Monday, September 30, 2019

Life is full of mystery Essay

Life is full of mystery that will lead us to one experience to another. There are hurtful experiences that we may want to forget but there are happy moments that will surely linger on our thoughts for many years. Allow me to narrate some of the many valuable experiences in my life. The succeeding pages will tell you how blessed and lucky I am as a person in this world. Through the years of my life, I came to know about various people who provided a great impact on my personality and beliefs. It narrates of my experiences about school, family, friendship, acquaintances and discoveries in life. The journey towards one’s success can be measured about the priceless moments that will always remain in mind, heart and soul. I can say that my personal and professional experience made me a better person who is willing to accept more memorable experience to come. Gaze upon the following pages of this booklet and be enchanted about my rollercoaster kind of life. It made me the person that I am now and an individual that will face the future with full optimist. At the end of the day, I always contemplate on things that have happened and ask myself what I have done so far. The contentment that I feel each time I remember gives me enough courage to move on and seek for more adventure in the future. One will never find his/her way forward if he/she never knows how to look back. Yesterday will always be a part of our personality and I can say that life will be meaningless if I was not given the chance to experience the following stories. Memories with Mother Life is best shared with people whom you trust most. As I look back and recall my childhood days, I cannot help but compare the love and care that I receive from my beloved mother. She is one of the most precious gift that God has given me. From the day I was born until I learn how to walk and talk, she is always by my side and never gets tired of giving me the attention and patience that I need most. There was a point in my life that I always get bruised and injured from playing outside. I end up running home with tears on my eyes. But as the door opens for me, Mother is always there giving me the best hug and warm kisses that will cast all my pains away. She reminds me that I should never be depressed from getting those bruises since it will make me a stronger and better person when I grew up. At first I though that I should take that word literally since wound are healed as days goes by and I cannot feel any pain from it. As I grow up and experience having problems about life, school and many more, I came to realize that there is a deeper meaning behind those bruises and it effect on my personality. I clearly remember how I gain problems more serious that getting injured. I get depressed and frustrated by getting low grades but I eventually learn from my mistakes and studies harder than before. Mother’s words of wisdom are priceless because it speaks of courage and confidence about my personality. My perception about bruises and being stronger are changed because as I mature, I realize that life is full of problems that may cause wounds to people but once they recover they will be more stronger and confident than before. As days goes by I will always remember the bountiful encouragements that mother always told me.

Article rebuttal

I located an article on CNN. Com the article is â€Å"Why we should not legalize marijuana†. The author states that marijuana is the commonly abused illegal drug in the U. S. , and around the world. The author also states that marijuana makes it totally impossible for a person using it to function and live a normal daily life. The author believes everyone who uses this drug she have penalties against them. I disagree, because the author is not stating facts and the information she provided In the article does is not reliable because she is going off of her opinions.I know many people who smoke marijuana and many people who use other drugs. Marijuana would not do much harm, I know a lot of people who are successful college graduates who used marijuana all throughout college and in their careers. Although I have never smoked a day in my life. I have reliable sources who have and decided to question them. I questioned friends who smoke marijuana, and friends who used to smoke mar ijuana. In my Interviews with friends and a few family members the ones who smoked told me It relaxes them and helps them focus more and have a clear vision on the things.The ones who quit says marijuana helped them perform better in school and feel stress free and that the only reason they quit was because of employment purposes. There are other drugs out there such as crack cocaine that can cause bodily harm and damage and even death while using, or overdose. You can not over dose on marijuana, marijuana can not cause serious harm. Being that marijuana can not cause you any serious harm or causes anyone to lose their life. I think It should be legalized and people should not get In trouble for having It. It should be their choice since no serious side effects occur

Sunday, September 29, 2019

A 24-hour society Essay

In a 24-hour society, when are people supposed to get a good night’s rest? The automobile industry, the airline industry, the medical industry, the manufacturing industry, the safety industry – all of these and others are industries which cannot simply close at 5 o’clock in the afternoon.   People must work around the clock to provide for the health, safety, and entertainment of others.   Unfortunately, scientists are becoming more concerned about the effects of the night shift on American workers.   While the night shift cannot be obliterated from working class America, those that do work on this schedule and the companies that employ them must be aware of the physical and psychological factors that come into play for the employee as well as the risks for the company itself. Twenty to thirty million Americans have jobs that require them to work nontraditional schedules, which includes working during nighttime hours when other, traditional workers are asleep (Weiss, 1989).   This shift has been around since society became industrialized because the need for 24 hour services in prisons and hospitals necessitated a â€Å"night† person.   However, these night workers have a much more difficult time than day workers in a variety of areas.   Most of these problems can be traced back to the lack of sleep and light that these workers receive while they are awake. See more: My Writing Process Essay Scientists have been studying the body’s circadian rhythms in order to solve the puzzle of sleep deprivation and its effects.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Circadian rhythms are the body’s reaction to the alternation of light and dark and   cues such as the timing of meals and sleep. This 24hour light-dark circadian cycle   is derived from the Latin circa (â€Å"about†) and dies (â€Å"day†). Since prehistoric times, circadian rhythms have regulated the pattern of working by day and sleeping by night† (Learning to live with light-dark cycles, 1996). This genetic functioning is the basis for how individuals are genetically programmed to sleep and to wake. According to scientists, the light from around a person travels through his eye to the hypothalamus in the brain – where the supposed â€Å"biological clock† is located.   Then the impulse travels to the pineal gland at which point the production of melatonin (the hormone that allows people to sleep) is dramatically reduced.   The rise and fall of melatonin in the body affects body temperature, perceived energy and enzyme and hormone production (Learning to live with light-dark cycles, 1996).   Ã‚  Ã‚   Basically, most of the body’s functions are related to this simple perception of light and dark.   One researcher, Dr. Foster, studying this phenomenon,   Ã¢â‚¬Å"found cells in the human eye that do nothing but detect bright sunlight and tell the brain to reset the sleep cycle accordingly† (Pepper, 2004).   He found that these eye cells do not help produce vision but are only set to respond to daylight.   It is important to note that even on a cloudy day, the daylight produced is 500 to 1,000 times brighter than any type of artificial light used in factories or offices.   These artificial lights do not fool these cells in the eye.          Pepper (2004) cites Foster in saying â€Å"You need light of a long duration and high brightness to shift the [biological] clock. This explains why business travelers crossing time zones eventually adapt, but night-shift workers never do. They get a dose of natural light on their way to and from work, too strong for a factory’s dim lamps to counter.†   These special eye cells feed directly to the brain and tell the brain’s ‘biological clock’ which is really about 20,000 cells with the scientific name of the suprachiasmatic nucleus, whether the person is receiving daylight or not.   If he is, the cells send out the word to stay away; if he is not, the cells send out sleep signals (Pepper, 2004). In addition to the sleepy or energized feeling that these cells can regulate, the human body is also affected in other ways. Scientific research has proved that people who work the third shift have a greater incidence of heart disease than those who work the first shift. They explain it by revealing that the less exposure to daylight a person has, the more the cholesterol is produced in the bloodstream, which will clog the person’s arteries (Fischette, 1992). â€Å"Blood pressure and pulse rates are slowest during the night, but rise dramatically upon wakening. Physicians see more heart attack and stroke patients in the morning hours.   Studies also are finding that circadian rhythms affect diabetes and certain cancers. For people with asthma, coughing and respiratory arrest are most common between midnight and 6:00 a.m.† (Pepper, 2004).   Similarly, Glaxo, Inc. a research organization in the Research Triangle area of North Carolina, notes other physiological effects that fall under control of these circadian rhythms: When parents remark that their children seem to grow overnight, they may not be far from the truth. During the hours of sleep, the human growth hormone is produced in greater abundance and is not inhibited from doing its job by activity hormones, like adrenaline, which are released during the day. Jet lag. When traveling to a different time zone, jet lag afflicts travelers and disrupts sleep and daytime functioning. The body’s circadian rhythm becomes â€Å"out of sync† with the rhythm of light and dark, taking up to several days to re-align itself to the new routine. Shift workers’ sleep disorder. Re-adjusting the body’s clock to different schedules on night or rotating shifts plays havoc with the natural circadian rhythm that responds to light and dark, making one’s temperature lowest at night and highest during the day. Although shift workers make up one-fourth of the nation’s workforce, they are twice as likely as nine-to-five individuals to report sleep disruption. Seasonal affective disorder (SAD). For some people, the â€Å"winter blues† aren’t just a mood, but a chronic disorder that leads to depression, drowsiness, and carbohydrate cravings during the winter months. People suffering from SAD report longer periods of sleep, indicating that this disorder may be a circadian disturbance due to the shorter days of winter. Lung function. The body’s production of cortisol steroids, which control lung inflammation, drops at night and peaks in the morning. This means air flow in and out of the lungs is best at 4:00 p.m., often giving athletes a â€Å"leg up,† compared with other times of the day. Air flow drops to its lowest point at 4:00 a.m., explaining why people with asthma often have nocturnal problems.   Ã‚  (Learning to live with light-dark cycles, 1996). All of these negative affects will be exacerbated for those who must work during the dark, sleeping hours. Other problems can also arise from a lack of sleep due to working the third shift.   A range of personality and behavioral problems may arise due attitudes related to shift work. These attitudes correlate to sleep habits and self-assessed feelings of vigor (Bohle & Tilley, 1998).     Even if third shift workers are able to stay alert on shift, they may not be able to sleep during the day which exposes them to all kinds of additional problems due to sleep deprivation.     Ã¢â‚¬Å"Studies show that one night’s loss of sleep results in a 30 percent drop in cognitive performance, rising to 60 percent after two nights† (Bohle & Tilley, 1998).   This means that the ability to think and make decisions quickly, as may be required by the majority of third shift workers – police officers, air traffic controllers and medical personnel – may be seriously diminished if they cannot sleep well during the day.   Of course, as previously mentioned, the amount of daylight makes this very difficult (Bohle & Tilley, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The attitudes toward the night shift can also affect relationships and performance.   Night shift was most frequently characterized as being tiring, having drowsy moments, being bad for family life and not starting too early in a study reported by Bohle & Tilley, 1998).   Stickgold et al,   1999 reports also that night owls have slower reaction times, slower motor responses and slower levels of linguistic and associated processing. These could be very costly for some people.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sadly, the vast majority of industrial accidents occur in the overnight hours when some workers may doze or suffer from lowered cognitive functioning. Such was the case with the accident at Three Mile Island, which began at 4 am. And the accident at Chernobyl, at 1:23 am (     the early hours when night-shift workers are prone to doze: the nuclear accident at Three Mile Island started at 4 a.m., Chernobyl at 1:23 a.m. (Bohle & Tilley, 1998).   Ã¢â‚¬Å"We are asking 20 percent of our work force, including pilots and surgeons, to operate when they’re massively impaired,† says Dr. Russell Foster, a molecular neuroscientist at London’s Imperial College (Bohle & Tilley, 1998).   Indeed, over 50% of shift workers admitted to falling asleep at least once while on the job (Weiss, 1989).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã ‚  Ã‚   .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Scientists are working on some medications and false lighting systems to help with the physiological and psychological problems associated with third shift work.   Until then, workers and their company’s should take steps to prevent accidents and illnesses which may result. References Bohle, P & Tilley, AJ. (1998). Early experience of shif twork: Influences on attitudes. Journal of   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Occupational and Organizational Psychology 71, 61-79. Fischette, M. (1992). Working the heart-disease shift. Omni14 (11) Pepper, T. (2004). Night Shift. Newsweek (Atlantic Edition) 144 (16). Stickgold, R.,   Scott, L.,   Rittenhouse, C., & Hobson, J.A. (1999).   Sleep-induced changes in   Ã‚  Ã‚   associative memory.   Journal of Cognitive Neuroscience 11(2) Weiss, R. (1989). Safety gets short shrift on long night shift. Science News 135 (3)

