Saturday, December 28, 2019

The Facts And Benefits Of Animal Testing - 1533 Words

Life revolves around animals When thinking of animal testing the first thing that pops into our mind may be animal cruelty, and unfair treatment. We all must set aside our personal beliefs and morals and, for a brief moment, think of the logical facts and advantages animal testing provides. When thinking of rabbits, mice, dogs, cats and other animals, the last thing that comes to mind is that they save lives. Animal research allows every day, common animals to save human lives. Vaccines, over-the-counter medicines, food, cosmetics, and everyday items we need must be tested before they can be considered safe and legal to be given to the public. Since no humans are willing to be tested on a daily basis, scientists had to resort to finding the best alternative that could have a chance in mimicking the human system when testing the products we use. Thus, animals were introduced into the medical and cosmetic laboratories changing human and animal history forever. We, as a society, would b e nowhere near as advanced as we are today if it weren’t for the brave animals that have undergone testing no human would be willing to do. Animal research, or animal testing, is the use of animals, other than humans, that are experimented on to advance in medical research, test out drugs for safety, or test the safety of everyday products or items we use. Animal research was introduced to human history all the way back to the Greek and Roman times. Aristotle, one of history’s most famousShow MoreRelatedBanning Animals Should Not Be Tested Essay1307 Words   |  6 Pages101 3 November 2016 Putting an End to Animal Testing Utilizing animals as a part of research and to test the safety of items has been a subject of intense arguments for a considerable length of time. Individuals have distinctive affections for animals; numerous look upon animals as partners while others see animals as a methods for propelling medical research or encouraging exploratory research. However people see animals, the reality remains that animals are being misused by research offices andRead MoreThe Pros And Cons Of Animal Testing1725 Words   |  7 PagesEach year, more than 100 million animals are experimented on in U.S. laboratories. These experiments are for things such as biology lessons, medical training, curiosity-driven experimentation, and chemical, drug, food, and cosmetics testing.(Procon writers) Animal testing, also known as animal experimentation, is the use of non-human animals in experiments that seek to control the variables that affect the behavior or biological system under study. Animal testing is controve rsial and people findRead MoreThe Pros and Cons of Animal Testing1413 Words   |  6 PagesIntroduction Each year in USA laboratories more then 100 million animals are burned, poisoned and lamed (Top 5 Shocking Animal Experimentation Facts). Each year scientists use animals in order to progress, to improve life of people and animals. However, many testing animals suffer and die. But others do not agree and support the fact that we should use animals because of advance. So what are advantages and disadvantages of using animals? This problem will be researched from different areas such asRead MoreAnimal Testing Is Morally Wrong? Essay1373 Words   |  6 PagesHumans are animals, and as such it is morally wrong to use them to test pharmaceuticals intended for use by humans. Those who support animal experimentation believe it is a necessary evil, in part due to the false information put out by the media. The so-called benefits of animal testing have not helped humans for years, yet in many countries the law still requires researchers use animals to test their medications. In fact, although alternatives have been found, few steps have been taken to put anRead MoreWhat are Advantages and Disadvantages of Animal Testing?1107 Words   |  4 PagesIntroduction Each year in USA laboratories more then 100 million animals are burned, poisoned and lamed (Top 5 Shocking Animal Experimentation Facts). Each year scientists use animals in order to progress, to improve life of people and animals. However, many testing animals suffer and die. But others do not agree and support the fact that we should use animals because of advance. So what are advantages and disadvantages of using animals? This problem will be researched from different areas such asRead MoreAnimal Testing: What if You Were in Their Place? Essay1621 Words   |  7 Pagesinto the eyes of the animal to see how much irritation it will cause, a process known as the Draize eye irritancy test (Rabbits in Laboratories | PETA.org. 1). The test is certainly not pain free; it often causes distress, such as redness, swelling, and sometimes blindness. After the rabbits are finished being toyed with, they are killed (Rabbits in Laboratories | PETA.org. 1). The Draize eye irritancy test is just one of the thousands of examples of profuse animal testing that has been goingRead MoreAnimal Testing Should Not Be Banned1616 Words   |  7 PagesAnimal testing in the scientific and cosmetic fields has been a controversial topic throughout the world for many years. This topic keeps coming back up only to be pushed aside or covered back up by officials. Many people stay outraged and concerned when it comes to animal testing and the fact that it has gone on for so long. The fact of the matter is, that for years now scientist have been studying and developing numerous different methods that can be used for these type of testing’s and completelyRead MoreWhen Discussing Ethics, We Consider The Negative And Positive1360 Words   |  6 Pagesexample, most people agree on the immorality of forced human testing, but many do not see animal testing in the same light. The subject of animal testing requires not only examining the possible consequences on humans, but also whether or not we examine the possible consequences on animals. I believe that, ultimately, whatever decision we make depends on whether or not the positive effects on humans outweigh the negative effects on both animals and humans, and also requires minimizing any and all negativeRead MoreCase Study: The Benefits of Animal Testing Essay1718 Words   |  7 Pagesis the fact that this fascinating medical procedure would not be possible without the use of animal experimentation. A nimal testing allows doctors to save countless lives. Without it, Amy along with countless others would die. Animal testing is a largely debated and controversial issue. It was first introduced in the United States in the 1920s (Goldberg 85). Since then, there have been many advances in the field of medicine and science. These advances are due largely to the fact that animals are usedRead MoreAnimal Experimentation Is The Only Option For Research978 Words   |  4 Pagesever gotten a vaccine for the flu? If your answer is yes, then you can thank animal research because â€Å"Without animal research, medicine as we know it today wouldn’t exist† says Kristen Cook from pro-test.org. So, although animal experimentation can be labeled animal cruelty, sometimes using animals to experiment on is the only option for research. Animal experimentation research has brought many lifesaving medical benefits to the world. The California Biomedical Research Association states that nearly

Thursday, December 19, 2019

Vygotsky s Theory Of Human Development - 1386 Words

Lev Vygotsky was an educator and a theorist known primarily for his sociocultural theory. Vygotsky developed the sociocultural theory, which is the theory of human development through social and cultural influences (Aimin, 2013), during the 1920’s-30’s. One of Vygotsky’s focuses was the concept of the zone of proximal development (ZPD), which is the idea of a child being appropriately challenged, this will be discussed further on. His theory stemmed from how children’s learning is impacted greatly through guidance of peers, cultural relations (language), social interactions, teachers and any other adult figure in their environment. In the last 10-15 years, teachers, caregivers, and educators have been attending more to Vygotsky’s theory and his concept of the zone of proximal development, because his work impacts how children learn in their optimal environment (Trawick-Smith, 2015). Vygotsky’s sociocultural theory will be discussed through h istorical insight, explanation of the theory itself, how sociocultural and society relate to each other, and how the theory is applied in the educational society. [Historical information] When Vygotsky died in 1934 there were still parts of the theory that needed to be researched on and expanded upon, which was left in the hands of other theoreticians (Wang, Bruce, Hughes 2011). On the historical foundation line with Locke on one end and Rosseau on the other end, Vygotsky is one of the only theorists that falls directly in the middleShow MoreRelatedVygotsky s Play Theory On Human Development1089 Words   |  5 PagesVygotsky’s Play Theory Many researchers strongly believe on how important play on human development. A spontaneous play contributes to cognitive, social, emotional, physical and language in early childhood development. Plays promote social competence, creativity, language development, and thinking skills. The benefits of play that children use their creativity while developing their cognitive and social skills. Children learn best where the environment provides them an opportunity to create, exploreRead MoreSociocultural Theory And Social Rules1726 Words   |  7 Pagesassociated with these models, Vygotsky’s sociocultural theory, which is based in his study of psychology, does not attempt to use culture to explain how language is acquired. Instead, Vygotsky identifies the relationship between language and culture as a dynamic, reciprocal and constantly evolving experience whereby language and culture are constituted in and of each other. Lev Semenovich Vygotsky developed what is now called The Sociocultural Theory in Russia during the 1920s and 1930s. The coreRead MoreEducational Methods Influenced By Jean Piaget And Lev Vygotsky800 Words   |  4 Pagesand Lev Vygotsky. Both of these men provided influential theories, which had a significant impact on evaluating children’s learning styles and abilities. After years of research and observation, Piaget determined that intellectual development is the result of the interaction of individual and environmental factors. He felt that as a child develops and always interacts with the world around him, knowledge was established. Through his observations of his children, Piaget developed a stage theory of intellectualRead MoreOutline the main similarities and differences between Piaget‚Äà ´s and Vygotsky‚Äà ´s explanations for cognitive development in children1702 Words   |  7 Pagesfor cognitive development in children. Piaget and Vygotsky were both, looking into the same period of cognitive development in infants and children and sharing the same basic concerns. Piaget (1896-1980) developing his theory slightly earlier than Vygotsky (1896-1934) who worked to show that there were certain flaws in Piaget s theory of genetic epistemology. Vogotsky and his social-cultural theory of cognitive development might be seen as the Soviet counterpart to Piaget s western individualistRead MoreDevelopment Of A Child s Social And Emotional Development1377 Words   |  6 Pageschild development there have been many scientific studies which have formed our understanding of children’s social and emotional development, within this essay I am going to look at some of the theses developmental theories and how they have impacted modern day society in understanding the development of a child’s social and emotional development. Development is the pattern of change that begins at conception and continues thr ough the lifespan (Santrock, 2008, p.5) Emotional development is theRead MoreEssay on Lev Vygotsky and Social Development Theory1038 Words   |  5 PagesExplain Lev Vygotsky(1896-1934) was a Russian psychologist who created the Social Development Theory/ Sociocultural Theory. Vygotsky believed that childrens mental, language, and social development is supported and enhanced through social interaction. Vygotsky also believed that beginning at birth, children seek out adults for social interactions and that development occurs through these interactions. The belief that social development sets a precedent for development(appeals to the nurture sideRead MoreJean Piaget And Vygotsky s Theory On Children s Cognitive Development1507 Words   |  7 PagesJean Piaget and Lev Vygotsky, have shared their knowledge on children’s cognitive development. Both psychologists had their own vision of what stimulates and helps a child grow. Jean Piaget s theory was shaped through the thinking and understanding of how knowledge is built through a series of four stages; preoperational, sensorimotor, formal operational and concrete operational. He believe d that the development was with the child themselves. On the contrary, Lev Vygotsky s theory is shaped throughRead MoreComparing Piaget And Vygotsky s Theory Of Cognitive Development813 Words   |  4 Pagesand Lev Vygotsky are considered to be very prominent figures in the area of cognitive development. Both of these men considered themselves a constructivist, which entails a viewpoint that is concerned with the nature of knowledge. In their lifetime, both of them made contributions in the area of education and even after death, their theories still influence teaching methods. The purpose of this paper is to show some similarities as well as differences in the theories of Piaget and Vygotsky and whatRead More Cognitive Theories of Human Development Essay1183 Words   |  5 PagesCognitive Theories of Human Development Jean Piaget, known as the most important theorist; started the most comprehensive theory of intellectual development. Piaget was born in 1896, in Neuchatel Switzerland, and lived a full and significant life, he passed away at age 84. His father was a medieval historian, and his mother was a homemaker; she was highly emotional and her behavior disrupted the normalcy of their home. Piaget married Valentine Chatenay, and they soon welcomed three girls;Read MoreSocio-cultural Assessment1369 Words   |  5 Pagesexist. Berger (2005), states that human development results from dynamic interactions between developing persons and their surrounding society and culture. (p.45). Every child is influenced by their own individual socio-cultural and historical environments. Infants are by nature attuned to engage with the social and cultural environment of their family and the wider community they live in. All environments are culturally constructed, shaped by generations of human activity and creativity, and fashioned

