.

Wednesday, November 27, 2019

Aloe essays

Aloe essays Aloe (Agave) is a genus of plant that has more than 150 species. Agave is native to South Africa but has been brought to America and is best-known here as American aloe (Agave americana), or century plant. An aloe plant has a short stem, fleshy, lanceolate leaves that form in rosettes at the end of each stem, and red or yellow tubular flowers in dense clusters. The different species of aloe differ in size from a few centimeters to more than thirty feet. The plant only blooms one time between the ages of ten and twenty-five. When it finally does bloom, the plant grows a long stalk that grows rapidly up to about fourty foot. The aloe plant is very helpful in making many medicines. The plant is ninety-six percent water and the rest contains active ingredients including essential oil, amino acids, minerals, vitamins, enzymes and glycoproteins. Powered aloe juice (sap) is a laxative. Modern healers have used it since the 1930's. Many liquid health treatments are made, some combining aloe juice with other plants and herbs. The juice is soothing to digestive tract irritations, such as colitis and peptic ulcers. Aloe vera gel is used to; heal wounds, heal ulcers, and speed up the healing process of burns by putting a protective coating on the As a food supplement, aloe is said to facilitate digestion, aid in blood and lymphatic circulation, as well as kidney, liver and gall bladder functions. Aloe contains at least three anti-inflammatory fatty acids that are helpful for the stomach, small intestine and colon. It naturally alkalizes digestive juices to prevent overacidity - a common cause of indigestion. To make many of the medicines the plant must be crushed or taken apart. Aloe vera gel is made by pulverizing the whole leaves of the plant. Aloe juice is In conclusion, the aloe plant is very helpful in medicine and everyone ...

Sunday, November 24, 2019

How Mainbars and Sidebars Are Used in News Coverage

How Mainbars and Sidebars Are Used in News Coverage Youve probably noticed that when an especially big news story happens, newspapers, and news websites dont just produce one story about it but often many different stories, depending on the magnitude of the event. These different kinds of stories are called mainbars and sidebars.   What Is a Mainbar? A mainbar is the main news story about a big news event. Its the story that includes the main points of the event, and it tends to focus on the hard-news aspects of the story. Remember the five Ws and the H  - who, what, where, when, why and how? Those are the things you generally want to include in the mainbar. What Is a Sidebar? A sidebar is a story that accompanies the mainbar. But instead of including all the main points of the event, the sidebar focuses on one aspect of it. Depending on the magnitude of the news event, the mainbar can be accompanied by just one sidebar or by many. An Example Lets say youre covering a story about the dramatic rescue of a boy who has fallen through the ice of a pond in winter. Your mainbar would include the most newsy aspects of the story - how the child fell and was rescued, what his condition is, his name and age and so on. Your sidebar, on the other hand, might be a  profile of the person who rescues the boy. Or you might write about how the neighborhood where the boy lives comes together to help the family. Or you might do a sidebar on the pond itself - have people fallen through the ice here before? Were appropriate warning signs posted, or was the pond an accident waiting to happen? Again, mainbars tend to be longer, hard-news oriented stories, while sidebars tend to be shorter and often focus on a more feature-y, human-interest side of the event. There are exceptions to this rule. A sidebar on the dangers of the pond would be a very hard-news story. But a profile of the rescuer would probably read more like a feature. Why Do Editors Use Mainbars and Sidebars? Newspaper editors like using mainbars and sidebars because for big news events, theres too much information to cram into one article. Its better to separate the coverage into smaller pieces, rather than having just one endless article.   Editors also feel that using mainbars and sidebars is more reader-friendly. Readers who want to get a general sense of what has happened can scan the mainbar. If they want to read about one particular aspect of the event they can find the relevant story. Without the mainbar-sidebar approach, readers would have to plow through one huge article to try to find the details theyre interested in. In the digital age, when readers have less time, shorter attention spans and more news to digest, thats not likely to happen. An Example From The New York Times On this page, youll find The New York Times main news story on the ditching of a U.S. Airways passenger jet into the Hudson River. Then, on the right side of the page, under the heading Related coverage, youll see a series of sidebars on the accident, including stories on the quickness of the rescue effort, the hazard that birds present to jets, ​and the fast reaction of the jets crew in responding to the accident.