General Security Policy

Sample Information Security Policy I. POLICY A. It is the policy of ORGANIZATION XYZ that information, as defined hereinafter, in all its forms–written, spoken, recorded electronically or printed–will be protected from accidental or intentional unauthorized modification, destruction or disclosure throughout its life cycle. This protection includes an appropriate level of security over the equipment and software used to process, store, and transmit that information. B. All policies and procedures must be documented and made available to individuals responsible for their implementation and compliance. All activities identified by the policies and procedures must also be documented. All the documentation, which may be in electronic form, must be retained for at least 6 (six) years after initial creation, or, pertaining to policies and procedures, after changes are made. All documentation must be periodically reviewed for appropriateness and currency, a period of time to be determined by each entity within ORGANIZATION XYZ. C. At each entity and/or department level, additional policies, standards and procedures will be developed detailing the implementation of this policy and set of standards, and addressing any additional information systems functionality in such entity and/or department. All departmental policies must be consistent with this policy. All systems implemented after the effective date of these policies are expected to comply with the provisions of this policy where possible. Existing systems are expected to be brought into compliance where possible and as soon as practical. II. SCOPE A. The scope of information security includes the protection of the confidentiality, integrity and availability of information. B. The framework for managing information security in this policy applies to all ORGANIZATION XYZ entities and workers, and other Involved Persons and all Involved Systems throughout ORGANIZATION XYZ as defined below in INFORMATION SECURITY DEFINITIONS. C. This policy and all standards apply to all protected health information and other classes of protected information in any form as defined below in INFORMATION CLASSIFICATION. III. RISK MANAGEMENT A. A thorough analysis of all ORGANIZATION XYZ information networks and systems will be conducted on a periodic basis to document the threats and vulnerabilities to stored and transmitted information. The analysis will examine the types of threats – internal or external, natural or manmade, electronic and non-electronic– that affect the ability to manage the information resource. The analysis will also document the existing vulnerabilities within each entity which potentially expose the information resource to the threats. Finally, the analysis will also include an evaluation of the information assets and the technology associated with its collection, storage, dissemination and protection. From the combination of threats, vulnerabilities, and asset values, an estimate of the risks to the confidentiality, integrity and availability of the information will be determined. The frequency of the risk analysis will be determined at the entity level. B. Based on the periodic assessment, measures will be implemented that reduce the impact of the threats by reducing the amount and scope of the vulnerabilities. IV. INFORMATION SECURITY DEFINITIONS Affiliated Covered Entities: Legally separate, but affiliated, covered entities which choose to designate themselves as a single covered entity for purposes of HIPAA. Availability: Data or information is accessible and usable upon demand by an authorized person. Confidentiality: Data or information is not made available or disclosed to unauthorized persons or processes. HIPAA: The Health Insurance Portability and Accountability Act, a federal law passed in 1996 that affects the healthcare and insurance industries. A key goal of the HIPAA regulations is to protect the privacy and confidentiality of protected health information by setting and enforcing standards. Integrity: Data or information has not been altered or destroyed in an unauthorized manner. Involved Persons: Every worker at ORGANIZATION XYZ — no matter what their status. This includes physicians, residents, students, employees, contractors, consultants, temporaries, volunteers, interns, etc. Involved Systems: All computer equipment and network systems that are operated within the ORGANIZATION XYZ environment. This includes all platforms (operating systems), all computer sizes (personal digital assistants, desktops, mainframes, etc. ), and all applications and data (whether developed in-house or licensed from third parties) contained on those systems. Protected Health Information (PHI): PHI is health information, including demographic information, created or received by the ORGANIZATION XYZ entities which relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual and that identifies or can be used to identify the individual. Risk: The probability of a loss of confidentiality, integrity, or availability of information resources. V. INFORMATION SECURITY RESPONSIBILITIES A. Information Security Officer: The Information Security Officer (ISO) for each entity is responsible for working with user management, owners, custodians, and users to develop and implement prudent security policies, procedures, and controls, subject to the approval of ORGANIZATION XYZ. Specific responsibilities include: 1. Ensuring security policies, procedures, and standards are in place and adhered to by entity. 2. Providing basic security support for all systems and users. 3. Advising owners in the identification and classification of computer resources. See Section VI Information Classification. 4. Advising systems development and application owners in the implementation of security controls for information on systems, from the point of system design, through testing and production implementation. 5. Educating custodian and user management with comprehensive information about security controls affecting system users and application systems. 6. Providing on-going employee security education. 7. Performing security audits. 8. Reporting regularly to the ORGANIZATION XYZ Oversight Committee on entity’s status with regard to information security. B. Information Owner: The owner of a collection of information is usually the manager responsible for the creation of that information or the primary user of that information. This role often corresponds with the management of an organizational unit. In this context, ownership does not signify proprietary interest, and ownership may be shared. The owner may delegate ownership responsibilities to another individual by completing the ORGANIZATION XYZ Information Owner Delegation Form. The owner of information has the responsibility for: 1. Knowing the information for which she/he is responsible. 2. Determining a data retention period for the information, relying on advice from the Legal Department. 3. Ensuring appropriate procedures are in effect to protect the integrity, confidentiality, and availability of the information used or created within the unit. 4. Authorizing access and assigning custodianship. 5. Specifying controls and communicating the control requirements to the custodian and users of the information. 6. Reporting promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 7. Initiating corrective actions when problems are identified. 8. Promoting employee education and awareness by utilizing programs approved by the ISO, where appropriate. 9. Following existing approval processes within the respective organizational unit for the selection, budgeting, purchase, and implementation of any computer system/software to manage information. C. Custodian: The custodian of information is generally responsible for the processing and storage of the information. The custodian is responsible for the administration of controls as specified by the owner. Responsibilities may include: 1. Providing and/or recommending physical safeguards. 2. Providing and/or recommending procedural safeguards. 3. Administering access to information. 4. Releasing information as authorized by the Information Owner and/or the Information Privacy/ Security Officer for use and disclosure using procedures that protect the privacy of the information. 5. Evaluating the cost effectiveness of controls. 6. Maintaining information security policies, procedures and standards as appropriate and in consultation with the ISO. 7. Promoting employee education and awareness by utilizing programs approved by the ISO, where appropriate. 8. Reporting promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 9. Identifying and responding to security incidents and initiating appropriate actions when problems are identified. D. User Management: ORGANIZATION XYZ management who supervise users as defined below. User management is responsible for overseeing their employees' use of information, including: 1. Reviewing and approving all requests for their employees access authorizations. . Initiating security change requests to keep employees' security record current with their positions and job functions. 3. Promptly informing appropriate parties of employee terminations and transfers, in accordance with local entity termination procedures. 4. Revoking physical access to terminated employees, i. e. , confiscating keys, changing combination locks, etc. 5. Providing employees with the opportunity for training needed to properly use the computer systems. 6. Reporting promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 7. Initiating corrective actions when problems are identified. 8. Following existing approval processes within their respective organization for the selection, budgeting, purchase, and implementation of any computer system/software to manage information. E. User: The user is any person who has been authorized to read, enter, or update information. A user of information is expected to: 1. Access information only in support of their authorized job responsibilities. 2. Comply with Information Security Policies and Standards and with all controls established by the owner and custodian. 3. Refer all disclosures of PHI (1) outside of ORGANIZATION XYZ and (2) within ORGANIZATION XYZ, other than for treatment, payment, or health care operations, to the applicable entity’s Medical/Health Information Management Department. In certain circumstances, the Medical/Health Information Management Department policies may specifically delegate the disclosure process to other departments. (For additional information, see ORGANIZATION XYZ Privacy/Confidentiality of Protected Health Information (PHI) Policy. ) 4. Keep personal authentication devices (e. g. passwords, SecureCards, PINs, etc. confidential. 5. Report promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 6. Initiate corrective actions when problems are identified. VI. INFORMATION CLASSIFICATION Classification is used to promote proper controls for safeguarding the confidentiality of information. Regardless of classification the integrity and accuracy of all classifications of information must be pr otected. The classification assigned and the related controls applied are dependent on the sensitivity of the information. Information must be classified according to the most sensitive detail it includes. Information recorded in several formats (e. g. , source document, electronic record, report) must have the same classification regardless of format. The following levels are to be used when classifying information: A. Protected Health Information (PHI) 1. PHI is information, whether oral or recorded in any form or medium, that: a. is created or received by a healthcare provider, health plan, public health authority, employer, life insurer, school or university or health clearinghouse; and b. relates to past, present or future physical or mental ealth or condition of an individual, the provision of health care to an individual, or the past present or future payment for the provision of health care to an individual; and c. includes demographic data, that permits identification of the individual or could reasonably be used to identify the individual. 2. Unauthorized or improper disclosure, modification, or destruction of this information could violate state and federal laws, result in c ivil and criminal penalties, and cause serious damage to ORGANIZATION XYZ and its patients or research interests. B. Confidential Information 1. Confidential Information is very important and highly sensitive material that is not classified as PHI. This information is private or otherwise sensitive in nature and must be restricted to those with a legitimate business need for access. Examples of Confidential Information may include: personnel information, key financial information, proprietary information of commercial research sponsors, system access passwords and information file encryption keys. 2. Unauthorized disclosure of this information to people without a business need for access may violate laws and regulations, or may cause significant problems for ORGANIZATION XYZ, its customers, or its business partners. Decisions about the provision of access to this information must always be cleared through the information owner. C. Internal Information 1. Internal Information is intended for unrestricted use within ORGANIZATION XYZ, and in some cases within affiliated organizations such as ORGANIZATION XYZ business partners. This type of information is already idely-distributed within ORGANIZATION XYZ, or it could be so distributed within the organization without advance permission from the information owner. Examples of Internal Information may include: personnel directories, internal policies and procedures, most internal electronic mail messages. 2. Any information not explicitly classified as PHI, Confidential or Public will, by default, be classified as Internal Information. 3. Unauthorized disclosure of this information to outsiders may not be appropriate due to legal or contractual provisions. D. Public Information 1. Public Information has been specifically approved for public release by a designated authority within each entity of ORGANIZATION XYZ. Examples of Public Information may include marketing brochures and material posted to ORGANIZATION XYZ entity internet web pages. 