Wednesday, October 30, 2019

Volkswagen AG Essay Example | Topics and Well Written Essays - 750 words

Volkswagen AG - Essay Example Our company was founded in 1904 (History 2011), and since that time we have gone through a great number of changes and developed a series of strategies to help us be a socially responsible company that employs around 370,000 people globally (Human Resources 2011). Therefore, on the basis of our vast experience operating internationally we would like to provide the local network with a number of recommendations on how other companies can become as socially responsible, for the benefit of both the companies and the global society. In particular, we would like to address the following two principles of the Global Compact: Principle 3: Businesses should uphold the freedom of association and the effective recognition of the right to collective bargaining; Principle 6: the elimination of discrimination in respect of employment and occupation.  (UN Global Compact 2011). Lessons Learnt Our company takes active part in initiatives aimed at human rights protection. We respect and support peo ple’s right to collective bargaining. In particular, the freedom of association and our employees’ right to collective bargaining have had a significantly positive impact on the company’s operations in the 1990s. Due to financial constraints, at that time Volkswagen was about to fire a great number of company’s employees. ... On contrast, failure to follow collective agreements and cooperate with unions and associations may lead to disastrous results for a company. In particular, one of our competitors, General Motors Corporation (GM), had to undergo through a series of court trials as a result of denial to support human rights. In 2005, as the Delphi Corporation, a former part of General Motors Corporation, filed bankruptcy and refused to fulfil its defined benefit plans. The plans, including retirement plans for former Delphi employees, were terminated and GM cancelled and terminated all the obligations under the old collective bargaining agreements. In 2009 GM, finally, did sign a settlement agreement. However, it â€Å"did not provide top-ups to the splinter unions or to any other noncovered employees† (Bovbjerg and Clowers 2011). We, at Volkswagen AG, believe such behaviour of the company to be unacceptable in terms of the recognition of the right to collective bargaining. Furthermore, such ac tions lead to negative consequences for both the company and the society: the company’s image is damaged, and people are left without any benefits provided by collective bargaining agreements. As for the elimination of discrimination in respect of employment and occupation, Volkswagen AG can proudly claim that it is taking numerous measures to follow this Global Compact principle. In particular, among our CSR initiatives is advancing women and promoting diversity in the workplace. More than 30% of our employees are women, and we are actively working towards increasing this number. In addition, we are striving to increase the number of women in management positions (Advancing women

Monday, October 28, 2019

Definition of Culture and Its Importance Essay Example for Free

Definition of Culture and Its Importance Essay Human beings are considered the highest form of animals, behaving passionately social as a group, using language and understanding, and doing teamwork and intergroup rivalry. Culture then relates to everything that humans have, think and do as a member of the social group. Both existent and make-believe, humans have stuff like tools, weapons, languages, laws, music, art, material resources, technologies and systems that when taken jointly will give details of the past and describes the present. On the other hand, when ideas, values, attitudes, beliefs and ideologies are taken as a group, help explains religious partiality, political directives, mores and extensive range of social associations. In addition, humans do or perform activities among specific group or society based on nationality, religion, ethnic boundaries and even occupation and academic, which later on collectively form the prescribed accepted behavior. (Holt, D. Wigginton, K. 2002). In 1997, culture was described by Geert Hofstede in his book, Cultures and Organizations as the â€Å"software of the mind†. While individuals all have the identical â€Å"hardware†, which is the human brain, their â€Å"software† or â€Å"programming† is rather diverse. It is an identical experience when interrelating with somebody from a dissimilar culture – their language, suppositions, body language and movement, morals, and other facets of their culture will not be logical when relocated to another’s orientation structure. There are three fundamental logical reasoning when it comes to culture, namely: 1. Superiority of experience in the fine arts and humanities; 2. A combined blueprint of human knowledge, trust, and manners that relies upon the aptitude for figurative thinking and social knowledge; and 3. The set of divided outlooks, principles, purposes, and practices that distinguishes an association, society or group. According to Holt and Wigginton (2002), culture is a concept in the field of anthropology that concerns with shared structure of attitudes, way of life, ownership, traits, tradition and morals that describes group actions, which can be observed in a family, ethnic group, a business organization or a society. Authority, leadership, work attitudes and ethical practices on the part of management are influenced by this shared structure. Workers also are influenced by cultural antecedents on how they recognize and understand quality performance, work responsibilities, their function in decision-making and attitude in following orders from superior, as well as insight of human rights. The daily demeanor of workers in terms of punctuality, following rules on safety standards and personal hygiene are also affected. Slight differences between any two or more cultural groups can be observed, which therefore requires sensitivity to understand cultural differences, especially in manners of proper handling of business transactions. This way, when difficulties are encounter they will be solved readily with positive results. Understanding Differences in Culture The basic requirements for human survival are standard, which means for people to live they need water, food, clothing, housing and security. However, scarcity of these necessities compels human to creatively expand manners of acquiring them in order to give solutions to these survival problems. For simple societies, economic and social behavior consists of uncomplicated activities like looking for and cooking food, crafting clothes, building houses and rearing children. On the other hand, for developed societies, roles go beyond work and domestic related actions and extend to production and distribution of goods and services in order to sustain their big areas of responsibilities. It is essential to know that differences in culture would mean that different cultures have a diversity of styles in looking at things, ways of dressing and expressing individuality and/or goodness. Education, social rank, religion, individuality, belief composition, precedent experience, warmth shown in the domicile, and a countless of other factors will influence an individual’s manners and mores. A good deal of dissimilarities in culture has something to do with foodstuff preparation, music, and what each culture considers good manners. There are really cultural and philosophy disparities and it is fine to have an appreciation about a civilizations way of life. Hofstede’s Model of Cultural Dimensions A Dutch researcher by the name of Geert Hofstede made a cross-cultural study of organizational behavior using managers from different countries to produce profile of cultural differences. This model is the most famous Hofstede’s Model composed of five dimensions namely power distance, individualism, uncertainty avoidance, masculinity and long term orientation, which gives a comparative evaluation of group attributes. Said dimensions when used jointly, provide management sensible outlook regarding contradicting values and prototypes of manners among countries and groups. Power distance as a dimension relates to the degree of human inequalities. Hierarchical position and authority are the main focuses of a culture with high power distance. Less dominant member of the society acknowledge just being subordinates, who should always follow those who are leading. In societies with high power distance as exemplified by Japan, formal authority comes from the hierarchy where employees hardly ever go against a chain of command or subject into scrutiny the decisions of top management. The reverse is true with societies like the United States, Australia and New Zealand with low power distance, where both higher-ups and subordinates coordinate their decisions with one another and authority is not a big deal. However, for societies like Great Britain, Israel and Canada in particular, though they refuse to accept parity in social level, still they value the right of each person’s accomplishment (Holt, D. Wigginton, K. , 2002). Individualism pertains to the degree of initiative in becoming independent against that of collective endeavor. Societies with high individualism placed importance on personal triumphs, advancement, escapades and self-sufficiency. This implies ignoring the extensive necessities of the society and making oneself and ones family the priority. Contradictory, culture with low degree of individualism supports family relationship, group synchronization, social order and devote to compromised ideas. Uncertainty avoidance (Holt, D. Wigginton, K. , 2002) is the degree of open-mindedness for uncertainty and ambiguity, particularly to man’s search for Truth. It means the feeling of contentment and discontentment in shapeless circumstances which are unusual, unknown and unexpected. For majority of the societies, their religious beliefs stand as their manner of knowing the Absolute Truth. Japanese culture for instance, typifies a society that avoids uncertainty by creating detailed laws and standards in consonance with the norms of the society. There are also societies with dual philosophical beliefs that they do not consider any Absolute Truth and so they accept uncertainty within their organizations. Canadians, as an example do not prioritize ceremonies and company rites unlike the Japanese. The degree of motivational behavior based on value systems that are depicted in terms of being masculine or feminine is another dimension in the Hofstede’s Model termed masculinity. The focus of the said model is not on biological perspectives; however, the behavior is portrayed using gender. In countries with high masculinity, like Japan, men work and hold top positions in organization, while women stay at home to perform household chores and nurture children. In other words, there are distinct roles that women and men do in society. The priorities of people living in societies with high masculinity are achievement, wealth and expansion. Working professionals spent much of their time in work related activities and seldom take vacations to relieve their stress. When confronted with problems, the manners of settling these conflicts are done aggressively. On the opposite, countries that score low in masculinity give significance to their family, relationships and quality of life. There is equality in terms of positions for both men and women which could be observed in all aspects of their lives. Negotiation for people in societies with low masculinity is the best way to resolve misunderstandings and disagreements. They are also fond of working in flexible hours to give way for more vacations and relaxation. The fifth and newest cultural dimension is the long term orientation, founded on the teaching of Confucius on the East. Countries with high long term orientation can be described as being persistent, thrifty, having a sense of shame and organizing and observing relationship by status. On the other hand, those cultures with short term orientation have personal control and firmness, shield ones â€Å"face†, value ritual and give back to greetings, favors, and gifts.

Saturday, October 26, 2019

Braham Stokers Dracula and The Distrust Between the Sexes Essay

Dracula and The Distrust Between the Sexes       "Unpleasant experiences with the opposite sex seem to be unavoidable" (Horney 342). This quote from Karen Horney's essay The Distrust Between the Sexes seems to be discussing Dracula. Though her essay, (a lecture originally given to the German's Women Medical Association in November 1930), does not mention Dracula directly, the points that she argued can be transposed onto Bram Stoker's Dracula. In her essay, Horney asserts that men are very concerned with self-preservation, and also that men have an innate fear of women in power positions and therefore do what they can to prevent women from obtaining "power positions,"; these two points are applicable to Dracula.    Karen Horney observes that "because of our instinct for self-preservation, we all have a natural fear of losing ourselves in another person" (340). This is evident in Dracula when Lucy knows that her "bad dreams" (Stoker 109) come at night so she has "the pain of sleeplessness, or the pain of the fear of sleep" (Stoker 132). She has the fear that if she sleeps Dracula will appear and cause her to "lose herself." Stoker's Dracula character defies Horney's above statement, presumably because he is not "human." He has "a heart that knew [sic] no fear and no remorse" (302). However, the self-preservation clause still applies. He was very adamant in his desire to study John Harker, in order that he could pass as a native Londoner. Harker realized his place in the Count's plan, while staying at the castle. Harker says "this was the being I was helping to transfer to London, where, he might, amongst its teeming millions, satiate his lust for blood, and create a new and ever widening circle of semi-demons to batten o... ...e processes?" (348).    Though Dracula was written a full 30 years before Horney's essay, it is most fascinating re-analyzing the novel after having read the essay. We can see Horney's two assertions (that men are very concerned with self-preservation, and than men have an innate fear of women in power positions) come to life in Dracula. She even mentions "vampires" in her essay (343), but it is a different context; she's not referring to Stoker's novel. These two works, analyzed together, make a most engaging gothic classic that much more interesting.    Works Cited: Horney, Karen. "The Distrust Between the Sexes." A World of Ideas: Essential Readings for College Writers. 5th ed. Ed. Lee A. Jacobus. Boston, MA: Bedford/St. Martin's, 1998. 337-351. Stoker, Bram. Dracula. (London: 1897) introduction by George Statde. New York: Bantam Books, 1981.

