Wednesday, October 30, 2019
Social Work Practice with Children in Schools and Therapeutic Settings Essay
Social Work Practice with Children in Schools and Therapeutic Settings - Essay Example The essay outlines the effective use of various play therapies. It is also significant that Ramon Rivera develops mastery over his own traumatic experiences and the therapist can employ effective play therapies with him. The therapist can benefit from the good insights gained from Adlerian play therapy and as Morrison observes the posttraumatic play therapy can offer the child a unique opportunity for Rivera ââ¬Å"to express fully and gain mastery over his experienceâ⬠and ââ¬Å"to gain insight and understanding to establish social interest and a sense of belongingâ⬠. There is no doubt that the childhood trauma has adversely affected the childââ¬â¢s emotional, physical, cognitive and social faculties and has contributed to his social and emotional difficulties in such a way that he fails to cope up with his studies, peers and the social world around him. One has to bear in mind the fact that Rivera will not be able to express himself or share his feelings completely t o the therapist through normal conversations or dialogues just as an adult is able to do. Therefore, it is imperative that the therapist elicits responses regarding the boyââ¬â¢s experiences, inner feelings, emotions and frustrations through play therapy. The therapist needs to derive significant play themes through the four phases of counseling that include ââ¬Ëbuilding an egalitarian relationshipââ¬â¢ with the client, ââ¬Ëexploring the client's lifestyleââ¬â¢, ââ¬Ëhelping the client gain insight into his or her lifestyleââ¬â¢ and ââ¬Ëreorientationââ¬â¢ whereby the therapist offers other positive alternatives to the client to solve the problem behavior.
Monday, October 28, 2019
Working Cass Families and Modern Education Systems Redefined under Neo-Liberalism Policies Essay Example for Free
Working Cass Families and Modern Education Systems Redefined under Neo-Liberalism Policies Essay Connellââ¬â¢s (2003) article focuses on the problematic relationship between working-class families, and modern education systems, which is being redefined under neo-liberalism policies. Connell explores this issue in relation to an Australian reform, which was created with an intention to make upper secondary education more inclusive, in particular à ¬Ã¢â¬â through more extensive vocational education opportunities. Connell explains that the level of which working-class youthââ¬â¢s needs have been met, or neglected throughout the past 150 years of mass schooling in advanced capitalist economies remains a core problem of social justice in education. (p. 235) Connellââ¬â¢s argument is that while social class is no longer officially recognised as an issue in Australian life, class inequality and exclusion have a marked influence on education in the present day. (p. 247) Connell states that the nature of which working class families respond to state schooling is a key issue of importance in research on class and education. Connellââ¬â¢s central argument lies in her criticism of the neo-liberal market agenda, which she states is ultimately seeking to ââ¬Ëreconstruct mass education on a ruling-class education organisational modelââ¬â¢. Connell argues that due to the fact neo-liberalism fails to acknowledge that class structure exists, and assumes its market model is universally applicable (an assumption which Connell states is disproven by British research) ââ¬âproblems associated with class structure will continue to go unacknowledged. (p. 37) Connell further argues that many working class families continue to grapple with the ââ¬Ëbureaucratic machineryââ¬â¢ of state education in order to obtain a reasonable education for their children, however as Connell believes ââ¬â ââ¬Ëthereââ¬â¢s still a long way to goââ¬â¢ before this relationship is cohesive and productive for all parties involved. (p. 247) In support of her argument of class still being a key factor of inequality in education, Connell cites authors such as Bettie (2002), Dent and Hatton (1996), Thompson (2002), Lynch Lodge (2002) Teese and Polesel (2003) (p. 235). Connell cites Marginson (1997) to argue that the motives of neo-liberalismââ¬â¢s market agenda in the 1980ââ¬â¢s was to ââ¬Ëpush to privatise educationââ¬â¢, and where public education institutions remained ââ¬ârestructure them to become market competitive. (p. 236) Using largely a methodical approach, Connell draws on close-focus research carried out across four socially and geographically diverse government secondary schools, obtained from the Vocational Education and Equity in Senior Secondary Schooling project, and undertaken by staff of the University of Sydneyââ¬â¢s Faculty of Education, the Department of Education and Training and the NSW Board of Studies. Through a series of qualitative interviews with students, parents and teachers of Years 11 and 12 VET classes over a period of two years, Connell explores the relationship between working-class families and schools today, which operate under this neo-liberalist influence, but which are also attempting to implement social justice reforms, particularly in regards to expanding vocational education options. (p. 238) Connellââ¬â¢s central argument is plausible and relatable in the sense of the extensive field data carried out across schools depicting various class structures. The article being ââ¬Ëpeer reviewedââ¬â¢ also adds more weight to her claims. The central theme of her argument is logically developed throughout the body of the paper, and further solidified in the conclusion, however at times she touches on international research, (for example; the British research she suggests disproves the neo-liberalist market model is ââ¬Ëfar fromââ¬â¢ being universally applicable) (p. 237) without any further details as to why. Adding further detail of the international data Connell cited would have helped to solidify her key points.
Saturday, October 26, 2019
Perils Of Hope - Analysis :: essays research papers
Analysis of "Peril of Hope" 	 	The poem "Peril of Hope," by Robert Frost is about having hope. The poem speaks about no matter how things are one minute they can always change. Hope, however, is constantly there and will always be there to help get through the tough times until things get better. 	Imagery is used throughout this poem to help describe the extent of the boundaries of hope. Hope has endless boundaries in this poem it goes from one extreme to the next. In the first stanza (lines1-4), the poet describes a late fall scene just before winter when all the leaves have already fallen off of the trees. But in the same stanza, he also depicts a beautiful spring day just after all the leaves have come out before all the blossoms appear on the orchard trees. Frost does this to show the extremes in which hope can be found. The second and third stanzas reiterate the same thing as the first four lines but in a more vivid way using color images and images off a frosty morning that brings a chill to the readers spine. 	"Peril of Hope," has a definite from. It is set up in a quatrain form with three stanzas. The poem has a rhyme scheme ABAB, with the last word of every other line rhyming, such as, lines one and three , there and bare, and also lines two and four, between and green. Lines one, two, and four in every stanza all have five syllables, and line three only has four. The poems lines have a stressed syllable followed by a unstressed syllable. 	The name of the poem has little significance to the meaning of the poem. There is nothing connecting the poem to the title, except the common theme of hope. The title implies that in having hope a person could put themselves in some type of danger of expecting too much. But, the poem just talks about where and when a person may find hope, which could be anytime and anywhere.
Thursday, October 24, 2019
The Hound of the Baskervilles Plot Summary :: essays research papers
The story begins on Baker Street where Sherlock Holmes and Watson are trying to figure out who left a walking stick at Holmes's residence and as they figure out whose it is, its owner arrives. The cane belongs to Dr. Mortimier, who has rumours of a new mystery for famous Sherlock to solve. The mystery involves what seems to be a supernatural hound that is the cause of the deaths of a line of related Baskerville men. The stories began a few generations before Sherlock Holmes?s era. Hugo Baskerville was killed while riding out upon the moor. Witnesses had stated that he was mauled to death by a huge, supposedly supernatural hound. The mystery of Hugo?s death was always thought upon, but the mystery was never solved, and soon only the stories and superstition had remained. That is until recently a descendant of Hugo Baskerville, Sir. Charles was found dead on the moor right out side his house(the Baskerville Hall), scared to death. Superstitious Mortimier is giving this information t o Sherlock Holmes because he fears for his good friend?s (Sir Henry) life. Sir. Henry is, at the beginning unbelieving of the Baskerville curse, but Mortimier has high hopes that Sherlock will be able to solve the mystery and take Sir. Henry Baskerville?s life out of danger. As the story continues, Holmes sends Watson to live in Baskerville Hall with Sir. Henry to gather information on the recent murder and to provide protection for him. While in Devonshire, Watson goes around meeting Sir. Henry?s neighbours, trying to discover anything seemingly unusual. Of the many characters he came across the most memorable couple were Mr. & Miss Stapleton who declared themselves as naturalists. He finds out that they had recently moved to the moor (two years previous) and they are brother and sister. It is at about this point in the novel that a mini mystery presents itself. Watson sees that the butler currently employed at Baskerville Hall is acting strangely, but taking late night trips to a window facing the moor. After a few nights of wondering, Watson spies upon the butler, and reveals himself. After questioning the butler, Watson finds out that he (the butler) is really doing a favour for his wife. There had recently been talk from the residents of Devonshire about an escaped convict. It turns out that the escaped criminal is his (the butler?