2. This information may be disclosed outside of ORGANIZATION XYZ. VII. COMPUTER AND INFORMATION CONTROL All involved systems and information are assets of ORGANIZATION XYZ and are expected to be protected from misuse, unauthorized manipulation, and destruction. These protection measures may be physical and/or software based. A. Ownership of Software: All computer software developed by ORGANIZATION XYZ employees or contract personnel on behalf of ORGANIZATION XYZ or licensed for ORGANIZATION XYZ use is the property of ORGANIZATION XYZ and must not be copied for use at home or any other location, unless otherwise specified by the license agreement. B. Installed Software: All software packages that reside on computers and networks within ORGANIZATION XYZ must comply with applicable licensing agreements and restrictions and must comply with ORGANIZATION XYZ acquisition of software policies. C. Virus Protection: Virus checking systems approved by the Information Security Officer and Information Services must be deployed using a multi-layered approach (desktops, servers, gateways, etc. ) that ensures all electronic files are appropriately scanned for viruses. Users are not authorized to turn off or disable virus checking systems. D. Access Controls: Physical and electronic access to PHI, Confidential and Internal information and computing resources is controlled. To ensure appropriate levels of access by internal workers, a variety of security measures will be instituted as recommended by the Information Security Officer and approved by ORGANIZATION XYZ. Mechanisms to control access to PHI, Confidential and Internal information include (but are not limited to) the following methods: 1. Authorization: Access will be granted on a â€Å"need to know† basis and must be authorized by the immediate supervisor and application owner with the assistance of the ISO. Any of the following methods are acceptable for providing access under this policy: . Context-based access: Access control based on the context of a transaction (as opposed to being based on attributes of the initiator or target). The â€Å"external† factors might include time of day, location of the user, strength of user authentication, etc. b. Role-based access: An alternative to traditional access control models (e. g. , discretionary or non-discretionary access control po licies) that permits the specification and enforcement of enterprise-specific security policies in a way that maps more naturally to an organization’s structure and business activities. Each user is assigned to one or more predefined roles, each of which has been assigned the various privileges needed to perform that role. c. User-based access: A security mechanism used to grant users of a system access based upon the identity of the user. 2. Identification/Authentication: Unique user identification (user id) and authentication is required for all systems that maintain or access PHI, Confidential and/or Internal Information. Users will be held accountable for all actions performed on the system with their user id. a. At least one of the following authentication methods must be implemented: 1. strictly controlled passwords (Attachment 1 – Password Control Standards), 2. biometric identification, and/or 3. tokens in conjunction with a PIN. b. The user must secure his/her authentication control (e. g. password, token) such that it is known only to that user and possibly a designated security manager. c. An automatic timeout re-authentication must be required after a certain period of no activity (maximum 15 minutes). d. The user must log off or secure the system when leaving it. 3. Data Integrity: ORGANIZATION XYZ must be able to provide corroboration that PHI, Confidential, and Internal Information has not been altered or destroyed in an unauthorized manner. Listed below are some methods that support data integrity: a. transaction audit b. disk redundancy (RAID) c. ECC (Error Correcting Memory) d. checksums (file integrity) e. encryption of data in storage f. digital signatures 4. Transmission Security: Technical security mechanisms must be put in place to guard against unauthorized access to data that is transmitted over a communications network, including wireless networks. The following features must be implemented: a. integrity controls and b. encryption, where deemed appropriate 5. Remote Access: Access into ORGANIZATION XYZ network from outside will be granted using ORGANIZATION XYZ approved devices and pathways on an individual user and application basis. All other network access options are strictly prohibited. Further, PHI, Confidential and/or Internal Information that is stored or accessed remotely must maintain the same level of protections as information stored and accessed within the ORGANIZATION XYZ network. 6. Physical Access: Access to areas in which information processing is carried out must be restricted to only appropriately authorized individuals. The following physical controls must be in place: a. Mainframe computer systems must be installed in an access-controlled area. The area in and around the computer facility must afford protection against fire, water damage, and other environmental hazards such as power outages and extreme temperature situations. b. File servers containing PHI, Confidential and/or Internal Information must be installed in a secure area to prevent theft, destruction, or access by unauthorized individuals. . Workstations or personal computers (PC) must be secured against use by unauthorized individuals. Local procedures and standards must be developed on secure and appropriate workstation use and physical safeguards which must include procedures that will: 1. Position workstations to minimize unauthorized viewing of protected health information. 2. Grant workst ation access only to those who need it in order to perform their job function. 3. Establish workstation location criteria to eliminate or minimize the possibility of unauthorized access to protected health information. 4. Employ physical safeguards as determined by risk analysis, such as locating workstations in controlled access areas or installing covers or enclosures to preclude passerby access to PHI. 5. Use automatic screen savers with passwords to protect unattended machines. d. Facility access controls must be implemented to limit physical access to electronic information systems and the facilities in which they are housed, while ensuring that properly authorized access is allowed. Local policies and procedures must be developed to address the following facility access control requirements: 1. Contingency Operations – Documented procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency. 2. Facility Security Plan – Documented policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft. 3. Access Control and Validation – Documented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision. . Maintenance records – Documented policies and procedures to document repairs and modifications to the physical components of the facility which are related to security (for example, hardware, walls, doors, and locks). 7. Emergency Access: a. Each entity is required to establish a mechanism to provide emergency access to systems and ap plications in the event that the assigned custodian or owner is unavailable during an emergency. b. Procedures must be documented to address: 1. Authorization, 2. Implementation, and 3. Revocation E. Equipment and Media Controls: The disposal of information must ensure the continued protection of PHI, Confidential and Internal Information. Each entity must develop and implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain PHI into and out of a facility, and the movement of these items within the facility. The following specification must be addressed: 1. Information Disposal / Media Re-Use of: a. Hard copy (paper and microfilm/fiche) b. Magnetic media (floppy disks, hard drives, zip disks, etc. ) and c. CD ROM Disks 2. Accountability: Each entity must maintain a record of the movements of hardware and electronic media and any person responsible therefore. 3. Data backup and Storage: When needed, create a retrievable, exact copy of electronic PHI before movement of equipment. F. Other Media Controls: 1. PHI and Confidential Information stored on external media (diskettes, cd-roms, portable storage, memory sticks, etc. ) must be protected from theft and unauthorized access. Such media must be appropriately labeled so as to identify it as PHI or Confidential Information. Further, external media containing PHI and Confidential Information must never be left unattended in unsecured areas. 2. PHI and Confidential Information must never be stored on mobile computing devices (laptops, personal digital assistants (PDA), smart phones, tablet PC’s, etc. ) unless the devices have the following minimum security requirements implemented: a. Power-on passwords b. Auto logoff or screen saver with password c. Encryption of stored data or other acceptable safeguards approved by Information Security Officer Further, mobile computing devices must never be left unattended in unsecured areas. . If PHI or Confidential Information is stored on external medium or mobile computing devices and there is a breach of confidentiality as a result, then the owner of the medium/device will be held personally accountable and is subject to the terms and conditions of ORGANIZATION XYZ Information Security Policies and Confidentiality Statement signed as a condition of employme nt or affiliation with ORGANIZATION XYZ. H. Data Transfer/Printing: 1. Electronic Mass Data Transfers: Downloading and uploading PHI, Confidential, and Internal Information between systems must be strictly controlled. Requests for mass downloads of, or individual requests for, information for research purposes that include PHI must be approved through the Internal Review Board (IRB). All other mass downloads of information must be approved by the Application Owner and include only the minimum amount of information necessary to fulfill the request. Applicable Business Associate Agreements must be in place when transferring PHI to external entities (see ORGANIZATION XYZ policy B-2 entitled â€Å"Business Associates†). 2. Other Electronic Data Transfers and Printing: PHI, Confidential and Internal Information must be stored in a manner inaccessible to unauthorized individuals. PHI and Confidential information must not be downloaded, copied or printed indiscriminately or left unattended and open to compromise. PHI that is downloaded for educational purposes where possible should be de-identified before use. I. Oral Communications: ORGANIZATION XYZ staff should be aware of their surroundings when discussing PHI and Confidential Information. This includes the use of cellular telephones in public areas. ORGANIZATION XYZ staff should not discuss PHI or Confidential Information in public areas if the information can be overheard. Caution should be used when conducting conversations in: semi-private rooms, waiting rooms, corridors, elevators, stairwells, cafeterias, restaurants, or on public transportation. J. Audit Controls: Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use PHI must be implemented. Further, procedures must be implemented to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. These reviews must be documented and maintained for six (6) years. K. Evaluation: ORGANIZATION XYZ requires that periodic technical and non-technical evaluations be performed in response to environmental or operational changes affecting the security of electronic PHI to ensure its continued protection. L. Contingency Plan: Controls must ensure that ORGANIZATION XYZ can recover from any damage to computer equipment or files within a reasonable period of time. Each entity is required to develop and maintain a plan for responding to a system emergency or other occurrence (for example, fire, vandalism, system failure and natural disaster) that damages systems that contain PHI, Confidential, or Internal Information. This will include developing policies and procedures to address the following: 1. Data Backup Plan: a. A data backup plan must be documented and routinely updated to create and maintain, for a specific period of time, retrievable exact copies of information. b. Backup data must be stored in an off-site location and protected from physical damage. . Backup data must be afforded the same level of protection as the original data. 2. Disaster Recovery Plan: A disaster recovery plan must be developed and documented which contains a process enabling the entity to restore any loss of data in the event of fire, vandalism, natural disaster, or system failure. 3. Emergency Mode Operation Plan: A plan must be developed and documented which c ontains a process enabling the entity to continue to operate in the event of fire, vandalism, natural disaster, or system failure. 4. Testing and Revision Procedures: Procedures should be developed and documented requiring periodic testing of written contingency plans to discover weaknesses and the subsequent process of revising the documentation, if necessary. 5. Applications and Data Criticality Analysis: The criticality of specific applications and data in support of other contingency plan components must be assessed and documented. Compliance [ § 164. 308(a)(1)(ii)(C)] A. The Information Security Policy applies to all users of ORGANIZATION XYZ information including: employees, medical staff, students, volunteers, and outside affiliates. Failure to comply with Information Security Policies and Standards by employees, medical staff, volunteers, and outside affiliates may result in disciplinary action up to and including dismissal in accordance with applicable ORGANIZATION XYZ procedures, or, in the case of outside affiliates, termination of the affiliation. Failure to comply with Information Security Policies and Standards by students may constitute grounds for corrective action in accordance with ORGANIZATION XYZ procedures. Further, penalties associated with state and federal laws may apply. B. Possible disciplinary/corrective action may be instituted for, but is not limited to, the following: 1. Unauthorized disclosure of PHI or Confidential Information as specified in Confidentiality Statement. 2. Unauthorized disclosure of a sign-on code (user id) or password. 3. Attempting to obtain a sign-on code or password that belongs to another person. 4. Using or attempting to use another person's sign-on code or password. 5. Unauthorized use of an authorized password to invade patient privacy by examining records or information for which there has been no request for review. . Installing or using unlicensed software on ORGANIZATION XYZ computers. 7. The intentional unauthorized destruction of ORGANIZATION XYZ information. 8. Attempting to get access to sign-on codes for purposes other than official business, including completing fraudulent documentation to gain access. — ATTACHMENT 1 — Password Control Standards The ORGANIZATION XYZ Information Security Policy requi res the use of strictly controlled passwords for accessing Protected Health Information (PHI), Confidential Information (CI) and Internal Information (II). See ORGANIZATION XYZ Information Security Policy for definition of these protected classes of information. ) Listed below are the minimum standards that must be implemented in order to ensure the effectiveness of password controls. Standards for accessing PHI, CI, II: Users are responsible for complying with the following password standards: 1. Passwords must never be shared with another person, unless the person is a designated security manager. 2. Every password must, where possible, be changed regularly – (between 45 and 90 days depending on the sensitivity of the information being accessed) 3. Passwords must, where possible, have a minimum length of six characters. 4. Passwords must never be saved when prompted by any application with the exception of central single sign-on (SSO) systems as approved by the ISO. This feature should be disabled in all applicable systems. 5. Passwords must not be programmed into a PC or recorded anywhere that someone may find and use them. 6. When creating a password, it is important not to use words that can be found in dictionaries or words that are easily guessed due to their association with the user (i. e. children’s names, pets’ names, birthdays, etc†¦). A combination of alpha and numeric characters are more difficult to guess. Where possible, system software must enforce the following password standards: 1. Passwords routed over a network must be encrypted. 2. Passwords must be entered in a non-display field. 3. System software must enforce the changing of passwords and the minimum length. 4. System software must disable the user identification code when more than three consecutive invalid passwords are given within a 15 minute timeframe. Lockout time must be set at a minimum of 30 minutes. 5. System software must maintain a history of previous passwords and prevent their reuse.