Thursday, November 21, 2019

Use valid academic sources to illustrate the proximate causes for the Research Paper

Use valid academic sources to illustrate the proximate causes for the massive downturn of the U.S. economy 2009 - Research Paper Example What is however, significant to note that the crisis created a kind of contagion effect on other sectors of the economy also and started to take deeper roots in terms of creating recessionary pressures on the economy? During the last quarter of 2007, US officially went into the recession and official response from US government started to emerge. US took massive action in terms of supporting the failing institutions and government injected tax payers’ money in order to ensure that the whole financial system of the country should not collapse. This also included separate responses from the different actors of the State including The President, Congress, Treasury as well as the Fed Chairman while working in their official capacity. As discussed above that the original cause of financial crisis was the busting of asset bubble wherein the subprime mortgage portfolio of the banks started to get worse. Over the period of time, banks started the practice of lending to subprime borrowers- borrowers with impaired credit history- in order to earn higher returns. Most of the banks however, also securitized their mortgage portfolio and subsequently repackaged their loans and sold them in the form of mortgage based securities. (Cocheo. 2007). The real issue started to emerge when the subprime borrowers started to default and the banks have to divert their own funds to payoff their obligations on the mortgage based securities. This mismatching of the cash flows therefore created the credit crunch for other sectors of the economy and slowly started to engulf the whole economy. The apparent reason may be the subprime mortgages however, underlying this crisis, many critical weaknesses of the regulatory environment of the country. It is generally argued that the overall regulatory environment of the developed countries was so relaxed that the firms took undue advantage and started to adapt the business practices which were risky and put the entire

Wednesday, November 20, 2019

Qatar sporting legacy Dissertation Example | Topics and Well Written Essays - 15000 words

Qatar sporting legacy - Dissertation Example Having won the bid for the 2022 FIFA World Cup made Qatar the highlight of sports news, as the nation continues to establish and consolidate its position as a prime sporting destination. In line with the economic potential of hosting local and international sports events, the present study aims to determine the social, political and economic factors as the foundation that helped build Qatar's sporting legacy. A qualitative approach has been utilized, wherein data collection was processed using interview responses as primary sources, whereas journals, and the like, have been used as secondary sources. The study focused on answering the questions, (1) Can Qatar be a viable venue for holding sports events (2) Does Qatar have the necessary sporting infrastructure, economic and political stability to sustain its sporting legacy on a long term basis, (3) Can other Asian countries sustain a sporting legacy, similar to what Qatar has done. The researcher was able to determine that Qatar has the resources and the capacity to become a prime venue for holding both international and local sports events, as well as sustain its sports legacy on a long term basis. This is due to the country’s stable economic and political state, as supported by the nation's passion towards sports. It has also been found that other Asian economies would only be able to emulate Qatar's sporting legacy, given that the factors necessitated in creating one would be present. Chapter 1 Introduction Sports stand to command a pivotal place in Qatar’s social and national life. One primary reason behind this phenomenon is the fact that people in the Middle East do have a special predilection for outdoor activities. The sports legacy of Qatar is a unique mix of the new developments as well as the age old traditions. This is why, since the last two decades, the government of Qatar has embarked on a unique policy to promote the local and international sports in Qatar (QSC, 2010). The primary thrust of this policy is to introduce and support new sports like golf, soccer and tennis, while at the same time encouraging traditional sports like camel racing and horse racing. There is no denying the fact that modern Qatar can proudly boast of some of the best, world class sports facilities. Qatar not only intends to promote sports within the country, but also aspires to evolve into a popular tourist destination. The hosting of international sports events and competitions by Qatar has stimulated and enhanced the interest of the local population in sports (QSC, 2010). The awarding of 2022 FIFA World Cup to Qatar came as a surprise to most of the Asians, Americans and Europeans. However, the fact is that this Gulf

