol.com/article/2013/09/29/new-ways-employer-spy/20699464/ Council, B. (2016). Brisbane's 2014 G20 Leaders' Summit | Brisbane City Council. Brisbane.qld.gov.au. Retrieved 31 March 2017, from https://www.brisbane.qld.gov.au/about-council/governance-strategy/economic-development/brisbanes-2014-g20-leaders-summit Farrell, P. (2015). Personal details of world leaders accidentally revealed by G20 organisers. The Guardian. Retrieved 31 March 2017, from https://www.theguardian.com/world/2015/mar/30/personal-details-of-world-leaders-accidentally-revealed-by-g20-organisers Gee, K. (2017). The Not-So-Creepy Reason More Bosses Are Tracking Employees. WSJ. Retrieved 1 April 2017, from https://www.wsj.com/articles/the-not-so-creepy-reason-more-bosses-are-tracking-employees-1490101200 Griffin, A. (2016). Hacker advertises details of 117 million LinkedIn users on darknet. The Guardian. Retrieved 1 April 2017, from https://www.theguardian.com/technology/2016/may/18/hacker-advertises-details-of-117-million-linkedin-users-on-darknet hack. Dictionary.com. Retrieved from https://www.dictionary.com/browse/hack Hoffman, C. (2014). How Do Spammers Get Your Email Address?. Howtogeek.com. Retrieved 1 April 2017, from https://www.howtogeek.com/180477/htg-explains-how-do-spammers-get-your-email-address/ Day, K. (2015). Ke Day on Twitter. Twitter.com. Retrieved 1 April 2017, from https://twitter.com/KenDay/status/638999331350151168?ref_src=twsrc%5Etfwref_url=http%3A%2F%2Fwww.businessinsider.com%2Fwhsmith-customer-emails-data-privacy-2015-9 England, L. (2015). People are freaking out because WHSmith is accidentally emailing customer contact details to other customers. Business Insider. Retrieved 1 April 2017, from https://www.businessinsider.in/People-are-freaking-out-because-WHSmith-is-accidentally-emailing-customer-contact-details-to-other-customers/articleshow/48772997.cms RadioLiberty, R. (2016). U.S. Charges Russian Hacker With Stealing LinkedIn Data. RadioFreeEurope/RadioLiberty. Retrieved 1 April 2017, from https://www.rferl.org/a/us-charges-russian-hacker-nikulin-stealing-date-linkedin-san-francisco-dropbox-formspring-/28068596.html Reuters, T. (2016). LinkedIn to wipe out passwords for 100 million hacked accounts - Business Insurance. Business Insurance. Retrieved 1 April 2017, from https://www.businessinsurance.com/article/20160518/NEWS06/160519773/LinkedIn-data-breach-hack-2012-100-million-accounts-passwords Rogers, J. (2016). Hacker looks to sell 117M LinkedIn passwords from 2012 data breach. Fox News. Retrieved 1 April 2017, from https://www.foxnews.com/tech/2016/05/19/hacker-looks-to-sell-117m-linkedin-passwords-from-2012-data-breach.html Schroeder, S. (2012). 6.5 Million Encrypted LinkedIn Passwords Leaked Online [REPORT]. Mashable. Retrieved 1 April 2017, from https://mashable.com/2012/06/06/6-5-million-linkedin-passwords/#0qSP.pTP0GqT Security Breach. Techopedia. Retrieved from https://www.techopedia.com/definition/29060/security-breach Silveira, V. (2012). An Update on LinkedIn Member Passwords Compromised. Blog.linkedin.com. Retrieved 1 April 2017, from https://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised Singh, A. (2015). Is Big Data the New Black Gold?. WIRED. Retrieved 31 March 2017, from https://www.wired.com/insights/2013/02/is-big-data-the-new-black-gold/ Spivak, W. (2012). Hacking (1st ed., p. 13). Lulu.com. Temperton, J. (2015). WHSmith data breach spams confidential customer details. WIRED UK. Retrieved 1 April 2017, from https://www.wired.co.uk/article/whsmith-data-breach-customer-emails Tran, T. (2016). What is the valuation of a social network company?. Quora. Retrieved 1 April 2017, from https://www.quora.com/What-is-the-valuation-of-a-social-network-company/answer/Tony-Tran-75 Westervelt, R. (2014). What Is That Stolen Data Worth? 11 Most Lucrative Hacking Targets, Services. CRN. Retrieved 1 April 2017, from https://www.crn.com/slide-shows/security/300075162/what-is-that-stolen-data-worth-11-most-lucrative-hacking-targets-services.htm Zilberman, B. (2017). How Lucrative is Confidential Data? Prime Bounty for Hackers, Top Concern for Businesses. Radware Blog. Retrieved 1 April 2017, from https://blog.radware.com/security/2017/01/lucrative-confidential-data/