Saturday, September 28, 2019

Early Childhood Research and Practice Essay

From the heading I am able to see that the journal is going to be about â€Å"Learning Stories and Children’s Powerful Mathematics. † There are three authors in total who were part of the publishing of the journal, they are Bob Perry, Sue Dockett and Elspeth Harley. It is possible to find out a great deal of information about the authors, for example what university they attended, their current job roles and what they are interested in researching. The journal was published in the Early Childhood Research Practice, and it can only be found here. The journal has been peer reviewed. From reading the title and the abstract, I have learnt that â€Å"The approaches to teaching and learning mathematics in Australian preschools and schools can be quite different. † It is believed that different cultures are taught in different ways, however I would have to disagree with this statement, as schools today have multicultural classes, therefore every child has an equal opportunity and is taught the core subjects in the same way. The introduction made it clear that there is often conflict between this increase in formality and the play-based, child-centred philosophies of prior-to-school settings (Thomson, Rowe, Underwood, & Peck, 2005). They key to the research was to investigate young children’s mathematical experiences. The article was set out under numerous headings, separating key information into paragraphs. With-in the articles there are also tables showing how maths can be linked with play and whether it is a successful way of teaching the younger generation. Two of the authors of this paper worked with a small group of early childhood educators for two days in 2005 and two days in 2006. This paper reports how the powerful mathematical ideas and the developmental learning outcomes were brought together by a group of practicing early childhood educators into a numeracy matrix that encouraged the educators to plan, implement, and assess their practices. It also considers the use of learning stories by the early childhood educators to assess the mathematics learning of preschool children. Their list bears many similarities to other such lists (see, for example, Greenes, Ginsburg, & Balfanz, 2004; National Council of Teachers of Mathematics, 2000). Learning Stories are qualitative snapshots, recorded as structured written narratives, often with accompanying photographs that document and communicate the context and complexity of children’s learning (Carr, 2001). Luke has been given the opportunity, through the provision of time, materials, and space, to â€Å"participate purposefully in spatial tasks† and to â€Å"demonstrate flexibility and to make choices. † The article was easy to follow and fulfilled all of its set aims. Through their use of the numeracy matrix, the educators are now able to see how each of the powerful ideas contributes to the DLO. One of them was able to suggest that the work with the numeracy matrix had helped them see how the DLOs were the capstones to all that they were trying to do in all learning areas The purpose of this paper was to introduce the numeracy matrix, which has been developed as part of the Southern Numeracy Initiative in South Australia. subjective evidence from the participants in the Southern Numeracy Initiative suggest that the use of the numeracy matrix and the thinking behind it have had positive effects on the pedagogical practices of the early childhood educators involved. However some educators disagreed with this and the source can’t be trusted. The article gave a to the point review of what they were trying to achieve and also gave references so if you wanted to further your knowledge on the topic or similar reports then you could do so. Unlike previous articles, this one did not relate to anything that I have previously read. It interested me as I believe that maths is over looked and there is a great amount of ways in linking it in with everyday play and practice; however some educators do not do that. With Australia now putting this â€Å"matrix† into place others may follow suit and see the positive outcomes. References Australian Association of Mathematics Teachers and Early Childhood Australia. (2006). Position paper on early childhood mathematics. Retrieved March 7, 2010, from http://www.aamt. edu. au Carr, Margaret. (2001). Assessment in early childhood settings: Learning stories. London: Paul Chapman. Carr, Margaret, & Claxton, Guy. (2002). Tracking the development of learning dispositions. Assessment in Education, 9(1), 9-37. Greenes, Carole; Ginsburg, Herbert P. ; & Balfanz, Robert. (2004). Big math for little kids. Early Childhood Research Quarterly, 19(1), 159-166. Thomson, Sue; Rowe, Ken; Underwood, Catherine; & Peck, Ray. (2005). Numeracy in the early years: Project Good Start. Melbourne: Australian Council for Educational Research.