Thursday, October 24, 2019

Humboldt Squid

Humboldt Squid Dosidicus gigas Domain: Eukarya Kingdom: Animalia Phylum: Mollusca Class: Cephalopoda Order: Teuthida Suborder: Oegopsina Family: Ommastephidae Genus: Dosidicus Species: Dosidicus gigas Ecological Geographic range: Receives its name from its main location – the Humboldt Current This current is found in the East Pacific Ocean region The Humboldt squids are sometimes found along the coastal region of California, Oregon, Alaska and Washington Generally, found about 2,300 feet below surfaceEnter shallow waters to lay eggs Trophic level: Sharks, dolphins, whales, tuna swordfish, many types of rays as well as an abundance of crustaceans, mollusks, fish of all   sizes, and other cephalopods such as octopus can be found in the food web of the Humboldt The Humboldt is occupies a relatively high trophic level It feeds on krill and small species of fish Predators:Sperm whales, sharks, seals, swordfish, and marlin feed on Humboldt squids of all sizes, while gulls and larg e fish often capture juveniles Parasites include Chromidina elegans, a ciliate protozoan that lives inside the renal organs of the Humboldt Life Cycle: Average life span is 1 year; however, some can live up to 2 years Spend much of their short life in the ocean’s oxygen-minimum zone Come up at night to feed After 200 days, the squids reach sexual maturity They die shortly after mating Physiological Development Bilateral symmetryArms and tentacles – 8 arms and 2 retractable tentacles Mantle – hollow structure and so internal organs are all exposed directly to the ocean water Funnel – water is pumped from out of the mantle to the funnel, which allows squids to move Fins – are used for both maintaining position and generating thrust Chromatophores – tiny elastic sacs of pigment. The Humboldt squid can turn their entire bodies from red to white to red again in less than one second Digestive system: Complete and ciliated Mouth, anus and complex s tomachUse of a duck like beak to break up food A radula or ribbon horn found on the tongue directs the food down the esophagus Food is taken up by cells lining the digestive glands arising from the stomach and then passed into the blood Excretory System Undigested materials are compressed and packaged and discharged through the anus into the mantle cavity and carried away by ocean currents Excretory functions are carried out by a pair of nephridia (tubular structures that collect fluids from the coelom and exchange salts) Respiratory system:Contains three hearts to support the constantly moving lifestyle of the squid Hemocyanin is the copper-rich respiratory protein that transports oxygen throughout the body Circulatory system: complex, closed circulatory system (reason why they can move fast) contains two branchial hearts at the base of the gills which send unoxygenated blood through the gills A third ventricular heart then pumps oxygenated blood throughout the body (blood turns bl ue when oxygenated, colorless before) Nervous system: Highly developed and sensitiveBrain consists of two fused nerve centers that are linked down the length of the body by two giant nerve axons The giant axons transmit nerve signals quickly Interesting fact – the squid’s nervous system is connected to structures called statocysts. These vesicles let the animal to orient itself to a gravitational field, allowing the squid to remain aware of its orientation and movement in a three-dimensional manner Reproductive strategies Highest fecundity of any cephalopod Reach sexually maturity after 200 days of life Timing and location of eggs is still guesswork for most scientists Sexual reproductionSemelparous reproduction (reproduce once in their lifetimes and die shortly after) Female Humboldt squids can have about 10 million eggs; however, the most to have been found has been between half a million and a million eggs After the eggs are laid, there is no further parental invest ment Kurth, J. and M. Garzio 2009. â€Å"Dosidicus gigas† (On-line), Animal Diversity Web. Accessed March 18, 2013 at http://animaldiversity. ummz. umich. edu/accounts/Dosidicus_gigas/ â€Å"Squid. † The Columbia Encyclopedia, 6th ed.. 2012. Encyclopedia. com. 18 Mar. 2013. Humboldt or Jumbo Squid Fact Sheet – National Zoo| FONZ. † Smithsonian: National Zoological Park. N. p. , n. d. Web. 18 Mar. 2013. â€Å"Humboldt Squid. † BioWeb. N. p. , n. d. Web. 18 Mar. 2013. â€Å"A Humboldt Squid Dissection Guide for Educators. † The Gilly Lab. N. p. , n. d. Web. 18 Mar. 2013. â€Å"Humboldt Squids: Systems. † Shorecrest Preparatory School. N. p. , n. d. Web. 18 Mar. 2013. â€Å"Humboldt  Squid. † Squid-World. N. p. , n. d. Web. 18 Mar. 2013. â€Å"Squid Sex and Babies. † Squid Sex and Babies. N. p. , n. d. Web. 18 Mar. 2013. http://theseasproject. weebly. com/uploads/5/3/8/4/5384258/5500235_orig. png? 243

Wednesday, October 23, 2019

Healthy lifestyle Essay

In my everyday life, I come across many fears. One of the constant fears is of leaving a negative impact on people with whom I deal on regular basis. These people are not my family members as I have a cocooned family life and I am hundred percent sure of my loved ones’ unconditional support to me always. It is the people like neighbors, peers etc. whose approval I seek the most and fear that they might hold a negative impression of my personality in their minds. This fear affects my everyday life drastically. Though I make sure that I appear calm and composed in front of others, I feel extremely conscious from within about the way in which I am coming across to people. This means most of my conversations during my interpersonal communications are not spontaneous. I think a lot before speaking as I do not want to hurt any body’s feelings and at the same time I try to safeguard my own self-esteem by being good in the eyes of others. This fear has made me an excellent observer of not only verbal but also non verbal communication. I am able to observe certain things that everyone cannot. I read eye contacts, different types of smiles, the way one nods ones head, the way one reacts on seeing me, the warmth of the handshake etc. to confirm whether all is well in one’s mind and heart as far as my image is considered. This is a trait that sometimes irritates me as even in informal chats I am always alert and feel that I am on a mission to present myself in the eyes of others as beautifully as possible. After trying to intrinsically understand this aspect of my personality I have come to a conclusion that I am extremely protective of my self image and would find it really difficult to combat any personal attacks like use of bad words or hurtful gestures as I am vulnerable from within. My fear truly represents my love for being considered a respectable member of the society and being acknowledged by everyone as a wonderful person. Another factor that affects my behavior is the fear of gaining weight. This fear is so strong that whenever I eat something good, I feel guilty of eating it. I love food but always keep on doing calculations of how many calories I might earn by indulging in satisfying my taste buds. As a result eating is not as much fun as it used to be in my childhood days. A simple activity like eating has become a complicated task for me. Not only this, I spend a substantial amount of time in looking at myself from all angles in the mirror. I want to ensure that I am fit and attractive. As a result I keep on asking my family members whether I look attractive or not. The worst part is that whatever the answer is, I somehow do not believe in it completely. This means that if some one says that I look great and my figure is good enough, I do not completely believe in him / her as I feel that he / she is saying this just to make me happy. On the other hand if someone points out a little defect in my figure for example slightly large buttocks or thighs etc. , I feel that he / she is being too sarcastic. I start arguing that after all; that does not mar my attractive personality in any way. This behavior of mine has really affected my personal relationships as my near and dear ones are really at their wits end to find out a way of providing an answer that satisfies me. I know that they love me the way I am and my appearance really does not matter to them much but my overindulgence of making sure that my outward personality is attractive puts them off sometimes and strains the conversations on many occasions. I want to get out of this fear induced behavior but have not gained any success so far. I feel that this behavior again represents how conscious I am of my self image. In addition to my inner qualities I also want to gain praises and acceptance of my appearance and looks. I want everyone to be mesmerized by my qualities and I am extremely conscious of it always. These two fears represent that I want to be a wonderful person from all aspects. Another fear that affects me and my behavior is the fear of loosing a dear one. I always fear that people whom I love the most might suffer a fatal accident or might get diagnosed with an incurable disease. This fear has affected my behavior a lot. I not only openly shower my love to the people I am close to, but also tell them to be as careful with their health and well being as possible. I advise them a lot on how to cross the roads, how to drive or how to lead and adopt a healthy lifestyle. This is something that all my family members are aware of but I still keep on reminding them about the negative results of being careless. A positive way in which my behavior has got affected due to my fear is that I have become very cautious with money. I think a lot before spending extravagantly as I feel that money should be saved for hard times like dealing with a loved one’s ill health. I keep track of all the measures that can be taken to prevent certain common diseases like high / low blood pressure level, high / low cholesterol level, Type 1 / Type 2 diabetes etc. I keep on reading self help books on how to keep oneself fit and keep on insisting to my family members that they should always exercise and take care of their bodies. If they miss out on their daily exercise routine then I let them know my dislike instantly and sometimes even behave rudely with them which puts them off. I try to take things lightly but get very rigid if my loved ones show any sign of being lazy in their health related matters. I also lecture them a lot on their spending habits and try to make them understand that health is the most important wealth they possess and they should save money for hard times. Thus all the three forms of fear represent the different ways in which I treasure the gift of life that God has bestowed upon me. I want to lead life to the fullest by conserving and taking good care of all the natural assets that I am born with as well as the ones that I have attained through hard work in order to lead a wholesome life in company of my loving family members and approving acquaintances. I fear of parting away from all that I have.

Tuesday, October 22, 2019

Crimes misc0 essays

Crimes misc0 essays two young women. After talking with Sonia, Raskolnikov fully confesses to the murder, and is sentenced to eight years in a siberian prision. Sonia follows him and with her help, Raskolnikov begins his regeneration. Rodian Raskolnikov is best seen as two characters. He often acts in one manner, and then suddenly in a manner completly contradictory. Raskolknikov is best described when Razumihim attempts to explain Raskolknikov to his mother and sister as being a "morose, gloomy, proud fanciful. He has a noble nature and a kind heart...he would rather do a cruel thing than open his heart freely. Sometimes, though, he is not at all morbid, but simply cold and inhumanly callous, its as if he were alternating between two characters." (Dostoevsky 200) His two characters are best interpreted as 1)his detatched, cold, intellectual side which emphasizes "power" and "self will" and 2) his warm compassionate humane side which suggests self-submissive and meekness. The intellectual side is a result of his deliberate and premeditated actions, such as the theories he formulated about the crimes. The other side of his character, the warm compassionate side, operates without and interfering thought process. Ironically the two murders that he ends up committing relate back to the two aspects of Raskolnikov's character. In this dual murder, he has killed one person who is mean, wicked, and cold (Alyona), and a second, Lizaveta, who is warm, friendly, human, compassionate, and exceedingly innocent person. But does the author ever remind us of the murder at any time in the novel again? Not in the physical sense of the crime itself. The reader doesn't hear how heavily the murderers are weighing on his heart, or how he is tormented by the visions of the crime, only his pride's hurt. Raskolknikov never again recalls the massive amounts of blood everywhere, the ...