Wednesday, December 11, 2019

Risk Management and Information Technology †MyAssignmenthelp.com

Question: Discuss about the Risk Management and Information Technology. Answer: Introduction: Risk is often been termed as the disaster or the malicious activities which is being present as the undesirable form of an activity been occurred. The activity which is being occurred as the vulnerable event and the threats which are being occurred as the expected harm which is being occurred in an organisation which is used to combine all the risks and the threats occurred into an organisation to set the risk for the regret and the remuneration on the probabilities based on expected outcomes. The application used for managing the risks in and organisation to prevent and to overcome from the malicious and harmful activities which mainly affect the main part of an organisation i.e. the whole infrastructure of an organisation (Aubert et al., 2005). The business risk is been linked with the ownership, operational activities, regarding the investment made with involvement of IT in an Organisation. It is usually based on the risks been performed on the on-going basis. It is critical to ex amine the risks and the threats being occurred in an organisation so as to prevent and to continuously process all the business activities. It is the complete approach to all the IT security and the risks management to cover the entire model of the business risks and management that is usually used for the identification of the security-related business to overcome from all the risks and for working on this it is essential to teach the employees working in an organisation so as to have a proper guidance on the security and the main objectives to be worked on and to have a proper security and network architecture (Benaroch et al., 2007). It security allows the clients to update and improve the security risks management and the strategy which is being used for continuing all the organisational activities and use the latest technologies to raise the data information and the protection to mitigate the current risks and threats. The resources which are being used in the organisation to have a strict security measures to prevent and to overcome form all the problems. The inward and outside dangers to the secrecy, uprightness, and accessibility of these assets have expanded. Security breaches in an organisation are the most popular targets that have increased to destroy the IT architecture of an organisation. They mainly target on the business transaction of an organisation, the employee database, client database and organisational personal data. It is essential for every organisation to overcome from the threats and to protect from the intrusions and wrong utilize or divulgence (Benaroch et al., 2006). All the systems of an organisation should be daily or weekly updated and maintained so as to overcome and have the prevention of the systems from the intrusions and the malicious activities. The main purpose of the organisation regarding the IT securities and the procedures is to ensure all the responsibilities of an individual to understand the main scope and the responsibility of employees to be followed for reducing the risks and to take the appropriate actions and the measures to be takes in terms of security policy to protect the organisational resources. IT Security Assessments that incorporate methodologies to administer the ID of and assurance from dangers and vulnerabilities through a successful hierarchical structure, an arrangement of all around reported polices and forms, and a sound security design (Fenz, 2014). The organisational policies specifically focus on the resources being used to overcome from the threats and mainly intend to require the responsibility to the safety measure in a suitable manner. Aztek has the main responsibilities to establish and follow the organisational standards for the information security and the internal controls and planning the disaster recovery plan. It is important for the organisation management to follow the main procedures, guidelines a nd have the proper guidance for performing the tasks regarding security. The Primary focus is been on the information which is kept confidential and reliable for conveying data all through the State (Galliers et al., 2014). The Main Policies and the Procedure to be followed: Confidential Information- Information is based on the performance and the position of a company. The information is strictly based on the job related functions. The confidential information should remain within the organisation it should not cross the boundaries of an organisation. It should be appropriate to prevent from the appropriate transfer of the sensitive and confidential information. The users working for an organisation should follow the required security practices and services by keeping the passwords for the user validating (Glendon et., 2016). Information Content- The essential Information provided should be content based and owned the primary responsibilities of the company to maintain the authentication, integrity and the information provided should be accurate in flow. The target of the owning the information regarding the organisation is to shield the data from coincidental or purposeful harm and also unapproved revelation or use as per the arrangement of the principles. It is essential that all the information content should reflect the actual problems being faced in the company. Access to an Information- Information being used for the accessibility should be in the correct state to form the desired access to information which is responsible for maintaining and holding the current and the accurate access to the employees who are working in the company for performing the security and functions. Imparting the suitable strategies, rules and best practices to the important client, proprietor, or individuals sincerely in charge of facilitating exercises, conceding, in the interest of their organization, client access to framework capacities, and announcing all deviations to the Policy, systems, rules and best hones (Grace etr al., 2015). Information Security- It is essential for the organisation to maintain the security so as to avoid the threats and the risks being affected in an organisation. The information should flow in and to be classified in the well organisational manner for maintain the security. It interprets the confidential information imposing to the rules and regulations and for establishing the classification and the approving the information access. Availability of Information- The availability of information is necessary to hold the responsibility of the client. The access of information is being granted as to follow the required business process to be continued for performing the following operations. The required availability is needed to for flowing of the information regularly, periodically and constantly in an organisation (Hopkin, 2017). IT Control Framework A n organisation framework is used for controlling of the organisation data structure and is which generally categorizes and bring together an organisational controls which are performed internally which are used for practicing and establishing the procedure for creating the business and reducing the business risk. The fundamental goal for having a system set up is to help the convergence between the operations and control execution. Various standards and frameworks have developed to meet the essential requirements of an organisation. The Control framework is been designed to ensure that the threats or the risks should be reduced by having a proper design in an organized form for having the proper implementation, testing of a data and monitoring of the systems (Hoyt Liebenberg, 2015). It is essential to have a powerful tool used for implementing the proper framework tool which primarily focuses on the key structures, Business values and processes so as to have the proper concept on internal control. It is the process which is performed in the teams or by the individuals for the dynamic learning for having a proper knowledge. The IT control Framework consider the following aspects which are the core elements of an organisation which mainly includes the administration, resources, structure of a company, its culture, business activities, assigned tasks, etc. so as to meet the organisational objectives. It is totally dependent on the individual belief or the ethical values which is essential to be followed by the employee for the organisational standards. It plays a vital role for controlling, identifying and mitigating the risks so as to have a continuous flow of business activities. These include the risks which are not only related to the organisational achievements but also with the company specific objectives and goals to the fundamental risks and availability (Jouini et al., 2014). Operations in outsourcing key IT functionality in risk management The company conduct business and rely on Information Technology for accessing large market research databases and finding new consumers .whereas some other companies transfers IT assets to third party vendors that helps the company to build safe It culture and ensures that an organization remains in competition without losing ground. The outsourcing is practiced now for many years and earlier this was named as facilities management. IT outsourcing is basically a long term contract between a vendor and a consumer where vendor helps consumer in organizational operations. These employees working in an organisation provide the control, operate, maintain or manage the customers information systems such as in equipment network and applications systems which is present either on customer or a vendors side. In such relationship the equipment involved maybe owned by the vendor or the customer. In this process customer finds a suitable vendor for their IT operations, then on long term contract is established between a vendor and a customer with a condition of not leaking the information that is outsourcing is done by non-information systems but information systems is an integral part of it. This service is a mission critical service where Information systems security is an important part of an outsourcing (Bahli Rivard, 2003). The main Principles used for controlling the framework Purpose- The framework should be designed to have a proper modelling of an organisation and have the main purpose or designing so that the risk should not take place in an organisation. Commitment- The employees working in an organisation should understand the main aim and align as individuals to follow the organisational identities and the ethical values. It can include the ethics regarding the organisation, integrity, policies regarding human beings, responsibilities, accountabilities and the mutual trust which should be maintained in an organisation. Capability- The employees working currently should be equipped with the resources being utilised in the company and have the proper competence to understand the requirements of the control model. It includes various tools and skills for accessing of information and controlling of activities. The capability totally depends upon the training and the awareness being made for contributing into all the business activities (Lam, 2014). Action- It is based on the actions being performed so as to overcome from the risks and threats according to the framework being designed and to initiate the action plan during emergency. Monitoring- It is essential for all the employees working in an organisation to monitor the problems being made and based on the internal and external environments of an organisation. It is essential to make the inspection, supervising and examining to the situations being raised so as to methods and the strategies should be implemented to overcome from all the situations (Larson Gray, 2013). Data Security in an Organisation Data security is the most essential part of an organisation. IT is the major issue which is generally been faced by all the organisations to have a proper security of a database. For this it is important to use the latest technologies for securing and ensuring the data to be secured to every business operations. It is also known as the backbone of an organisation which mainly holds the database of the clients, the users, information of employee, financial data of the customer as well as companies data. Data security is the most important asset of an organisation. It is the process of an organisation where the data is been securely placed and unveiling the data security as the most complex one. In todays