The painting A Jeu de Paume Before a Country Palace

Adriaen van de Venne `s painting   A Jeu de Paume Before a Country Palace: An AnalysisThe painting A Jeu de Paume Before a Country Palace is a small painting by the Dutch artist Adriaen van de Venne.   The beauty of this painting is spectacular.   The picture presented is busy with many people in the depiction as well as many activities.At first the eye is drawn to the palace.   Even though it is in the country, it is ornate and impressive with its spires and cupolas.   Faded into the background is the image of a silhouette of a village.   The sky is littered with birds, and dogs dominate the crowd scene.Bordered by an elegant fountain and garden on one side and a forest with goats and deer on the other, there is a game of ball taking place.   Many people of all classes and backgrounds are entertained by watching the game.   In the left hand corner there are lovers who are oblivious to the rest of the excitement.   The one character that stands out is the middle age d, hefty man in the front who is dressed as a country gentleman.   There is a sense of frivolity in the mood of this painting.  A Jeu de Paume Before a Country Palace was painted in sixteen fourteen.   The oil on panel is six and one half by nine inches.   This painting and its companion, A Merry Company in an Arbor, were part of a series of four landscapes representing the seasons. This painting probably represents summer. (A Jeu de Paume Before a Country Palace)   The painter, Adriaen van de Venne, was born in 1589 in Delft, Netherlands, and died in 1662in The Hague, Netherlands.

Friday, September 27, 2019

The Immigration and Refugee Protection Act 2002 Essay

The Immigration and Refugee Protection Act 2002 - Essay Example The act replaced the Immigration Act of 1976 based on the need to eliminate discrimination and include refugees in the provisions of the act. The great depression, the ageing Canadian population, low levels of immigrants and economic benefits of immigrants are among the key reasons leading to the development of the act (Arakelian, 2008, pp.67-68). The transformation of the act to the new immigration and refugee protection act stems from the need to stamp out discrimination, encourage population growth and the need for skilled workers. The act has contributed immensely to economic development of Canada as well as promoting population growth and its use should be continuously supported (Beach, Green, & Reitz, 2003, p.167). This paper is going to look at the historical background of the act in terms of its development and values and ideologies that guide the legislation. It will provide statistics and global trends contributing to the act as well as other researches that have been done and which support and are in contrary of the act.it will then conduct a critical analysis of the legislation in terms of how well it serves the population, its strengths and any gaps that exist in service before finishing off with a conclusion that will provide a summary of what was discussed. Historical Background The first immigration act was passed in 1869 and this marked the foundation of Canada’s immigration policy. ... Immediately after the war, the nation experienced a number of setbacks and once again revised the act to a more exclusionary immigration policy aimed at encouraging harmony and control; although certain religions as well as ethnicities were barred from immigrating to Canada. This was followed by a further amendment in 1919 of section 38 prohibiting entry of certain races and nationalities (Westhues, 2006, p.20). After the Second World War, there was a change in attitudes as well as unprecedented economic growth. The senate in 1951 recommended the return of the open door policy stance on immigration which led to a new act in 1952 that did not include much of the proposed changes and continued to discriminate against races and people on economic grounds. A more inclusive policy was arrived at in 1967 that eliminated racial discrimination. 1969 saw the inclusion of refugees into the policy widening increasing chances of people who could immigrate to Canada. Amendments continued until 20 02 when the immigration and refugee protection act was established (Kelley & Trebilcock, 2010, p.11-13). Westhues (2006, p.23) argues that the rationale and ideologies at this time was to attract an influx of immigrants in order to boost the economic growth of the nation. Coming up with the immigration policy was seen as a way of increasing the country’s demand for domestic products and stimulate the nation’s manufacturing sector. At this time also, there were large tracts of land that were unoccupied and thus the need to fill this land with people. The idea of filling up the unoccupied land was as a result of the need to ensure sovereignty of the nation which was an important factor at this time. Therefore it is only through a

Design and the Implementation of Knowledge Management System Research Proposal

Design and the Implementation of Knowledge Management System - Research Proposal Example On the other hand Maier (2007) defined Knowledge management system as a system that integrates knowledge pertaining to culture, information technology infrastructure and employees’ intellect of an organization. The heightened valuation of business entity on basis of their intellectual capital and prevalence of information has made knowledge management system key determinant of the success or failure of a firm. The main objective of this project will be to study the design and implementation of knowledge management system (KMS) in relation to the management of cultural, leadership and technological information of Samsung electronics. The project intends to examine existing conceptual models of knowledge, KMS implementation success factors and potential hindrance to KMS. The paper will employ case study method to achieve the highlighted objectives. Therefore, the methodology will entail detailed contextual analysis of literature review relating to Samsung electronics KMS. The study will thus examine reports and secondary sources of information detailing the design and implementation of KMS by Samsung electronics. In addition, subsequent analysis will identify barriers, strengths and weakness of the system to Samsung electronics. In conclusion, deductions from the evaluation and analysis of the KMS will be employed to prepare a report (Yin,

Thursday, September 26, 2019

A A Assignment Example | Topics and Well Written Essays - 1500 words

A A - Assignment Example Such stories have always included characters in them that would usually symbolize a certain group or class of people living in the society. With this in mind, to analyze deeper into the social contexts in these stories, we will be looking at some of the main characters in both stories and relate them to the people that are existent today. Both are classics but at the same time, both of these classic children stories have been a journey that transcends time and reaches into the present 21st century. The original Peter Pan was dark and rhetorical English tale (Flores 2011). Old English folk stories provoked of vile creatures and dark premises in such stories often offered the fantasies of heroic creatures with powers that a plain human do not exhibit. One of these stories was Peter Pan. The original text was written in 1915 and was greatly influenced by medieval background as how literature back then was inspired. The roots of the Peter Pan that caters to the children of today was originally a Peter Pan that was a novel that talked about dire and scary creatures that used magic, that were beastly and ravage. Only the turnaround in the Disney made the Peter Pan stories cater to kids because of the animation although the subliminal meaning it sends is still from the original roots of Peter Pan. Peter Pan is a lost boy who doesn’t grow up may be related to people of today, yesterday and tomorrow that refuses to hold to responsibilities and move on with the cycle of life. They insist on staying on the tracks where all is consisted of happy thoughts and the like. Peter may refer to the main influence that keeps the lost boys together. The society today is filled with people who gang up together pursuing the pleasures of life instead of the responsibilities that the traditional life has always expected of people. Peter Pan’s arch enemy is a pirate in the person of Captain

A choice of a certain strategy in business Essay

A choice of a certain strategy in business - Essay Example Management strategy Abstract A choice of a certain strategy in business is the determinant factor of a future success. Under conditions of turbulent environment there is a need for businesses to react properly to various changes in the global context of the world. On the example of case-studies of different companies and the challenges they face with, this paper underlines the necessity to develop a more flexible and multi-sided strategic decision making. The main concepts for further research were borrowed from theoretical developments of Mintzberg (1998), Johnson et al (2008), Child (2005) and others. The specific question of the research study is : â€Å"†¦.. adopting a simple profit-maximising perspective ..... can have positive impacts for a firm .....†. This claim is considered in terms of emergent and prescriptive approaches. Such companies, as Microsoft, Nokia and PowerCo emergent approaches are correlated with strategic decisions to increase their profits. The st rategic developments within the modern companies are dynamic and flexible. This trend can be explained by the necessity for the companies to be more responsive in the global business world. Further on, we should underline the importance of financial and organizational issues of every firm and the company for a proper development of their future management strategies. Introduction Under conditions of the modern globalization there are evident trends of convergence and unification. Strategic decision making should be based on mutual understanding between the managers and employees and all parties involved should be ready to react to the immediate changes in the world. Current ‘management techniques’ are challenging and they should be considered in detail by the managers and the employees within every company and a firm with respect to the specific features of the inner structures of their organizations. The strategic management is a helpful tool for â€Å"choosing the ri ght place for defining a unique position, making clear trade-offs, a tighter fit; it involves a comprehensive approach to managing all important aspects of the company's internal environment and it therefore significantly differs from other management techniques† (Child, 2005). Business planning and development strategies if developed under conditions of a dynamic environment should be focused on management strategies, which are responsive for structural, processing, systematic and cultural environmental changes. This discipline implies activities planning which are relevant to the orientation and functioning of the corporation. Profit-maximization perspective in the emergent approach of strategic management is a crucial technique for the modern managers and it should be noted that the contrasting strategy is the perfect example of discussion about profit-maximization policies. The field of contrasting strategy is a perfect field for focusing on owner-managed firms and profess ionally managed firms in their relation to profit maximizing perspective. The objects and behaviors of different firms may differ, but at the same time it is necessary to mention that profit maximization is â€Å"an oversimplified models of competitive interaction† (Volberda and Elfring, 2001). There is a close relationship between economics and strategy. In accordance with Mintzber (1992) â€Å"as never before, [strategic management] academics have adopted the language and logic of economics.† In the context of neoclassical economics a profit is the maximizing entity, which enables inputs transformation into outputs. Still, there are many opponents of profit-maximization perspective, because the modern companies are more concentrated

Challenges faced by the USA in China and the East Asian Region Essay

Challenges faced by the USA in China and the East Asian Region - Essay Example The twenty-first century is mainly about policy decisions the governments make and the counter-policies that major economy governments like the USA and China make regarding them.   They are the most influential countries regarding military endowment, economic might, and political superiors. Even as this is true, other countries fit into the jigsaw and the relationship these two countries have towards the others and between each other is important in running the global economy and stability.The rising China economy has contributed a lot to globalization and has become almost the single most important factor that is shaping the fast-changing geopolitical landscape in the 20th century. This rise has shifted the focus of the developing world towards the East Asia, something that has undermined the reputation of the USA among the developing countries. China has emerged as the world’s largest manufacturing platform and has compelled the global manufacturing networks and national e conomies. For instance, the US missile defense efforts, only the Japan is supporting it while China strongly opposes the move while the South Korea remains a bystander. Japan is strongly championing for the Asian Monetary Fund, and a seat in the United Nations is slowly complicating the United States leadership in the Asian region.  As much as Japan’s plan seems to benefit the greater East Asian region, China still finds this as a stumbling block as it is determined to cripple Japan’s regional and global influences  