Monday, October 21, 2019

Approaches to Ethics

Approaches to Ethics Utilitarianism is an ethical theory which focuses on the outcome of an action. It weighs the value of an action over its consequences. The rule of utilitarianism focuses on the result regardless of the nature of the action. It points out that, if the outcome is in line with the expected benefits, then the action can be undertaken. It should not only apply to the agent, but also satisfy everyone affected by the action.Advertising We will write a custom case study sample on Approaches to Ethics specifically for you for only $16.05 $11/page Learn More The action should put forth maximum happiness to everyone involved. Utilitarianism provides a morally upright approach in making decisions about a certain action. It foresees the possible outcome of the action and calculates the benefits and the costs. From these calculations, the best approach is chosen which ensures that benefits are maximized while costs are minimized. The major drawback of the utilitarianism i s justice. For instance, a situation where a certain act yields more benefits but is still deemed unjust affects decision making. This is because; one has to choose the principle to be used, which is either justice or utilitarianism. The utilitarian standard focuses on the happiness for all those concerned and not oneself. The kind of decisions we make should not only bring happiness to the agent of the action, but to everyone involved. The spirit and purpose of utilitarianism is ‘the greatest happiness for the majority’. Utilitarianism is being used by business analysts, scientists and legislators to make decisions on; whether to invest certain resources to carry out specific projects, whether to approve a certain drug, or whether to ban a certain chemical. The most important formal principle studied in formal ethics is the golden rule which involves principles such as; ‘treat others the way you want them to treat you’ ‘be logically consistent in you r beliefs’ ‘practice what you preach’ and ‘follow your conscience’. These principles can be ambiguous if they are taken literally, for instance the principle of treating others the way you want them to treat you, might not be applicable in some situations, for example in a case where a doctor wants to replace your kidney, then you ought not to replace his in order for him to replace yours. This ambiguity becomes a challenge when establishing these rules since it is hard to come up with situations that satisfy the rule and those that do not.Advertising Looking for case study on ethics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The question of right or wrong is generally dealt with in ethics. If one has a justified claim, then he has a right. For instance, every human being has a right to be educated, and hence entitled to some form of education. Moral rights are then justified by the moral stand ards that are agreed upon by the majority but not necessarily those coded by the law. An act is said to be wrong where it does not respect the rights of the persons involved. A right has a major role on ethics, but it should not be the only factor to be considered in ethical decision making. This is for the reason that, when we consider a right as the sole approach to ethics, then the focus shifts to an individual not to a community. Thus morality calls us to respect one’s dignity and uniqueness, so as to achieve desirable results for the effective living of the community. According to Aristotle, every individual has his own opinion in what is best for human beings. This brings diverse views raising disagreements. These disagreements need to be resolved so as to achieve a common ground that suits everyone. He states that, the moral value is the greatest way to the effective action. He points out that if one imagines, desires and thinks of an idea, then works towards achieving it; he is considered beautiful because he has taken a systematic procedure, and the end result thereof must be of importance because it involves critical thinking. To come up with a common ground for every individual involved is challenging, it involves consideration of many factors.

Sunday, October 20, 2019

Using Visual Basic VBA with HTTPS and SSL

Using Visual Basic VBA with HTTPS and SSL Is it possible to access web pages with HTTPS and that require login/password using Excel? Well, yes and no. Heres the deal and why its not so straight forward. First, Lets  Define Terms HTTPS is by convention the identifier for what is called SSL (Secure Sockets Layer). That doesnt really have anything to do with passwords or logins as such. What SSL does is set up an encrypted connection between a web client and server so that no information is sent between the two in the clear using unencrypted transmissions. If the information includes login and password information, encrypting the transmission protects them from prying eyes...but encrypting passwords isnt a requirement. I used the phrase by convention because the real security technology is SSL. HTTPS only signals to the server that the client plans on using that protocol. SSL can be used in a variety of other ways. So...if your computer sends a URL to a server that uses SSL and that URL starts with HTTPS, your computer is saying to the server: Hey Mr. Server, lets shake hands over this encryption thing so that whatever we say from now on wont get intercepted by some bad guy. And when thats done, go ahead and send me the page addressed by the URL. The server will send back the key information for setting up an SSL connection. Its up to your computer to actually do something with it. Thats key (pun...well, sorta intended) to understanding the role of VBA in Excel. The programming in VBA would have to actually take the next step and implement the SSL on the client side. Real web browsers do that automatically and show you a little lock symbol in the status line to show you that it has been done. But if the VBA just opens the web page as a file and reads the information in it into cells in a spreadsheet (a very common example), Excel wont do that without some additional programming. The servers gracious offer to shake hands and set up secure SSL communication just gets ignored by Excel. But You Can Read the Page You Requested in Exactly the Same Way To prove it, lets use the SSL connection that is used by Googles Gmail service (which starts with https) and code a call to open that connection just like it was a file. This reads the web page like it was a simple file. Since recent versions of Excel will import HTML automatically, after the Open statement is executed, the Gmail page (minus the Dynamic HTML objects) is imported into a spreadsheet. The goal of SSL connections is to exchange information, not just read a web page, so this is normally not going to get you very far. To do more, you have to have some way, in your Excel VBA program, to support both the SSL protocol and maybe to support DHTML too. Youre probably better off starting with the full Visual Basic rather than Excel VBA. Then use controls like the Internet Transfer API WinInet and call Excel objects as needed. But it is possible to use WinInet directly from an Excel VBA program. WinInet is an API - Application Programming Interface - to WinInet.dll. Its mainly used as one of the major components of Internet Explorer, but you can use it directly from your code as well and you can use it for HTTPS. Writing the code to use WinInet is at least a medium difficulty task. In general, the steps involved are: Connect to the HTTPS server and send an HTTPS requestIf the server asks for a signed client certificate, resend the request after attaching the certificate contextIf the server is satisfied, the session is authenticated There are two major differences in writing the WinInet code to use https rather than the regular HTTP: You should also keep in mind that the function of exchanging a login/password is logically independent of encrypting the session using https and SSL. You can do one or the other, or both. In many cases, they do go together, but not always. And implementing the WinInet requirements doesnt do anything to respond automatically to a login/password request. If, for example, the login and password are part of a web form, then you might have to figure out the names of the fields and update the fields from Excel VBA before posting the login string to the server. Responding correctly to a web servers security is a big part of what a web browser does. On the other hand, if SSL authentication is required, you might consider using the InternetExplorer object to log in from within VBA... The bottom line is that using https and logging into a server from an Excel VBA program is possible, but dont expect to write the code that does it in just a few minutes.

Saturday, October 19, 2019

Human Trafficking Coursework Example | Topics and Well Written Essays - 500 words

Human Trafficking - Coursework Example People from third world countries are made to believe that there are a lot of employment opportunities in developed countries. They see it as a chance to live the dream. There are other pull factors that have led to human trafficking. They include; demand for workers and the possibility of living better lives. People have been made to believe that better opportunities can be found abroad and in large cities. The above factors explain why human trafficking has been on the rise since 1980 (Shelley, 2010) . Globalization, rise of illicit trade and the existence of a free market has also contributed to the rise of trafficking. Due to globalization, people and goods can be transported easily. The world has become a global village and even the most remote part of the world is now part of the global village. Developed countries have put in place tough measures that aim of phasing out the problem of illegal immigrants and human trafficking. Human traffickers use various methods to lure their victims. They target poor people from third world countries by posting advertisements and billboards that advertise various high paying jobs in developed countries with good pay. They are encouraged to apply for such positions. Once the unsuspecting people apply for the jobs, they are informed that the company would take them abroad only if they pay around $4000 to cover for plane tickets and other expenses that the company is likely to incur. However, most people from third world countries cannot be able to raise such a huge amount. The company offers to pay the amount for the people who are interested on condition that they would pay the amount from their earnings once they reach the foreign country. This deal is too sweet, and many people end up falling for the trap. Once the plane lands in a foreign country, the people are not taken to the jobs they were promised. Many are taken to brothels,

Friday, October 18, 2019

Measures To Put Under Control the Cases Performance Deficiency among Assignment - 1

Measures To Put Under Control the Cases Performance Deficiency among Employees - Assignment Example It is evidently clear from the discussion that the leader should avoid being biased about the situation. He should make his conclusions about what led to the action. He should, rather be willing to listen to the person, and have a clear understanding of the cause of his inadequate performance. This helps to show the individual that he has a chance to be heard, without being judged. Providing the corrective feedback promptly, within the time the problem is noticed is necessary. This is because it will help guide the employee in performing his activities, and avoid a recurrence. According to Yukl, when an employee demonstrates inadequate performance, it is necessary for the leader to explain to the person the effects of his behavior. He makes the person understand that his behavior has a significant effect, not only to the company but also to his coworkers. When facing an incident of inadequate performance, the leader should stay calm, and exhibit professionalism. This means that he sh ould avoid accusations or insults to the person. By doing this, the employee understands the magnitude of his actions and works to improve his performance. To be a quality follower who is indispensable, it is necessary to have a clear knowledge and understanding of what the company requires you to do. According to Yukl, by understanding your roles and how they should be performed, you can deliver positive results that will impress the leader. This helps to ensure that work is completed as per the leader’s expectation. If the role is not clear, the person should request for clarification, and this will help improve the performance of the individual. When performing duties for a company, one should ensure constant communication with the leader is maintained. The leader should be updated on every activity that takes place. Regular communication allows for the leader to know how the person is conducting his activities and correct him if need be. This helps in the growth of an org anization. Feedback is important in the day to day performance of roles in a company.