Wednesday, October 23, 2019
Informative Speech Caffeine Essay
Caffeine Specific Purpose: To inform my audience about the history of caffeine, how the body processes caffeine, and possible side effects of excessive caffeine consumption. Central Idea: Caffeine has been around for centuries and has been used for it energizing effects on the body . Introduction I. Itââ¬â¢s the night before your chemistry exam and you decide to learn three weeks worth of material in one night. II. When 1:30 comes around and you can feel your eyes starting to get heavy, what do you grab to give you that extra energy to keep going? Is it coffee? Is it a Red Bull? III. Why do these types of drinks help us keep our eyes open long enough to get through that last chapter on combustion reactions? IV. The answer is caffeine. V. As college students, most of us consume caffeine every single day, so today I am going to share with you the history of caffeine, how the body processes caffeine, and possible side effects from excessive caffeine consumption. (Transition: Before I get into the many affects of caffeine on the body, lets go back in time to see where caffeine came from.) Body I. The appreciation of caffeinated beverages dates back tens of thousands of years. a. What is caffeine anyway? i. Caffeine is a naturally occurring substance that forms as an end product of nitrogen metabolism in plants. ii. It is found in more than 60 different plants species around the world, including coffee beans, tea leaves, and coco beans. b. The wild coffee bean plant originated in Ethiopia and according to Reginald Smith, author of the book A History of Coffee, cultivation of caffeine containing food and beverages from the coffee bean may have begun as early as AD575.â⬠c. Centuries passed before coffee would reach Europe by the 17th century, but then spread uncontrollably to all parts of the world, including America. d. Coffee was brought to America in the mid 1600s. i. At this time, most Americans still preferred to drink tea, another caffeinated beverage, even though coffee houses were being built all over the country. ii. Coffee did not become Americaââ¬â¢s favorite beverage until the Boston Tea Party, when Americans revolted against Britainââ¬â¢s heavy tax on tea. (Transition: Now that you know where coffee came from, lets look at how the body processes it.) II. How does that morning cup of coffee wake you up and give you that added energy to get the day started? a. Well, caffeine is known to boost the effects of neurotransmitters, such as dopamine, and serotonin. i. For example, dopamine is a neurotransmitter known to affect concentration. ii. Dopamine is also responsible for signaling your brain when it is time to go to bed, but when caffeine is introduced to the body, this signal is blocked. b. Caffeine also causes your body to release more adrenaline, which causes faster heart beat, more blood being pumped to muscles and organs in y our body, and adrenaline tells your liver to release sugar into the blood stream. c. When caffeine is in the blood stream, it encourages the release of more calcium ions, which in turn causes muscle to contract faster. d. The professor of nutrition at Tufts University, Susan Roberts, says that, ââ¬Å"Research studies broadly document favorable changes such as increases in metabolic rate, increased fat oxidation, and a perception of increased physical and mental energy.â⬠i. With all of these energy-boosting effects, itââ¬â¢s easy to see why we love caffeine so much. ii. Even though caffeine can make us feel invincible, consuming too much can have negative effects on our health. (Transition: Lets take a look at how much caffeine we should be consuming and what could happen if we consume too much.) III. Many people donââ¬â¢t know, but there are negative side effects of the overuse of caffeine. a. According to the article ââ¬Å"Selected Health and Behavioral Effects Related to the Use of Caffeineâ⬠published in the Journal of Community Health, ââ¬Å"Over 80% of adults consume caffeine daily in the form of coffee, tea, or soft drinks.â⬠i. Since we consume caffeine daily, the amount we consume is important. ii. J.J Barone, author of ââ¬Å"Caffeine Consumptionâ⬠, which was published in the book Food and Chemical Toxicology, states that people should only consume 5 oz. of ground roast coffee, 5 oz. of tea, and 6 oz. of cola only a daily basis. iii. For a lot of people, this is not enough caffeine to feel the energizingà side effects, which leads to overconsumption. b. The many side effects of the overconsumption of caffeine include insomnia, nervousness, restlessness, irritability, dizziness, nausea, fast heartbeat, and muscle tremors. i. Caffeine interferes with your bodyââ¬â¢s internal signal that it is time for bed. So, caffeine causes sleep loss and decrease in quality of sleep, which in turn contributes most of the negative side effects. ii. These negative side effects can easily be stopped when the person returns to a normal routine. Conclusion I. Today we have learned where caffeine originated, how it affects the body, and side effects of overconsumption of caffeine. II. Next time you grab a cup of coffee, weather it be to wake up in the morning or so you can pull an all-nighter, thank the Ethiopians, I know I will. III. Thank you for listening.
Tuesday, October 22, 2019
Creating an Analysis Essay on Archeological Record
Creating an Analysis Essay on Archeological Record In our previous guide, we discussed 20 topics for an analysis essay on archaeological record along with a sample essay plus 10 facts on for an analysis essay on the archeological record and genre to provide you with insights into what topics you can write on and how an analysis essay should be written. In this final guide, creating an analysis essay on archaeological record, we discuss the format, methods and tactics which will help you compose a brilliant paper thatââ¬â¢s admired by your professors. But before getting into the whatnots of how an analysis essay should be written, you should know that an analytical essay is not a summary. In theory it may be, but in practice, not so much so. In fact, an analysis essay is written in a way that tells a story about a specific subject and not just providing a summary of it. In simple words, you are answering the ââ¬Å"howâ⬠of something. For example: how using certain metaphors adds value to poetry, or how certain themes present themselves in a certain story etc. Now letââ¬â¢s get into the nitty-gritty of how an analytical essay is outlined: The Basic Way to Write an Analytical Essay There are a number of handful ways to write an analytical essay. They all aim at doing the same thing, hence the basics remain the same, which are as follows: Introduction Body Conclusion Now letââ¬â¢s discuss all the basics listed above: The Introduction The best way to introduce your analysis to the reader is to ignite interest in reading further. You can do this by doing three things: Get them hooked from the start. Introduce your thesis statement. One or two sentences on how you will prove your thesis statement. How do you get a reader into reading further? Itââ¬â¢s really simple: All you have to do is write something interesting and surprising like a rhetorical statement or question, mention a few statistics that are relevant, or maybeà make a controversial statement. Once you have got your reader interested in reading further, you will want to smack an impressive thesis statement right in their faces. To do this, be clear and concise and get to the point straight away. Afterwards, you want the reader to know how youââ¬â¢re going to provide evidence and prove your thesis statement ââ¬â¢ be clear and briefly describe what the reader is in for. The Body This is the part where you can play with formatting and show the reader how creative and ingenious you are. However, keep yourself focused on what really matters. Here is what should be included in your body: Include a Strong Topic Sentence To make your writing stand out, interesting and easy to scan, you should include a ââ¬Å"title sentenceâ⬠right before a paragraph. It should talk about exactly what the paragraph contains which makes it easier for the reader to know whatââ¬â¢s coming next. Introduce Your Claim Now itââ¬â¢s time to get your claim in front of the reader. You should break down your primary claim into several pieces, giving evidences for each part to make it more convincing rather than having the reader read the entire paragraph just to buy into your claim. Speaking of evidence; The Evidence You should always know that evidence is what gives weight to your claim. Remember to always include as much relevant information as you can to support your claim. Ensure that whenever you include any evidence, it ties with the title sentence, otherwise it would look more like a summary than an analysis. Finally, use effective transitions to keep your writing flowing seamlessly. Conclusion Once youââ¬â¢ve proven your point by backing it up with evidence and tying that evidence with your standout title sentence and youââ¬â¢re certain that the reader is convinced, itââ¬â¢s time to conclude your essay. Whatââ¬â¢s the best way to go about it? Briefly restate what youââ¬â¢ve written above and in different words than what youââ¬â¢ve written in the body. You can add a real-world example that correlates with your argument or add a quote, or paraphrased text on what youââ¬â¢ve just talked about. Final Words Thatââ¬â¢s it! All you need to do now is re-read your essay from a readerââ¬â¢s perspective and eliminate anything that seems out of place. Make sure your paper is free of errors and mistakes so that it looks like the work of a professional. There is no shame in borrowing a little online expertise and guidance. Donââ¬â¢t hesitate to use these guides as a reference in case you need to better polish off your essay. Cheers!
Monday, October 21, 2019
A Well Balanced Personality is Best for a Politician essays
A Well Balanced Personality is Best for a Politician essays Who can we trust with the welfare of Pennsylvania? I am not sure if it is possible to answer this question. I do not think that humans have a good sense for making these decisions. It seems to me that we allow outside emotions get to us instead of voting based on the issues at hand. Although this is inevitable, we need to have standards. In the upcoming gubernatorial election we need to decide what it takes to prove they are deserving of the title Governor. To help discuss this point I will be considering the two men up for the Democratic slot, Bob Casey Jr. and Ed Rendell. How much charisma, personality, and excitement should each candidate exude to the public? Well, many would say that Ed Rendell has a way to charm a crowd. On the same token does this prove he would be a better Governor than Bob Casey Jr. would? It is imperative to have a good balance of the three above characteristics and right now we are looking at two extremes. I understand why the public is more attracted to Rendell. He is friendly, out-going, and attempts to get down to the average persons level. But lets be honest, is a politician really all that close to the typical Pennsylvanian? I think not. In the article from The Philadelphia Inquirer entitled Rendells two-pair-of-shoes line doesnt match six-figure income by Thomas Fitzgerald touches on this point. We have a politician that has been in the publics eye for quite some time now. I am unable to believe that he does not live a comfortable life. In this article they quoted Rendell as saying, Ive never made any money, and I never will, and it never bothered me. I am sorry to hear that, but I do feel that middle-class Pennsylvania is not found at the $600,000 tax bracket, it is more like $30,000-40,000 (Fitzgerald, 2002). Honestly, get real, I know that Rendell is not on my level, and I am sure that most citizens can gat...