scenario the data is been moved freely within the corporate networks, the main impact arise from the mobile devices and from the clouds storage which has the increasing power in the rapidly evolving threats. It is the organisational infrastructure which mainly aims to expand the needs of an organisation by using the new technologies and services which is being used for initialising the tasks and activities. Mainly the company should aim to organise and manage the significant tasks of data security and risks for the data security (Laudon Laudon 2016). Managing of the data security form the remoteness is not the option left or simply accessing to the various security tools which is not sufficient with the risks and the threats evolving in an organisation. To implement the data security risks, it is essential to successfully address and cope with the data security risks, company follow the important approach for data centric so as to keep the main concepts in mind. To manage the risks been associated within the organisation in todays environment, company have the data centricity approach for valuing the important data of the business, which makes it important to implement the information security. Using all these approaches the company is in the successful phase to overcome from all the risks and threats being affected in the company (McNeil Embrechts, 2015). Ensuring Data Security Accountability- It is necessary for an organisation to assure that the workforce management have the key responsibilities of an organisation to be aware from the threats and risks. The classification of the data should be made so as to be understood by the people working in an organisation to easily understand the difference. The classification of the data includes the Data Confidentiality The Internal data which is been sent to the other management within the same organisation. General Data The data which is to be shared with the other networks. Network Services and the Policies been Govern- It depends upon the capability of the company that how the company handles the issues being placed like IP address configuration, and remote accessing of the data. It mainly covers and ensures all the security policies and its main components regarding the Intrusion Detection System. Scanning for Vulnerabilities- It is important for n organisation to find out the vulnerabilities in the company and its IT infrastructure. For avoiding all this company should have a routine checking of its networks regularly to overcome from the risks. Managing Patches- The implementation of the code should be done for eliminating the vulnerabilities to protect against the Threats. System Data and its Security- It is necessary to maintain the servers of the organisation so as to continue performing the operation in the systems with the data security policy. Rules and regulations made regarding to the server systems that are implemented on the company networks and should have the accounts and the passwords must be clearly defined (Olson Wu, 2015). It is the process from migrating of the database from one source to another by transferring of the entire data between the computer storage and the types of file. The data is been migrated for the variety of the reasons which initially tend for including the storage devices or server storage. Migrating of the database is the most important activity of all the organizations. It helps in moving or copying of the data from one source to another. Aztek Company, copy and move their whole organisational data from 1 source to another for keeping the security maintained. It is the key component of all the states which helps in mitigating the risks within the each component of a migration (Schwalbe, 2015). The four basic components of migrating of the database: Infrastructure of networks: It mainly includes the various servers, firewalls and the system security software tools used for maintaining the proper IT infrastructure so to keep the database maintained and secured form the threats. Databases: Their typical products which is being used for storing the database from one system to another system using various technologies. There are various software tools used for typical products for entering into the low risk entry points when the migration is be consider. Third Part Applications: This is being used for the involvement of the Third Party application which has the low risk migration products to be used or run on the multiple platforms. Custom Code: The different Scripting languages are used for creating thousands of applications which company uses to run the critical applications which may sometimes rise the risks or some malicious activity takes place because the applications which are being used is not meant for the target (Van De Walle et al., 2014). Strategies Used for Mitigation Reasonableness -A Company is not dealing with each conceivable hazard in light of the fact that not all the hazard is sensible to oversee. It is essentially the test that can be connected to decide if the hazard can be controlled. It is gotten from the sensible individual standard in law. Balancing Risk and Cost-The cost charge to oversee or control the hazard must be adjusted against the effect esteem. The cost is essentially adjusted by its real fiscal esteems in the event that they are accessible in an organisation (Webb et al., 2014). Perceptions made on the Threats- In staff not all the perfect individuals will comprehend the danger to an organization's if chance isn't overseen. A standout amongst the most difficult errands with the compelling danger administration is to accomplish an appropriate harmony between the security and ease of use. Stability in security and its Usability-One of the testing errand with compelling danger administration is to accomplish an appropriate adjusting of framework convenience and security. Techniques used for Risk Identification-It is essentially to learn and distinguish the dangers happened. Misfortunes are happened for the most part when the risk is been detected. There are 3 stages: Identification to the Malicious Activities Performance and the Calculation Performed to the livelihood Identification to susceptibilities (Willcocks, 2013). Database Security Best Practices of Aztek Organisation It is very essential to protect the confidential data, Integrity and Availability of the informational security. The best practices are made on: It is essential to ensure the database administrators to understand both the business value as well as the certifying the databases which are secured so that the various resources used for securing the database can be properly maintained. It is important to parameterize the queries made on the database so as to detect the malicious activities which intend to harm the database of an organisation. They make the analysis using the static code tool used for an organisation and developing of the various applications for the database which arises the mis-configuration issues. It is necessary for maintaining of an organisational database; the database should be up to date, removing an unwanted data, it is essential to ensure the confidentiality, integrity and the availability of the databases. To maintain the services and have the important features to work smoothly with the databases. The Database should be kept on updating so as to reduce the redundancy or the duplicate data of an organisation. To provide and maintaining the availability uses of the data so as the data should not be lost due to power cuts or UPS is down, to ensure and keep in mind that during the shut-down process the data is not loss. Data masking allows the accessibility to the users to access to the certain information so as to continue process the business operations like the credit card processing, testing and maintenance of the database. It mainly helps in data confidentiality. Conclusion It is essential in todays scenario that the companies are mainly affected from the risks, threats or any malicious activities have taken place in an organisation. To overcome from all these situations it is necessary to deal and mitigate the threats which are affecting to the Organisation. For keeping the business safe from all the harmful activities it is essential to control all the risk by following the various policies, procedures and the set of rules within an organisation so as to be aware of the risks and can be cured soon. The company should use the latest technologies and the software tools so as to be aware from the risks. Company should have a proper action plan and its strategies used for implementing in the business activities so as to avoid risks in the near future. References Akintoye, A. S., MacLeod, M. J. (1997). Risk analysis and management in construction.International journal of project management,15(1), 31-38. Alhawari, S., Karadsheh, L., Talet, A. N., Mansour, E. (2012). Knowledge-based risk management framework for information technology project.International Journal of Information Management,32(1), 50-65. Aubert, B. A., Patry, M., Rivard, S. (2005). A framework for information technology outsourcing risk management.ACM SIGMIS Database,36(4), 9-28. Bahli, B., Rivard, S. (2003). The information technology outsourcing risk: a transaction cost and agency theory?based perspective.Journal of Information Technology,18(3), 211-221. Bandyopadhyay, K., Mykytyn, P. P., Mykytyn, K. (1999). A framework for integrated risk management in information technology.Management Decision,37(5), 437-445. Benaroch, M., Jeffery, M., Kauffman, R. J., Shah, S. (2007). Option-based risk management: A field study of sequential information technology investment decisions.Journal of Management Information Systems,24(2), 103-140. Benaroch, M., Lichtenstein, Y., Robinson, K. (2006). Real options in information technology risk management: An empirical validation of risk-option relationships.Mis Quarterly, 827-864. Fenz, S., Heurix, J., Neubauer, T., Pechstein, F. (2014). Current challenges in information security risk management.Information Management Computer Security,22(5), 410-430. Galliers, R. D., Leidner, D. E. (Eds.). (2014).Strategic information management: challenges and strategies in managing information systems. Routledge. Glendon, A. I., Clarke, S., McKenna, E. (2016).Human safety and risk management. Crc Press. Grace, M. F., Leverty, J. T., Phillips, R. D., Shimpi, P. (2015). The value of investing in enterprise risk management.Journal of Risk and Insurance,82(2), 289-316. Hopkin, P. (2017).Fundamentals of risk management: understanding, evaluating and implementing effective risk management. Kogan Page Publishers. Hoyt, R. E., Liebenberg, A. P. (2015). Evidence of the value of enterprise risk management.Journal of Applied Corporate Finance,27(1), 41-47. Jouini, M., Rabai, L. B. A., Aissa, A. B. (2014). Classification of security threats in information systems.Procedia Computer Science,32, 489-496. Lam, J. (2014).Enterprise risk management: from incentives to controls. John Wiley Sons. Larson, E. W., Gray, C. (2013).Project Management: The Managerial Process with MS Project. McGraw-Hill. Laudon, K. C., Laudon, J. P. (2016).Management information system. Pearson Education India. McNeil, A. J., Frey, R., Embrechts, P. (2015).Quantitative risk management: Concepts, techniques and tools. Princeton university press. Olson, D. L., Wu, D. D. (2015).Enterprise risk management(Vol. 3). World Scientific Publishing Co Inc. Pritchard, C. L., PMP, P. R. (2014).Risk management: concepts and guidance. CRC Press. Rainer Jr, R. K., Snyder, C. A., Carr, H. H. (1991). Risk analysis for information technology.Journal of Management Information Systems,8(1), 129-147. Schwalbe, K. (2015).Information technology project management. Cengage Learning. Talet, A. N., Mat-Zin, R., Houari, M. (2014). Risk management and information technology projects.International Journal of Digital Information and Wireless Communications (IJDIWC),4(1), 1-9. Torij, H. W., Venekamp, A. A., de deGroot, N., Bonsel, G. J. (2016). Vulnerable pregnant women in antenatal practice: caregiver's perception of workload, associated burden and agreement with objective caseload, and the influence of a structured organization of antenatal risk management. Van De Walle, B., Turoff, M., Hiltz, S. R. (2014).Information systems for emergency management. Routledge. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102. Webb, J., Ahmad, A., Maynard, S. B., Shanks, G. (2014). A situation awareness model for information security risk management.Computers security,44, 1-15. Willcocks, L. (2013).Information management: the evaluation of information systems investments. Springer.