Sunday, November 17, 2019

Direct Manipulation Research Paper Example | Topics and Well Written Essays - 1000 words

Direct Manipulation - Research Paper Example This way, users meet their senses of control (Allison et al., 2012). The second principle is quick, flexible, and incremental actions (Bennett and Flach, 2011). The impacts of these actions on simulated objects are instantly visible. Otherwise known as the principle of virtuality, this principle shows direct manipulation can represent a controllable reality. This principle is applied in video game controls through fast-response correspondence between game controller manipulation and video game response. Examples of virtual responses in video games are characters, weapons, vehicles, or natural and manmade surroundings. Numerous actions are flexible under the rules of a video game. For instance, walking, opening, or closing doors, picking or dropping items are physical, reversible actions that video game controls manipulate through direct manipulation (Richer and Drury, 2006). Lastly, direct manipulation allows the user to make physical actions by pressing marked buttons on a controlling device rather than using compound syntax (Booth, 2014). Direction manipulation under this principle occurs with physical actions such as pointing at an object using a cursor rather than typing a pointing command. This principle fosters a feeling of immersion directly in a virtual reality instead of interacting with an intermediate. Video game controls have marked buttons that foster tasks that concentrate on local and precise interaction with virtual characters or objects. With video game controls, users do not have to type commands for characters or objects to interact with their virtual surroundings (Allison et al., 2012). Video game-type interfaces give users required information and control abilities in an interactive and enjoyable manner. These interfaces successfully streamline input/output frameworks. To a user, these streamlining protocols make a video game slightly more than just an interface. Many computer programs have interfaces that act as intermediaries for