The Invention of the Perspective In the Renaissance Essay

The Invention of the Perspective In the Renaissance - Essay Example The first 'book' refers to the 'diminution of plane surfaces' (6), the second explains the trial of ' diminution of square bodies' and those having a number of faces positioned at right angles to the planes'(7) and the third one 'the diminution of bodies' (8), that seems more difficult to realize. Analyzing Francesca's different ways of perspective, Kim Veltman notices 'geometrical proportion using diagonals' (9) a 'surveying type using a rod or a plane' (10) and 'a diagonal' (11) to determine the distance. There are also new 'perspective views' considered by Francesco in his book 'The Geometrical Method' ,these were basically used in the context of pavements, ceilings, facades and buildings and. He also used 'The Window Method' that had more elaborate details and was represented in architecture. Duccio di Buoninsegna was an Italian painter (1278-1319) who demonstrated the use of perspective in architectural forms. His style seems to be different in his tendency of giving his figures more volume. His 'perspective 'infuses elements from Byzantine style with more dramatic scenes and specific figures. In his 45 panels representing scenes from the Bible and saints he inspired from primitive Christian style regarding the outlines of figures, gestures, and clothes. In this way he tried to create a more natural visual impression. His art of 3 D perspective created a special spatiality, a type of 'breathing space' (17) around the persons and objects. The artist used a special technique of registering in his paintings intricate details (for example

Wednesday, September 25, 2019

Basel Accord Essay Example | Topics and Well Written Essays - 1000 words

Basel Accord - Essay Example The paper tells that the Basel Committee on Bank Supervision (BCBS) was originally established in the 1970s to tackle the new challenges of banking across international boundaries. It became apparent that the failings and collapse of one country's banks was now being felt in other countries all over the world. It was obvious that intervention and prevention was necessary. In the 1980s, the United States Congress, pushed domestic regulatory agencies to set and enforce standards, including a fixed proportion of capital a bank must hold, or capital adequacy. This is how the Basel Accords began. The accords have been adapted and expanded in attempts to meet needs and to speak to aspects that previous version of the accords may not have addressed sufficiently. In order to understand the Basel Accords better it is useful to review them individually in order to better compare and contrast the variations. The BCBS determined that bank capital would be organized into 2 separate tiers. Tier 1f ocuses on the higher-quality capital, those that represents items of the lowest priority of repayment and easiest to absorb when lost. Most of Tier 1 involves â€Å"core† capital, or common equity, which arises from actual ownership in the bank, like common stock, undivided profits, and surplus monies. Tier 2, also called supplementary capital, include certain reserves, and term debt. The capital under Tier 2 can be divided into 2 more sublevels; the upper focuses on maintaining characteristics of being continuous, like preferred capital, and equity. The lower level, is the least costly for banks to issue because it pertains to debts with a time of maturity of at least 10 years.(Eubanks, 2010) Basel I was the first attempt made to establish a standard of regulating international banking and it came under a great deal of criticism. Opponents felt that the Basel I Accord approach to â€Å"risk-weighing assets.† They claimed that this system is too broad and lacks the fin ite specialization to address all of the unique risks that apply to the differing assets held by the bank. As a response the BCBS released a revision to the accord called the â€Å"International Convergence of Capital Measurement and Capital Standards: Revised Framework,† which is, also, known as Basel II.(Larson, 2011) Basel II Basel II differs from Basel I in a distinct way. It introduced a section of â€Å"Pillars,† which intended to rectify the capital adequacy issues with Basel I. Pillar 1, specifically, deals with the procedures of calculating the required capital within banking organizations. This accord will determine risk potential based upon the totality of their credit risk, market risks, and operational risks. Pillar 2, ideally, was placed to increase, both, accountability and transparency with the banking system. Pillar 3 works to require banking institutions to disclose risk exposures, allowing for better assessment of the needed safety to help create a

BU1010 Final Assessment Essay Example | Topics and Well Written Essays - 2000 words

BU1010 Final Assessment - Essay Example And as result today the Central and Eastern European block and the Baltic States are knocking at the doors of European Union (IMF, 2000). The centrally planned economies existed in Soviet Union. The problem in the central economies was its inability to generate wealth and raise the living standard. The production and distribution would come from central government, deciding for the states, what to produce and how to distribute in what quantities. The workforce was assumed to be fully employed and salary was predetermined, regardless of the potential of the worker (Greenspan, 1997). In these economies there was no effective market clearing mechanism, the result was huge surplus of unwanted goods by population on one side and shortage of goods, which were in needed. This imbalance in demand and supply led to rationing the quota, as the quantity of the goods was limited. As production and planning was followed through state orders rather than by market demand, the finance had no control over the actions that were remotely planned by the center without following the market rules (Greenspan, 1997). In such economies, there was nothing like credit, interest or market values, as every thing belonged to the state. Due to the lack of a developed financial system, these economies as a consequence wasted their resources as much as much five to seven times more than Western European economies, yet without any productive result, which led to the dismemberment of Soviet Union and the rest of Eastern Bloc in early 1990s (Greenspan, 1997). The macroeconomic stabilization process after initial burst of high inflation stabilizes the inflation and allows the liberalization to take place, which keeps a tight control over the state budget and growth of money allowing the growth of progressive fiscal system to develop. These economies had no financial

Tuesday, September 24, 2019

The three most inportant gifts i ever received are Essay

The three most inportant gifts i ever received are - Essay Example When I was young I always had the capability to come out as a leader in my class. I used to be the class representative at an age when my group mates were hesitant to come in front of the teacher. I have learned to lead from the front and guide my class mates through everything that they face. The leadership skills I believe have been gifted to me by God himself. Similarly I have also been gifted the capability of being determined in life. Determination is yet another god gifted capability for which I did not have to do much in my life. From an early age I always had this determination in achieving my goals when I set them up. I wanted to clear the subject of mathematics with a good grade and with the right determination and struggle I was able to do so. I believe that this determination would also help me in the future. Determination is the most important gift I ever received from God as I believe that I can be able to achieve almost anything that I require in this world. Starting from my very early life I received a lot of presents from my family members on my birthday but one special gift that I still remember as the best from my childhood was when my grandfather gifted me a watch. A watch seems too ordinary for an important gift but the timing of the gift matters most to me. While gifting me the watch my grandfather said â€Å"Son, always be particular about your timings†. Ever since I used that watch to make sure that I was particular about my timings and this has helped me greatly in life. These three gifts have helped me to become a better man in my life. I believe that with these gifts I can make out something good of my life and can achieve anything that I require. Being particular about my timings can help me to set an example for others and the capability to lead can help me to lead other people. Similarly with the determination of my sort I think that I can be able to achieve almost any

Engaged Buddhist response to Consumerism Essay Example | Topics and Well Written Essays - 2500 words

Engaged Buddhist response to Consumerism - Essay Example In the twenty-first century, people live in a technologically-advanced world. Everything is done with a touch of a button. Perhaps, the saying that â€Å"an idle mind is the devil’s workshop,† is true because the more free time man has, the more time he spends on whining about how miserable life is and how only a new gadget or material possession could make him feel better. Conspicuous consumption is the name of the game. And consumerism is the rule. This paper shall discuss the concepts of consumerism from the perspective of Engaged Buddhism and their interaction in society, how Engaged Buddhism responds to tide of consumerism. More specifically, Engaged Buddhism responds to consumerism with meditation and mindful living coupled with acts of compassion and generosity. ENGAGED BUDDHISM Engaged Buddhism is a movement within the Buddhist religion. It follows all the teachings of Buddha, the Enlightened One; it practices all the traditions and rites of the Buddhist religion. But what makes it different is the fact that it puts a premium on the value of active compassion, that is, meditation coupled with action. However, when the founder himself is asked, he contends that â€Å"Engaged Buddhism is just Buddhism† (Malkin 1). This movement was established in the middle of the 20th century by Thich Nhat Hanh, a Vietnamese monk who, surrounded with pain and desperation during the Vietnam War, realized and decided that, â€Å"Buddhism has to do with your daily life, with your suffering and with the suffering of the people around you† (Malkin 1). ... Meditation is about the awareness of what is going on—not only in your body and in your feelings, but all around you,† (Malkin 1). Thus, Engaged Buddhism was born. Inspired by the deep desire to serve the community, Thich Nhat Hanh founded the School of Youth for Social Services where the students learned not only religion but most importantly compassion. They were taught to put their beliefs into actions by working to help ease the suffering of the people (Queen 38). As the group grew larger, Engaged Buddhism became not just a religious movement but also a social force – a flicker of light that beacons all those who are in the darkness of pain, despair and uncertainty. Armed with pure courage and determination to share the values of love and compassion to his fellowmen, Thich Nhat Hanh planted the seeds of Engaged Buddhism on the unforgiving and hostile bloodstained soil of his motherland. True enough, as an affirmation to his extraordinary efforts, religious and layman communities had soon adapted to the art of mindful living and mindfulness to the Buddhist principles that gives to every individual the respect and dignity he deserves as a human being (Queen 54). The Zen monk’s extraordinary courage and compassion sent ripples of hope across the country and even to the other side of the Pacific Ocean. In recognition, no less than Martin Luther King, Jr. nominated him to the Nobel Peace Prize in 1967 (Malkin 1). Consumerism In the society that we know today, there is always the need to have more and to possess the latest, best and coolest. Mass media makes sure of that. The advertising sector has mastered the art of deception – making every consumer think that he needs whatever is pushed in his mind through