Wednesday, December 4, 2019

Picture Of Dorian Gray Essays (833 words) - English-language Films

Picture Of Dorian Gray Art, what is Art? It is an ambiguous matter: without an exact form, an exact meaning. Does it have any rules or restrictions? However, it can be a great influence on the lives of people. In the novel, The Picture of Dorian Gray, two lovers have fell in and out of love due to Art! Dorian Gray found Sibyl charming because of her Art! She has not merely art, consummate art-instinct in her, but she has personality also; and you have often told me that it is personalities, not principles, that move the age (63). Sibyl is an actress. She is formed by others: no self is without external influence. Therefore, Art that expresses the self is less valuable than art which expresses the influence of others. The special thing that made Dorian mad about her is that she is more than an individual. I (Dorian) have seen her in every age and in every costume. Ordinary women never appeal to one s imagination. No glamour ever transfigures them (59). By imagination that Sibyl has the power to arouse, she can be of any characteristics. Art has no set form, but the purpose of art is to give form to feeling. Now, Sibyl is a person that is able to provide all kinds of feelings that Dorian wishes to experience. Dorian finds extreme pleasure in experiencing through all the sentiments that Sibyl gives. Being a spectator to the different lives and stories amuses Dorian: one evening Sibyl is Juliet, next evening she is Imogen, another night, she is Roselind. Art is something that arouse imaginations, imaginations of the viewer. In order for imagination to live, reality must not exist. She regarded me merely as a person in a play. She knows nothing of life (61). Art is not real , or, rather, it forms its own type of reality, its own world. Kbefore I knew you (Dorian), acting was the one reality of my life. It was only in the theatre that I lived. I thought that it was all true (95). Before Sibyl fell in love with Dorian, she lives in a world or Art, a world of imaginations. That great pureness of Art is so powerful that she can spiritualize her audiences, and give them a soul if they lived without one, create the sense of beauty in people whose lives have been sordid and ugly. Art has the power to bring people into a place where they have not been, or a place that they don t have the opportunity to go to in the reality. Dorian has realized, I love acting. It is so much more real than life (88). Real life is so limited as to in acting, a man can live any scene that he can possibly think of. Dorian s rejection of Sibyl came upon one night that Sibyl has lost her magic. A night that her acting lost the power to attract and charm the audiences. Good artists exist simply in what they make, and consequently are perfectly uninteresting in what they are (64). That night, she spoke the words as though they conveyed no meaning to her Kshe was absolutely self-contained. It was simply bad art. She was a complete failure (93). Sibyl has become herself! She has gotten out of the world of imagination into the real world, into what she is, herself! Sibyl s mind is occupied by Dorian. You are more to me than all art can ever be (96). Now, all the wonderful influences that Sibyl had, have been wiped out, but the influence of Dorian Gray. She tried to show Dorian of her love for him, but as the author of the book mentioned in the Preface, No artist desires to prove anything. Sibyl is no longer an artist. There is no more imagination for she is a person, an individual now, a Sibyl that is in love with Dorian, and Dorian only. There is no more curiosity that Dorian can have of her. You have killed my love (96). Dorian didn t loved Sibyl, he loves Art! How little you can know of love, if you say it mars your art! Without your art you are nothing (97). Anything without Art is plain to Dorian. Dorian s philosophy of Romance is consist of infinite imaginations, beauty, personality, and attraction of curiosity, --which is Art. Dorian have found so much imaginations to Sibyl as she acted in Shakespare s play, but how come he could

Wednesday, November 27, 2019

Quality of Life in Contract Security

Introduction A contract security company, such as G4s and Walden, should have an effective framework that deals with critical issues experienced by employees. This may include wages, union representatives, job placement, and pension, among others.Advertising We will write a custom proposal sample on Quality of Life in Contract Security specifically for you for only $16.05 $11/page Learn More According to Schermerhorn, Osborn, Hunt (2000), a vast majority of the contract security companies is faced with a dilemma when it comes to highlighting the key issues affecting the quality of life of their employees. This necessitates the need for reorganizing the duties in a manner that allows the employees to reap benefits for working in such companies. However, the implementation of a successful management system calls for a framework that is time consuming because it entails a thorough assessment. Despite the time constraints, the success of a contract security company necessitates a fair job placement since it acts as a function of motivation and ability (Pattanayak, 2005). Ability, in this case, is defined as a process that highly depends on education, training, and work experience of the employees. Although employee motivation poses a challenge for the contract security companies, low employee motivation can be devastating because it can lead to a decrease of employees’ quality of life, thus affecting productivity of the company (Podmoroff, 2005). Therefore, it is rational for the contract security companies to carry out a research proposal that aims at assessing what is needed from the upper management or the company as a whole in order to provide the employees with a suitable avenue for a good workplace environment. Jusification The study of job placement is of paramount importance in management because it seeks to highlight the factors affecting employees and the organizational performance.Advertising Looking for proposa l on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Hertzberg theory, job placement influences organizational behavior; therefore, jobs should have ample challenge to exploit the full potential of a given employee (Podmoroff 2005). This topic is imperative because it is congruent with my area of professional interest [Manager] due to the following reasons: It will facilitate definition of roles that have the capacity of enabling the employees to exercise their own judgment and free with respect to their career path; It will meticulously evaluate and criticize the most acceptable job placement that gives rise to working in a cohesive manner in a contract security company; It will facilitate an establishment of a theoretical framework that is able to assess the most satisfying job placement strategy that would benefit the employees and the contract security company as a whole; Podmoroff (2005) alleges that a fair job placement highly initiates deep behavioral changes and counters employee dissatisfaction. Therefore, this proposal will primarily concentrate on critically evaluating the literatures on the subject in order to supply answers as to what extent job placement is applicable to providing quality life for employees working for contract security companies. Literature search and academic context The G4S Company in U.K. carried out a research study and attributed the white color crimes to erroneous job placement (Dismore, 2009). As a result, the company came up with a risk management’s vetting process that seeks to carry out regular ethical tests for job placement. In doing so, the company speculates that the level of crime within the company will reduce significantly. This highlights that the company puts much emphasis on assessing the employees’ ethical behavior while handling job placement and fails to highlight other factors that motivate employees working in such an o rganization. Therefore, it is imperative for this proposal to assess whether there are other factors that the employees deem relevant in job placement. In the contract security firms, the issue of employee motivation and morale is often put at a minimal level. To be able to provide a comprehensive overview on the research topic, theories and concepts relating to job placement in a contract security companies will be analyzed. Furthermore, the ideas presented in the academic literature regarding job placement will be reviewed. The authors and the academic ideas that will be used include the following: Pattanayak’s works that reveals employee motivation through Adam equity theory. His book will be used in this research to highlight the definition of job equality within an organization. This book is crucial since it holds the fact that increased motivation through fair job placement leads to increased profitability and productivity. Podmoroff’s works that reveals employe e motivation through Hertzberg’s theory. Her book will be used in this research to explore the extent to which employees can be motivated by job enrichment as well as job rotation. This book is crucial since it holds the fact that productivity cannot be achieved without providing quality life to employees through work challenges. Green’s works that reveals employee motivation through expectancy theory. His book will be used in this research to assess the factors that motivate each individual in an organization, as well as to find the root cause of dissatisfaction amongst the employees. This book is crucial since it endeavors to provide quality life to employees by practicing effective job placement during the recruitment process. Method The Aim of the Research The employees of the organization should serve as the main source of data since they help to provide insight on various challenges that they encounter while handling their day-to-day tasks, as well as while coll aborating with the other workers in an effort to achieve the organization’s objectives.Advertising We will write a custom proposal sample on Quality of Life in Contract Security specifically for you for only $16.05 $11/page Learn More The employees will aim at revealing the impact of job placement in contract security companies. The descriptive case study will involve causal investigation of the research problem by involving all the departments within the contract security companies. The main purpose of this research is to investigate the effects of poor job placement on the overall quality of the services provided. Therefore, the researcher will be obligated to take the approach of finding out the role of human resource management in job placement. The study will use questionnaires and interviews as the data collection methods, and it will analyze the data using SPSS database system. The SPSS will help to calculate the descriptive statistics and to tabulate the data using the appropriate graphs. The program will seek to examine the relationship between company’s productivity and job placement. As such, the research study will answer the following questions: Is the overall quality of services provided by contract security companies affected by job placement that only takes ethical behavior as a key consideration? What are the main problems that prevent workers from different departments within the company to work harmoniously? How do the veteran workers in contract security companies react to the entry of new workers? What approaches, concepts, or theories should the human resource managers adopt to promote provision of great quality services? Does a good human resource management add to the quality of services provided by the employees of the contract security firms? Research Design The study will use both quantitative and qualitative designs, with a set of dependent and independent variables. The independent vari able will include employees’ attitude on the current job placement criterion, while the dependent variable will include the impact of quality of life of the employees on productivity of the contract security firms. The validity and the reliability of this design will be carefully identified in order to ascertain that the study holds a clear objective in answering the research questions. The study will be conducted for a period of 2 weeks, and all answers to the survey questions and interviews will be reviewed at the end of the study. The qualitative measures will emanate from textbooks that are grounded with theories of organizational behavior, which include high quality primary and secondary sources. The selection will be done in a manner that interconnects all the theories of organizational behavior. For this reason, the study will facilitate an effective analysis since it will create room for understanding job placement as a motivator in contract security companies.Adverti sing Looking for proposal on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The quantitative measures, on the other hand, will emanate from a sample size of 400 employees from the contract security companies across the country. The study will be designed in such a way that it will provides an effective analysis of the content in the textbooks as well as provide significant results of data obtained from the ethnography study. In addition, the sample size for the quantitative design will be based on probability-based sampling in order to ensure that participants from various contract security companies are equally represented. This will be followed by an affirmation of anonymity rights of confidential information. The Anticipated Outcomes The results are expected to be consistent with Green (2001) findings: that employees’ job satisfaction and their job placement will have a positive correlation. The study is expected to re-examine the effectiveness of job satisfaction to contract security companies. The study will show that job placement is an importa nt factor in job performance, and since job satisfaction stems from employee motivation, then motivation is the foundation of positive performance. Therefore, the more workers are satisfied with their work through a fair job placement, the more productive they will be in the contract security firms. It is also expected that employees who feel that the contract security firm exercises unfair job placement will have poor performance, as affirmed by Pattanayak (2005). This will portray that the human resources manager do not apply any concept to promote quality life for the employees. More so, the research study expects to highlight that the subject of motivation continues to be misunderstood and poorly practiced despite having a number of past research studies underlining the issue. Additionally, it is expected that the research study will demonstrate disunity between the workers in different departments, which emanates from lack of equity principle in the job placement. As a result, the veteran workers are expected to alienate the new workers in the company, believing that the inequality principle has been applied during the recruitment process, and thus threatening their positions. As such, individuals that display good level of competence in education and work experience should be encouraged to develop their skills so that they will be of great use to the contract security firms (Podmoroff, 2005). Hence, the best approach to job placement is one that aligns itself to equity principle not only on the ethical sphere but also on education and work experience spheres. Rationale This project is feasible because it will help to find a common ground of motivation through a framework designed for job placement. This will help in building cohesion between employees who share the same views, as well as the employees who share different views. In addition to this, the research will offer some sort of natural support, and this will help the individuals to feel more in co ntrol of their emotions through dialogue during the interviews session. Therefore, this research will be successful in achieving its objectives. References Dismore, A. (2009). Any of our business?: Human rights and the UK private sector : first report of session 2009-10. London: Stationery Office Green, T. B. (2001). Performance and motivation strategies for today’s workforce: A guide to expectancy theory applications (4th ed.). Westport, Conn: Quorum Books. Pattanayak, B. (2005). Human Resource Management 3Rd Ed. New Delhi: PHI Learning Pvt. Ltd. Podmoroff, D. (2005). 365 ways to motivate and reward your employees every day– with little or no money. Ocala, Fla: Atlantic Pub. Group. Schermerhorn, J. R., Osborn, R., Hunt, J. G. (2000). Organizational behavior. New York: Wiley. This proposal on Quality of Life in Contract Security was written and submitted by user Fallen One to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Community mental health act 1963 Essays