Sunday, October 20, 2019
Everyday Use By Alice Walker Essays - Everyday Use, Quilting, Quilt
Everyday Use By Alice Walker Essays - Everyday Use, Quilting, Quilt Everyday Use By Alice Walker Through contrasting family members and views in Everyday Use, Alice Walker illustrates the importance of understanding our present life in relation to the traditions of our own people and culture. Using careful descriptions and attitudes, Walker demonstrates which factors contribute to the values of ones heritage and culture; she illustrates that these are represented not by the possession of objects or mere appearances, but by ones lifestyle and attitude. In Everyday Use Walker personifies the different sides of culture and heritage in the characters of Dee and the mother (the narrator). Dee can be seen to represent a materialistic, complex, and modern way of life where culture and heritage are to be valued only for their trendy-ness and aesthetic appeal. Mother on the other hand, represents a simple content way of life where culture and heritage are valued for both its usefulness as well as its personal significance. The story clearly endorses Mamas simple, unsophisticated view of heritage, and shows disdain for Dees materialistic connection to her heritage. This is demonstrated from the outset of the short story, we learn very quickly that the mother (narrator) has inherited many customs and traditions from her ancestors. She describes herself as a large big-boned woman with rough man-working hands (485). She also describes here various abilities including, I can kill and clean a hog as mercilessly as a manI can work outside all day, breaking ice to get water for washing. I can eat pork liver cooked over the open fire minutes after it comes steaming from the hog. One winter I knocked a bull calf straight in the brain between the eyes with a sledgehammer and had the meat hung up to chill by nightfall. (485) While these feats are not extraordinary, Walker exemplifies what Mother has learned from her ancestors, and that being resilient and tough is a part of her heritage. Mother is very proud of her abilities and accomplishments. Mrs. Johnson, the mother, describes Dee as light skinned with nice hair and a full figure (486). She recounts Dees childhood and her appreciation of nice things. She was not the least upset when the family home burned to the ground while she was just a girl, Why dont you do a dance around the ashes? Id wanted to ask her. She had hated the house that much. (486) Dees character in the story is a direct relation to any number of people in society that do not know or are confused about their heritage. She is struggling to create an identity for herself, and is confused as to what it encompasses. She grasps at African tradition and culture, yet fails to acknowledge her own African American culture. This happened all over America, particularly in the North, in the 1960s, following the civil rights movement. Dee is misconstruing her heritage as material goods, as opposed to her ancestors habits and way of life. This may be due in part to her leaving her hometown and becoming an educated, sophisticated young woman. Dees direct heritage is that of African Americans. When Dee informs her mother and Maggie she has changed her name she states, I couldnt stand it anymore, being named after the people that oppress me. (488) Dees mother is quick to point out that Dee is in fact named after her aunt, who was named after her grandmother. While Dee may not be an African name it is based on ancestors, tradition, and the heritage of the Johnson family. Dee discards this name in favor of an African name, Wangero, that, although is African, is not directly related to her heritage. It has not been passed down through generations, nor does it symbolize anything directly related to her family. The contradiction of culture and heritage becomes more evident as the quilts are introduced into the story. While the Johnsons sit down to lunch, Dee begins to admire the butter churn and the dasher. Although she has a brief recollection of Uncle Buddy whittling the churn, she is much more interested in the churn top as a centerpiece for her alcove table. Following lunch Dee re-discovers the quilts. The quilts were composed of an eclectic array of material including,
Saturday, October 19, 2019
Intravenous Drug Users Assignment Example | Topics and Well Written Essays - 1250 words
Intravenous Drug Users - Assignment Example This paper will focus on the on the vulnerability of the youths towards intravenous drug abuse. The most vulnerable population of this abuse is the youthââ¬â¢s offenders this is according to the study carried out in South Australia. These youths are mostly found in areas that are densely populated. Lack of good storage techniques of syringes encourages intravenous drug use among the youths. Statistics indicate that there is less use of drugs in youths that are under the care of the parents than those that are on the streets. An assessment was carried out among the youths to acquire appropriate data on the usage of drugs. Most youths were not ready to comply with this assessment. It was later found that intravenous drug abuse is most common among the youths of the age between 14-19 years old (Chin 133). The youths seem to abuse drugs more than the adults. Substance abuse increases with an increase in age. Male youths have been reported to abuse drugs more than women. This abuse amo ng youthââ¬â¢s emanates from environmental factors and also social factors. Intravenous drug users get to learn from there peers. Youths who reside in urban centers are reported to be the most vulnerable towards drug abuse. These youths are influenced into substance abuse by those individuals that have a close connection to the drugs. ... A study carried out in Canada proved that the high spread of substance abuse was due to the high level of homelessness among the youths. Therefore, this homeless children resort to staying in the streets where they are lured into substance use. Others participate in transportation or selling of these drugs to earn a living (Chin 139). Another contributing factor to the usage of drugs is stress among the youths who later resort to abuse of drugs. Adults play a role in fueling drug use among the use for instance ignorance among parents on their childrenââ¬â¢s welfare, there are adults who encourage intravenous drug use by selling drugs and syringes to the youths. Abuse of drugs has had negative far reaching effects on the youth population. Most cases of HIV/AIDS has been caused due to substance abuse. Unplanned pregnancies have also bee caused by substance abuse therefore leading to production of children by children. Intravenous drug abuse is sometimes caused by an individualââ¬â ¢s ignorance. Most youths are adamant to the teachings and blind to the negative effects that accrue from substance abuse. Another reason to the high substance abuse is school drop outs. Most undisciplined students drop out of school to engage in substance abuse. They do not care about the effects of these drugs to their health. Effects of intravenous drug abuse have been made known worldwide therefore; the youthââ¬â¢s engagement in this act cannot be blamed to the environmental factors but rather themselves (McCarthy 16). Research is very important in shaping ones attitudes. The bias that has been formed against the intravenous drug users can be changed through research. This is because we get to learn different factors that lead to substance abuse among the youths. An individual will be able
Friday, October 18, 2019
Text and Audience Paper Coursework Example | Topics and Well Written Essays - 2000 words
Text and Audience Paper - Coursework Example It is increasingly becoming a conventional activity. Its growing significance is affecting the relationship between corporate organizations and their various stakeholders such as clients, workers, suppliers, governments, and the communities. The article by Griffiths is to remind corporate players of the fact that taking considerable care of the people and the environment is fundamental to good financial results. Organizations are not supposed to wait for the relevant government bodies to impose certain rules and regulations for them to oblige. They have a responsibility to protect the social and cultural systems of the societies under which they expect to coexist in. To build a business based on trust and prescience, corporate social responsibility has to be considered as a fundamental factor. This is essential in building and keeping trust with communities and clients. To flourish and achieve long-term goals of a business, organizations are expected to focus on much more than issues affecting them at present, and think more about the future (Griffiths, 2010). This fact is not just applicable to the advancements in technology, but also on the changes in social, cultural, and environmental matters. Griffiths explains corporate social responsibility as ââ¬Å"business behavior that creates the trust and commitment of stakeholders, both now and in the futureâ⬠. He suggests that corporate social responsibility can no longer be viewed as a background corporate public relations strategy, but a significant factor that is gradually becoming correlated to fundamental operational performance. The key drivers of this primary concept comprise of compliance to laws and regulations crafted for this purpose, and an emphasis on the significance of environmental rules necessary to create customer loyalty and brand likeness. According to Griffiths (2010), unlike what many may suggest, ââ¬Å"Corporate social responsibility is a set of business values and not a toolâ⬠. Due to this fact, it is unlikely to follow the line of reengineering. Not all organizations will successfully implement this concept; however, it is not logical for anyone to suggest that it has been applied to the wrong reasons. Unlike other business concepts, it is not likely to fade away anytime soon (Griffiths, 2010). This is because the environment under which corporate social responsibility operates is characterized by a much wider group of stakeholders; many of them exhibit opposing interests in this context. A good example is an incidence whereby a company decides to invest in reducing carbon emissions for environmental protection. This would mean that it probably will have to cut funding towards employee training initiatives, pay less dividend ratio, and also reduce funding towards community development program. According to Griffiths, the effectivity of the concept of corporate social responsibility can be managed in four different perspectives, i.e. ââ¬Å"corporate gover nance and ethics, environment, people, and contribution to developmentâ⬠. Information plays various primary tasks in the implementation of this key concept. The general conceptual model of implementation incorporates processes, people, and technology. This is to make sure that its outcomes are integrated
To what extent the negative internet contents affect children Essay
To what extent the negative internet contents affect children - Essay Example In this paper, we will discuss the effects of negative internet contents on young children. We will also focus social construction of the childhood in order to get a better understanding of the issue. 2. Children and Negative Use of Internet ââ¬Å"The combination of pornography and the pedophiles it produces is deadly for childrenâ⬠(Kastleman 2010). The sexual contents available on the internet in forms of pictures, stories, and movie clips produce a number of negative effects on the children. Some studies show that almost 4 to 5 out of every 10 children regularly switch on their personal computers just to watch the adult material. The number of children watching adult material varies from place to place and it depends on their social construction as well. In some societies, people try to keep their children away from any sort of adult activity. Some people even make their children stay away from the friendships with opposite gender. Such restrictions increase the frustration level of the children and the frustration leads their way towards illegal social and sexual activities. The growing age of children is very critical for their proper mental and social development. Children generally are very eager to know about sex, and for this reason, they use different ways to gain information about it. Internet is one of the easiest ways to get sex related information. Some children do not open adult websites intentionally. They just log on to the internet to search educational stuff or other things based on their personal interests. But when they start searching for their desired stuff on the internet, the links present on the websites sometimes lead their way towards adult material, which drive the attention of children away from actual purpose. Seventy percent of all children exposed to pornographic material are not actually looking for such contents (Dougherty 2010). The unintentionally opened websites attract the attention of the children and they start exp loring those websites in order to know more and more about sex. 3. Negative Internet Contents Livingstone and Hadden (2009) found that internet brings both opportunities and risks for the children. Risks are related to the presence of sexual contents on the internet. There are three major types of negative contents available on the internet, which include sex stories, sexual video clips, and webcams. Pictures and video clips arouse the sexual feelings of children and increase the level of sex frustration in them. We cannot say that every child who views pornographic material is affected by the negative contents. ââ¬Å"Every child who is exposed to pornography does not automatically become a sexual deviant or sex addictâ⬠(Hughes 1998). The effects are harmful for those children who view the pictures and try to practice what they see in the pictures. We can take the example of alcoholic drinks. Not every person who takes such drinks becomes addicted to those drinks. Some people take those drinks very seldom just to relieve themselves from the tensions for some time whereas some people become addicted to alcohol and they cannot even live a single day without taking alcoholic drinks. Same case is with the children who want to view
Thursday, October 17, 2019
Financial Plan Case Study Example | Topics and Well Written Essays - 1250 words
Financial Plan - Case Study Example The following three partners and their responsibilities are - CEO - Miss Josefa Calfoforo; responsibility includes: Managing customer database Contacting and dealing with client Financial aspect of the business, such as: budgets, profit & loss statement etc. Finalizes fix cost Co-operate with Chief Sales Executive and Chief Designer Chief Sales Executive - Miss Elizabeth Carter; responsibility includes: Generating sales through marketing and sales campaign In charge of orders Public Relation Chief Designer - Miss Yu-Een Eav; responsibility includes: Programming website Designing of diaries Source materials from suppliers Manufacturer Updating technology Also, two employees are to be inducted for the day to day operations of the business in the first year. Performance Monitoring of Plan edesignerdiary will measure performance by looking at number of units (diary) sold in a month. edesignerdiary will measure the satisfaction of the e-commerce business operation by conducting online surveys after each purchase. edesignerdiary will measure quality of diary against competitors every 6months. Critical Success factors Offer a clear description of the goods on offer Provide a total price for the goods (including any taxes payable and freight cost) Have a refund and return policy Clearly explain how privacy issues will be handled Customers acceptance of privacy issues Have reliability, trust or privacy seals Have clear delivery dates Customers who make a purchase from another electronic site or mail house do so without physically, seeing or touching the product they are buying. Therefore customers will be more likely to purchase items from electronic retailers who adopt these critical success factors as a minimum. Time required for raising...A total of $30,000 is personal investment. According to the Rate if Return on Owners Investment Ratio each partner will individually receive 3.59% return in 2006, 2.44% return in 2007 and 8.64% in 2008. Finance options which the partners have already decided to adopt is the government grant for small business and the Export Market Development Grant. Combined the business will be able to receive finances of up to $15,000 Customers who make a purchase from another electronic site or mail house do so without physically, seeing or touching the product they are buying. Therefore customers will be more likely to purchase items from electronic retailers who adopt these critical success factors as a minimum. Establishing and operating edesignerdiary is a great personal and financial investment however, accidents and problems do arise; these can be minimized by taking out insurance. The business has decided to get insurance through Allianz as they are able to tailor the insurance policy to meet business requirements. edesignerdiary differentiates its custom diary making through strategic edge such as gathering information from the individual to compose a custom made diary that contains special features selected by the individual. Hence it is a hand made diary that is of high quality produced in Melbourne - Australia. Edesignerdiary will win by having a unique
Film Review Movie Example | Topics and Well Written Essays - 500 words
Film - Movie Review Example However, the film was nominated for the Academy Awards for best ââ¬Ëmakeupââ¬â¢. Best Character and Scene form the Film The novel ââ¬ËFrankensteinââ¬â¢ as well as the film captivates a volley of characters within the plot. The character which is most fascinating and appealing is evidently ââ¬ËThe Creatureââ¬â¢ played by Robert De Niro as it is presented as the product of an experiment with corpse and electricity. The kind of makeup which was put on Niro was definitely quite bizarre and heavy in order to make him awful. The way Robert De Niro carried the makeup throughout the film, makes his acting commendable. The attire and the makeup became a coherent part of his personality throughout the film. The way Robert De Niro displayed the bestial qualities within the creature; it almost compelled the audience to think that he is a real corpse electrified to life incarnated. Also at times, the emotions displayed by the awful creature are not an easy job to exhibit but an expert actor like Robert De Niro could make it possible. For an average or general actor it is not an easy task to portray emotions with attire and make up of a beast.