Monday, September 23, 2019

Social and environmental sustainability vs Financial sustainability Essay

Social and environmental sustainability vs Financial sustainability - Essay Example The differences among social as well as environmental sustainability and financial sustainability can be resolved based on the different views. Social economic is also essential for the purpose of doing a business properly and improve economic growth of businesses. In the recent trends, there is a huge scope for a business. Sustainability can also be defined as the long-term growth economically, financially, environmentally and socially (IFC, 2012). In this context, the paper deals with the implications of the differences among social as well as environmental sustainability and financial sustainability in two ways such as the ways through which they can operate their business properly and also can report on their activities. In addition, it intends to explain how these differences can be reconciled or resolved along with the major obstacles for reconciling different views. Social and environmental sustainability is different from financial sustainability based on going concern of the accountants. Social and environmental sustainability is important to prevent the issues related to social and environmental aspects and on the other hand, financial sustainability is essential to prevent financial issues in a business. In a business, there are several factors, which play an important role for the development of a business. Social sustainability helps to support the future generation to maintain a healthy as well as well-being society and community (IFC, 2012). Environmental sustainability can be described as the process through which demands of an environment can be attained. Environmental sustainability is also important to reduce the negative impact of the business and to take effective decisions regarding the business purpose and also for the improvement of the natural environment. On the other hand, financial sustainability means long-term

The Politics of the Hijab Case Study Example | Topics and Well Written Essays - 500 words

The Politics of the Hijab - Case Study Example da is constitutionally and professedly a multicultural nation that supports religious and cultural diversity, actually speaking Canada is not that tolerant of the religious rights of minority communities. In that context Hijab relates to the assertion of political, cultural and gender identity in a Canadian context. The young Muslim women in Canada see Hijab as an umbilical cord that ties them to their culture and endows them with community acceptance and sustenance, as they move out in the larger Canadian society to eke out their identity at their own terms. Hijab allows women to deny the patriarchal practices typical to their culture of origin while allowing them to solicit familial and community support as they adapt to the Western way of life. Many young Canadian Muslim women also use Hijab to assert their cultural identity in a society dominated by majority norms and as an expression of their religious pity, modesty and political beliefs. Thereby, Hijab is not a monolithic symbol of patriarchal oppression, but carries a range of meanings and implications. It is true that Hijab is used as a way of oppressing women in many totalitarian Muslim nations (Lazreg, 2009). Yet, using this fact to assign a singular meaning related to patriarchal dominance to Hijab is unjust and wrong (Elver, 2012). Many a times some sections of the majority community in Canada associate simplistically derogatory meanings with Hijab, not because they care about women rights, but because the Hijab stands out as a potent symbol of a minority culture and identity. It sounds really modern to use the ploy of women rights, while demeaning a symbol of minority identity and religion (Scott, 2007). There are also sections of the majority community who do genuinely believe that the Hijab worn by the young Muslim women in Canada conveys their surrender before the patriarchal domination. This is actually a gross misconception. For many young Muslim women in Canada, Hijab is a thing that keeps

Sunday, September 22, 2019

Nutritional Value Preservation in Cooking Essay Example for Free

Nutritional Value Preservation in Cooking Essay Cooking is often defined as the application of heat to food products in which after the process, improvements in taste, visual, appearance, texture and aroma is attained prior to consumption. Cooking in food establishments and other food service facilities are often done by chefs or cooks. Cooks usually focus on making the food palatable and appealing to consumers. It is common to sacrifice the nutritional aspects of food preparation to attain the maximum satisfaction of the diners and create very appetizing courses for the sake of culinary arts. The twist of preparing very complex meals in terms of cooking method and expected taste output is the opportunity cost of nutritional value of the meal being prepared. Array of reasons suspend upon the discussion of nutrient conservation in cooking. The concepts of temperature, time, total surface area exposed and certain cooking techniques interplay for the betterment of retaining the nutrient content of the meals being prepared. Chefs of today’s cooking era should consider the nutritional content of the foods they are preparing for the aims of giving delicious and nutritious foods in their customers. Necessity of Nutrient Preservation in Cooking The food items being cooked undergo physical and chemical changes that opt to alter the nutrient content of the food. And the current trend leads to a lesser nutritional content because of the present practices. It is important to preserve nutrient content of the food to provide the diners a better quality of food in terms of nutrient content. This will also provide a help on the campaign for a healthier society. Moreover the nutrient content of the food item would not be put into waste. Hospital cooks should focus more on the preservation of nutrients for the reason that the patients inside the hospital need more nutrients for faster recovery. The patients with specific nutritional deficiencies also require specific amount of nutrient in such way, the dietary departments of the hospitals compute the diet of these patients but if the cooking process is not that nutrient conserving, the computations of the dietitians as well as the plan and time frame of dealing with the patient will be lost. The Techniques and Concepts for Preserving Nutrients in Cooking Cooking has an ample ways to preserve the nutrient contents. These vary from controlling the temperature, managing the time, using the right portion sizes and some techniques in food preparation. This is necessary for the conservation of the nutrients. Time and Temperature effects on the nutrients upon cooking The temperature greatly affects the nutrient content of the food as stated by the NutritionData. com. The trend is that higher temperature, the greater the loss of nutrients. Morris stated that blanching spinach can cause for the loss of 80% of amino acids and blanching peas will result into loss of 26% vitamin C. Therefore applying greater amount of heat will significantly increase the loss of vitamins. The time required to cook the food item is also directly proportional to the nutrient loss. As stated by Mateljan, there would be a greater loss if the cooking time is longer therefore cooks can lessen nutrient losses by shortening cooking time and lowering cooking temperature. The Total Surface area exposed Bastin stated that greater the surface area exposed, the greater the nutrient loss. This is according to Bridge. The smaller cut of vegetables serves as the greater surface thus more nutrients are exposed and greater loss will carry on. Thus chefs should master the art of bigger cuts to food portions. Bigger cuts have a relative smaller total surface area exposed. Amount of Water The amount of water is directly related to the nutrient loss. As water increases with respect to the meal portion, there would be a greater chance of more nutrient loss. This is due to the fact that water has more space to accept nutrient molecules thus more water means more losses in terms of nutrients. Chefs should try to concentrate on decreasing the water content of every course they are preparing to conserve nutrients. Washing Methods Washing food items after peeling will cause the lost of nutrients. It is necessary to wash first and then peel. After washing carefully, the food item can be peeled. The logic behind this sequence is that upon peeling, water labile nutrients such as Vitamin B will tend to go with water as the water runs over the surface of the peeled food item. The necessity for cooks to practice washing first before peeling is great to avoid further loss of nutrients. Cooking for the betterment of the nutritional status of the society The combination of the techniques and the processes will be a great tool to efficiently utilize the nutrient content of the food. Such practices will provide number of individual more nutritious food which in turn can support the reputation of the cooks for including nutritious and delicious foods in their menu. Cooks having this knowledge can provide nutritious food for the improvement of his diners’ health.