Community mental health act 1963 Essays Community mental health act 1963 Paper Community mental health act 1963 Paper Community mental health center act of 1963 was a significant milestone in America’s record of mental health rights. On 31st October 1963, the act was signed into a regulation by President John F. Kennedy. The law was the pioneer among other many federal policy alterations that helped ignite a significant transformation of the communal mental health arrangement by shifting resources outside huge organization toward community-based mental health action line up. The act lead to the increased improvement in the rights and treatment options for youth, children and  adults living with mental sickness, though full guarantee of community-base concern has not been fully captured. This paper seeks to explain the rationale of community mental health center act of 1963. President Kennedy referred to the law as a bold new approach and it was the first federal bylaw to promote community-based mental health care. The Act offered donations to state for the building of (CMHC) community mental health centers, special facilities designed for treatment, diagnosis and delivery of mental health prevention to persons living in the community. The centers were built to provide the following indispensable services: inpatient services, emergency services, education and consultation on mental health, outpatient services, partial hospitalization and emergency response. The donations were projected to provide 1500 more community mental health centers across the country (Dolan Powell, 2001). The act was proposed because the country was experiencing an increased number of children and adults with mental illness. In mid-1950’s, over 500,000 adults and children were institutionalized for mental sickness. The public sentiment concerning the system of institutionalization started to transform. People questioned the usefulness of the institutional care. The public criticized that THE COMMUNITY MENTAL HEALTH ACT OF 1963 3 the care centers did not treat patients holistically while others said that the centers worsened the patient’s mental status. In addition, the increased awareness of the appalling conditions in several psychiatric hospitals made mandatory for these centers to implement better treatment options for these patients. The president proposed the community mental health act because of the  intensified pressure from the general public demanding changes in the public mental health system (Hill, 1963). These institutions had few and under skilled staff to cater for the large number of patients. Thousands of patients were living in these institutions for long periods without care of treatment. For example, the standard period of stay for a patient suffering from schizophrenia was 11 years. The act was vital to the people with mental illnesses who were housed in these places for long periods of time before being able to move back into a community setting. The act drastically changed the delivery of mental health services and brought about a change in public opinion about the mental health concern. The development of effectual psychotropic medications and new practice in psychotherapy made society-based concern for individuals with mental illnesses a realistic solution. This gave people awareness that mental sicknesses could be treated more successfully and in a less expensive way rather than the customary psychiatric hospitals. The act led to development of wide-ranging community mental health centers all over the country. People came to acknowledge the need for more treatment alternatives for addiction disorders, as services delivered to the mental ill patients became assorted and widespread. The decree came to fruition by a key study of the care of patients with mental sickness during President Eisenhower’s reign, and led to a report in 1961. The 1961 report was referred as Joint THE COMMUNITY MENTAL HEALTH ACT OF 1963 4 Commission on Mental Illness and Health: Action for Mental Health. President Kennedy signed the Mental Retardation Facilities and Community Mental Health Centers Construction Act of  1963 just 23 days before he was assassinated in Dallas. President Kennedy said, â€Å"The law facilitated various positive transformations for millions of Americans: the deinstitutionalization of mental health concerns and the construction of community mental health centers all over the United States, advance research grant, increase consideration to the requirements of those with mental illness, educate medical doctors and supplementary mental health experts in community-based care, instruct about the significance of working in an interdisciplinary approach to serve patients and families, and merge social,  environmental and mental aspects to help in the recovery of patients. † The president proposed the act to help in the inauguration of a wholly innovative emphasis and manner to care for mental ill patients. The system would make use of new drugs obtained and manufactured in current years for faster and appropriate treatment of mentally ill persons and return them to a useful state in society. The act was projected to help many mentally ill patients since it will help them remain in their homesteads without causing hardship to them as well as their families. The main objective of the act was to cut down the institutional population. The number of institutions had decreased by 75% by 1980 and the number continued to decrease gradually. There were about 55,000 institutionalized people in 2000 which represent less than 10% of the institutions in mid-1950’s. The change was especially prominent among youth and children. The institutionalized population had decreased by 98% by 2009. Despite this advancement, the public mental health systems significantly failed to provide adequate resources THE COMMUNITY MENTAL HEALTH ACT OF 1963 5 and staff members to support and treat persons at home and in the community-based settings. The service arrangement in many societies continues to be insufficiently intensive and comprehensive to handle the number of adults and young people who return from institutionalized centers. Through proper scrutiny to the public mental health systems, they were critically understaffed and underfunded and this continues until now (Hill, 1963). The people with mental illnesses struggle to stay in their societies in a safe manner due to inadequate support and service. The symptoms of a society lacking enough public mental health system include suicide, substance abuse disorders, increased risk of homelessness, and  incarceration among mentally ill persons. Juvenile justice professionals said that more than 70% of detained youth suffer from a mental disorder and 20% have a serious mental illness. In the recent past many families are take their children to child welfare and juvenile justice systems so that they can access mental health services which are inadequate in the community (Engdahl, 2010). In conclusion, the promise of the Community Mental Health Act has not been understood. The closure of institutions without intensifying community-based services and funding has led to severe hardships on many mentally ill patients. However the elementary principles of community care welcomed in the Act offered the foundation and vision for considerable progress. There is a lot to be done to realize the full promise of the Act to the community. In order to provide treatment and appropriate services to mentally ill patients it is vital to add a number of staff, train the staff and provide adequate funding to ensure proper running of the system. THE COMMUNITY MENTAL HEALTH ACT OF 1963 6 References Community Mental Health Act. (n. d. ). The National Council Community Mental Health Act Comments. Retrieved July 1, 2014, from thenationalcouncil. org/about/national-mental-health-association/overview/co mmunity-mental-health-act/ Dolan, B. , Powell, D. (2001). The Mental Health Act explained (2nd ed. ). London: Stationery Office. Engdahl, S. (2010). Mental health. Farmington Hills, MI: Greenhaven Press/Gale Cengage Learning. Hill, J. L. (1963). Mental retardation facilities and community mental health centers construction act of 1963. May 21, 1963. Ordered to be printed. Washington, DC: [s. n. ]. THE COMMUNITY MENTAL HEALTH ACT OF 1963 7 Kemp, D. R. (2007). Mental health in America a reference handbook. Santa Barbara, Calif. : ABC-CLIO. Mental health systems act: report. (1980). Washington: U. S. Govt. Print. Off.. PsychiatryOnline | Psychiatric News | News Article. (n. d. ). PsychiatryOnline | Psychiatric News | News Article. Retrieved June 30, 2014, from http://psychnews. psychiatryonline. org/newsArticle. aspx? articleid=1769257 The Community Mental Health Act of 1963. (n. d. ). youngmindsadvocacy. org. Retrieved July 2, 2014, from youngmindsadvocacy. org/the-community-mental-health-act-of-1963/ The Community mental health centers act (1963): a commentary.. (1965). Bethesda, Md. : Public Health Service, National Institute of Health :.