Thursday, November 28, 2019

Reflective Account on Communication free essay sample

Communication is very important in order to express needs and emotions. There are two types of communication, verbal and non-verbal, both of which are important in understanding and supporting someone. This report is based on a 40 year old lady that finds verbal communication hard, due to shyness. She also has bipolar and cerbal-palsey. The communication barrier I have with AB is she is finding speaking to me other then yes, no and don’t know very hard. She is shy and timid. AB does not engage in conversation easily. I believe that it is important to find way of communicate as it is the way we express needs and emotions. I chose to read her care plan and all records held at her property, written by other support workers and other professions working with AB. I did this so I would be aware what others have found to work or not and what is the type of communication AB chooses to use. We will write a custom essay sample on Reflective Account on Communication or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This is also a good way of communicate between staff that work with AB and it will ensure consistency of care for her. From reading this information I discovered that AB needs to build a relationship with a person before she is able to communication or make eye contact, these can take a long time when you are only present for short periods. I am working on building a good relationship with AB at present. I show an interest in her life, her family and other things that I have read see is interested in, or been doing. I always ask her if she knows what she would like to do each day. I will continue to read diary each visit. I also discovered that the way that I approach her is very important, so I always approach AB with a very positive attitude and always reminding AB that I am there to support her. The barriers to communication between myself and AB is that she is able to verbally commute but is choosing not to speak to me, more than one word answers and speaks very quietly. I am trying to over come this barrier by stop doing what i am doing to make sure that I am giving AB my full attention, listening carefully and showing interest in her. Most of the time AB is happy to make short answers to questions. If AB is then not happy to communicate with me, I remind AB that I am there to support her and will be here to talk to if she so chooses, as it is her choice. I also watch the type of body language that AB is using to help work out how she is feeling about the situation. AB does also have picture cards to help her to commute, but choose not to use them. I can check that she has understood what I have aid I by observing her reactions and short answers AB give. By always reminding and allowing AB to make her own choices and respecting her wishes to communicate with me or not I am working in a way to prevent discrimination. Reflecting on how I communicated with AB, I believe that I worked to the best of my knowledge at the time, but by doing some research I could find other ways of opening communication lines and I need to watch out more for body language signs, about the way AB is feeling. Having notes from other people about what they have tried and how they have worked or not, helps me know what things that might help get the lines of communication open and what things to research. There are many people that are working with or have a relationship AB, that I could ask for support and advise like: speech and language therapies, family members, friends, GP, district nurse, other support works. These people have different understands of AB’s needs and knowledge of supporting individuals with communication barriers. These people may have new ways of supporting and developing communication. It is important that any information that is shared is in AB best interest and with her knowledge. All information that is stored about AB is covered by the Data protection act 1998, which stated that it is to be kept secure. My company also have a policy in accords the government’s guideline, confidentially of personal information 1988.