Poverty in Black America Research Paper Example | Topics and Well Written Essays - 750 words

Poverty in Black America - Research Paper Example Out of 40 million, 10.7 million blacks live in poverty (27.4%). A total of 54.6 % of all blacks live in single mother homes. (Black Poverty).1 2. American Black community is not only poor by American standards; rather many amongst them touch â€Å"third world† poor status. In USA official unemployment rate is 4.4% whereas official unemployment rate for blacks is 10% .Approximately a million black children in USA are living below poverty line. (Phillip).2 3. Poverty brings other associated problems. Either poverty causes these problems or these problems cause poverty. The problems include poor education standards, broken family structure, violence, high crime rate, mass unemployment, poor living standards and housing, poor health, friction in communities and low contribution towards economy etc. 4. Higher education is considered essential in upgrading the standard of life. However with poor economic status, black families are unable to afford college education and postgraduate studies. The frustrated youth is therefore divulged towards depression, uncertainty, frustration, drugs and crime. 5. Consistently black students in schools have not performed well. According to Carter (Carter) â€Å"so many decades have passed since 1954 Brown decision however many people are still intrigued by the (under) performance of Black Students in Americas schools†3 . In schools these students remain in groups. These groups often fight each other to gain dominance. Masculine image amongst black boys is a very dominant concept. The past association with slavery also haunts quite a few black youngsters. There is another impression amongst black students according to which a student involved in studies is not received well amongst the peers. When impact of all these factors is combined it results into distraction from studies and poor results and failure in life later on. 6. There has been a factor of racism as well in few schools where black students have been labeled naturally â€Å"dumb†. There has been a feedback from teachers according to which white teachers did not feel comfortable in the company of black students. Unfortunately negative indicators in school life do not point towards bright future of black students. 7. Lack of role models is often cited as a reason for blacks not doing well in many fields specially education. There is a general impression that blacks are not good at studies however they are good in sports and music. However it is considered a wrong argument. Black sportsmen and music celebrities are very few in number. The lifestyles and wealth these celebrities enjoy create a false impression amongst blacks, due to which, black youngsters dream of becoming music or sports stars, through some sort of shortcut in life. The results in real life are far different than dreams. 8. Thirteenth amendment to US constitution was passed in December 1865, according to which slavery was abolished in USA. The country was not stabl e in that era and southern states continued with practices similar to slavery however union army was limited and could not protect ex-slaves. Few states passed â€Å"black codes† according to which unemployed blacks could be arrested and fined .Prisoners that were unable to pay fines could be used as slaves. Blacks were not allowed to buy land and were denied fair wages for work. 9. After the civil war

Thursday, October 17, 2019

Self-Expression Project (VOICE) Essay Example | Topics and Well Written Essays - 750 words

Self-Expression Project (VOICE) - Essay Example Many scholars argue that the easiest way to solve a conflict is to understand what kind of conflict the organization is being faced with and to understand the motivations behind those conflicts (Jack, LaFrance, & Ginter, 2003). Once this has been established, it is easy to prescribe s a solution for the problem by addressing the root cause of that problem. In today’s world, there are a lot of innovative ways in which conflicts could be solved but the choosing of the most appropriate method is the prerogative of the concerned organization y examining the issues at hand and identifying the most effective way to deal with the situation. Creative solutions are usually the nest in solving conflicts although many are not used because of a lack of precedence (Keyton, 2011). The problem in this situation therefore is persistent conflicts between the employees and the management from tasks and processes. The employees argue that the organization does not understand their needs while th e organization claims that the employees do not understand its policies and processes. This has created conflicts in the organization leading to increased employee turnover and absenteeism. The creative idea leading to the innovation Research has shown that it is only through critical thinking and careful analysis of a situation that individuals will be able to bring a situation into perspective and thus find a solution for it. It is not possible to craft a solution to a problem without a careful analysis of the problem in order to understand the root cause of the issue (Miner, 2007). However, when such issues arise, there are always creative ways to solve them and this can only be achieved through brainstorming and coming up with an idea that will help in solving the problem (Mullins, 2005). Much of what people think of are as a result of their interpretation of the issue and thus may think that contemporary approaches to solving the problem would easily work without hitches. In th is situation, the idea therefore is to enable the management and the employee to reach a consensus and avoid the constant wrangles that exist between the management and the employees. The idea is to make them meet and discuss what is going on in the organization and how they can contribute to alleviating or solving the conflicts that have engulfed them. Therefore, the reasoning here is that when these two groups sit together in a free environment they will be in a better position to air out their views freely and each one of them will contribute to the problem and explain what each party is doing and what they think is aggrieving the other party so that they can come up with solutions on how to solve future problems. Once the people have met, a conducive environment is created, on which is free from retribution and one that supports free expression of ideas from all the parties concerned. The idea is that each party will listen to the other and be able to understand where the proble m is coming from and how they can help one another in sorting out the problem. It is widely accepted that lack of effective communication is what leads to conflicts (West, 2004). This innovative idea is thus meant to bring the conflicting sides together to a table, on a weekly basis, with the management and the employees being there to talk about any issue they feel is affecting them. Expected value of the innovation

Assessing Learning and Achievement Essay Example | Topics and Well Written Essays - 2750 words

Assessing Learning and Achievement - Essay Example For college students I based mostly on observations, presentations and project work. The complete opposite is for work based learners where the most appropriate methods are witness testimonies, products of work and accreditation for prior learning. With regards to the issues I intend to address are as follow: The advantages and disadvantages of criterion-referenced assessment, the assessment of validity and reliability (where demand from the government to meet targets forces from the colleges, to employ assessors lacking in competence, making assessment value to be questioned). Also I would like to address the current issues in assessment policy bureaucracy, the measuring and recording of assessment results reduces time spent with the learner, 'bums on seats' model forces colleges to accumulate quantitative achievement rather than qualitative ones. As result this makes the value of qualifications and achievement questionable. In the initial assessment, computer tests are used to identify the literacy and numercacy level of potential applicants, At the diagnostic assessment, the applicants are again tested on the computer, yet compared to previous ones, the applicants are to diagnose; going into the details to diagnose which are the areas that need to be addressed and then identify the support. For formative assessment, it is on going throughout the year both whether it be in lessons or at visits for WBL. Finally for summative assessment was used at the end of the unit or the whole course. It is also at the end of the unit, learners have to complete the underpinning knowledge test to prove their knowledge competence, norm referenced, criterion reference or ipsative assessment; Identify and discuss range of concepts, definitions and principles covered in learning and assessment within your professional practice In the initial assessment, computer tests are used to identify the literacy and numercacy level of potential applicants, At the diagnostic assessment, the applicants are again tested on the computer, yet compared to previous ones, the applicants are to diagnose; going into the details to diagnose which are the areas that need to be addressed and then identify support . For formative assessment, it is on going throughout the year both whether it be in lessons or at visits for WBL. Finally for summative assessment was used at the end of the unit or the whole course. It is also at the end of the unit, learners have to complete the underpinning knowledge test to prove their knowledge competence,norm referenced, criterion reference or ipsative assessment; Formal and informal assessment. I encounter informal assessment throughout the course by means ofinformal discussions and feedback; Self assessment and peer assessment Peer assessment is used more in college environment, and self assessmentis used at the end of the lessons or in tutorials Analysis of your assessment

Wednesday, October 16, 2019

Self-Expression Project (VOICE) Essay Example | Topics and Well Written Essays - 750 words

Self-Expression Project (VOICE) - Essay Example Many scholars argue that the easiest way to solve a conflict is to understand what kind of conflict the organization is being faced with and to understand the motivations behind those conflicts (Jack, LaFrance, & Ginter, 2003). Once this has been established, it is easy to prescribe s a solution for the problem by addressing the root cause of that problem. In today’s world, there are a lot of innovative ways in which conflicts could be solved but the choosing of the most appropriate method is the prerogative of the concerned organization y examining the issues at hand and identifying the most effective way to deal with the situation. Creative solutions are usually the nest in solving conflicts although many are not used because of a lack of precedence (Keyton, 2011). The problem in this situation therefore is persistent conflicts between the employees and the management from tasks and processes. The employees argue that the organization does not understand their needs while th e organization claims that the employees do not understand its policies and processes. This has created conflicts in the organization leading to increased employee turnover and absenteeism. The creative idea leading to the innovation Research has shown that it is only through critical thinking and careful analysis of a situation that individuals will be able to bring a situation into perspective and thus find a solution for it. It is not possible to craft a solution to a problem without a careful analysis of the problem in order to understand the root cause of the issue (Miner, 2007). However, when such issues arise, there are always creative ways to solve them and this can only be achieved through brainstorming and coming up with an idea that will help in solving the problem (Mullins, 2005). Much of what people think of are as a result of their interpretation of the issue and thus may think that contemporary approaches to solving the problem would easily work without hitches. In th is situation, the idea therefore is to enable the management and the employee to reach a consensus and avoid the constant wrangles that exist between the management and the employees. The idea is to make them meet and discuss what is going on in the organization and how they can contribute to alleviating or solving the conflicts that have engulfed them. Therefore, the reasoning here is that when these two groups sit together in a free environment they will be in a better position to air out their views freely and each one of them will contribute to the problem and explain what each party is doing and what they think is aggrieving the other party so that they can come up with solutions on how to solve future problems. Once the people have met, a conducive environment is created, on which is free from retribution and one that supports free expression of ideas from all the parties concerned. The idea is that each party will listen to the other and be able to understand where the proble m is coming from and how they can help one another in sorting out the problem. It is widely accepted that lack of effective communication is what leads to conflicts (West, 2004). This innovative idea is thus meant to bring the conflicting sides together to a table, on a weekly basis, with the management and the employees being there to talk about any issue they feel is affecting them. Expected value of the innovation

Tuesday, October 15, 2019

Serratia marcescens Term Paper Example | Topics and Well Written Essays - 1250 words