Wednesday, October 16, 2019
Financial Plan Case Study Example | Topics and Well Written Essays - 1250 words
Financial Plan - Case Study Example The following three partners and their responsibilities are - CEO - Miss Josefa Calfoforo; responsibility includes: Managing customer database Contacting and dealing with client Financial aspect of the business, such as: budgets, profit & loss statement etc. Finalizes fix cost Co-operate with Chief Sales Executive and Chief Designer Chief Sales Executive - Miss Elizabeth Carter; responsibility includes: Generating sales through marketing and sales campaign In charge of orders Public Relation Chief Designer - Miss Yu-Een Eav; responsibility includes: Programming website Designing of diaries Source materials from suppliers Manufacturer Updating technology Also, two employees are to be inducted for the day to day operations of the business in the first year. Performance Monitoring of Plan edesignerdiary will measure performance by looking at number of units (diary) sold in a month. edesignerdiary will measure the satisfaction of the e-commerce business operation by conducting online surveys after each purchase. edesignerdiary will measure quality of diary against competitors every 6months. Critical Success factors Offer a clear description of the goods on offer Provide a total price for the goods (including any taxes payable and freight cost) Have a refund and return policy Clearly explain how privacy issues will be handled Customers acceptance of privacy issues Have reliability, trust or privacy seals Have clear delivery dates Customers who make a purchase from another electronic site or mail house do so without physically, seeing or touching the product they are buying. Therefore customers will be more likely to purchase items from electronic retailers who adopt these critical success factors as a minimum. Time required for raising...A total of $30,000 is personal investment. According to the Rate if Return on Owners Investment Ratio each partner will individually receive 3.59% return in 2006, 2.44% return in 2007 and 8.64% in 2008. Finance options which the partners have already decided to adopt is the government grant for small business and the Export Market Development Grant. Combined the business will be able to receive finances of up to $15,000 Customers who make a purchase from another electronic site or mail house do so without physically, seeing or touching the product they are buying. Therefore customers will be more likely to purchase items from electronic retailers who adopt these critical success factors as a minimum. Establishing and operating edesignerdiary is a great personal and financial investment however, accidents and problems do arise; these can be minimized by taking out insurance. The business has decided to get insurance through Allianz as they are able to tailor the insurance policy to meet business requirements. edesignerdiary differentiates its custom diary making through strategic edge such as gathering information from the individual to compose a custom made diary that contains special features selected by the individual. Hence it is a hand made diary that is of high quality produced in Melbourne - Australia. Edesignerdiary will win by having a unique
Tuesday, October 15, 2019
Cost Benefit Analysis Math Problem Example | Topics and Well Written Essays - 3000 words
Cost Benefit Analysis - Math Problem Example Asymmetric information can lead to disappearance of markets or rather inefficient allocation of resources, which causes the deadweight loss (Brent 98). A deadweight loss can be illustrated on the basis of the following graph. In the absence of government interventions from asymmetrical information, the market is likely to be inefficient thus causing a consumer surplus gain represented by CFEG and a consumer surplus loss represented by DGB. The graph CFEG+GEB represents the producer surplus. Therefore, the deadweight loss in this respect will be represented by DGB+GEB. Therefore, in the absence of the government interventions in a market with asymmetrical information, there is likelihood that the market will experience a deadweight loss represented by the graph DGB+GEB. b. Briefly describe a policy that could partially or entirely eliminate the deadweight loss resulting from information asymmetry. Solution: Deadweight loss results from the inefficiencies within various markets especia lly with respect to asymmetrical information. Efficient markets need symmetrical information to both buyers and producers. In the event that one party has more information than the other then there is likely to be inefficiency within the market, which definitely leads to deadweight loss. Nonetheless, various government policies can be employed in order to eliminate the deadweight loss resulting from information asymmetry (Brent 79). One such government policy is provision of adequate information in various sectors through various interventions such as cost-subsidization policies. The cost-subsidization policy will assist in making sure that every individual buyer has adequate information and access to specific services. c. Use the diagram, indicate the benefits, costs, or transfers that would result from implementing your policy (show these areas on your graph) and describe discuss each. Solution: The governmentââ¬â¢s involvement in eliminating the deadweight loss is likely to yi eld to various benefits, costs, and possible transfers. Through cost-subsidization programmes, the government will enable the customers to achieve social benefits hence reducing costs in respect to acquisition of goods. The following diagrams illustrate how gained social surpluses will assist in eliminating deadweight loss caused by the information asymmetry. In the above figure, the involvement of the government through cost-subsidization has caused an increase in the social surpluses hence making it possible for the elimination of the deadweight loss within an inefficient market. Another graph illustrating the significance in terms of the costs, benefits, and transfers that consumers may derive from government inventions involving the cost-subsidization policy that aims at providing adequate information regarding the market is represented below. This graph provides an illustration of how consumers benefit from the government invention. The benefits are increase in government reven ue on one hand and gain in the consumer surplus. However, the transfer experienced is the shift of surplus from consumers to producers hence bringing about loss or cost to producers as they lose their surpluses. d. Describe any benefits, costs, or transfers that do not show up in your diagram. Solution: Even though benefits, costs, and transfers are illustrated in the above graphs, there are some costs, benefits,
Journeys End by R.C. Sherriff Essay Example for Free
Journeys End by R.C. Sherriff Essay How does R.C Sherriff present life in the trenches for the soldiers or World War 1 and the conditions they had to endure? In the play Journeys End by R.C. Sherriff, he describes many conditions that the soldiers had to endure. Life in the trenches was bad, but the men who were signing up for the war were told that it was all a big game, a walk in the park. However, when they got there they got a shock. R.C. Sherriff wanted to tell them all to know the truth about the war. First he starts the play by describing the living conditions: [A pale glimmer of the moonlight shines down the narrow steps into one corner of the dugout.] The words narrow and corner show that they live in a small, narrow and cramped place. Not only was it cramped but it was muddy, cold and wet, and it would be very uncomfortable. If the moonlight can come into the dugout and hit onto a corner of the wall, shows that it is very small and with a company of soldiers living their then that will make it even tighter and there wouldnt be much privacy. The soldiers had to sleep in their uniforms to stay warm, and incase there was an attack at any point, then they would be ready at a moments notice. [As he carefully turns his sock this way and that feeling it against his face to see if its dry,] Having it on constantly would cause moist to appear in the boots and any crevices in the body so they had to stay as clean as possible. But when they took off their boots, because they had them on for a long time, often their toes would come off as well. When reading this, I thought about how uncomfortable they must feel, and this same message would be out to all other readers, and would put people off from going to war. As well as the cramped, cold and wet conditions, they had to put up with little rations of food that tasted horrible, but on occasions, a nice piece of chicken. These are the men that are fighting for our countries, and our lives, and all they get is a small ration and a cheer up from the next poor sap who has to suffer: Trotter: Whats this? Maison: Meat sir. Trotter: I know that. What sort? Maison: Sort of cutlet, sir. The words sort of cutlet shows that the food that they get is low quality, a sort of meat that not good enough to be actual cutlet, and its not good enough to feed the British Army. They are being fed the bare essentials, and if they got any less then I think that they would die from malnutrition. This would also put people off from going to war, because they know that if they are not going to be treated accordingly, and not like animals, then they wont go to war. If the soldiers werent worrying about their food, then they were definitely worrying about the war itself. Many men went mad because of the loud crashes of the bombs and the constant rattle of the guns, some soldiers were so afraid of the war, and because they were told that it was a game, then they would make up conditions so that they didnt have to fight: I dont think that I can manage any supper tonight, Stanhope. Its this beastly neuralgia. It seems to be right inside this eye. The beastly pain gets worse every day. The words beastly pain and worse shows that the conditions were so bad, that Hibbert would pretend that he had neuralgia so that he could be sent home. There were many men out in the war who didnt want to be there, but had to go, and they would try anything to get home. Some soldiers, because of the pressure to go out and fight, they would kill themselves, but this was rare. Along with the pressure of war, they had to deal with other things that affected the mind, like sleep and other peoples thoughts. When they didnt get enough sleep they would get agitated and would spend days without sleep, and if they got on the wrong side of someone, then this would agitate them more, and could lead to outburst at the smallest things: Stanhope: Sit down. Raleigh: Its all right, thanks. Stanhope (Suddenly shouting) Sit down! Stanhope had not slept for days and just the little thing of Raleigh getting on the wrong side of him made him snap. R.C. Sherriff shows that Stanhope is angry in the stage directions: (Suddenly shouting). He gives the reader the impression that Raleigh, because he is the newest, that he doesnt fit in with the rest of the group, that what he is doing is wrong, because he doesnt know any better. Because of this Stanhope gets very angry very quickly. All of these are ways of showing the conditions in which the men had to face during the war. Not only was it the war itself but the pressure of being in a cramped environment, with lots of other men, in the cold and dirt, with little food. R.C. Sherriff brings to the readers what the conditions of war are really like.