Monday, November 25, 2019

Non-Plagiarized Term Papers

Non-Plagiarized Term Papers Non-Plagiarized Term Papers Non Plagiarized Term Papers Secure Yourself! Non plagiarized term papers are the sign of our professional writing qualities. It is known fact that the practice of plagiarism is inaccessible in education and writing business. Therefore, our company pays serious attention to this aspect in order to provide only unique and exclusive non plagiarized term papers to our customers. Non Plagiarized Term Papers: The Essence Non plagiarized term papers are regarded as the high-quality and unique works of our writers. These papers include exclusive professional ideas and thoughts which describe the certain topic in full. The core aspect of our term papers writing is to keep the main idea within the text and express it with unique style of writing. It means that our works are lacking of copy paste and repetitions from published and issued sources. Thus, non plagiarized term papers are a sign of exclusivity and creativity. Non Plagiarized Term Papers: The Requirements to Writers Non plagia rized term papers are one of the fundamental merits of our companys business. That is why we responsibly and thoroughly select the writers for our big family of talented authors. The common list of requirements includes the following:Our writers have to know the current policies of anti-plagiarism in depth; Our writers ought to know the rules of correct referencing and citation in order to minimize the relations to plagiarism; Our writers should rely mainly on own creative thoughts and uncommon ideas to make the custom papers stronger and smoother; It is strongly recommended for our writers to check their works on plagiarism before the sending of an order. Non Plagiarized Term Papers: The Security of Our Customers Non plagiarized term papers can be an important basis for security of our clients who want receive high-quality and well-organized works. Our non-plagiarism policies and standards are designed to maximally secure the comfort of our customers and reputation of o ur agency in the future. At the same time, such non-plagiarism policies and standards encourage our marketing strategies: if the client is satisfied with quality of a work, he/she would contact to our agency over again. It eventually increases our reputation and level of economic profit. The writers who resort to practice of plagiarism and copy pasting lose their working position in our agency and trust of our managers. As you can see, our measurements of non-plagiarism are directed to provide the maximum security to our customers.

Thursday, November 21, 2019

Effects of Taxation on Economy Essay Example | Topics and Well Written Essays - 750 words

Effects of Taxation on Economy - Essay Example A tax on a commodity tends to be shifted from the producer forward to the consumer and from the consumer backward to the producer. A tax on production of a commodity tends to raise its price and will, therefore, be normally borne by the consumer. But a tax on consumption is likely to check consumption and tends to be shifted backward to the producer. The tax levied of consumers can reduce the demand. Commodity taxes are disincentive to purchase the commodities on which they are levied. The amount by which the tax reduces purchases will depend upon the elasticity of demand for that commodity. The less elastic is the demand and the supply, the less will the demand be reduced. On the other hand the tax levied on corporations will impose a disincentive on a firm to incorporate. Taxes on firms can lead to low motivation for investment, which will in turn reduce the supply for goods if the Government has imposed price control with tax initiatives. A tax on income tends to reduce the ability to save and invest on the part of individuals. A tax on net profits of business firms will reduce their ability to save and invest. A decrease in investment is bound to affect adversely the level of output. The equilibrium price and quantity will be changed according to the elasticity of demand of that good. ... The equilibrium price and quantity will be changed according to the elasticity of demand of that good. The extent to which a commodity tax will actually be shifted will depend upon the nature of demand and supply curves. If demand is inelastic, as is the case with the necessaries of life the people must buy the commodity. The producer will be in stronger position and almost the entire burden of the tax will be shifted on to the consumer. But in the case of elastic demand, the people will buy less. In that case the price will not rise by the full amount of the tax, and the tax will be partly borne by the producer (Dewett, 571-572). - In this market, describe a hypothetical situation where a price ceiling or floor could be imposed. What implications would this have for the market' Government actions may shift demand and supply curves as when changes in safety legislation shifts the supply curve. Price controls are Government rules or laws that forbid the adjustment of prices to clear markets. Price controls undertaken in the market can be of two types. 1. Price ceilings: In this case Government applies an upper limit for the sellers and they cannot charge more prices upper than that limit. Such a limit is usually imposed when the shortage of a commodity is expected to increase the price of a commodity. Although through charging high prices the rationing of the scarce commodities can be undertaken. The solution to the problem of scarce supply of a commodity can be responded by an increased price but this is an unfair solution. For example high food prices can lead to considerable hardship among the poor. In the case of above market 2. Price floors: Governments impose a limit of minimum price of

Wednesday, November 20, 2019

Report -- financial investment Essay Example | Topics and Well Written Essays - 1000 words