Thursday, November 21, 2019

Use sociological theory to discuss and analyse the future effects of Essay

Use sociological theory to discuss and analyse the future effects of globalisation on developed and developing societies.(essay1500-2000 words) - Essay Example ise economic system dominated by supranational corporate trade and banking institutions that are not accountable to democratic processes or national governments.† (Rosenberg 2000) defines â€Å"The term ‘globalisation’ after all, is at first sight merely a descriptive category, denoting either the geographical extension of social processes or possibly, as in Giddens’ definition, ‘the intensification of worldwide social relations’.† According to the (World Bank Brief 2000) globalisation gained pace in the 1980s and 1990s, with the advancements in information technology, transportation and global communications. These include improved telecommunications, the Internet and faster world travel, to name a few. These technological improvements enabled people to transport goods, services and knowledge, faster, farther and more reliably. Governments have also adopted more open policies that allow for closer international economic cooperation. Supporters of globalisation claim that its goal is to reduce poverty worldwide. Supporters point out that despite the world population increasing from 1.8 billion to 6.0 billion, with the presence of political and armed conflicts, the real average income of each individual today is five times more than it was at the beginning of the century. However, globalisation also revealed vulnerabilities, which raise concern among both developed, and developing countries. If there is global reduction of poverty, it has also produced problems for its players. (Giddens 2001) states that, â€Å"Globalisation is not an ‘out there’ phenomenon, as if some external forces are at work. September 11 showed that it’s an ‘in here’ phenomenon†. He emphasized that globalisation is not a product of external factors, but also occurs within nations. â€Å"With interdependence comes vulnerability, a shift in our institutions, our emotions, our anxiety†¦Ã¢â‚¬ , he stressed (Giddens 2001). (Giddens 2001) stated that tradition in early modernity

Wednesday, November 20, 2019

The Cold War and American Foreign Policy Essay Example | Topics and Well Written Essays - 1000 words

The Cold War and American Foreign Policy - Essay Example Two names more important than perhaps any other in terms of The United States foreign policy and its impact, position and effect in the Cold war are those of Paul Nitze and George Kennan, senior officials in the American administration, with sharply contradicting views and positions of strategy. Each had a highly contrasted sense of policy from the other, in terms of how the United States should take a stand towards the Cold War and what would be the most favorable policy for their victory and the Soviets’ defeat. These views and the lives of these two men are outlined in Nicholas Thompson’s book, The Hawk and The Dove, and are investigated in the paragraphs to follow, along with the question of who influenced American foreign policy more favorably and what effect it would have on the ultimate result of the Cold War. To outline their most fundamental disagreement in a nutshell, one believed in prevention and the other believed in action. One of them, Nitze, believed the ir strategy should be to surpass any limits of capability the soviets may hold them responsible for and then act on them, while the other, Kennan, believed to think like the soviets would, try to analyze their intentions and then counter or contain them until they themselves internally collapsed, known as his policy of containment. Kennan, who believed in the latter, was of the belief that the soviets were fundamentally weak and insecure and that it would not take much for them to collapse, assuming they were handled correctly. Nitze on the other hand was of the opposing view that the Soviets were fast gaining power and that Moscow would attain strategic superiority from the United States in a few years, which he hoped to counter before it occurred. Where Kennan believed that it just took to understand the Soviets’ intentions and thoughts to end the cold war, Nitze believed it took to understanding and surpassing their every capability. To understand how fundamentally differe nt the two men were, it is of interest to note that foreign policy aside, they even differed on their own country: Kennan condemned America for its vulgar culture, and its people for having a complacent and mediocre standard. Nitze on the other hand was convinced of America’s power and central hold on the world. Therefore, given their completely contrasting view, one ready to take the back-seat and one ready to accelerate with full force, they can both be said to sum up the two sides of a generation’s argument on the Cold War and America's foreign policy regarding it. Of course there were also many incidents where the two men, who were close friends, did agree, such as the Marshall Plan, or their stance on the American position in Vietnam, in which cases they tended to prove that they were quite correct in their judgment and often received favorable reaction. Nonetheless, those few times aside, they had different viewpoints at a primary and fundamental level, thereby m aking it more likely for them to disagree than agree. These differences however did not prevent them from seeking mutual benefit from each other’s policies. For example, Nitze extracted military benefit from Kennan’s theory of containment, by negotiating deals with Soviets regarding the United States military, and by keeping the military and its allies safe. Kennan on the other hand enjoyed a certain level of military and otherwise superiority from which to excise his policy of containment, thereby proving that each was necessary factor in American policy on the Cold War and that while each contradicted each other, it did not necessarily mean that they clashed with each other. Where the differences in their thinking arose from is of no mystery, as it was indeed early experience in the lives of both these men that were to shape them for the rest of their life. One’s experience with the Cold War, Nitze's, consisted of dealing with the live aftermath of a Nuclear W ar, on the scene

Sunday, November 17, 2019

What is disabled Assignment Example | Topics and Well Written Essays - 250 words

What is disabled - Assignment Example Under ADA, disable may refer to a physical or mental impairment that may have a major effect on the major life activities of an individual (Blanck 17). To this respect, it is worth noting that either those individuals with previous record of such impairment or those regarded as having such impairment are covered. Reasonable accommodation refers any changes made to either a job or any other thing that is done in order to allow an individual with any disability to be able to not only apply for a job, but also enjoy equal access to the various benefits that are available to other employees at the workplace (Blanck 19). The fact that the employee has documentations from his doctor that he is medically obese and the fact that HR has qualified the employee as qualifying for reasonable accommodation under ADA implies that there is no need to get someone else to run warehouse errands for him since he is still able to perform the various essential functions of the job in question. In the case of Maryline, the fact that she has worked with the company for long and that she uses a wheelchair, then the employer’s obligations under title I requires that the employer provide access for an individual employee with a disability to perform the essential functions of his/her job which may include access to a building like in this case. When accommodating employees, it is not required that an employer makes its existing facilities accessible until a particular applicant or an employee needing such accommodation which will thus necessitate modifications that meets the work needs of the affected individual. In general however, it is expected that employers consider initiating changes that enables general accessibility though they are not required to provide access in places or facilities that need not to be used for benefits or activities related to