Friday, November 15, 2019

Literary Components Of M Commerce Information Technology Essay

Literary Components Of M Commerce Information Technology Essay The present assignment on Secure Mobile Transactions: m-commerce, aims to present a comprehensive view of all the technological and security aspects that influence and govern monetary transactions done on wireless networks. This paper refers to some basic concepts related to m-commerce and then proceeds to discuss various purely technical issues involved in m-commerce. This work identifies presently available technologies that facilitate m-commerce and gives explanation about each of such technology. Further, the assignment focuses on the security challenges involved in mobile transactions and various aspects of mobile payments. Finally, the paper gives a brief list of m-commerce solutions currently available. Table of Contents 1. Introduction: Mobile commerce or simply m-commerce relates to commercial business operations and transactions carried out on wireless telecommunication networks with the infrastructural assistance of handheld mobile electronic devices. E-commerce is the commercial business processes done on internet and the m-commerce is making all monetary transactions on mobile devices (wireless electronic commerce). The technology of m-commerce offers many services and facilities that make commercial dealings simplified and reduce time consumed in those transactions. But the users and service providers have to be cautious of possible treats of wireless trade operations. Security of information, privacy to personal details and protection to the money involved are the real touch stones of strength of m-commerce. 2. Literary components of m-Commerce: The concept of mobile commerce came into existence in the last decade of the 20th century. What has started as a facility to make payments to a soft drink vending machine, has now effectively subsumed nearly every aspect of electronic commerce. Today, m-commerce has emerged as a viable extension to e-commerce. Now the customers of any service or product can make their payments over mobile phones staying anywhere or even on move. Fundamental difference between e-commerce and m-commerce is that, in electronic commerce business dealings and transactions are made on internet, but the mobile commerce services can be used with the help of simple and inexpensive SMS and IVR systems (Rediff.com, 2010). Statistics inform that, the penetration of personal computers is still limited and the mobile penetration is nearly ten times more than that of PCs. Further, the wide internet access is still a distant dream with the exception of big cities and conurbations. Thus with the presently available u ser share and the further spread in future would certainly point mobile commerce as a viable and popular option to make swift and secure monetary transactions. Further, people with basic literacy can also make use of various services of mobile commerce unlike the electronic commerce, which requires the users to have good command on PC knowledge and its operational procedures. The central point of mobile commerce is making payments on mobile phones. It is a point of sale payment made over a mobile gadget like cell phone, PDA (Personal Digital Assistant) ,a smart phone, gadgets of personal area networks and other newly coming wireless equipment (Krueger, 2001). Here, not only the merchandise transactions made through cell phones but the monetary payments made to utility vending machines, cab services, car wash machines etc also constitute acts of mobile commerce (Paavalainen, 2001). The core idea is the convenience. This convenience should not turn into a nightmare because of lack of security of the data exchanged in these commercial transactions over wireless networks. Important services offered by m-commerce are, Making reservations of tickets of journeys Booking various entertainment show tickets Making payments of civic utility bills Transferring gift vouchers Booking hotel rooms Booking cab services Make money donations to social service foundations Making stock market trading To avail all these facilities, mobile users can make use of SMS, BREW, GPRS and IVR services. Key issues of mobile transactions are the questions of authentication and security. The service providers have to follow robust security standards that are in vogue world wide. Some of the presently accepted standards are PCI DSS (Payment Card Industry Data Security Standard). Advantages of m-commerce are: Reduction of time consumed in serving merchandise orders Reduction in the cost of management of commercial transactions Gives extensively broad reach Helps in effectively coordinating all the business processes involved Gives competitive advantage in matters of product pricing Provides high speed access to modern cellular applications (Answers Corporation, 2010). Disadvantages of mobile transactions: Cost of establishing and managing wireless telecommunication infrastructure Concerns over safety of information and data exchanged over mobile gadgets Mobile devices come with small screens and this limited display can limit the types of data and files that can be exchanged and accessed Advanced mobile technologies are now largely confined to big cities Technical limitations of mobile telecommunication equipments (Answers Corporation, 2010). Given the comparative merits and demerits of mobile commerce, one can be perfectly sure that, the ongoing technological researches would certainly find viable answers to problems of this new paradigm in wireless commerce. 