Report -- financial investment - Essay Example he company stood at 39,848 Million, which included 4,135 Million liquidity which is a good prospect for a shareholder as the company has good available liquidity. The company also has enough cash to pay off its short term liabilities. The company had a good prospect to pay off its short term and current liabilities. The sales of the company was spread all over the world and carried less amount of bad debts which also gave strength to its debtors turnover. The current ratio of the company is 1.44, with current Assets amounting to 12,571 and current liabilities 8,756. The company has a substantial cover over its current liabilities and has enough current assets to overcome the current liabilities. The industry’s average current ratio is 1.08, which gives an indication that Pepsi is well off compared to the other companies. The company carries 8,759 quick assets to cover current liabilities worth of 8,756 which gives a quick ratio of 1. (Co.) The current assets of the company amount to 17,551 while the current liabilities stand at 13,721. It makes the current ratio stand at 1.28. This specifies that the company has adequate current assets to pay off their current obligations. (Stock-Analysis, 2010) However, the quick assets make up 12,971 of the current assets which are less than the current liabilities. This may create difficulty for the company when it pays off its current liabilities. (Cola) The profitability ratios, i.e. the Return on Assets and the Return on Equity for the company amount to 14.92% and 35.38% respectively. (Stock-Analysis) The similar rations for the industry stand at 4.14% and 11.9% respectively which gives Pepsi Inc an upper hand as it has utilized its assets and equity very efficiently. The company generated a Return on Assets and Return on Equity equal to 14.72% and 27.52% respectively which is well over the industry norms. The company generated a profit of 6,824, which is 1,000 more than the profit of the company last year and 800

Monday, November 18, 2019

Assignment 6 Coursework Example | Topics and Well Written Essays - 250 words

Assignment 6 - Coursework Example Thus, Americans need a good understanding of Islamic religion and culture in order to operate effectively in such regions. 2. 6- A) Guanxi refers to relationship networks supported by reciprocation known as connections. On the other hand, guanxiwang is referred to as â€Å"relationship network.† These are very important in business since they help to create a network that can help sustain a business. In other words, it helps build long term relationship or bond between the business and its targeted consumers (Ridley, 254). B) The experience of DMG tells us that connections that emanate from what is known as guanxi determine the way things work in China. The connections spell the relationships that exist but the case of Dan Mintz shows that he found a way around them to get things done. This strategy may be helpful in creating new connections especially by going over the existing relations in order to create new connections. C) The ethical issues that are likely to arise when drawing upon guanxiwang to get things done in China involve elements of truthfulness and honest when conducting business. More emphasis is put on personal relationships. However, there are some limits of using guanxiwang for a Western business committed to high ethical standards given that focus is on relationships while western cultures stress the importance of