Friday, November 15, 2019

Patient Protection and Affordable Care Act Debate

Patient Protection and Affordable Care Act Debate Eunae Jeong Patient Protection and Affordable Care Act should continue When people heard the news that the first patient with the Ebola virus arrived in Dallas, they were frightened by not only panic about the Ebola virus itself but also by fear that someone in the early stage of infection might not see the doctor because of the enormous cost of health care. In March 2010, President Barack Obama signed into the law the Patient Protection and Affordable Care Act (PPACA) or obamacare. It is the United States’ first health care reform since legalization of Medicare in 1965. Provisions of PPACA include that, in brief, all Americans should buy health insurance from the Health Insurance Marketplace in their state. Another provision states that the federal government should support insurance exchange’s financing (â€Å"Patient Protection and Affordable Care Act (PPACA)†). PPACA needs to continue because through the implementation of this Act, people with pre-existing conditions as well as a lot of uninsured people can be aided, and the bud get for Medicare can be reduced at any time. Although there are many opposing views on PPACA, the implementation of PPACA has to be supported because of its clear advantages. For example, imagine that there are a man with type I diabetes, which developed when he was young. To manage type I diabetes, periodical injections of insulin are needed. This means that he needs to visit the doctor to get insulin throughout his life. The cost of insulin depends on insurance coverage. If he tries to apply for insurance in this situation, the insurance company will decline his application due to he has a pre-existing condition. The reason why he is worried about this problem is that he is an American. Fareed Zakaria reports that other countries, such as Switzerland or Taiwan, support their people’s universal insurance independently of pre-existing conditions (22). This is possible because the government, not private insurers, provides the coverage (22). Before PPACA came to the front, Americans had to be anxious about the United Stat es’ terrible health care support system. To address this issue, PPACA prohibits that insurance companies deny an application on account of applicants’ pre-existing conditions (â€Å"Patient Protection and Affordable Care Act (PPACA)†). Also, another benefit of the program is that the uninsured Americans can be aided by expansion of PPACA. With the implementation of PPACA, they can have opportunities to get medical service when they require it. According to the article written by Leonard Zwelling, for example, 28 percentages of adults, about 6 million people, in Texas are currently uninsured and about 3 million uninsured Texans can get coverage by the implementation of PPACA (13). In addition, because the budget cuts for Medicare are possible if the states’ finances are endangered PPACS should continue. One of key facts that the Obama administration provide PPACA includes current Medicare and has a plan to expand it with states’ cooperation. Uninsur ed adults do not have as much political leverage as wealthier insured citizen who can contribute to political campaign. Therefore, the securing of the budget for Medicare can be threatened easily when there is pressure to cut the budget. â€Å"Already, there are calls for curbing the law’s subsidies that will help the uninsured buy coverage as part of a bipartisan budget deal-an extraordinarily bad idea, given the limited scope of those subsidies.† Clearly, PPACA is required to protect and expand Medicare. / reference: Oberlander, Jonathan, The New England Journal of Medicine. The debating on the implementation of PPACA continues even though PPACA has already begun implementation. Young Americans oppose the implementation of PPACA because they already have health insurance, and they might spend more money if the federal government and states try to expand health insurance. The Institute of Politics of Harvard University questioned â€Å"2089 citizens aged 18 to 29: 56% of those 18 to 24 disapproved of the President’s job performance; 53% of those 25 to 29 disapproved; and 47% maintain they would recall President Barack Obama if that were possible† (Emord, Jonathan W. â€Å"YOUNG AMERICANS TO OBAMACARE: NOT INTERESTED† USA Today, February 2014. 16). They argue that PPACA is primarily attractive to those who have been uninsured in the past and who suffer from chronic or acute and costly diseases. It is likely that only those individuals will sign up for the program. Most of interviewees have already health insurance. They think that PPAC A’s benefits will not affect them because they are already insured by some other way. Instead, those polled might think that they will have to pay the money that allows expanding health insurance through PPACA. Also, because PPACA does not target a specific population, money might be wasted in the allocation of funds in the federal governmental budget for PPACA’s implementation. In his article â€Å"The Future or Obamacare†, Jonathan Oberlander argues that there is no â€Å"clear programmatic identity: unlike Medicare and Social Security, PPACA does not have a well-defined population of beneficiaries, and its benefits are diffuse.† (Oberlander, Jonathan. â€Å"The Future of Obamacare†, The NEW ENGLAND JOURNAL of MEDICINE (2012). Furthermore, Texas and 15 other states assert that PPACA, with expansion of Medicare, should be reconsidered because it will raise state expenses. (Zwelling, Leonard. â€Å"Obamacare: Why Should We Care?† Journal of Oncology Practice Vol .10, Issue 1 (2014). This is the most difficult, prolonged assault, which the federal government and states should overcome for continuous implementation of PPACA. In spite of these opposing opinions, PPACA should continue to go to the fore. First of all, nobody can assure that they will have enough insurance when they will need health care. In 1963, Kenneth J. Arrow wrote, â€Å"UNCERTAINTY AND THE WELFARE ECONOMICS OR MEDICAL CARE†. In his article, Kenneth J. Arrow contended that health care industry could be explained with â€Å"uncertainty in the incidence of disease†. Namely, the reason why young Americans oppose PPACA implies that young Americans are literally young. Current situation can change suddenly; the insurance is for risk and uncertainty. Reference : Kenneth J. Arrow, â€Å"UNCERTAINTY AND THE WELFARE ECONOMICS OF MEDICAL CARE†, The American Economic Review, Vol LIII December 1963 Number 5 941-973. Moreover, PPACA’s ta rgeting to the universal population of the US is not a weak point, but a strong one. There are other countries with universal access and universal insurance such as Switzerland and Taiwan. Their types of insurance are similar to Medicare supplied by their government instead of being supply by private insurance companies. Surprisingly, while the United States spends 17% of its GDP on health care, Switzerland and Taiwan spends 11% and 7% respectively, of their GDP on it. Because PPACA is not completely enacted Act yet, addressing concerns over budget waste and discussing solutions are necessary to make PPACA move forward Reference: Zakaria, Fareed, Time magazine, 3/26/2012. Last but not least, the Federal government, not each state, will support the expansion of PPACA at a 100% level until 2017, a bit less later, then at 90% indefinitely after 2022(Zwelling, Leonard 12). For example, in Texas, for every $1 the state spends on health care for the poor, the US government matches $9 doll ars. This effectively means that, during the first 10 years of the program in Texas (current Medicare program plus expansion) the federal government would increase payments to the Texas health care system by nearly $90 billion, whereas the state of Texas’s share would be $15.6 billion. However, there are no specific plans after 10 years. More patchworks should be added in many holes of PPACA for its sustainable implementation. PPACA is not perfect yet, but its direction is right. Because PPACA can aid people with pre-existing conditions or uninsured people and can support Medicare, which may be endangered. The opponents argue that they have already health insurance, money might be wasted, or state expenses will be increased. PPACA, supported by the federal government, however, can guarantee people’s future health insurance. In the process of the implementation, although waste of the budget can occur, and PPACA does not have enough time to be revised, it can be getting better with continuous debating with many opposing views. Therefore, PPACA needs to go on in spite of several opposing opinions. Works cited Arrow, Kenneth J. â€Å"UNCERTAINTY AND THE WELFARE ECONOMICS OF MEDICAL CARE† The American Economic Review LIII (1963): 941-973. Academic Search Complete. Web. 16 Oct 2014. Emord, Jonathan W. â€Å"YOUNG AMERICANS TO OBAMACARE: NOT INTERESTED.† USA TODAY Feb. 2014: 16. Print â€Å"Health Care that Works for Americans.† the White House PRESIDENT BARACK OBAMA. The government of the United States of America, 2014. Web. 28 Oct. 2014 Levy, Michael. â€Å"Patient Protection and Affordable Care Act (PPACA).† ENCYCLOPAEDIA BRITANNICA. Encyclopaedia Britannica, Inc., 2014. Web. 16 Oct. 2014 Oberlander, Jonathan. â€Å"The Future of Obamacare.† New England Journal of Medicine 367.23 (2012): 2165-2167. Academic Search Complete. Web. 16 Oct 2014. Zakaria, Fareed. â€Å"Health Insurance Is for Everyone.† Time 26 Mar. 2012: 22-23. Print. Zwelling, Leonard, and Hagop M. Kantarjian. â€Å"Obamacare: Why Should We Care?† JOURNAL OF ONCOLOGY PRACTICE 10.1 (2013): 12-14. Academic Search Complete. Web. 16 Oct 2014.

Tuesday, November 12, 2019

Malcolm X :: essays research papers

Malcolm X is born Malcolm Little in Omaha, Nebraska. His life is full of discrimination and racial violence. When Malcolm as a child he moved to Michigan with his family where they continue to experience persecution and violence. White people murder Malcolm’s father and forced his mother into a mental hospital. Malcolm moves to Boston, to live with his half-sister, Ella. In Boston Malcolm quickly becomes involved in urban nightlife. Malcolm was into gambling, drinking, doing drugs, and dating an older white woman, Sophia. He then moves to New York, where he begins working as a hustler in Harlem. Malcolm’s various jobs there include running numbers, selling drugs, and steering white people to black brothels. When life becomes too dangerous is Harlem, he returns to Boston, where he becomes a house burglar and is eventually arrested. In prison, Malcolm transforms himself, converting to the branch of Islam promoted by the Nation of Islam. Inspired by faith, Malcolm stops us ing drugs, he reads voraciously, prays, and studies English and Latin. The prison releases Malcolm on parole. Malcolm rises quickly from the rank of temple assistant in Detroit to the Nation’s first national minister. Malcolm X becomes known throughout the United States, even outside of Muslim circles, as a fiery advocate for black unity and militancy. The Nation of Islam’s leaders resent and fear Malcolm despite his allegiance to their cause, and they suspend him from the organization. The Nation of Islam’s frustration with Malcolm intensifies, and Malcolm begins receiving death threats. After a divisive argument with Elijah Muhammad the leader of Nation of Islam, Malcolm leaves organisation.