3. How m-commerce differs from e-commerce? The level of wide availability of wireless telecommunication networks to use m-commerce applications practically from any location. The convenience in handling these small and low weighed devices is unique when compared to equipment required for carrying out electronic commerce transactions. Further these mobile devices are purely personal electronic gadgets and this guarantees maximum personalization unlike the PCs with Internet which are needed for e-commerce actions that are often shared among multiple users. Localized positioning of users can be done on all mobile commerce transactions. As the users carry their mobile phones with them, they can utilize their preferred personalized settings with which they can transact. This personalization is not available in electronic commerce transactions and dealings. 4. Technical areas related to secure m-commerce: There are various aspects on the technical front that are closely related to safe money transactions done on wireless telecommunication networks with the help of mobile handheld devices. They are: 4.1. Need for secure m-commerce: According to Yeun (2001), there are more cell phones which are connected to internet than the number of net connected Personal Computers. Though the PC penetration is also gaining pace, the spread of mobile phones and related gadgets has already surpassed all the future projections. The comfort given by mobile merchandise transactions is fueling the further expansion of m-commerce. As more and more people are resorting to the m-commerce utilities, the service providers have to take every care to ensure that all the transactions done, payments made, business deals concluded and the information exchanged over wireless networks is best guarded and strongly protected. Already the electronic commerce has seen any worst cases of security breaches and fraudulent infringements in high value commercial transactions done on electronic media through PCs connected to internet. This shows the dire need to research, design, invent and implement robust security standards for every small monetary tr ansaction done over mobiles. Propensity of threat should be reduced and the vulnerability of supportive wireless networks should be reduced to sub-terrestrial depths to complement the growing demand for m-commerce. 4.2. Security Challenges in m-commerce: As the wireless telecommunication networks are spreading fast and becoming a ubiquitous resource, the user base of m-commerce is fast expanding. But to ensure the continuity of this boom, high security of mobile transactions is in dire need. Important data and transaction security problems that pervade over m-commerce transactions are analyzed by Grosche Knospe (n.d.). As the mobile gadgets are purely personal devices, they are bound to carry some important private and confidential information which needs protection from unauthorized intruder access. To answer this threat these, smart and sensitive gadgets must employ user authentication mechanisms like passwords and PIN. Further, these cell phones must come with good data backup and crash recovery tools pre-installed in them, to cater to any unforeseen data loss and authentication breach. The operating systems used in the wireless gadgets must have tested perfection in defending owners data security needs. While the owner of the mobile phone intends to transmit some data over wireless telecommunication network for any commercial dealing, the wireless interface that guides this information exchange must be strong enough to maintain high levels of confidentiality, content integrity and more particularly user authenticity. Eavesdropping is a big threat which the wireless networks have to confront ser iously. Data security mechanisms vary from one mobile technology to another. The end user access networks need to be strongly protected from data theft within and out side these network loops. And the network operator concerned must ensure that the money transactions made are concluded to the maximum satisfaction of both parties. Money payment actions done on wireless networks should have assured secrecy and protection to the money involved. This task should cover all the stages starting from the payment or committing to make a payment up to the conclusion of the deal and authentication systems have to guard the entire transaction leaving no chance to intruder attack. 4.2. Technologies involved in m-commerce security: With the increasing widening of mobile penetration, and all other similar wireless handheld devices, the services offered by mobile commerce have assured future. The technologies involved in the mobile commerce mainly deal with transferring of data and information over the available wireless telecom networks. Presently, widely used supportive network technologies are 2nd generation (2G), 3rd generation (3G) etc (Grosche Knospe n.d.). 2nd generation wireless telephone technologies include, GSM (TDMA based), CDMA One etc. 2G telecommunication technologies are also known as PCS (Personal Communications Service) in USA. Advanced version of 2G services is 2.5G. This new one offers data transfer at higher speed. These services gave way to 3G services. This 3G technology comes with wireless telecom services like CDMA2000, UMTS, GSM EDGE, WiMAX, DECT etc. These new mobile standards support data transfers up to 14Mbits per second while downloading. The security of data transfers is higher in 3G when compared to earlier 2G technology. 