Serratia marcescens - Term Paper Example S. marcescens is susceptible to expanded-spectrum cephalosporins, such as ceftoxamine, ceftazidime, cefepime, and cefpirome, though different mechanisms of resistance to expanded-spectrum cephalosporins have been reported. A constitutive overproduction of Amp-C, as a result of mutation in the regulatory gene system of Amp-C expression results in resistance to expanded-spectrum cephalosporins. The other enzymes that confer resistance to expanded-spectrum cephalosporins are Ambler Class A extended-spectrum ?-lactamases (ESBLs) or Class B metallo-?-lactamases. Mutation in chromosomal amp C gene also adds to the resistance pattern to expanded–spectrum cephalosporins in the Family Enterobacteriaceae. Enterobacter cloacae GC1, S marcescens GN16694 and S. marcescens HD are among the few clinical isolates producing extended-spectrum ?- Amp C ?-lactamases. Yatsuyanagi et.al., (2006), in their study examined the resistance mechanism of cetazidime-resistant S. marcescens strains from inp atients of a cerebral ward over a 14 month period in one hospital in Japan. One environmental and five E.coli transformants from clinical isolates harbouring the amp-C gene, cloned from S .marcescens and E.coli AS22-6-51, which is an amp-D mutant of E.coli C600, has a deletion mutation in AmpC. The cloning vector used was pBcSK+. The MICs of azetreonam, imipenem, meropenem, gentamicin, minocycline and levofloxacin were determined by broth dilution technique. The reference strain used for in vitro susceptibility testing was E. coli ATCC 25922. Chromosomal DNA was prepared from S .marcescens and the isolates were examined by PCR for the presence of the following genes : blaTEM , blaSHV, bla CTX-M, and plasmid borne amp-C genes. Primers specific for S.marcescens isolates were used to amplify a 552-bp fragment. Chromosomal DNA embedded in agarose plugs were prepared for Pulse-Field Gel Electrophoresis (PFGE). The primers amp-C Seq 5 was used to amplify 1.174 bp fragment containing the c hromosomal amp C gene and Mab/F and MAb/R primers were used to amplify the 1.192 bp fragment containing the blaTEM gene. These primers were used to sequence the chromosomal amp C gene and blaTEM gene from S. marcescens isolates. The primer amp C Exp5ER was used to amplify the chromosomal gene from S. marcescens strains ES46, ES76, and SM4 by PCR. Cloning of S. marcescens chromosomal amp C gene and construction of amp C harbouring E.coli transformants were carried out. Amp-C expressing transformants were confirmed to be positive for S.marcescens chromosomal amp C gene using PCR with a set of Sma amp C F and Sma amp C R primers and amp C Exp5ER and ampC Exp 3 HND primers for the 1,158 bp fragment containing the amp C gene using PCR. A primer was used to introduce a point mutation leading to a substitution of a third motif of the amp C gene, in a PCR based site -directed mutagenesis performed withal PCR in vitro. Using overnight cultures of S. marcescens, amp C ?-lactamases induction a nd enzyme assay were done using an ultrasonic disrupter and the protein content was evaluated by BCA protein assay reagent. DNA sequence data analysis were performed using an updated version of Basic Local Alignment Search Tool. The nucleotide sequences of the chromosomal amp C genes of S. marcescens were deposited in the Gene Bank data base. Results of the study showed that four strains of S.marcescens (ES11, ES31, ES42, and ES46) isolated from urine specimens showed an identical SpeI PFGE pattern, indicating that a

Monday, October 14, 2019

U.S. television networks Essay Example for Free

U.S. television networks Essay Television is nowadays one of the most popular sources of information, so there is a number of networks, participating in the market competition and thus remaining sensitive to the audience’s beliefs and preferences; at the same time they to great extent shape the needs and culture of the population. The present paper argues that the popularity of a television network greatly depends upon its autonomy and ability to both combine creation and broadcast of a TV-product, as well as upon its rejection and deconstruction of the objective reality, which the target audience is likely to criticize, for the purpose of weaving an alternative world, dominated by the key values of the potential consumers. In her article, Johnson touches briefly the institutional structure and underlying economics of CBS and PAX-TV, high-rated and extremely popular networks, which seek to provide uniform TV-products around the country; moreover, they are also similar in their business approach: â€Å"Both networks share strikingly similar business strategies, branding appeals, the same flagship programs produced by Martha Williamson [†¦]† (Johnson, 2004, p.404). Whereas CBS has quite a democratic and friendly slogan, PAX-TV states its mission in quite religious terms; however, both networks are established by media magnates with orientation to pious audiences, so they share their programming content freely. However, there is also one non-commercial network called PBS, which positions itself as non-profit and thus does not own any broadcasting stations; as a result, it cannot reach the desirable uniformity of broadcasting CBS and PAX-TV demonstrate. According to Meehan Byars, two decades ago, there began a tendency for large companies’ ownership of TV channels; these corporations often engaged with the creation of their own TV-products like films and shows, so they were becoming increasingly more autonomous in the selection of the information to broadcast. Furthermore, the advent and popularization of commercial cable television allowed these large TV-industry players to ensure they had a stable group of loyal consumers (Meehan Byars, 2004, p. 92).   As opposed to this obvious integration of channels into large companies, it is possible to exemplify the abovementioned PBS, coordinated by several non-profit organizations, which seek to provide free and independent broadcasting.   Johnson observes that the audiences of CBS and PAX-TV are composed mainly of conservative, family-oriented middle-class and working-class Americans, who believe in God and greatly value conversations on religious topics. The owners of the two networks assume that the existing American culture is not fully tolerable by Americans themselves, especially by the older generation, and therefore seek an alternative reality, primarily through programming and display of movies and shows based upon idyllic pastoral and religious themes. As it has been mentioned above, CBS and PAX-TV have quite friendly or â€Å"peaceful’ slogans, which they used as promos in broadcasting; this turn seems likable to the conservative audience. Both networks tend to focus on nuclear family values, affiliation to Christianity and material well-being or ability to provide for oneself (Johnson, 2004, pp.406-407). Meehan and Byars take a little different approach and state that Lifetime has gradually shaped itself as a liberal feminist channel and â€Å"seized† in the 1980s a new audience, independent females with white-collar jobs (Meehan Byars, 2004, p. 94). One of the most powerful tools of reaching the target group was the creation and display of the company’s own films, dedicated to the occupational and interpersonal issues in working women’s life: â€Å"Both The Good Fight and Shame illustrated Lifetime’s operational definition of â€Å"television for women† during the emergent period† (Meehan Byars, 2004, p.96). Further, the network began to employ the characters of female officers, detectives and FBA agents, so there appeared the first female superheroes. The product was conceptually novel and thus met a fully expected response, the group’s adherence to Lifetime. In the present day, this segmentation has become even more obvious: for instance, there are networks for minority groups, such as Galavision and Telefutura, developing networks for children like Qubo and ThinkBright and specialized sports networks for those men who prefer to receive comprehensive sports news without switching between channels. However, the abovementioned companies use much simpler tools of spread amongst the target audience, including language (native to the minority group), interesting intellectual games and scientific problems for minors and focus on soccer and baseball most American men are interested in. Both articles, being addressed in the paper, identify a set of values the networks communicate for the purpose of obtaining their target viewers. In particular, CBS and PAX-TV broadcast explicit stories about self-sufficient and mature people, who dedicate themselves to their family and career; moreover, Johnson asserts the importance of â€Å"middleness† (Johnson, 2004, p. 408), which means both the corresponding geographic location and politically neutral views, which reconcile the right and the left. Conservatism as valuable by itself is often communicated through showing global and American cultural anomalies and positioning the traditional, time-honored lifestyle as a way of avoiding problems and succeeding in social life and work. In addition, order to achieve the admiration of â€Å"ordinary Americans†, CBS and PAX-TV also rely heavily upon the American dream, or realization of all dimensions of life through hard work and observance of religious principles; for this purpose, they include the â€Å"true† TV-stories about modest self-made Americans. The â€Å"telefeminist† network, in order to maintain customer loyalty, nowadays also orients to such values as love, family, as opposed to female strength, stressed in the early 1990s (Meehan and Byars, 2004, p.102). Intrafamilial harmony also becomes the emphasis in Lifetime’s films, which depict the peaceful coexistence of the couple of professionals, genuinely motivated for their job, but also interested in preserving their marriage and family as a source of support. However, it is possible to exemplify an alternative strategy, which can be categorized as â€Å"broadening of focus†, which consists in the attempt to respond the questions most Americans ask to themselves. For instance, ABC frequently broadcasts reality series (e.g. â€Å"Lost†) to define the degree to which a person might change under the new or stressful conditions; however, such TV-product also implicitly reveals the importance of the American dream and value of a self-made personality, capable of resisting real-life challenges. Works cited Johnson, V. â€Å"CBS, PAX-TV, and â€Å"heartland† values in a neo-network era†. In The Television Studies Reader, edited by Robert C.Allen and Annette Hill. Routlege, 2004, pp. 403-416. Meehan, E. and Byars, J. â€Å"Telefeminism. How Lifetime Got Its Groove, 1984 -1997†. In The Television Studies Reader, edited by Robert C.Allen and Annette Hill. Routlege, 2004, pp. 92-104.