Friday, November 15, 2019

The Things They Carried Philosophy Essay

The Things They Carried Philosophy Essay The Things They Carried is author by storyteller Tim OBrien and addresses truth through fiction. He has taken the acts of the Vietnam War and told them through a series of stories. The characters listed in the book may actually be true but their actions may not be or not in the way OBrien tells the stories. He does not write in this book a historical account of the war but instead tells us about experiences that the soldiers had. In the chapter How to Tell a War Story (64) OBrien tells us that the truth is ugly and that war is not always about the glory or bravery of the soldiers. The stories are more about the soldiers feelings than the actual acts of war. I came to realize quickly that the book was about what the soldiers carried such as guilt, sadness, mental anguish and self doubt over acts of war and not the actual possessions. I believe people carry burden every day. I carry the guilt over my divorce and the fact that I wanted it so badly. I know that I will carry that guilt the rest of my life even though my life today is much better. Could I have tried harder? Did the divorce truly harm my son in anyway? The Things They Carried was a difficult book for me to read and I have to admit that reading the book actually has increased my concern for my son who is currently serving in Iraq. Once of my greatest fears is what he carries home with him after he has completed his mission. I understand that he may experience things thing that no one can image much like what OBrien wrote about. I am sure his experience is much different than what is referenced in OBriens book since we are not fighting the same kind of war. Those men had no choice they had to serve when called upon. My son has chosen to serve of his own free will and is actually enjoying his deployment even thought silently I worry about him. Human behavior is very strange especially in the act of war. Soldiers will do things that most human beings would not think of. In the normal routine of our day we do things that are strange. At work we may act a certain way so we can keep our job. Soldiers do the same thing; they act a certain way to stay alive and deal with the issue of war. In the chapter How to Tell a True War Story OBrien explains how war affects the soldiers minds. They hear voices, music, talking but there is nothing there. The soldiers call in fire power and there still is nothing there. The soldiers mind played tricks. The human mind can affect human behavior. Pre-Socratic Greek Philosophers Thales Thales was known as a first Greek philosopher and mathematician and introduced the idea of geometry. He was a successful business man and started his own school of philosophy which taught math and astronomy. Thales is also known for his thoughts on natural rather than supernatural views for events such as earthquakes. Looked upon as a man of knowledge and wisdom, Thales was named one of the Seven Wise Men of Greece. Thales was one of the founders of math and applied geometry but made a name for himself by establishing the need for deductive reasoning and proof for demonstrating a statement. Before Thales, geometry was focused on measuring surfaces and solids. He focused on lines, circles and triangles and is known for the five basic theorems of geometry. Besides his interest in geometry and math, he enjoyed astronomy. He is most noted for astronomical observations when he predicted a solar eclipse. It is thought he learned to predict the eclipse while in Babylon where they kept detailed records of astronomical events for years. With well kept records, Thales was able to calculate when an eclipse would occur and in what year. Thales believed the earth was flat and floated on water. Water was the origin of all life and was the one element needed to grow and nurture all things. He also believed that supernatural events could be explained by natural events. That an earthquake was caused when the earth was rocked by waves. It is thought Thales died sometime around 546 BC and was the only one of the Seven Wise Men of Greece to be declared wise multiple times. His philosophy became to be known as the Ionian School of Philosophy (Thales of Miletus, 2005). Heraclitus Heraclitus lived from 540-ca to 480 BC and tried to explain the nature of the universe by using logos or reason as the guide to all things, specifically fire. Heraclitus was born in Ephesus and is thought to have renounced his social status, probably king, to his brother. He was a lonely man who looked for the truth within himself and his works were similar to the writings of other philosophers. Much of Heraclitus work, On the Nature of the Universe, exists today but the work is difficult to interpret due to the use of abbreviations and style of writing. The basis of Heraclitus philosophy is the world of appearance, all things are constantly changing. Change is due to the idea that opposites guide all changes such as hot and cold, day and night, good and bad. He also believed that things that are inconsistent through conflict or tension are a type of harmony. Heraclitus thought the cosmos had always existed but did not come to existence at some specific time; that fire is the basic substance in the cosmos and all elements are changed because of it. He thought that the human soul may come to understand the truth of the cosmos even though humans understanding may only be child like. He commanded humans to learn the nature of the universe through the understanding of their own souls and was considered to be one of the first mental philosophers. Heraclitus was one of the first Greek philosophers to focus on the problem of knowledge and was the first to note the importance of an understanding of the soul as the beginning to understanding the world (Heraclitus, 2005). Empedocles Empedocles was a philosopher, poet, politician and visionary. He developed a philosophy around four elements in the universe and defined matter as the various ratios of these elements. Empedocles was born in Sicily to a wealthy family and named after his grandfather. His sharp intellect allowed him to combine his talents in philosophy, natural history, poetry and politics to accomplish popular status in his day. He was thought to be the inventor of rhetoric which is used in politics. He was popular because of his support of democracy. His scientific exploration included mysticism but his philosophies contained the basic laws of physics which included atomic theory. Empedocles followed the