Sunday, November 10, 2019

Women Role in Athenian Society

Women†s role in Greece can be seen when one first begins to do research on the subject. The subject of women in Greece is coupled with the subject of slaves. This is the earliest classification of women in Greek society. Although women were treated differently from city to city the basic premise of that treatment never changed. Women were only useful for establishing a bloodline that could carry on the family name and give the proper last rites to the husband. However, women did form life long bonds with their husbands and found love in arranged marriages. Women are â€Å"defined as near slaves, or as perpetual minors† in Athenian society (The Greek World, pg. 200). For women life didn†t extend far from the home, which was thought to be their sole realm of existence. Though they ranked higher than slaves did, they were treated in many of the same ways. Just like slaves, their mothers trained women as adolescents what their domestic duties were. They were secluded from all males, including those in their family. They lived in gynaikeion, which were women†s apartments in Athens (Daily Life in Greece, pg. 55). They were kept at home where they were taught the proper manners and duties of a desirable wife. â€Å"Marriage was the inevitable goal to which her whole life tended. To remain a spinster was the worst disgrace which could befall a woman† (Everyday Life in Ancient Greece, pg. 82). However, it was seen as more of a disgrace on her father who ‘owned† her until she was married. Although Athenian women were completely in charge of their household and slaves, they didn†t have much freedom. They rarely left the house, unless they were part of some sort of religious procession. They could only walk abroad in the streets if accompanied by a slave or other attendant. It was improper for respectable women to share the same social entertainments as men. Even if caught in the courtyard of the house by a male visitor, they would return to the seclusion of their own apartments. Pericles once said, â€Å"it was their business to be spoken of as little as possible whether for good or ill† (Everyday Life in Ancient Greece, pg. 82). This sentiment describes the extent of the importance of women in society. Marriage was their only major role in the lives of men. The betrothal was arranged by the parents as a strictly business contract. The parent†s choice of a suitable groom for their bride was a matter of pride and status for the family. The groom†s choice in bride was largely determined by the amount of dowry the bride would bring with her. Although the wedding was a happy ceremony, it was only the beginning of a woman†s loss of independence. Not only did women possess no independent status in the eyes of the law; she always remained under the supervision of a male. If her husband died, she was returned to her father†s or brother†s home where they would take charge of her. After the wedding, the wife†s duties were centered on the management of the home. She would overlook the slaves, mend and make clothing for her family, usually done by spinning or knitting, weave rugs and baskets for the home, or just fold and refold the clothing kept in the family chest. The wife was also responsible for maintaining her attractiveness for her husband. A proper Athenian wife would adorn herself with jewelry and use rouge upon her husband†s arrival home. Sometimes she might spend an entire evening sitting next to the couch where her husband lay reclining. Most importantly the Athenian women were seen as â€Å"fine upstanding matrons† fit to bear a race of excellent athletes† (Everyday Life in Ancient Greece, pg. 86). An Athenian man married primarily to have children. These children were expected to care for him in his old age, but more importantly to bury him with the â€Å"full appropriate rites† (Daily Life in Greece, pg. 57). Moreover, Athenian men married to have male children in order to perpetuate the family line and guarantee him honors when he died. It was also a large disgrace for a man to be unmarried. Basically, Athenians married not out of love for each other, but for religious and social convenience. All this aside, love was abundant in Greek society. Although love was never a determining factor in marriages, a lifelong bond and devotion developed between a couple as the years passed. â€Å"We know that the Greeks of the fifth and fourth century used the word eros (love) to describe the passion linking a husband and his wife† (Daily Life in Greece, pg. 58). There are many instances in myth and history where husbands and wives in Greek society have sacrificed themselves for the sake of the other. They were bonded together by their love of their family and by their dedication to each other through their family. Women were dedicated to the happiness of their husband and the well being of their children. Men were dedicated to providing for and supporting their family and raising noteworthy children. These common goals brought together the husband and wife like never before. It was this bond that sparked the beginning of a lifelong commitment to one another and the growth of th eir love for one another. Although women were not given formal rights, they were able to find pride and happiness in the mundane applications of their life. Women found pride in their children and satisfaction in their husband†s happiness. I would like to leave you with closing remarks that illustrate the bond between a wife and her husband. â€Å"The greatest pleasure to me will be this, that, if you prove yourself my superior, you will make me your servant and there will be no fear lest with advancing years your influence will wane; nay the better companion you are to me and the better guardian of the house to our children, the greater will be the esteem in which you are held at home; and all will admire you, not so much for your good looks as for your good deeds in practical life† (Everyday Life in Ancient Greece, pg. 86). â€Å"Atthis, who didst live for me and breathe thy last toward me, once the source of all my joy and now of tears, holy, much lamented, how sleepst thou the mournful sleep, thou whose head was never laid away from thy husband†s breast, leaving Theios alone as one who is no more; for with thee the hope of our life went to darkness† (Everyday Life in Ancient Greece, pg. 87).

Friday, November 8, 2019

Perfect Custom Essays

Perfect Custom Essays Nowadays, paper writing for college students has proved to be rather a difficult task for most of them. Consequently, this has pushed them to seek essay writing services from various agencies that offer such services. Various factors have contributed to the students turning to custom essay writing companies for help. These factors include lack of adequate material to complete the assignments, others may be non-natives and the English language appears to be difficult to comprehend. Most college students prefer English essay writing from English native speaking individuals. This is because English is their second language, and they would want their work immaculately done. This may seem unethical to some, but it is quite helpful to many as these companies offer templates that assist students in composing their original work. Additionally, these companies offer various services such as thesis writing, research papers, dissertation chapters, course work and reports among others. Proofread ing and editing of previously done work are also services offered by these companies. Subsequently, such services help in avoiding common grammatical errors such as run-on sentences, punctuation mistakes, spelling mistakes, subject verb agreements and other common typos. It also helps in eliminating plagiarism by correct citations where work has been borrowed and paraphrased to represent originality. These companies accomplish all these by employing expert writers who offer excellent and professional English essay writing skills. Some of these professional writers are English language natives while others have English as their second language but still offer excellent services to the clients available.

Wednesday, November 6, 2019

Market Potential Index Essay Essay Example

Market Potential Index Essay Essay Example Market Potential Index Essay Paper Market Potential Index Essay Paper What are the indexs used in developing this index? Market Potential Index was developed to assist companies compare emerging market with each other so they can find which market to come in and the appropriate selling schemes for those states. Eight dimensions were used to make the index ; each measured utilizing different indexs ( Global EDGE ) . Market size is measured utilizing indexs such as urban population and electricity ingestion. Market growing rate is measured utilizing Average one-year growing rate of primary energy usage and Real GDP growing rate. Turning markets will demo increase demand for merchandises. Market strength is measured utilizing GNI per capita and private ingestion as a per centum of GDP. Market Consumption Capacity is measured utilizing Percentage portion of middle-class in consumption/income. Commercial Infrastructure is measured utilizing indexs like Cellular Mobile endorsers. Main Telephone lines. Number of PC’s bought. figure of internet users. Paved route denseness. per centum of family with Television and population per retail mercantile establishment. Economic freedom relates to the grade of economic and political freedom occupants enjoy. It is measured utilizing indexs such as economic freedom index and political freedom index. Market Receptivity related to sum of imports a state consumes and the willingness to seek forging merchandises. It is measured utilizing Per capita imports from US and Trade as a per centum of GDP from state trade informations. State hazard is measured utilizing the index state hazard evaluation from state hazard study Which of the indexs. in your sentiment. would hold a greater impact for a company that markets laptop computing machines? I think the dimension of Commercial Infrastructure would hold a greater impact for a company that markets laptop computing machine because it is measured utilizing a really relevant index of figure of Pcs ( per 1000 dwellers ) . This dimension besides created utilizing indexs such as figure of cellular nomadic endorsers. chief telephone lines and figure of internet users. All these indexs are really utile in finding if the market is favourable to come in because if the market has high figure of internet users or telephone and Personal computer proprietors. it might demo the company that the market has already been tapped by other companies and possibly motivate them to look at other markets. where commercial substructure is moderate or low. Using the MPI. which states would be ideal for this company to come in? Why? I think that China would be ideal for the laptop company to come in because it has a high market size and market growing rate but a moderate to low commercial substructure. The manner I am reading the MPI. It means that China has room to turn in the commercial substructure country and a laptop company could capitalise on this great chance. Whereas. Hong Kong. Czech Republic and South Korea are rated high for commercial substructure. which could means that those markets might hold good established laptop companies and non deserving it for this company to come in and vie. On the other manus. you besides have to take into history other seven dimensions because a market might hold low commercial substructure and potency to turn but besides have really high state hazard. low economic growing and market size for this laptop company to enter. Using the same logic and taking into history other seven indexs. I think some other ideal states for this company to come in along would China would be Turkey. India. Singapore. Peru. Mexico. and Malaysia.

Sunday, November 3, 2019

Jeddah Floods Disaster Essay Example | Topics and Well Written Essays - 750 words

Jeddah Floods Disaster - Essay Example Both the floods were associated with heavy rainfall which resulted in a rise in the level of water and therefore resulted in floods. The first flood struck Jeddah on 5 November 2009 and the second flood struck my hometown in the month of January in 2011. Many people were stranded and life came to a standstill in the city in the Jeddah which is known to be one of the most important cities of the country of Saudi Arabia. The floods of 2009 and 2011 have both been associated with heavy rainfall in the city of Jeddah. The flood that struck the city in the year 2009 brought with it more destruction and was associated with rainfall recorded to be of 90 mm volume. It was analyzed that the losses of lives was greater than one hundred in the year 2009. Bridges fell down owing to the heavy downpour and the major roads in the city were blocked and there was accumulation of water. This resulted in the deaths of many people owing to their sinking under the accumulated water on the roads as well a s due to the falling of bridges over them. The chaos also resulted in accidents which led to more fatalities. The infrastructure of the city was greatly affected and many people were stranded and did not have proper shelter left. ...The increased rainfalls were therefore associated with more intense floods. Despite of increased severity, the destruction was lesser and the numbers of deaths associated with the disaster were also not as high as those of the floods of 2009. This can be associated with the preparedness of the government due to lessons learnt from the previous flood and the methods devised by the authorities to overcome such situations. Rescue teams immediately became alert and started operating to save the people who were stranded and lift them from the high water areas. Eleven deaths were reported due to this flood and many people were wounded (Humaidan et al 2011). The floods greatly affected the normal living and day to day life of the people residing in the city. Th e roads and many houses in the city were submerged in water. Many people were missing in the floods resulting in the creation of a chaotic situation. Many people also lost their lives due to these floods. The infrastructure of the city was totally disturbed. There were power outages and many areas were reported to be suffering from shutdown of power owing to the disruptions in the power lines. This was also associated with the breakdown in the communication networks and many mobile towers were disturbed which resulted in lack of networks available for communication. The situation in the city was not minor and it took many weeks for everything to return to normal. Offices were closed and the schools were also closed down for a few days. This meant that the official work as well as the education in the city was disrupted owing to these floods (BBC News- Middle East 2009; Humaidan et al 2011).Â