Monday, October 14, 2019
Philosophy Of Nursing Education In Terms Of The Role Of Educator
Philosophy Of Nursing Education In Terms Of The Role Of Educator The purpose of this paper is to describe my philosophy of nursing education in terms of the role of educator and learner, evidence-based practice in nursing education and useful teaching strategies. Three key issues in nursing education are examined: raising the educational level of nurses, increasing interdisciplinary learning opportunities, and preparing nurses to lead initiatives to improve care and enhance patient outcomes. These challenges are related to my goal as an educator. Role of the educator The role of the educator is to facilitate student development of critical thinking by helping the student build on existing knowledge and integrate curriculum content with clinical experiences. Peters (2000) described a teaching as a process of medication where the educator works as the interface between curriculum and student. Core competencies for nursing education have been developed by the National League for Nursing (2005). The competencies include facilitating a learning environment by providing structure to content and learning activities, goals and objectives, assessment, evaluation and feedback to students. In addition, the core competencies outline the role of educator in curriculum development and program evaluation. Educators should function as role models and change agents, working to continuously improve the learning experience. Educators should function within the academic environment and serve as leaders in scholarship through the development and refinement of evidenc e-based teaching practices. Finke (2009) outlines the scholarship dimensions of nursing education: discovery, integration, application and teaching. The effective educator is a facilitator, coach, mentor, and role model in continuous practice improvement. Role of the student Students build existing knowledge by interpreting new information through personal constructs and prior experiences. Students employ a variety of learning styles and have diverse educational needs and come to the learning experience with a variety of perspectives, expectations, and motivations. Students who take an active role in learning acquire important skills of scholarly inquiry and discovery. Svinicki (2011) described strategic learners as diligent and resourceful who are open to continuous learning to improve their practice. Benner (2010) identifies the ability to prioritize and a acquiring a sense of salience as central goals of nursing education. Through feedback, reflection, and discussion, the student creates meaning and gains awareness of personal constructs influencing his or her perceptions. Students develop skills for lifelong learning, a key to successfully adapting to ever-changing technology, information, and clinical situations. Useful strategies in nursing education The most useful strategies in nursing education are those that help the learner integrate clinical knowledge with patient experience. Emergency situations happen rarely in clinical practice and simulator training helps students gain confidence as they test their performance under a variety of conditions without risking harm to a patient. Benner (2010) describes several strategies educators use to enhance learning such as contextualizing patients experiences, and guiding students in learning how to respond to changing situations. Constructive planned feedback helps students improve their practice. Learning is also enhanced when the educator creates opportunities for students to integrate clinical experience with classroom content. Through clinical coaching and classroom interactions, the educator and student engage in an empowering social process aimed at the development of the student nurse. Narrative pedagogies are a useful strategy to help students learn to think critically through analysis and interpretation. Reflective journaling allows students to find meaning in clinical experience and explore feelings when clinical interactions are complex or challenging. Interdisciplinary collaboration on service projects builds a foundation of mutual respect and understanding of roles and boundaries and students learn from patients, families, communities and each other. The role of evidence-based practice in nursing education. Chisari (2006) Evidence-based elements of nursing education. Should be adopted by all programs. Mission to educate a nursing workforce maximizing their ability to provide safe, effective, patient-centered care. Oermann, 2007 Using evidence in your teaching. Strategies that work, so much content knowledge, simulators training best practices, Three most important issues in nursing education and why My goal as an educator I hope to impart the spirit of continuous improvement so that learners seek new knowledge and learning opportunities throughout their careers. I hope to contribute to the preparation of nurses who can practice effectively in complex, technological healthcare environments with the skills necessary to work with others in the efficient management of health information and resources. I hope to reveal the learning opportunities that exist in everyday experience as nurses interact with other disciplines and patients and families who are the experts in their care. Most of all, I want to teach nursing by example through respect, thoughtful reflection, and continuous refinement of my teaching practice.
Sunday, October 13, 2019
Hypocrisy in Arthur Millers The Crucible Essay -- Essay on The Cruci
Hypocrisy in Arthur Miller's The Crucible ââ¬Å"I want to open myself! ... I want the light of God, I want the sweet love of Jesus! I danced for the Devil; I saw him, I wrote in his book; I go back to Jesus; I kiss His hand. I saw Sarah Good with the Devil! I saw Goody Osburn with the Devil! I saw Bridget Bishop with the Devil!â⬠Such a line was said by Miss Abigail Williams, who claimed to be a gift from God, but as we see, turned out to be the devil herself. Hypocrisy is the issue that many characters suffered from in the novel. We see hypocrisy in the lives of the religious leaders, or Reverends, of the town, we see it in the lives of the rich and greedy, as well as in the lives of the guilty. Hypocrisy seems to be the issue in the town of Salem. We see hypocrisy cover the lives of the religious leaders in Salem. Many of which claim to be holy men, and do not show it in the works of their lives. The reader discovers the greed in Reverend Parris as he claims to be a man of God. He never seems satisfied with the money he receives as pay for being a preacher as well as his wanting ...
Saturday, October 12, 2019
Richard Ii - Silence Is The Plot :: essays research papers
In this play of challenge and debate, could it be possibly suggested that King Richard had a part to play in the murder of his uncle the Duke of Gloucester? Could the reader possibly pick up this assumption having known nothing about the play? These are all factors that one must find by reading in between the lines, noticing and understanding the silence that is exchanged. For the silence is just as important as the speech.Why is it assumed that King Richard II has anything to do with the murder? Let us review a scene from the play were Gaunt accuses Richard of being accountable for Gloucester's death. "Gaunt: O, spare me not, my [brother] Edward's son, For that I was his father Edward's son, That blood already, like the pelican, Hast thou tapp'd out and drunkenly carous'd. My brother Gloucester, plain well-meaning soul, Whom fair befall in heaven 'mongst happy souls, May be a president and witness good That thou respect'st not spilling Edwards blood." (II.i) That passage simply states: You may be a king, but you could have respected my brother enough not to kill him. There is also another quote were Mowbray indirectly suggests that the King is also at fault. "Mow: O, let my sovereign turn away his face, And bid his ears a little while be deaf, Till I have told this slander of his blood, How God and good men hate so foul a liar." (I.i) Yet with saying this remark about the King, he also begs for his innocence. "Mine honor is my life, both grow in one, Take honor from me, and my life is done. Then, dear my liege, mine honor let me try; In that I live, and for that I will die." (I.i) These passages indirectly state that King Richard II is at fault for the death of his uncle. But for the reader to see this they must break down the play and search for those "hidden meanings".For the ordinary reader, who does not search, the text clearly states that the fight for innocence is distinctly between Bullingbrook and Mowbray. Such an example can be found in Act I: "Bull: That he [Mowbray] did plot the Duke of Gloucester's death,Suggest his soon-believing adversaries,And consequently, like a traitor coward,Sluic'd his innocent soul through streams of blood." The rest of the dialogue converses back and forth between Bullingbrook and Mowbray, each fighting for their own innocence.