Greek philosopher Parmenides in the belief that matter is indestructible. He stated that matter made up all things and the four elements of the universe air, fire, earth and water made up all things according to various ratios of these four elements. Empedocles thought that love and hate controlled how the four elements came together or moved apart. Empedocles introduced the theory of reincarnation because nothing that comes into being can be destroyed only transformed. Later in his life he wrote a poetic piece called On Nature which contained ideas of evolution, the circulation of the blood and atmospheric pressure. He was the first to state the moon could be seen due to the reflection of light and thought the moon to be one third the distance from the earth to the sun. Empedocles made significant contributions to the philosophy of science. He is credited for founding the Italian school of medicine and was known to have a style for self promotion and public relations which is seen in his writings (Empedocles of Acrages, 2005). Apology-Justice and Duty (i) and Socrates Speaks at his Trial in Plato: The Last Days of Socrates Skillful Speaker with Speaking the Truth Socrates contrasts being a skilled speaker with speaking the truth (17b). Today in the media we are exposed to a great deal of false advertising. The commercials or print ads are produced and skillfully done. They are colorful, pleasing to the eyes; cleaver and many times catch our attention. Americans spend a great deal of money on these items and many times they are worthless. In the example of the toy company advertising a dancing ballerina, it was determined the television commercial through video made the ballerina dance, not the doll itself. Today in politics, Americans are exposed to very skillful speakers running for political office. When they speak of their platforms, what they believe in, many times it is thought to be what we want to hear and not what it necessarily the truth. Americans are exposed to their cleaver speeches and many times make decisions based upon those skillful speeches. Many times when a political race is about to end and individuals are expected to vote, the ads and political speeches begin to contain damaging information and again, this damaging information is skillfully delivered but is not always the truth. We then make a last minute decision based upon this questionable information and find out later it was a bad choice. In Socrates the Apology, Socrates, much like the skillful advertisers, used rhetoric to attempt to sway his accusers. He professed to be a plain main who speaks only simple truth yet he uses cleaver rhetoric and uses words in such a way as to manipulate them to serve a different purpose. Socrates claims he is not a cleaver speaker but the Apology tells us otherwise (The Interplay of Influence: News, Advertising, Politics and the Mass Media, 2001). Socrates was not afraid of Death Socrates continues to tell the accusers that he will not be the formal charges which will destroy him but the prejudicial gossip and slander. He does not fear death because he is concerned about acting right or wrong. Socrates argues that those who fear death show ignorance, that death is a blessing but those who fear it as an evil thing cannot know it to be such. He points out that his wisdom lies in the fact that he is aware that he does not know (29a, b). Socrates thought that man should be evaluating his actions as being right or wrong, just or unjust. This is because the value and justness of our lives count. He also thought that man should not be afraid of death, because we do not know what it is. To be afraid of something we do not know is to assume we know and Socrates felt that was unwise. He was not afraid of death because he realized it is a peaceful sleep and you meet those who have died before you, so how can this be evil? Socrates also thought that man should not stop fighting for what he believes in, even if it leads to death. He felt that he would rather die than give up his philosophical life. Socrates died for a righteous cause, the belief that one should never change their beliefs because of the fear of death. When Socrates declares to the jury, Wherefore, O men of Athens, I say to you, do as Anytus bids or not as Anytus bids, and either acquit me or not; but whatever you do know that I shall never alter my ways, not even if I have to die many times, he is giving up his life as an example for the future generations. He thought that if he died for a great cause it was justified. Once Socrates was found guilty, he insisted that a just person will not allow anything to count against doing the right thing, no matter the cost. If he chose ordinary good instead of the just course of action he would be choosing an action that was not good for him and he refused to do this. He did not propose an alternative to the death penalty. Socrates chose to accept his fate and becomes known as the greatest hero in the history of philosophy. His main concern in life was excellence in moral character of the soul which has set the foundation for ethics and philosophy today (Encyclopedia of Ethics, 2001). The Last Words in the Apology and Socrates Defense God and gods play a huge role in the Apology. The last word in Socrates defense is God (42a) and is placed there on purpose. In addressing the charges against him, charged with believing in other gods and corrupting the youth, Socrates does a good job of making the charges seem ridiculous. When Plato wrote the Apology he emphasizes the importance of the gods in agreement with Socrates wisdom. It was the Oracle of Delphi that proclaims that he is the wisest of the wise (20c) not Socrates. He is not defying the gods but trying to reach some truth and meaning. By asking questions he is gaining knowledge and truth which challenges the accuser to think beyond what they have always known. Socrates accusers try to prove him to be an atheist but fail by establishing Socrates teaches men to acknowledge some gods and that he believes in spirits or demigods (26a). This proves Socrates is not guilty of teaching the youth to not believe in gods of any kind but of introducing the youth to other ideas of god. In the defense of Socrates he delivers the argument that he believes in the spirits or demigods which establishes the fact that he has not corrupted the minds of the youth with ideas of not believing in God, when he himself believes in gods. Socrates tells us in the Apology that we should strive to be like God if God is considered to be the supreme entity.