Sunday, October 13, 2019

Comercio Electrónico

Comercio Electrà ³nico Este trabajo hablara sobre el desenvolvimiento del Comercio Electrà ³nico evidencia en los tiempos actuales, que comprende un instrumento cuyo crecimiento es impresionante, sobre los cuales es necesario tomar control que resguarde el desarrollo de la actividad Comercial que allà ­ se efectà ºa. El interà ©s que surja y se establezcan parà ¡metros controladores en beneficio de quienes forman parte de la actividad; es decir, tanto demandantes como comerciantes de bienes y servicios, asà ­ como de los agentes recaudadores de impuestos a la actividad comercial quienes determinan como usuarios las necesidades reales han de tomarse en cuenta para orientar el diseà ±o de la plataforma tecnolà ³gica sobre la cual opera estas actividades destinadas al Comercio, aun cuando los fabricantes de las tecnologà ­as han dado muestras fehacientes del perfeccionamiento en cuanto operatividad; sin embargo, en la actualidad se ha incrementado en el ciberespacio (escenario de la actividad comerc ial), un gran nà ºmero de fraudes que van en detrimento de quienes operan comercialmente a travà ©s de este medio, aà ºn cuando el espacio de la operacià ³n es virtual, los delitos o fraudes que ocurren en à ©l son reales. DESARROLLO En la actualidad la informatizacià ³n se ha implantado en casi todos los paà ­ses. Tanto en la organizacià ³n y administracià ³n de empresas y administraciones pà ºblicas como en la investigacià ³n cientà ­fica, en la produccià ³n industrial o en el estudio, e incluso en el ocio, el uso de la informà ¡tica es en ocasiones indispensable y hasta conveniente. Sin embargo, junto a las incuestionables ventajas que presenta comienzan a surgir algunas facetas negativas, como por ejemplo, lo que ya se conoce como criminalidad informà ¡tica. El espectacular desarrollo de la tecnologà ­a informà ¡tica ha abierto las puertas a nuevas posibilidades de delincuencia antes impensables. La manipulacià ³n fraudulenta de los ordenadores con à ¡nimo de lucro, la destruccià ³n de programas o datos y el acceso y la utilizacià ³n indebida de la informacià ³n que puede afectar la esfera de la privacidad, son algunos de los procedimientos relacionados con el procesamiento electrà ³nico de datos mediante los cuales es posible obtener grandes beneficios econà ³micos o causar importantes daà ±os materiales o morales. Pero no sà ³lo la cuantà ­a de los perjuicios asà ­ ocasionados es a menudo infinitamente superior a la que es usual en la delincuencia tradicional, sino que tambià ©n son mucho mà ¡s elevadas las posibilidades que no lleguen a descubrirse. Se trata de una delincuencia de especialistas capaces muchas veces de borrar toda huella de los hechos. En este sentido, la informà ¡tica puede ser el objeto del ataque o el medio para cometer otros delitos. La informà ¡tica reà ºne unas caracterà ­sticas que la convierten en un medio idà ³neo para la comisià ³n de muy distintas modalidades delictivas, en especial de carà ¡cter patrimonial (estafas, apropiaciones indebidas, etc.). La idoneidad proviene, bà ¡sicamente, de la gran cantidad de datos que se acumulan, con la consiguiente facilidad de acceso a ellos y la relativamente fà ¡cil manipulacià ³n de esos datos. La importancia reciente de los sistemas de datos, por su gran incidencia en la marcha de las empresas, tanto pà ºblicas como privadas, los ha transformado en un objeto cuyo ataque provoca un perjuicio enorme, que va mucho mà ¡s allà ¡ del valor material de los objetos destruidos. A ello se une que estos ataques son relativamente fà ¡ciles de realizar, con resultados altamente satisfactorios y al mismo tiempo procuran a los autores una probabilidad bastante alta de alcanzar los objetivos sin ser descubiertos. El estudio de los distintos mà ©todos de destruccià ³n y/o violacià ³n del hardware y el software es necesario en orden a determinar cuà ¡l serà ¡ la direccià ³n que deberà ¡ seguir la proteccià ³n jurà ­dica de los sistemas informà ¡ticos, ya que sà ³lo conociendo el mecanismo de estos mà ©todos es posible encontrar las similitudes y diferencias que existen entre ellos. De este modo se pueden conocer los problemas que es necesario soslayar para conseguir una proteccià ³n jurà ­dica eficaz sin caer en la casuà ­stica. En consecuencia, la legislacià ³n sobre proteccià ³n de los sistemas informà ¡ticos ha de perseguir acercarse lo mà ¡s posible a los distintos medios de proteccià ³n ya existentes, creando una nueva regulacià ³n sà ³lo en aquellos aspectos en los que, en base a las peculiaridades del objeto de proteccià ³n, sea imprescindible. Si se tiene en cuenta que los sistemas informà ¡ticos, pueden entregar datos e informaciones sobre miles de personas, naturales y jurà ­dicas, en aspectos tan fundamentales para el normal desarrollo y funcionamiento de diversas actividades como bancarias, financieras, tributarias, provisionales y de identificacià ³n de las personas. Y si a ello se agrega que existen Bancos de Datos, empresas o entidades dedicadas a proporcionar, si se desea, cualquier informacià ³n, sea de carà ¡cter personal o sobre materias de las mà ¡s diversas disciplinas a un Estado o particulares; se comprenderà ¡ que està ¡n en juego o podrà ­an llegar a estarlo de modo dramà ¡tico, algunos valores colectivos y los consiguientes bienes jurà ­dicos que el ordenamiento jurà ­dico-institucional debe proteger. No es la amenaza potencial de la computadora sobre el individuo lo que provoca desvelo, sino la utilizacià ³n real por el hombre de los sistemas de informacià ³n con fines de espionaje. No son los grandes sistemas de informacià ³n los que afectan la vida privada sino la manipulacià ³n o el consentimiento de ello, por parte de individuos poco conscientes e irresponsables de los datos que dichos sistemas contienen. La humanidad no esta frente al peligro de la informà ¡tica sino frente a la posibilidad real de que individuos o grupos sin escrà ºpulos, con aspiraciones de obtener el poder que la informacià ³n puede conferirles, la utilicen para satisfacer sus propios intereses, a expensas de las libertades individuales y en detrimento de las personas. Asimismo, la amenaza futura serà ¡ directamente proporcional a los adelantos de las tecnologà ­as informà ¡ticas. La proteccià ³n de los sistemas informà ¡ticos puede abordarse tanto desde una perspectiva penal como de una perspectiva civil o comercial, e incluso de derecho administrativo. Estas distintas medidas de proteccià ³n no tienen porque ser excluyentes unas de otras, sino que, por el contrario, à ©stas deben estar estrechamente vinculadas. Por eso, dadas las caracterà ­sticas de esta problemà ¡tica sà ³lo a travà ©s de una proteccià ³n global, desde los distintos sectores del ordenamiento jurà ­dico, es posible alcanzar una cierta eficacia en la defensa de los ataques a los sistemas informà ¡ticos. Objetivo General: Acceder a un conjunto de nociones, conceptos e informaciones diversas, que permita la exploracià ³n de la realidad del comportamiento de la actividad comercial dentro de la Red, midiendo el efecto que tal actividad ejerce en la sociedad y en forma individual y en especial, cuando son objeto de fraudes en la realizacià ³n de las actividades; a travà ©s de una metodologà ­a seleccionada y asà ­ entender los orà ­genes, causa y consecuencias del fraude electrà ³nico, y los delitos y abusos que ocurren en la Internet. Objetivos: Determinar las condiciones necesarias para el establecimiento de la actividad comercial en red, que permita una actividad segura, sin riesgos desde el punto de vista jurà ­dico. Conocer las variables dependientes e interdependientes que inciden en el proceso de la comercializacià ³n on line, que permita de deteccià ³n y lucha contra los delitos electrà ³nicos. Conocer el impacto que tienen en la sociedad y en el individuo el manejo y la ejecucià ³n de actividades de tipo comercial a travà ©s de la red. Evaluar y entender la tecnologà ­a utilizada en la plataforma operativa, software y hardware como medio de ejecucià ³n, para la comprensià ³n del delito electrà ³nico. CONCLUSION Despues de haber comprender las particularidades reales del problema, su entorno, dimensià ³n, asà ­ como el conocimiento holà ­stico de los demà ¡s elementos evidenciados en el marco teà ³rico concluir con aproximacià ³n a un tema de gran interà ©s y de preocupacià ³n, se puede seà ±alar que dado el carà ¡cter transnacional de los delitos informà ¡tico cometidos esto implica actividades criminales que no se contemplan en las figuras tradicionales como robos, hurtos, falsificaciones, estafa, sabotaje, etc. Sin embargo, debe destacarse que el uso de las tà ©cnicas informà ¡ticas ha creado nuevas posibilidades del uso indebido de computadoras lo que ha propiciado a su vez la necesidad de regulacià ³n por parte del derecho. Universidad Iberoamericana UNIBE Administracià ³n de empresas Jonathan Sanchez Mat. 10-0476 Introduccion a la TIC 2ndo Parcial Jonathan Antonio Sanchez Pena Primera terraza del arroyo num. 37, cuesta Hermosa 2 arroyo hondo. Tel. 809-567-4704, Cel. 809-917-1231 Personal: Fecha de nac: 24 de oct del 1990 Nacionalidad: Dominicana Cedula: 001-1861213-4 Educacion: Colegio San Judas Tadeo Universidad Unibe Administracion de empresas 2do semestre Idiomas: Espanol Ingles Experiencia Laboral: Hotel Jaragua Campamento Comatillo/ monitor Plaza Lama/ vendedor Referencias: Piroska Ordehi: 809.986.4556 Gianfranco Torino: 809-532-6161 INDICE Pag.1.. Introduccion Pag.2-5 . Desarrollo Pag. 6 .. Conclusion Pag.7 .. Internetgrafia INTERNETGRAFIA http://www.myownbusiness.org/espanol/s9/ http://www.seic.gov.do/baseConocimiento/TLCEEUU%20DRCAFTA/Texto%20del%20Tratado%20en%20Espaà ±ol/Capà ­tulo%2014.%20Comercio%20Electrà ³nico/DR-CAFTA%20Capà ­tulo%2014.%20Comercio%20Electrà ³nico.pdf

Saturday, October 12, 2019

Managing A Personal Computer :: essays research papers

Managing A Personal Computer 1.1 The AUTOEXEC.BAT file is one of files which loads every time the computer is booted. It contains command lines and procedures to run programs and load settings for the system’s hardware and software configuration. It also may contain command lines procedures to run programs which may clean your system’s hard drive of temporary files and viruses. An example of this file is shown below: @ECHO OFF PROMPT $P$G SET PATH=C:DOS LH C:SBCDDRVMSCDEX.EXE /S /D:MSCD001 /M:8 /V SET BLASTER=A220 I5 D1 T4 SET SOUND=C:SBPRO C:MOUSEMMOUSE.COM The first line of this batch file, @ECHO OFF, is programming command which hides all the command lines procedures from the user. The second line is also a programming command that configures the CUI command prompt. The parameters after PROMPT tell the CUI what to show. The $P stands for current drive and path and $G stands for the greater than sign (>). Apart from those two parameters, a user can add any characters after PROMPT and it’ll be shown as the command prompt. The next command configures the CUI to search for files in that directory first before looking in its current location. The SET and PATH command procedures, even though different commands, are used in conjunction to configure CUI environment variables and the parameters displayed after that are what the CUI will search in first. The next command is loading DOS’s CD-Rom drive letter allocater (The CD-Rom driver must be loaded first in the CONFIG.SYS). The parameters after the executable file inform the CUI to allocate a particular drive letter for the CD-Rom and also may inform the CUI to allocate extended memory or how to read the CD-Rom in terms of speed and sectors. The LH configures the CUI to load this command procedure in high or extended memory. The next command procedure allocates the Interrupt and Drive Memory allocation for the system’s sound card as well as informing the CUI of the sound card’s input/output range. The next command procedure informs the CUI to look for all the drivers for the sound card in its parameters which will be a directory on the hard disk. The last command loads the driver for the mouse. This command procedure doesn’t need any parameters and is just a single command procedure telling the CUI to load that executable file. 1.2 A Batch File Which Asks For User Input: @echo off cls IF "%1"=="C" GOTO DRIVE IF "%1"=="D" GOTO DRIVE if "%1"=="c" goto drive if "%1"=="d" goto drive