Friday, October 11, 2019
Citizen Kane Essay
The film Citizen Kane (1941), directed and written by Orson Welles and Herman Mankiewicz, is an American film drama that use various film techniques to illustrate themes, attitudes, and the development of a story. Wellesââ¬â¢ use of camera angles, lighting, movement, symbolism and expression allow the audience to comprehend and understand the themes such as power and exploitation that are present in this movie along with many other themes that pertain to the life of the main character, Charles Foster Kane. Many of the filming techniques that are used in this film illustrate Kane and his feelings and transitions through and about his life. Citizen Kane is a film that demonstrates the importance of how simple scene techniques can help develop a story. After viewing the film, the audience comes to understand that the main theme of the movie is centered around the importance of childhood. Throughout the movie, symbolism is used to reinforce the theme. Thompson, the reporter, attempts to figure out the meaning of the word ââ¬Å"rosebudâ⬠, Kaneââ¬â¢s last words before passing away. Kaneââ¬â¢s life seems to be a mystery to some people, and the word ââ¬Å"rosebudâ⬠is that missing piece to Kaneââ¬â¢s life. Thompson never figures out what ââ¬Å"rosebudâ⬠means, but at the end of the movie we see the word ââ¬Å"rosebudâ⬠on the sled that was thrown into the fire. At this point the audience understands that rosebud is indeed symbolic of his childhood and the missing piece of his life. Earlier in the movie, Kane is outside playing with that same sled while his parents are discussing a plan to send him away. ââ¬Å"Rosebudâ⬠can now be connected to the snow globe which represents his childhood in Colorad o. Thomson said that ââ¬Å"rosebudâ⬠was a missing piece in a jigsaw puzzle. He is illustrating that Kane always felt that he lost his childhood and himself. All he had to show for it was that sled and the snow globe. Further importance on the theme of his childhood is illustrated through lighting when Thomson the reporter investigates Tatcher to get a better understanding of Kaneââ¬â¢s childhood. When he enters the room there is a very distinct, glowing light that is angled in such away that it focuses on a book containing information about Kaneââ¬â¢s childhood. Right away, we see the importance of Kaneââ¬â¢s childhood in the developing plot. To further emphasize this importance, when Thomson opens the book, the audience notices the very distinct contrast between the bright light on the book and the dark area surrounding the book. Throughout the movie, the director is hinting to the audience that his childhood is symbolic of something very important which just might be the answer to the question, ââ¬Å" What/who is Rosebud?â⬠By now the audience understands that that Kane was unable to have a normal childhood due to a lack of say and power. This is illustrated using a depth and focus effect. In the early parts of the film there is a scene in which Kane is outside playing while his parents and banker are negotiating his fate. The actors are ordered in such a way that the mother is always in front, followed by the banker, Kaneââ¬â¢s father, and then Kane. Kaneââ¬â¢s mother seems to have the power due to her position in this scene. It is important to notice that although Kane is in the far depths, he is still in focus, but with limited power. As we transition through the movie, Kane gains power and is in the front of this scene but there is always depth and focus in the shot to illustrate a hierarchy of power. Another theme in the movie that is reinforced by this technique of depth focusing is relationships. As Kane develops through the movie, the audience recognizes that he is losing his power and his weakness leads to broken relationships. When he takes control of the Inquirer, he is constantly surrounded by people and they are not physically distant from him, but as his status on the hierarchical system dwindles down, he begins to distance himself from others in scenes. When Kane fires Leland, we see a great deal of depth and distance between the two but both remain in focus. In this same scene Bernstein is standing in the doorway at a distance away from Kane but he has no significance. The way the actors are positioned illustrate how Kane is developing as person and with other people around him. When Kane gets taken away by Tatcher at a very young age, his life is transitioning into one of power and corruption. When his employees and partners welcome him for the first time at the Inquirer, all the shots are low angle shots. The angle also makes it seem as though Kane is significantly larger than everyone else in the subsequent scenes. It is as though the audience is looking up to him just as his employees are, illustrating the theme of power that Kane now holds. Exploitation is a theme that begins to develop after Kane has taken control of the Inquirer. His need for power continues to grow and he becomes more and more corrupt. Not only is there corruption within his company, but he comes to exploit other peoples thoughts and ideas. As Kane obtains more power and greed, he gets the idea to run for governor, but in the process he gets exploited in regards to his developing relationship with Susan. This is where the movie transitions from power to weakness. Up until this point there has been many low-angle shots to illustrate Kaneââ¬â¢s growing power. When Kane loses the election, the film moves transitions into high-angle shots. Prior to anyone even saying that the election was over, the scene setting clearly illustrates that the election was lost. Even though the office looks like it is a mess, it is very empty. No campaign crew, no feeling. The shot then moves to Kane. During this scene Kane speaks with two different people but his face is down and hidden from the audience. The camera is constantly at a low angle illustrating Kaneââ¬â¢s diminishing power. Furthermore, this is the first scene with Kane in which there is limiting lighting in the room, which reinforces the concept of an empty feeling. As mentioned before, the director uses deep focused shots to illustrate a hierarchy of power. Throughout the movie, deep focused shots are also used to put significance on a specific actor. In the deep focused shots, actors are usually separated by long distances, like in the scene where Kane is talking to Susan across a long corridor with Thompson as the interviewer. When either Kane or Susan speak, the camera shot is always focused in front of them to draw attention to what they are saying. Another technique used to put focus on Kane throughout the movie is by drawing in on Kane by passing through and object or person through a continuous shot. This filming technique is used in the first scene of the movie. The scene begins with the audience closing in on a ââ¬Å"No Trespassingâ⬠sign, and then passes through the sign to reveal a house with light coming from one window. This might not be a significant amount of light, but the lighting does illustrate the importance of what lies beyond those windows. The scene continues through a garden, over fences, etc. but the whole time the lighted window stays in the same position, continuously bringing a attention to its significance. Of course as the scene continues it is that of Kane passing away and revealing the mystery which follows throughout the film. The director attempts to always keep the attention on Kane even when it seems as though he is fading out of the discussion. The audience can always find a relationship between the characters of a story/film and the main themes. In the film Citizen Kane, the relationship between the characters and important themes are illustrated by filming techniques that range from camera angles to symbolism. Throughout the movie symbolism played an important role in determining the main theme and what ââ¬Å"rosebudâ⬠meant. Kaneââ¬â¢s development as a person and place in society was illustrated through camera angles, lighting, and depth. These techniques not only assists the audience in understanding Kane, but also understanding other characters and the relationship Kane had with them.
Thursday, October 10, 2019
Implementation of Lsb Steganography and Its Evaluation for Various File Formats
Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) 868 Implementation of LSB Steganography and its Evaluation for Various File Formats V. Lokeswara Reddy Department of CSE, K. S. R. M. College of Engg. , Kadapa, A. P. India Email: [emailà protected] com Dr. A. Subramanyam Dept. of CSE, AITS, Rajampet, Y. S. R. (Kadapa) Dist.. A. P. Dr. P. Chenna Reddy Dept. of CSE, JNTUCE, Pulivendula, Y. S. R. (Kadapa) Dist.. A. P. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âABSTRACTââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â-Steganography is derived from the Greek word steganos which literally means ââ¬Å"Coveredâ⬠and graphy means ââ¬Å"Writingâ⬠, i. e. covered writing. Steganography refers to the science of ââ¬Å"invisibleâ⬠communication. For hiding secret information in various file formats, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. The Least Significant Bit (LSB) embedding technique suggests that data can be hidden in the least significant bits of the cover image and the human eye would be unable to notice the hidden image in the cover file. This technique can be used for hiding images in 24-Bit, 8-Bit, Gray scale format. This paper explains the LSB Embedding technique and Presents the evaluation for various file formats. Keywords: Steganography, Least Significant Bit (LSB), GIF, PNG, BMP. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â-Date of Submission: 24, August 2010 Date of Acceptance: 08 November 2010 are transferred through unknown cover carriers in such a manner that the very existence of the embedded messages is undetectable. Carriers include images ; audio, video, text or any other digitally represented code or transmission. The hidden message may be plaintext, cipher text or anything that can be represented as a bit stream. II. IMAGE STEGANOGRAPHY Image compression techniques are extensively used in steganography. Among the two types of image compressions, lossy compression and loss less compression; lossless compression formats offer more promises. Lossy compression compression may not maintain the original imageââ¬â¢s integrity. Lossless compression maintains the original image data exactly, hence it is prefered. Example of Lossy compression format is JPEG format files. Examples of Lossless compression formats are GIF[3] and BMP formats. We have used an 8-bit image size for implementation of our steganography. Improvement in stegnographic techniques is make it possible to apply the Detecting LSB Steganography in Colour and Gray- Scale Images which were confined to gray scale images in the initial stages The difficulty in colour images control is solved later on in many techniques such as the analysis of the variation of the gradient energy. The secret message embedded in the target image is detected in both gray and colour images, and the length of the embedded message is estimated [5, 6]. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â-I. INTRODUCTION Digital content is now posing formidable challenges to content developers, aggregators, distributors and users. Th e destruction, extraction or modification of the embedded message is required to develop more robust systems so that the digital content processing and organization becomes easy. Cryptography was created as a technique for securing the secrecy of communication and many different methods have been developed to encrypt and decrypt data in order to keep the message secret. Unfortunately it is sometimes not enough to keep the contents of a message secret, it may also be necessary to keep the existence of the message secret. The technique used to implement this, is called steganography. The shift from cryptography to stegnography is due to that concealing the image existence as stegno-images enable to embeded the secret message to cover images. Steganography conceptually implies that the message to be transmitted is not visible to the informal eye. Steganography has been used for thousands of years to transmit data without being intercepted by unwanted viewers. It is an art of hiding information inside information. The main objective of Steganography is mainly concerned with the protection of contents of the hidden information. Images are ideal for information hiding[1,2] because of the large amount of redundant space is created in the storing of images. Secret messages Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) III. HIDING METHODS IN IMAGE STEGANOGRAPHY In Image Steganography, There are a variety of methods using which information can be hidden in images. Least Significant Bit Replacement Technique: In image steganography almost all data hiding techniques try to alter insignificant information in the cover image. Least significant bit (LSB) insertion is a common, simple approach to embedding information in a cover image. For instance, a simple scheme proposed, is to place the embedding data at the least significant bit (LSB) of each pixel in the cover image[7,8,9] . The altered image is called stego-image. Altering LSB doesnââ¬â¢t change the quality of image to human perception but this scheme is sensitive a variety of image processing attacks like compression, cropping etc. We will be emphasizing more on this technique for the various image formats. Moderate Significant Bit Replacement Technique: The moderate significant bits of each pixel in the cover image can be used to embed the secret message. This method improves sensitivity to modification, but it degrades the quality of stego-image. Experiments have shown that the length of hidden messages embedded in the least significant bits of signal samples can be estimated with relatively high precision. IV. THE LSB TECHNIQUE The least significant bit i. e. the eighth bit inside an image is changed to a bit of the secret message. When using a 24bit image, one can store 3 bits in each pixel by changing a bit of each of the red, green and blue colour components, since they are each represented by a byte. An 800? 600 pixel image, can thus store a total amount of 1,440,000 bits or 180,000 bytes of embedded data. As an example, suppose that we have three adjacent pixels (9 bytes) with the RGB encoding. 10010101 00001101 11001001 10010110 00001111 11001011 10011111 00010000 11001011 When the number 300, can be which binary representation is 100101100 embedded into the least significant bits of this part of the image. If we overlay these 9 bits over the LSB of the 9 bytes above, we get the following (where bits in bold have been changed) 10010101 00001100 11001000 10010111 00001110 11001011 10011111 00010000 11001010 Here the number 300 was embedded into the grid, only the 5 bits needed to be changed according to the embedded message. On average, only half of the bits in an image will need to be modified to hide a secret message using the maximum cover size. Since there are 869 256 possible intensities of each primary colour, changing the LSB of a pixel results in small changes in the intensity of the colours. The human eye cannot perceive these changes ââ¬â thus the message is successfully hidden. With a well-chosen image, one can even hide the message in the LSB without noticing the difference[10]. Fig. 1 Block Diagram for implemented Logic of LSB embedding V. DESIGN DETAILS This section focuses on algorithms Steganography and Steganalysis[10] A. Algorithm for Hiding (Steganography) 1. 2. 3. Read the original image and the image which is to be hidden in the original image Shift the image to hide in the cover image by X bits. And the original image or cover image with 240 which is 11110000 So four MSBââ¬â¢s set to 0. Because of this only four LSBââ¬â¢s considered further. The shifted hidden image and the result of step 3 are bitored. This makes changes only in the X LSB bits so that the image is hidden in the original image. of LSB 4. In MATLAB we convert it to unit8 format. This image can be called as the stego image B. Algorithm for Steganalysis 1. The stego image is bit shifted by 4 bits since it was shifted by 4 bits to insert it into the original image. 2. The image is the ANDED with 255 i. e. , 11111111, which gives the original image. It is ANDED with 255 because initially all the LSBââ¬â¢s were made 0. Now it is recovered back. 3. To get it to Unit8 format we, convert it back to unit8 which is the extracted image. Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) that a message is being passed is being achieved. C. LSB in GIF 870 Fig. 2: Block Diagram for Steganalysis VI. IMAGE ANALYSIS A. LSB in BMP The BMP file format also called bitmap or DIB file format (for device-independent bitmap), is an image file format used to store bitmap digital images. Since BMP is not widely used the suspicion might arise, if it is transmitted with an LSB stego. When image are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value. A BMP is capable of hiding quite a large message. LSB in BMP is most suitable for applications, where the focus is on the amount of information to be transmitted and not on the secrecy of that information. If more number of bits is altered, it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of Steganography is to pass a message to a receiver without an intruder even knowing that a message is being passed is being achieved. B. LSB in PNG Portable Network Graphics (PNG) is a bitmapped image format that employs lossless data compression. PNG was created to improve upon and replace GIF. Since PNG is widely used the suspicion might not arise if it is transmitted with an LSB stego. When images are used as the carrier in Steganography they are generally manipulated by changing one or more of the bits of the byte or bytes that make up the pixels of an image. The message can be stored in the LSB of one colour of the RGB value or in the parity bit of the entire RGB value . A PNG is capable of hiding quite a large message. LSB in PNG is most suitable for applications where the focus is on the amount of information to be transmitted and not on the secrecy of that information. If more number of bits is altered it may result in a larger possibility that the altered bits can be seen with the human eye. But with the LSB the main objective of steganography i s to pass a message to a receiver without an intruder even knowing Graphics interchange format also known as GIF is one of the machine independent compressed formats for storing images. Since GIF images only have a bit depth of 8, amount of information that can be hidden is less than with BMP. Embedding information in GIF images using LSB results in almost the same results as those of using LSB with BMP. LSB in GIF is a very efficient algorithm to use when embedding a reasonable amount of data in a grayscale image. GIF images are indexed images where the colours used in the image are stored in a palette. It is sometimes referred to as a colour lookup table. Each pixel is represented as a single byte and the pixel data is an index to the colour palette. The colours of the palette are typically ordered from the most used colour to the least used colours to reduce lookup time. Some extra care is to be taken if the GIF images are to be used for Steganography. This is because of the problem with the palette approach. If the LSB of a GIF image is changed using the palette approach, it may result in a completely different colour. This is because the index to the colour palette is changed. The change in the resulting image is noticeable if the adjacent palette entries are not similar. But the change is not noticeable if the adjacent palette entries are similar. Most applications that use LSB methods on GIF images have low security because it is possible to detect even moderate change in the image. Solutions to these problems could be 1. Sort the palette so that the colour difference between consecutive colours is minimized 2. Add new colours, which are visually similar to the existing colours in the palette. 3. Use Gray scale images. In a 8 bit Gray scale GIF image, there are 256 shades of gray. This results in gradual changes in the colours and it is hard to detect. VII. EXPERIMENTED RESULTS Following experimental results highlights on 8 bit LSB Steganography. A. Results for . png image 8 bit stego image Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) 871 B. Results for . bmp file 8 bit stego image PSNR is measured in decibels (dB). PSNR is a good measure for comparing restoration results for the same image, but between-image comparisons of PSNR are meaningless. MSE and PSNR values for each file format is shown in table 1. Table 1: Image quality metrics for bmp file Cover image 224. 948 24. 6100 Stego image 244. 162 24. 2540 Cover- Stego image 69. 826 29. 690 MSE PSNR Stego Recovered IX. EVALUATION OF DIFFERENT TECHNIQUES There are many steganographic algorithms available. One should select the best available algorithm for the given application. Following characteristics are to be evaluated while selecting a particular file format for Steganography. Steganography says that the secret message is to be hidden and it should result in an distortion less image. The distortion must not be visible to the human eye. The amount of data embedded in the image also plays an important role. The algorithm decides how much amount of data could be embedded in the image resulting in a distortion less image. Steganalysis is the technique of detecting the hidden information in the image. The algorithm for Steganography must be such that the steganalysis algorithms should fail. i. e the Steganography algorithms must not be prune to attacks on steganalysis. During communication the intruder could check the original image to remove the hidden information.. He/she may manipulate the image. This manipulation may include cropping or rotation etc of the images. The manipulations done may cause the image distortion. Steganographic algorithms chosen must be such that it overcomes such manipulation and the steganographic data reaches the destination in the required format. VIII. EVALUATION OF IMAGE QUALITY For comparing stego image with cover results requires a measure of image quality, commonly used measures are Mean-Squared Error, Peak Signal-to-Noise Ratio[3] and histogram. A. Mean-Squared Error The mean-squared error (MSE) between two images I1(m,n) and I2(m,n) is: M and N are the number of rows and columns in the input images, respectively. Mean-squared error depends strongly on the image intensity scaling. A mean-squared error of 100. 0 for an 8-bit image (with pixel values in the range 0-255) looks dreadful; but a MSE of 100. 0 for a 10- bit image (pixel values in [0,1023]) is barely noticeable B. Peak Signal-to-Noise Ratio Peak Signal-to-Noise Ratio (PSNR) avoids this problem by scaling the MSE according to the image range Int. J. Advanced Networking and Applications Volume: 02, Issue: 05, Pages: 868-872 (2011) Table 2: Comparison of LSB technique for various file formats LSB LSB LSB In BMP in GIF In PNG Percentage Distortion less High Medium High resultant image Invisibility Steganalysis detection Image manipulation Amount of embedded data Payload capacity Independent of file format X. CONCLUSION Since BMP uses lossless compression, LSB makes use of BMP image. To be able to hide a secret message inside a BMP file, one would require a very large cover image. BMP images of 800? 600 pixels found to have less web applications. Moreover such uses are not accepted as valid. For this reason, LSB Steganography has also been developed for use with other image file formats. Although only some of the main image steganographic techniques were discussed in this paper, one can see that there exists a large selection of approaches to hiding information in images. All the major image file formats have different methods of hiding messages, with different strong and weak points respectively. LSB in GIF images has the potential of hiding a large message, but only when the most suitable cover image has been chosen. High Low Low High High Low Medium Low Low Medi um Medi um Low Medium Low Low Medium Medium High Authors Biography 872 Steganography: Seeing the Unseenâ⬠, Computer Journal, February 1998. [5] Li Zhi,Sui Ai Fen. , ââ¬Å"Detection of Random LSB Image Steganographyâ⬠The IEEE 2003 International Symposium on Persona1,lndoor and Mobile Radio Communication Proceedings, 2004. [6] Jessica Fridrich, Miroslav Goljan, and Rui Du. , ââ¬Å"Detecting LSB Steganography in Color and GrayScale Imagesâ⬠, ââ¬â IEEE Multimedia. [7] F. Collin,Encryptpic,â⬠http://www. winsite. com/bin/ Info? 500000033023. [8] G. Pulcini, Stegotif,â⬠http://www. geocities. om /SiliconValley/9210/gfree. html. [9] T. Sharp, Hide 2. 