Wednesday, November 13, 2019

My Day in Africa Essay -- Descriptive Essay Examples

My day in Africa was one I'll not soon forget. I toured two major cities of Morocco-land of mystery, enticement, and enchantment. I was expecting belly dancers, snake charmers, and many exotic sights filled with color and intricate decoration. While I did see some of what I expected, the majority of what I saw was totally unexpected and will haunt me forever. As I boarded the ship that was to take me across the Mediterranean Sea to the northern shores of Morocco, I felt an array of mixed emotions. Mainly, I was excited. After all, I was only 13 and about to become "tricontinental." The previous five days I had spent in sunny Spain, and now I was to travel to Africa for one day. Besides excited, I also felt deeply intrigued and mystified. Moroccans practice the Muslim religion, and Arabic is one of their main languages. This may seem a bit prejudiced, but as I took my seat in the boat, the song "Arabian Nights" was playing over and over in my mind. However, I was dressed very conservatively so as not to offend anybody. The boat ride took only about 45 minutes. After we had docked and debarked the ship, we were led straight to a bus. My first glimpse of Africa wasn't too exciting, since it was just pretty much like Andalucia, the southern region of Spain. It was a little warmer here, though, being so close to the equator. We rode for a while and then stopped to have our passports checked in a city owned by Spain. This is when I had my first "real" glimpse of Morocco. There was trash strewn all over alongside the old, cracked pavement of the road. Natives attending to their business stopped for a moment to stare at the tour bus that held so many foreigners. Of course, they could scarcely see us because of the tinted ... ...ed fezzes, which he sold for 2000 pesetas, or about 10 dollars. I said, "No, thank you." The man replied, "Oh, you buy from in store but don't buy from the street, eh?" I honestly didn't know what to say, so I just said, "I'm sorry." His reply was, "I bet." I just kept on walking, feeling very guilty. But as it turned out, he gave my mom a 1000 peseta discount, so she bought three of the hats. As I boarded the bus, I felt relieved to be leaving Morocco behind me. But then I looked back at all the people, some of them children, and thought how difficult it must be to have to go through hardships every single day, hardships worse than anything we modern Americans have ever endured. I was leaving Morocco, but these people had no way out. Even today, the sights and sounds of its cities still haunt me. I suppose those memories always will. Â   My Day in Africa Essay -- Descriptive Essay Examples My day in Africa was one I'll not soon forget. I toured two major cities of Morocco-land of mystery, enticement, and enchantment. I was expecting belly dancers, snake charmers, and many exotic sights filled with color and intricate decoration. While I did see some of what I expected, the majority of what I saw was totally unexpected and will haunt me forever. As I boarded the ship that was to take me across the Mediterranean Sea to the northern shores of Morocco, I felt an array of mixed emotions. Mainly, I was excited. After all, I was only 13 and about to become "tricontinental." The previous five days I had spent in sunny Spain, and now I was to travel to Africa for one day. Besides excited, I also felt deeply intrigued and mystified. Moroccans practice the Muslim religion, and Arabic is one of their main languages. This may seem a bit prejudiced, but as I took my seat in the boat, the song "Arabian Nights" was playing over and over in my mind. However, I was dressed very conservatively so as not to offend anybody. The boat ride took only about 45 minutes. After we had docked and debarked the ship, we were led straight to a bus. My first glimpse of Africa wasn't too exciting, since it was just pretty much like Andalucia, the southern region of Spain. It was a little warmer here, though, being so close to the equator. We rode for a while and then stopped to have our passports checked in a city owned by Spain. This is when I had my first "real" glimpse of Morocco. There was trash strewn all over alongside the old, cracked pavement of the road. Natives attending to their business stopped for a moment to stare at the tour bus that held so many foreigners. Of course, they could scarcely see us because of the tinted ... ...ed fezzes, which he sold for 2000 pesetas, or about 10 dollars. I said, "No, thank you." The man replied, "Oh, you buy from in store but don't buy from the street, eh?" I honestly didn't know what to say, so I just said, "I'm sorry." His reply was, "I bet." I just kept on walking, feeling very guilty. But as it turned out, he gave my mom a 1000 peseta discount, so she bought three of the hats. As I boarded the bus, I felt relieved to be leaving Morocco behind me. But then I looked back at all the people, some of them children, and thought how difficult it must be to have to go through hardships every single day, hardships worse than anything we modern Americans have ever endured. I was leaving Morocco, but these people had no way out. Even today, the sights and sounds of its cities still haunt me. I suppose those memories always will. Â