Friday, October 11, 2019

Africans Living With Hiv Health And Social Care Essay

IntroductionIn January 2000 the United Nations Security Council held an historic meeting ; for the first clip the Council declaring that HIV/AIDS, is wellness issues of security menace ( Elbe, 2002 )[ 1 ]. In â€Å" 2006, the US National Security Strategy declared that â€Å" the hazards to societal order are so great that traditional public wellness attacks may be unequal, asking new schemes and responses ‘ ( Collins. 2007, pp: 422 )[ 2 ]. the shifting in the security conceptualisation to including the disease threats as one of grounds which concern the homo, national and international security. In 2009, HIV/AIDS killed 1.8 million people, 1.3 million of whom were populating in sub-Saharan Africa. Major advancement has been made in presenting life-saving intervention for people populating with HIV/AIDS, but 15 million people are in demand of intervention globally, 10.6 million of whom are populating in Africa ( Alexandra E. Kendall, 2011, p:5 )[ 3 ]. The entire figure of Africans populating with HIV or AIDS is now 25.3 million. In 8 African states, at least 15 % of grownups are infected. In these states, AIDS will claim the lives of around a 3rd of today ‘s 15-year-olds in Africa[ 4 ]. South Africa besides has one of the highest Numberss of kids under 15 life with HIV/AIDS in the universe ; estimations range from 180,000 to 280,000[ 5 ]. It is estimated that over 15 million kids worldwide have been orphaned by AIDS, with 13 million of these populating in sub-Saharan Africa. In the worst-affected states, such as Zambia and Botswana, it is estimated that 20 % of kids under 17 are orphans. ( Sophie Lister, 2010 )[ 6 ]. This essay examine the drive factors and the impact of the HIVAIDS on international surveies or security surveies to be exact. I would wish to denote in my study to Africa as instance survey to analyze how this deadly disease affected the life aspects in this part. In the first portion, I will discourse how the spread of HIV/AIDS in Africa, where I will touch the major causes of infection and transmittal, and besides I will mention to the driving factors of and aid to the growing and spread of HIV / AIDS in Africa, and in the 2nd portion I will mention to the Threats and Effects of AIDS on Africa continent, Where I will reexamine the impact of AIDS on National Armed Forces, Political Stability Of State, consequence HIV/AIDS on Administrative corruptness And besides I will discourse the function of AIDS in impairment of African IdentitiesWhy Spread of HIV / AIDS in Africa Continent? And How?Between 1999 and 2000 more people died of AIDS in Africa than in all the wars on the continent, as mentioned by the UN Secretary General, Kofi Annan[ 7 ]. The decease toll is expected to hold a terrible impact on many economic systems in the part. In some states, it is already being felt. Life anticipations in some states is already diminishing quickly, while mortality rates are increasing. â€Å" Second millenary began with 24 million Africans infected with the virus. Each twenty-four hours, 6,000 Africans die from AIDS. Each twenty-four hours, an extra 11,000 are infected † ( Lester R. Brown, HIV Epidemic Restructuring Africa ‘s Population )[ 8 ].The Main Causes who lead to familial HIV/AIDSThere are merely three important paths of transmittal for HIV: From infected sexual fluids From infected blood From infected female parent to pamper during gestation and bringing ( if a pregnant adult female is HIV-positive, the babe has a 1 in 3 opportunity of being infected )[ 9 ]. Unprotected sexual intercourse ( either vaginal or anal ) with person who has HIV. Sexual contact. This is by far the most common manner that HIV spreads. HIV is present in the seeds of an septic adult male and in the vaginal fluids of an septic adult female. When two people have sex and exchange organic structure fluids, HIV may distribute from one spouse to the other. Anal sex is riskier than vaginal sex because the anal tissue is more prone to rupturing during sex than the vaginal tissue. HIV is besides transmitted through unwritten sex, though it is much less common. However, if you contract HIV through unwritten sex, transmittal is 100 % for you[ 10 ]. Sharing acerate leafs or panpipes with person who is HIV septic. Lab surveies show that infective HIV can last in used panpipes for a month or more. That ‘s why people who inject drugs should ne'er recycle or portion panpipes, H2O, or drug readying equipment. This includes acerate leafs or panpipes used to shoot illegal drugs such as diacetylmorphine, every bit good as steroids. Other types of acerate leafs, such as those used for organic structure piercing and tattoos, can besides transport HIV[ 11 ]. There are an estimated 250,000 new infections per twelvemonth as a consequence of the reuse of acerate leafs and panpipes[ 12 ], and in Africa 250 to 500 people are freshly infected with HIV each twenty-four hours as a consequence of insecure blood transfusions[ 13 ].Testing of blood is indispensable but remains absent in many low and middle-income states[ 14 ]. Infection during gestation, childbearing, or breast-feeding ( mother-to-infant transmittal ) . Any adult female who is pregnant or sing going pregnant and thinks she may hold been exposed to HIV-even if the exposure occurred old ages ago-should seek testing and guidance. Those who test positive can acquire drugs to forestall HIV from being passed on to a foetus or baby, and they are counseled non to breast-feed[ 15 ].Driving Factors for Spread HIV/AIDS in Africa:Impact Of Poverty On AIDS In AfricaAlthough there are legion factors that lead to the distributing HIV/AIDS in Africa continent, it is mostly recognized as a disease of poorness, hitting hardest where people are marginalized and enduring economic adversity. The intensifying poorness across the continent has created fertile land for the spread of the HIV/AIDS and infective diseases. Worsening living conditions and decreased entree to basic wellness services have led to distribute of AIDS/HIV[ 16 ]. Lack of money is an obvious challenge, it can drive many immature adult females and misss into forms of sex work in order to guarantee their support or that of their household, or else to obtain safe transition, nutrient, shelter or other resources. Emergencies can besides take to new forms of sex work, for case, in Mozambique the inflow of human-centered workers and transporters, such as truck drivers, can do sex workers to travel to the country. In northern Kenya, for case, drouth has led to a lessening in clients for sex workers, and the consequence is that sex workers are less able to defy their clients ‘ refusal to have on rubbers[ 17 ].Human Demographics and BehaviorPopulation growing, peculiarly in the Africa, will go on to ease the transportation of AIDS pandemic among people and parts. Frequent and frequently sudden population motions within and across boundary lines caused by cultural struggle, civil war, and dearth have been blamed for the spread diseases quickly in affected countries, peculiarly among the refugees. Refugee cantonments, found chiefly in Sub-Saharan Africa, have been identified to distribute of catching disease, such as HIV/AIDS. Well over 120 million people lived outside the state of their birth in 1998, and 1000000s more will emigrate yearly, increasing the spread of diseases globally. Behavioral forms, such as unprotected sex with multiple spouses and endovenous drug usage, will stay cardinal factors in the spread of HIV/AIDS[ 18 ].Medical IntuitionAs a consequence of several high profile incidents affecting Western medical practicians[ 19 ]every bit good as historically hapless intervention by outside powers, there are high degrees of medical intuition throughout Africa. This misgiving for modern medical specialty is frequently linked to theories of a â€Å" Western Plot †[ 20 ]of mass sterilisation or population decrease. There is grounds that such rumours may hold a important impact on the usage of medical services[ 21 ].Menaces and Effectss of AIDS:AIDS Has Negatively Affected On National Armed ForcesIn footings of the military deductions lifting from pandemic of HIV/AIDS, a convincing statement was proposed that the epidemic has negatively affected national armed forces[ 22 ]. ( Elbe,2002 ) notes that HIV rates among African armed forcess are consistently higher than the rates of the populations of the continent at big. He argues that soldiers are normally recruited from a pool of sexually active age ; their likeliness to undergo unprotected sexual dealingss as a manner to cut down their anxiousness is high. Furthermore, as soldiers trained for combat, they are more likely to ‘valorize violent and hazardous behavior ‘ in a military environment that is known to pull sex workers[ 23 ]. These facets are thought to be playing a major function in exposing the armed forces to sexually familial viruses such as HIV. It is relevant to foreground the links between AIDS in the military and the hazards for security. It is noted that AIDS is the primary cause of decease in the armed forces[ 24 ]. The epidemic can arouse, in already deteriorated ground forcess, ‘a unsafe weakening of military capablenesss ‘ by doing the loss, of non merely regular soldiers but more significantly, the decease of specialised forces and officers, â€Å" Estimates of HIV infection rates among regional ground forcess are every bit high as 50 % in Congo and Angola, 66 % in Uganda, 75 % in Malawi, and 80 % in Zimbabwe. It is the figure one cause of deceases in many ground forcess, including those like Congo ‘s which have been at war often over the last decennary 20th, It permeates the South African military to the extent that soldiers ( every bit good as constabulary ) are prohibited from giving blood † . Additionally, it was found that a lessening in preparedness and morale could hold a negative impact on the ground forces abilities to execute their responsibilities, h ence undermining deployment effectivity. From a realist ( province ) position, it is possible to reason that this ‘hollowing out ‘ and diminution in efficiency of African armed forcess may be perceived by an enemy as an chance for onslaught, hence doing HIV/AIDS a significant menace to national security.HIV/AIDS Threatens Political Stability Of StateA big portion of the literature on HIV/AIDS is dedicated to the harmful deductions of the epidemic on national armed forcess and its deterioration effects on war, while sometimes excluding the extent to which African administration has been affected. It has been argued that HIV/AIDS may set greater strains on already weakened cardinal province establishments, and its erosion effects are said to lend to possible province failure. The epidemic can sabotage African administration by doing the decease of big Numberss of forces indispensable to running efficient regulating establishments. De Waal underscores that authorities retai ner with strong political experience and professional accomplishments are cardinal to good working province organic structures. However HIV/AIDS has doing major losingss among staff possessing those properties. Furthermore, this loss in human resources would damage the lesson of the staying workers further underselling the efficiency of those national organic structures[ 25 ]. This has been replicated in several sectors, but the important point is that the virus in Africa â€Å" has tended to claim the lives of the most productive members of society, who are non easy replaced † such as instructors, wellness workers and civil retainers[ 26 ]. Second, political discontent refering the handling of the issue by authoritiess may besides originate, endangering the political stableness of the province. As cardinal establishments weaken, the assurance in authorities can diminish, and as McInnes suggests dissatisfaction may emerge from the dependence on foreign assistance[ 27 ]. This state of affairs may supply chances for ‘coups, rebellions and other political and cultural battles to procure control over resources ‘ leting warlords to make full the power vacuity and take control over certain countries[ 28 ]. This demonstrates that HIV/AIDS can lend to province failure in Africa and therefore can be considered as a major menace.HIV/AIDS Stimulates Administrative corruptness among authorities employeesIt was highlighted that corruptness has risen amongst authorities functionaries or civil retainers who are unable to afford HIV interventions for themselves or household members through lawful agencies[ 29 ]. De Waal is of sentiment that HIV/AIDS has negatively impacted population abilities to take part in the political life. He suggests that HIV/AIDS has damaged civil society due to the loss of members in administrations advancing a healthy civil society. Furthermore, because household precedences lie in caring for the sick, it is apprehensible that the population ‘readiness ‘ to take portion in elections has diminished. This combined with the de-institutionalisation of authoritiess through the loss of experient forces can in turn lead to the farther centralization of power in the manus of little opinion elite, which already characterized many African authoritiess ; hence sabotaging the development of democratic procedures at national degree[ 30 ].HIV/AIDS and The Deterioration of African IdentitiesHIV/AIDS can besides be involved in the impairment of individualities among the population of Africa, which can later present menace to African societies. As people infected by the virus are stigmatized, they become more vulnerable[ 31 ]. A more direct mechanism by which the new demographics of AIDS can rise security hazards is through its creative activity of a new pool of orphans, amplifying the kid soldier job. By 2010, over 40 million kids will lose one or both of their parents to AIDS, including 1/3 of all kids in the h ardest hit states. These include 2.7 million in Nigeria, 2.5 million in Ethiopia, and 1.8 million in South Africa. Because, they are HIV positive, their households and communities may reject them, hence losing a sense of belonging. This state of affairs creates chances for warlords to enroll those victims on the land of cultural bitterness for case, therefore fuelling cultural force. A peculiarly vulnerable population group are kids because as celebrated by Singer, ‘this mass of staccato and ill-affected kids is peculiarly at hazard to being exploited as kid soldiers ‘[ 32 ].Decision:To reason, it is indispensable to emphasize that HIV/AIDS can be considered as a major menace to African security for several grounds. It has been found that AIDS has had a weakening consequence upon African ground forcess by doing considerable losingss within the ranks particularly amongst persons with long military experience and cut downing soldiers readiness to deploy efficaciously. In Africa, it is established that the disease is progressively deteriorating the political stableness and constitution o f democracy in many states of the continent by gnawing their institutional base, in bend increasing corruptness and offering chances for rebellions as despair grows within the population. Therefore, the epidemic creates the conditions of instability within provinces favorable for armed groups to transport out onslaughts against the constitution and other enemy cultural groups. The likeliness of this scenario is reinforced by the loss of individuality that groups of population suffer. Those who have lost fond regard will turn to violence for endurance, which strengthens cultural groups and their inclination to prosecute in cultural force.Bibliography & A ; DiariesElbe, S. ( 2002 ) HIV/AIDS and the Changing Landscape of War in Africa.A International Security, A Vol. 27, No. 2. Collins, A ( erectile dysfunction. ) 2007, Contemporary Security Studies, 2nd Edition. Oxford University Press, New York ; Oxford. Alexandra E. Kendall, February 22, 2011, U.S. Response to the Global Threat of HIV/AIDS: Basic Facts. AT THE AFRICAN SUMMIT ON HIV/AIDS, TUBERCULOSIS AND OTHER RELATED INFECTIOUS DISEASES ABUJA, NIGERIA aˆ? 24-27 APRIL 2001. Republic of South Africa, Department of Health, The National HIV and Syphilis Prevalence Survey of South Africa 2007 ; 2008. Sophie Lister, 2010, The Back Story: AIDS Orphans Leader ‘s Guide. Lester R. Brown, 2000. HIV Epidemic Restructuring Africa ‘s Population, World Watch Issue Alert, 31 October 2000 hypertext transfer protocol: //www.globalissues.org/article/90/aids-in-africa HIV Infection and Acquired Immunodeficiency Syndrome ( AIDS ) hypertext transfer protocol: //www.stdservices.on.net/std/hiv-aids/details.htm entree day of the month = 26/11/2011. Gloria Edini, Introduction to HIV and AIDS: What You Need to Know. hypertext transfer protocol: //gloria.taboca.com/artigos/text2.html entree day of the month = 27/11/2012. Basic Facts About HIV/AIDS. hypertext transfer protocol: //www.amfar.org/abouthiv/article.aspx? id=3352 # How_is_HIV_transmitted? entree day of the month = 26/11/2011. UNICEF ‘Immunization: Injection safety ‘ . WHO ( 2006, 27th June ) ‘Making Safe Blood Available in Africa ‘ . All Africa ( 2009, 30th December ) ‘Africa: HIV Transmission Via Transfusions in Continent Remains High ‘ . Basic Facts About HIV/AIDS, Op. Ann-Louise Colgan, Hazardous to Health: The World Bank and IMF in Africa, Africa Action, April 18, 2002. Samuels, Fiona ( 2009 ) HIV and exigencies: one size does non suit all, London: Overseas Development Institute. DR.A GORDON NATIONALA INTELLIGENCEA COUNCIL Washington, DC 20505, ( article ) .- hypertext transfer protocol: //www.nytimes.com/2007/07/31/opinion/31washington.html date=2007-07-31 entree date=2011/11/26. UNICEF â€Å" Battling anti-vaccination rumours: Lessons learned from instance surveies in Africa † .http: //www.path.org/vaccineresources/files/Combatting_Antivac_Rumors_UNICEF.pdf entree date=2011/11/26. Savelsberg PF, Ndonko FT, Schmidt-Ehry B. Sterilizing vaccinums or the political relations of the uterus: Retrospective survey of a rumour in the Cameroon. Medical Anthropology Quarterly. 2000 ; 14:159-179. Clements CJ, Greenough P, Shull D. How vaccine safety can go political – the illustration of infantile paralysis in Nigeria. Current Drug Safety. 2006 ; 1:117-119. Alex De Waal, â€Å" ‘New-Variant ‘ Dearth: How Aids Has Changed the Hunger Equation † , November 20, 2002, available at. De Waal, A. ( 2003 ) How will HIV/AIDS transform African Governance? .A African Affairs, A 102, pp.1-23. McInnes, C. ( 2006 ) HIV/AIDS and security.A International Affairs, A Vol. 82, No. 2, pp. 315-326. Ostergard, R. L. Jr. ( 2002 ) Politics in the hot zone: AIDS and national security in Africa.A Third World Quaterly, Vol. 23, No. 2, pp. 333-350. Peterson, S. ( 2002/3 ) Epidemic Disease and National Security.A Security Studies, A Vol. 12, No. 2, pp. 43-81.