1, 2001,â⬠www. sharpthoughts. org. [ 10] Deshpande Neeta, Kamalapur Snehal, Daisy Jacobs ââ¬Å"Implementation of LSB Steganography and Its Evaluation for Various Bitsâ⬠Digital Information Management, 2006 1st International conference. pp 173-178,2007. V. Lokeswara Reddy did his M. Tech (CSE) from SRM University, Chennai in the year 2005. He did his M. C. A from S. V. University, Tirupati in the year 2000. He is pursuing his Ph. D from JNTUA, Anantapur. He has a total of 09 years of experience in teaching. Currently he is working as Associate Professor at K. S. R. M College of Engineering, Kadapa. He has presented 2 papers in International and National Conferences. Dr. A. Subramanyam received his Ph. D. degree in Computer Science and Engineering from JNTU College of Engineering, Anantapur. He has obtained his B. E. (ECE) from University of Madras and M. Tech. (CSE) from Visweswaraiah Technological University. He is having 17 years experience in teaching. He is currently working as Professor & HOD in the Department of Computer Science and Engineering of Annamacharya Institute of Technology & Sciences, Rajampet, Y. S. R. (Kadapa) Dist. A. P. He has presented and published number of papers in International and National Conferences, International and National Journals. He is guiding few Ph. D. s. His research areas of interest are parallel processing, network security and data warehousing. Dr. P. Chenna Reddy did his B. Tech (CSE) from S. V. University College of Engineering, Tirupati in the year 1996. He did his M. Tech from JNTU, Anantapur. He completed his Ph. D from JNTU, Hyderabad. He has a total of 13 years of experience in teaching. Currently he is working as Associate Professor at JNTUA College of Engineering, Pulivendula, Y. S. R. (Kadapa) Dist. , A. P. He has number of publications to his credit. References [1] Pfitzmann Birgit. Information Hiding Terminology, First International Workshop, Cambridge, UK, Proceedings, Computer Science, 1174. pp. 347-350, Mayââ¬âJune. [2] Westfield Andreas and Andreas Pfitzmann, Attacks on Steganographic Systems, Third International Workshop, IH'99 Dresden Germany, October Proceedings, Computer Science 1768. pp. 61- 76, 1999. [3] Moerland, T. , ââ¬Å"Steganography and Steganalysisâ⬠, Leiden Institute of Advanced Computing
Wednesday, October 9, 2019
Imagery in Prose Essay Example | Topics and Well Written Essays - 750 words
Imagery in Prose - Essay Example He wasnââ¬â¢t a rock star in a traditional meaning either (well, everybody knows those adored handsome guys following the sex, drugs and rock-n-roll motto); he didnââ¬â¢t earn a fortune of money and never grew vain. His fans found something disarming about his kind and easy-going manners, and everyone would sense something so familiar in his songs. He didnââ¬â¢t want to be famous worldwide and wasnââ¬â¢t obsessed with fame, he knew that it was a delusive thing. Now, hurrying to meet his fans (who were certainly the best fans in the world, he thought) at a charity concert, he thought about the legacy he wanted to leave: not because he was going to die, not at all. It was in his nature, this desire to be useful to the society, and he had so many plans and so many purposes. Miles wanted to communicate his message to people. ââ¬Å"The legacy and the message,â⬠he thought. ââ¬Å"Thatââ¬â¢s what makes artists live forever in the minds of people. But is it enough? Is it enough to write a couple of mediocre songs? Guys like me are not starry enough to get themselves listened to.â⬠If he shared these thoughts with his wife, she would surely say that he was too modest and underestimated his significance. Well, he did. The cellphone rang ââ¬â it was Steve, the concert manager (he always communicated with all the staff himself). Miles picked up the call with his right hand, holding the driving wheel with the left one. The car lost traction on the icy turn and ran against the truck. The collision set the Range Rover afire. Everything was blurred in his eyes, and the last thing he saw before he fell into darkness was the strange fiery bird of red and gold hovering above him. Miles found himself standing near the cathedral of his hometown amidst the overwhelming crowd of grieving people dressed in black. The weather was lousy, cold rain falling from the leaden clouds; however,
Tuesday, October 8, 2019
Development and behaviour of high performance concrete materials and Essay
Development and behaviour of high performance concrete materials and their use in innovative structural solutions - Essay Example the high performance concrete has an extremely elevated compressive strength, as well as, durability with perfect flexural ductibility and resistance. And, with an ever-growing population, in addition to, expanding urban center, come increased level of constructions can be expected in all developing and developed countries. (Shuaib and Barker, 1991). Owing to enhanced mechanical property and durability, the high performance concretes have gained a wide acceptance in construction of innovative structures such as bridges, building and marine structures. Aitcin (2003), defines high performance concrete as the low water- binder concrete with optimized aggregate to binder ratio of controlling its dimensional stability (for examples, drying shrinkage) which receives the sufficient water necessary for controlling autogenous shrinkage. Though high performance concrete has extensive application, its production is limited in various nations owing to the fact that suitable concrete aggregate like river sand, hard crushed or gravel aggregates are not available or either is available only in restricted quantity. An all-embracing research has been carried out for the purposes of developing blended cement, concrete, as well as, other construction materials (self consolidating concrete, high performance, fibre reinforced concrete or lightweight concrete) for sustainable development with industrial and natural waste like fly ash, cement kiln dust, volcanic, as well as, slag materials. The developed blended cements and concrete materials did make a wonderful impact in the cement manufacturing and construction industries in many countries. At the moment, they are being utilizes in the common construction and in the restoration projects. The United States department of Transportation shows that the high performance concrete have a tendency of having compressive strength of over 150MPa, interior fibre reinforcement of ensuring brittle behavior, as well as, a higher bidder
Monday, October 7, 2019
Critically evaluate the case for the United Nations in the Essay
Critically evaluate the case for the United Nations in the twenty-first century - Essay Example Fourthly, the paper will look into the Rwandan genocide, which is termed as the greatest failure of the United Nations. Subsequently, the paper will also assess the UNââ¬â¢s involvement in provision of asylum for the ever-rising number of refugees in Africa. Lastly, the paper will conclude by a brief summary of the United Nationsââ¬â¢ overall functions in attainment of its goals. However, United Nations just like any other organization is prone to glitches, especially when those running the show refuse to prioritize the organizationââ¬â¢s core objectives. The UN (United Nations) was founded in 1945 October 24th by 51 states dedicated to maintaining peace via international collaboration and joint security. Currently, almost every state globally, is a member of UN. The UN (United Nations) has 6 main structures. The General Assembly is a parliament of states that meets often and in distinct conferences to envision the globe's most critical problems. The Security Council prime d uty is to maintain international security and peace. The Economic and Social Council, underneath the total power of the General Assembly, directs the social and economic work of the United Nations. ... Following an era of unsuccessful peacekeeping undertakings around Africa at the culmination of the 20th century, the UN (United Nations) has been obligated to re-assess its task as a global establishment for conflict resolve. In the freshly reformulated AU (African Union), the United Nations appears to have established a dependable regional confederate to aid and share the responsibility of peacekeeping upon the continent. Nevertheless, while joint peace enforcement initiatives amid the United Nations and regional allies are progressively sought as keys for culminating several of Africaââ¬â¢s most wicked wars. One has to doubt whether there exists an even-handed distribution of duties between establishments, or whether the United Nations is permitting its enthusiastic counterparts to embark on the dangerous duties of peacekeeping without the necessary logistical and financial backing in return (Baylis 2011). The post-Cold Warfare era was a phase of critical learning for the UN. In a progressively complex global security background, where traditional methods of brokering reconciliation were not sufficient for culminating chaotic internal intra-state skirmishes, the United Nations was enforced to re-assess its function as an international peace enforcement establishment. Stinging let-downs in nations like Somalia, Angola and Rwanda were ample to drive the blue helmets flinching from the Africa continent, hesitant to impulsively enter into engagements where peace is required to be vigorously enforced, not just held. Certainly, even a report by Brahimi issued in 2000, and broadly viewed as an important account of the United Nationsââ¬â¢ challenges and progress steering into the 21st era acknowledge this. Brahimi
Sunday, October 6, 2019
Report Essay Example | Topics and Well Written Essays - 2000 words - 2
Report - Essay Example The company is headquartered at London, United Kingdom. The telecommunication giant started its operation as Racial Telecom in the year 1983 but the British telecommunication company changed their name to Vodafone in the year 1991 (Vodafone, 2012). The company has established its presence in continents like Asia, Europe, USA, Oceania and Africa. Total employee base of the company is more than 80,000. Global subscriber base for the company is over 350 millions (Vodafone, 2010). Vodafone focuses on developing its product portfolio in periodic manner in order to meet multidimensionality of ever changing consumer demand. For example, the company has implemented new facilities such as shopping order tracking from mobile phone in order to attract attention of online shoppers. The British telecommunication company faces competition from companies like BT Mobile, One Tel, Virgin and many others. Vodafone has earned sales revenue of $71.81billion in the year 2012 and market capitalization of the company is $ 127.18 billion (Yahoo Finance, 2013). Telecommunication industry in the world is going through a transitional phases, telecom companies are slowly moving towards synchronizing internet service with telecom services altogether in order to meet customer demand. Three key trends of the industry have forced telecom companies to rethink about adopting e-business model in order to reduce the cost of providing service. Evolution of Internet Entrust (2001) has reported that, internet usage in B2C & B2B transactions will increase threefold in next 15 years, which means by 2015, e-business will contribute more than half of the global transaction. Demand for Data BBC (2011) had reported that global data demand will rise to more than 400 exabytes within 2013 and companies need to use online business model in order to store such huge databases. Social networking, web browsing and online shopping produce huge amount of data, companies need to use the online platform in order to c hannelize these data properly for generating revenue. Demand for Convenient Service In modern world, both B2B and B2C customers prefer faster and convenient transactions in order perform strategic and non-strategic functions. These customers want to be empowered with faster internet access and real time data monitoring, telecom companies need to implement e-business model in order to fulfil increased demand for convenience among mobile users. The essay will propose a holistic e-business model for Vodafone. Next part of the essay will discuss theoretical framework of the proposed e-business model. Research scholars such as Dierickx & Cool (1989), Rumelt (1986), Grant (1991) and Barney (1986) have argued that, firms need to increase their resource capability such as technological integration capability, developing tangible assets etc in order to achieve sustainable competitive advantage over competitors. Porter (1980, 1985) had stated that, companies need to use competitive advantage as a source for ensuring sustainability of business operation. It is evident from the scholarly works of various research scholars,
Subscribe to:
Posts (Atom)