3G services come with user authentication facilities while connecting to any network. This guarantees high security to all the transactions done of that specific telecom network (Grosche Knospe n.d.).. GSM is the most used media for carrying out mobile commerce transactions. The data transfer and sharing services offered on GSM networks are, SMS (Short Messaging Service) for sending short messages having maximum 160 characters on the network media, WAP (Wireless Application Protocol) to access internet APIs designed in WML (Wireless Mark-up Language), HSCSD (High Speed Circuit Switched Data) tool of channel clustering for high data transfer rates and GPRS (General Packet Radio Service) actually, this is an extension of GSM services. Fundamental architecture of GSM network generally contains GPRS, Intelligent Network(IN) and SMS services. UTMS (Universal Mobile Telecommunication System) is a modern telecommunication system offered by 3G services. This is largely an extension of existing GSM. It has WCDMA (Wireband Code Division Multiple Access) radio channel signaling technology (Grosche Knospe n.d.). WLAN (Wireless LAN) works in 2.4 GHz 5 GHz spectrum. Normally WLANs are low in data security. IEEE stipulated WEP (Wired Equivalent Privacy) to provide some security to transactions done on WLANs. 5. Security at various levels of mobile transactions: 5.1. Safety in data transport channels: The technologies like GSM, GPRS, WLAN, UTMS provide considerable security to all deals transacted on wireless networks. But they cannot handle the safety constraints, when the commercial transactions involve multiple access networks. To ensure end to end security in such cases that communicate over Internet Protocol, SSL/TLS is widely used. SSL works with TCP (Transmission Control Protocol). Another transport layer security protocol designed and used for this purpose is WTLS with WAP services (Grosche Knospe n.d.). 5.2. Safety of network services: To make m-commerce transactions more secure, Intelligent Network (IN) concept in GSM networks is introduced. This GSM framework contains IN logic i.e. CAMEL (Cuatomized Application for Mobile Enhanced network Logic). IN handles all the m-commerce conversations. These services can also be used with SMS systems. Other technologies for secure services are, Parlay / OSA (Open Service Access) and USSD (Unstructured Supplementary Service Data) (Grosche Knospe n.d.). 6. Security models presently in use: GSM (Global System for Mobile Communication) is the widely used mobile security standard in European countries. According to Zobol (2001), Europe has the highest mobile penetration and the European Commission is presently implementing 15 new projects that operate mobile telecommunication networks. These projects are using WAP, GPRS, UTMS technologies. For ensuring high security of mobile transactions, they are using NESSIE encryption and E-PASTA environment. Further, 4G an ultra speed broadband is also under implementation. 7. m-Payments: The commercial transactions concluded on mobile wireless networks do involve money payment. The concept of m-payments related to payment of charges for services or the price of goods sold or purchased over mobile wireless telecommunication networks. Significant advantageous aspects of m-payments are, less time consumed, no need to carry physical money and remote operability of accounts safely. There are different variants of m-payment systems like, pre paid payment systems, pay now payment systems and post payment systems. There are various agreed limits of money transactions that can be done on mobile networks. In Europe micro, small and macro payments are in vogue form 1euro to more than 10 euros. In India the monetary transactions up to Rs.50000 can be done (Rediff.com, 2010). The level of safety such mobile transactions need varies based on the money involved and the items that are traded in that transaction. But in each of such case anonymity of customer has to be protected safely. Mandatory and common requirements of mobile transactions are authenticity, reliability, confidentiality, authorization and integrity. Further the response time has to be reduced to minimum. And, conformity to ACID (Atomicity, Consistency, Isolation and Durability) principle for all deals involving monetary payment. Depending on the sources of money from where customers make payment over mobile networks, various m-payment systems presently available are: Software electronic coins, Hardware electronic coins, Background amount (Grosche Knospe n.d.). 8. Examples of m-commerce security solutions: Irrespective of the mode of payments made on mobile phones, there are various standardization bodies that deal with mobile commerce transactions. Some of them are, MoSign, Mobile Payment Forum, mSign etc. Another famous data security standard related to m-commerce is PCI DSS (Payment Card Industry Data Security Standard) (TechTarget, 2010). Visa International has recently developed Mobile 3D. It is a global security specification standard system that makes money transactions made by mobile phones and on internet more secure and safe (CellularOnline, n.d.). Finacle m-commerce solution developed by Infosys has many good security features like, generation of One time Password (OTP), USSD application, strong inclusivity framework and ability to register multiple bank accounts to a single mobile (Infosys, 2010). 9. Conclusion: Security of transactions concluded on mobile telecommunication networks is of fundamental necessity for the very concept of m-commerce. This assignment attempted to through light on every important aspect related to mobile commerce. The technologies discussed in this paper do need further improvement to cope up with the increasing threats to data and money transfer over internet and on wireless networks. Growing fraudulent intrusions on mobile information systems and individual gadgets make up a persistent need to continuously refine existing solutions and design new ones that can better resist attacks on transaction security over wireless media.