Thursday, October 10, 2019

Cypop 7 Essay

CYPOP 7 – Promote creativity and creative learning in young children 1.1 – Analyse the differences between creative learning and creativity Creative learning is about how children are actively involved in their own learning and their ability to make choices and decisions. This can be achieved by providing a creative environment, allowing exploration through play and praising the child’s creative efforts. Creative learning is about helping children develop imaginative thinking through exploration of materials, objects and problem solving skills like ICT. It is also about giving children opportunities to make connections between different areas and to relate to them. Some creative learning activities may be goal orientated like the goal is to make any painting they like, but the child will also be exploring the different colours given to them; to paint like colours can be mixed to make another colour. This activity will also help the child in other areas of learning too. Creative learning is about children using their mind to solve problems. Creativity is about risk taking and making connections, allowing children to explore and express themselves through a variety of media and materials. Like through dance, music, making things and drawing. A child being creative is linked to play and can develop through a child being engaged in their own actions and ideas. Creativity consists of traditional arts and the development of imagination and imaginative play, like role play and small world play. Creativity is about exploring emotions and expressions; also is about enjoying creativity and learning from the process. Creativity links to creative development areas of the learning from the EYFS. 1.2 – Explain current theoretical approaches to creativity and creative learning in early childhood There are many theoretical approaches to creativity and creative learning these are nature verses nurture this could mean that people are born with it or they learn it from life or other people. Some people believe that children will learn from watching other people this is called role modelling. Many may believe that creativity is a progress, this means that creativity will follow a pattern to make it happen, this will also help to build upon skills that will occur. Nature versus nurture is a debate in the area of psychology. In terms of children’s  creativity, some think children are born naturally creative, for example having a gift for music or having a creative personality. This is known as the â€Å"nature† theory. Others believe creativity is something that can be taught. This is known as the â€Å"nurture† theory. The cultural approach means that every child will be creative so many things will affect this. As practitioners you have to give the child the right environment that will help children to explore and be creative with how they want to be. Cognitive theories is when children make relations between different things, this theory look at how the brain puts things together, lots of opportunities need to be provided for the child to develop knowledge in lots of different areas, and so that they can draw on their own views and experiences. Some theorists such as Robert Sternberg and Howard Gardener argue that being able to make new connections and to create a drawing from them is a type of intelligence. The ‘Creative Partnerships’ programme was set up in 2002 by the government in response to the influential report ‘all our futures’. They use the term ‘creative learning’ to try and sum up their education programme. They believe creative partnerships can help free the creativity of everyone involved by engaging them in fresh approaches to learning through partnership. They feel collaborative working has these key characteristics; †¢ Motivation for learning †¢ Bringing the curriculum to life †¢ Greater involvement in decision making †¢ New ways for learners to engage in a subject The Qualifications Curriculum Assessment (QCA: Creativity, Find It and Promote It 2005), promotes creativity as an vital part of all national curriculum subjects and identifies characteristics of creative learning as; †¢ Questioning and challenging conventions and assumptions †¢ Making imaginative connections and associating things that aren’t usually related †¢ Visualizing what might be: imagining seeing things in mind’s eye †¢ Trying alternative and fresh approaches, keeping options open †¢ Reflecting critically on ideas, action and outcomes These characteristics and abilities have shown to lead to a sense of purpose, achievement of strengths, talents and interests, self-respect and a sense of belonging. 1.3 – Critically analyse how creativity and creative learning can support young children’s emotional, social, intellectual, communication and physical development Creativity and creative learning can support children’s development in a number of ways. Emotionally they learn how to manage frustration if something is not going to plan and they feel happy and proud and a sense of achievement when something is completed by them. Socially children can build up self-confidence by working with others or alongside them; to make something to share with everyone and the child also makes new friends. Intellectually children learn about problem solving, numeracy and developing their reading and writing skills. Children’s capability to communicate with peers and adults develops through creative play as well as their overall speech and listening skills. Physically, creativity can help develop fine motor skills by children using materials such as crayons, paints and sticking. Participating in movement activities such as dance or drama (role play) also improves the child’s overall physical development. Like during a cooking activity children are learning many skills through this creative process, they may feel happy and excited about making their own food. They are sociable by working with adults to support them and cooking for their friends or family members. By following instructions either written or verbal and measuring quantities they are developing intellectually. Knowing when to ask for help and starting a conversation around what they are doing and using can help develop their communication skills especially listening and taking direction. Finally all the mixing, chopping, kneading and picking up small cut up pieces, help the child develop physically developing the fine motor skills, hand eye co-ordination and building hand and arm muscles. The EYFS ensures that creativity and critical thinking are developed through play- based learning across the curriculum, and that children learn in an environment encouraging exploration and active and playful learning. It reflects the viewpoint that play offers significant benefits for children’s cognitive, emotional, social and physical development and is central to creativity.