Role of the Nurse Leader in Evaluating Data Essay Example for Free

Role of the Nurse Leader in Evaluating Data Essay Role of the Nurse Leader in Evaluating Data to Improve Quality and Safety Recent nursing literature indicates it is critical that nurse leaders construct a culture of safety to develop and maintain a successful fall prevention program (Johnson et al., 2011). Data exists readily in healthcare systems that nursing leaders may use to understand nursing performance and improve patient outcomes (Diers, Hendrickson, Rimar, Donovan, 2013). The purpose of this paper is to discuss the importance of nursing leadership’s use of data to improve patient quality and safety. Data Overview Data provided in the NURS 4020 course [lecture notes] (â€Å"Evaluating Data†, n.d.) and the Patient Fall Data (Excel, n.d.) document indicate patient fall rates have increased over the last four months to an unacceptable level on a telemetry unit (Laureate Education, Inc., n.d.). Patient population data indicates the majority (68%) of patients is arewomen, all have a cardiac diagnosis, and the average age is 72.4 years. The majority of patients receive diuretic therapy (94%), and 12% have a secondary diagnosis of disorientation or confusion. Additionally, one full-time employee has been removed from the night shift (11p-7a) to the evening shift (3p-11p). â€Å"Data hold the key to risk reduction – to understanding not only what happened but why – and point the way toward solutions† (Siegal Ruoff, 2015, p. 25). Analyzing the data in the patient fall data set (Excel, n.d.) reveals that 59% of falls occur over a weekend, and 62% of falls occur between 3a-11 a. Staffing on weekends and especially between 3a-11a may not be appropriate to manage tasks and safeguard patients from falls. (Williams, Szekendi, Thomas, 2013). A high number of falls occur two hours after mealtime. Assessing patient needs every one or two hours has been reported helpful to prevent patient falls (Williams, Szekendi, Thomas, 2013). The average age of patients on the telemetry unit is 72.4 years of age (â€Å"Evaluating Data†, n.d.). Twelve percent of patients have secondary  diagnoses of confusion or disorientation. William et al., (2013) state patients exhibiting confusion and disorientation have an increased risk of falls. The National Guideline Clearinghouse (National Guideline Clearinghouse, Prevention of falls, 2012) recommends assessment of all adults over age 65 upon admission for dementia and delirium. Patients with delirium and dementia are at a much higher risk of falls. Why? How do the cardiac medications influence the fall rate? What about the l ayout of the unit? Quality Improvement Plan The DMAIC method of Six Sigma is a process improvement method whereby nurse leaders develop quantitative data to implement a quality management program. The first step in the DMAIC process is to identify what measure will indicate success (Sullivan, 2013). A baseline measurement must include what fall prevention strategies are in place presently. An assessment of staff knowledge of fall prevention strategies is necessary to determine deficits. In the example provided, 47 patient falls have occurred in 4 months. An appropriate goal is patient falls are reduced by 50% in the next quarter or four months. The second step in the DAMIC process is to provide a baseline of performance. The patient fall data set (Excel, n.d.), provides this baseline data. Accurate data must be utilized to create a successful quality improvement plan (Siegal Ruoff, 2015). The next three steps consist of analyzing the data set to determine appropriate interventions, improving performance through interventions, and last control and sustain improvements (Sullivan, 2013). Implementation of an evidence-based plan to improve patient falls include asking the right questions, acquiring and appraising evidence, and applying evidence to practice. Refinement of a quality improvement plan includes adjusting processes as needed (Seidel Newhouse, 2012). Rogers change model is appropriate for implementing change in a fall prevention program. Sullivan (2013) states the first step is assessing knowledge related to fall risk and prevention. Secondly, persuasion is utilized to convince staff of a need for fall prevention focus and prevention program. Senior leadership must support the fall prevention initiative for success and sustainability of quality improvement projects (Sullivan, 2013). The third step in Roger’s change model is decision-making. Decisions must be made regarding how implementation will  occur. Implementation and confirmation follow. National Guideline Clearinghouse (2012) suggests successful fall prevention programs are supported by organizational leadership and include interdisciplinary team members to oversee the program. Reliable risk assessments, as well as communication of the assessment and plan, are imperative to the success of a fall prevention program. Clinical staff and interdisciplinary team members must receive fall prevention education. Patients, family members, and non-clinical staff must also receive fall prevention education. Organizational leadership must foster a culture of safety that includes on-going analysis of fall rates and injuries sustained, as well as effectiveness of fall prevention measures (National Guideline Clearinghouse, Prevention of falls, 2012). Leadership Characteristics Shared leadership is a leadership style that incorporates principles of participative and transformational leadership to empower staff to make changes in health care (Sullivan, 2013). Complex problem resolution require solutions that more than one individual may be capable of providing. Including a panel of experts or a team approach to problem resolution may be most beneficial in implementing a fall prevention program. Nurse Managers must encourage and create a culture of safety and quality. Providing open discussion and brainstorming sessions to uncover how, when and why patient falls occur will assist in formulating a fall prevention plan.Very good plan This type of open communication also encourages a â€Å"just culture.† Sullivan (2013) explains a â€Å"just cultures† allow reporting of errors in an environment where staff does not fear retribution for reporting errors or near misses (Sullivan, 2013). Summary Nurses have an ethical responsibility to protect patients from harm (Fowler, 2008). Patient falls remain one of the most frequently occurring safety incidents in hospitals (Johnson et al., 2011). Nurse leaders must identify problems in safety and quality through data collection, communication with staff and multidisciplinary departments. Numerous evidence-based strategies are available to improve nursing practice and patient safety. Creating a culture of safety culture is accomplished through shared leadership. Utilizing quality improvement processes and change management strategies  discussed in this paper will provide greatest success and sustainability of change necessary to protect patients from harm. References Diers, D., Hendrickson, K., Rimar, J., Donovan, D. (2013). Understanding nursing units with data and theory. Nursing Economics, 31(3), 110-117. Fowler, M. D., American Nurses Association. (2008). Guide to the code of ethics for nurses: Interpretation and application. Silver Spring, MD: American Nurses Association. Johnson, J. E., Veneziano, T., Green, J., Howarth, E., Malast, T., Mastro, K., Smith, A. (2011, December). Breaking the fall. The Journal of Nursing Administration, 41, 538-545. Laureate Education, Inc. Patient Falls Data (Excel). (n.d.) Retrieved from https://class.waldenu.edu National Guideline Clearinghouse, Prevention of falls (acute care). (2012). http://www.guideline.gov Seidel, K. L., Newhouse, R. P. (2012, June). The intersection of evidence-based practice with 5 quality improvement methodologies. Journal of Nursing Administration, 42(6), 299-304. Siegal, B., Ruoff, G. (2015). Data as a catalyst for change: Stories from the frontlines. JOURNAL OF HEALTHCARE RIS K MANAGEMENT, VOLUME 34(3), 18-25. Sullivan, E. J. (2013). Effective leadership and management in nursing (8th ed. ed.). Upper Saddle River: Pearson Prentice Hall. Williams, T., Szekendi, M., Thomas, S. (2013). An analysis of patient falls and fall prevention programs across academic medical centers. Journal of Nursing Care Quality, 29(1), 19-29. Grading Rubric NURS 4020 Week 5 Application Criteria/Points Comments/Points Earned Introduction to overview of paper. The last sentence in this paragraph is a sentence that begins The purpose of this paper is to . . .† 20 points Well-written, the reader knows what to expect 20 Data over view describe some possible interpretations of the data related to the patient fall rate on the telemetry unit. Summarize the statistics and demographics of your patients. 20 points The data analysis and  interpretation is accurate. The importance of the medication and the environment needed to be included in the analysis – 19 points Quality improvement plan discuss the quality management process you would follow to improve patient fall rates on the unit. Also, discuss the change management strategies you would incorporate in your quality improvement plan. 20 points DMAIC and Rogers change theory were accurately explained and applied to the scenario. Including the national clinical practice guideline recommendations was very effective in supporting the analysis. 20 Leadership characteristics explain the leadership characteristics needed to assist in improving the patient fall rates. 20 points These are explained very well 20 points Summary end the paper with a 1-paragraph summary of the importance of a solution to the identified practice-based problem that is based on evidence and a 1-paragraph summary of the main points of the paper. 20 points The key points discussed in the paper are included in the summary 20 points Grammar and format (indicate if any points are taken off for these errors. Up to 40 points may be deducted if needed). A minimum of three references are required. No issues – the paper is well-written and the required areas are included. Please see my comments. Total points possible – 100

Saturday, September 21, 2019

The Rules Of The Sociological Method Response Philosophy Essay

The Rules Of The Sociological Method Response Philosophy Essay Over time the study and application of social sciences have become to be viewed differently in comparison to those in the realm of natural sciences. By definition and practise Social sciences rely more on subjective details and inference than do those of the natural sciences which rely on empirical data to derive conclusions. Emile Durkheim sought to establish rules and practises for the methods used to discover new information utilized by the social sciences. With his publication of the book, The Rules of the Sociological Method, Durkheims theory of the social fact was revealed and presented as a practical and workable model for utilization within the discipline of the study of social behaviour. Durkheim goes on within his writings to break down his theory and to outline the different rules. Seemingly the most vital section establishes the Rules for the Constitution of Social Types. Social Types is a significant concept and the section that defines it is most important, this is due to the clarity in which brings it to his thesis and because it aids in relating the theory of social facts to particular societies and species. It is for these reasons that one can clearly see the concept and refinement of social types is the most vital piece to Emile Durkheims theory of social facts. Durkheims theory on Social Facts is based upon the thesis that there is a category of facts which present very special characteristics: they consist of manners of acting, thinking and feeling external to the individual. Which are invested with a coercive power by virtue of which they exercise control over him. This definition shows that Durkheim is focusing on sociology and the main forms of socialization; acting, thinking and feeling and how they control an individual. Along with this definition Durkheim continues to refine his outline that a social fact is a thing that stems from an idea not an idea from a thing.(page 60). From this frame of reference Durkheim further explores the social fact and the many other variables that make up its sum. Durkheim identifies that social facts are divided into two separate groups: normal and pathological. Normal social facts are attributes or characteristics that are found in most if not all of a population, while pathological social facts are found within a limited number of the population and are sometimes only experienced for a brief period of time. With this clarity one can begin to see the importance of social types and its relation to Durkheims thesis as you cannot categorize something as normal or pathological until you are fully aware of its social type. Simply, this is due to the fact that you will not know how common or uncommon a particular social fact may be to a population until it has been identified and categorized. The importance of social types however begins to be more clearly portrayed when analyzing the rules for the constitution of social types. Durkheim implies that human beings are not all the same and suggests many different groups of species exist amongst us. He does his best to distinguish himself from the historian and philosopher who both view society in much different ways. The historian looks at every event and occurrence within society in sequence to that particular time as unique and will not be repeated. On the other hand is the philosopher, who views humans as different groups who are governed by laws and justice. These laws aid in taking humans through the many stages of growth and evolution into more complex and modern societies. Sociology takes a much different view and approach than these two disciplines. Durkheim believes that cities are made up of many different types of species with the inference that many of these species are similar in several ways. Durkheim theorizes that these differences arise within each particular species and calls them social facts affording each a classification accordingly to the particular species. In my frame of reference and after having been exposed to Durkheims concepts I find myself supporting Durkheims views as practical and realistic of the three, in accordance to how society is really made up. The historian sees no relation in anything while the philosopher believes that laws applied to certain societies are what dictate how that society will progress, sociology seems to be a medium to these two schools of thought. Conceptually this shows that social types can be seen in many different ways of thinking and is not limited to sociology or any discipline for that matter. Durkheim uses these social types to apply social facts with this aiding in expl aining how and why certain things occur socially. Durkheim correlates social fact with a very heavy reliance on social types. While Durkheim does an excellent job in outlining and creating his theory regarding social facts, he does encounter some problems. One issue he identifies and discusses is not how many different species there may be, but what exactly is the best way to go about classifying them. Durkheim states, We shall begin by classifying societies according to the degree of organisation they manifest, taking as a base the perfectly simple society or the single-segment society. Within these classes different varieties will be distinguished, according to whether a complete coalescence of the initial segments takes place. Durkheim describes the idea of classifying different societies by their organisation as a whole. Ultimately, categorizing the seemingly more advanced societies as superior in comparison to others that do not appear to be as advanced. There may be some critique given to this idea, that Durkheim may believe a society has little going on while quite the opposite is actually taking place. The term simple is used to describe these lower societies, which one may interpret this classification as labelling this group as primitive. One could say that the difference in language, culture and practice creates a barrier and the automatic classification of simple is wrong. Still I must digress; one can see the importance that this classification has to Durkheims theory. The fact that dependencies exist within these societies makes it so that modern societies must rely on resources and labour that are more complex in comparison to the more simple societies who must also rely on resources and labour fitted to suit their needs. The impact that the social type has can be seen clearly as the theory of the social fact is defined and explained. It is needed to describe and categorize the many different species of people so that the social facts of that particular society may be analyzed and discovered. If it were not for social types, the classification of normal and pathological would cease to exist. This would ultimately make it impossible to accurately identify and outline social facts for specific populations. The social type proves that it is a large division within the theory of the social fact. It is this factor that ultimately ties the different thoughts and ideas together. This is why, for me, I view the concept and utilization of social type as the most vital piece to Emile Durkheims theory of social facts.