Tuesday, November 12, 2019

Lukes Three Dimensions of Power :: Power Society Symbolism Culture Essays

Luke's Three Dimensions of Power   Ã‚  Ã‚  Ã‚  Ã‚  "Power serves to create power. Powerlessness serves to re-enforce powerlessness"(Gaventa,1980:256). Such is the essence of the on going relationship between the Powerful and the Powerless of the Appalachian Valley where acquiescence of the repressed has become not only common practice but a way of life and a means of survival. In his novel Power and Powerlessness, John Gaventa examines the oppressive and desperate situation of the Appalachian coal miners under the autocratic power of absentee land-owners, local elites, and corrupt union leaders. His analyses is based on Lukes three-dimensional understanding of power from his book Power: A Radical View. Gaventa applies the three notions of power to the politics of inequalities in the Appalachian Valley and, while demonstrating the inadequacies of the first or 'pluralist' approach and the merits of the second and particularly the third dimensions, asserts that the interrelationship and reinforcing affect of all three dimensions is necessary for an in depth understanding of the "total impact of power upon the actions [or inactions] and conceptions of the powerless"(Gaventa:256)   Ã‚  Ã‚  Ã‚  Ã‚  This essay will examine Luke's three power dimensions and their applicability to Gaventa's account of the inequities found in the valleys of the Cumberland Mountains. Reasons for the mountain people's submission and non- participation will be recognized and their nexus with the power relationship established. In this way, Gaventa's dissatisfaction with the pluralist approach will be justified and the emphatic ability of the other two dimensions to withhold issues and shape behaviour will be verified as principal agents of Power and Powerlessness.   Ã‚  Ã‚  Ã‚  Ã‚  The one dimensional view of power is often called the 'pluralist' approach and emphasizes the exercise of power through decision making and observable behaviour. Robert Dahl, a major proponent of this view, defines power as occurring in a situation where "A has power over B to the extent he can get B to do something that B would not otherwise do"(Dahl as cited in Lukes, 1974:11). A's power therefore is defined in terms of B and the extent to which A prevails is determined by its higher ratio of 'successes' and 'defeats' over B.   Ã‚  Ã‚  Ã‚  Ã‚  Observable behaviour then becomes a key factor in the pluralist approach to power. Dahl's Who Govern's? expresses the pluralist belief that the political arena is an open system where everyone may participate and express grievances which in turn lead to decision making. Those who propose alternatives and initiate issues which contribute to the decision making process are demonstrating observable influence and control over those who failed all together to express any interest in the political process.   Ã‚  Ã‚  Ã‚  Ã‚  The Pluralist approach assumes that in an open system, all people, not

Sunday, November 10, 2019

Nursing Health Assessment

DE LA SALLE HEALTH SCIENCES INSTITUTE COLLEGE OF NURSING AND SCHOOL OF MIDWIFERY CITY OF DASMARINAS, CAVITE NURSING HEALTH ASSESSMENT Submitted by: Andrea Antonette D. Balboa Submitted to: Rowena Cepeda-Laigo, RN, MAEd NURSING HEALTH ASSESSMENT I. Status Post Caesarean Section II. HEALTH HISTORY AND PHYSICAL EXAMINATION A. Demographic (Biographical Data) Client’s initials: R. R. P. Gender: Female Age, Birthdate and Birthplace: 34, 10/21/1978, Muntinlupa Marital (Civil) Status: Married Nationality: Filipino Religion: Roman CatholicAddress and Telephone Number: Blk 5 Lot 54 Greengate Imus Cavite Educational Background: Bachelor’s Degree in Computer Science Occupation (usual and present): Encoder Usual Source of Medical Care: PhilHealth Date of Admission: 01/08/2013 B. Source and Reliability of Information The patient was competent to provide information. She was able to speak clearly; conscious and coherent; oriented to time, place and person. The patient’s chart w as also included as a secondary source of information C. Reasons for Seeking Care 1. â€Å"Inadequate size of pelvis† 2. â€Å"Scheduled for caesarean section† D.History of Present Health The expected date of the delivery was January 8, 2013, 8:00AM at St. Paul Hospital. It was a scheduled caesarean section of the patient; not in labor. The patient was calm since it was her second time to deliver a fetus through caesarean section. There were no signs and symptoms of labor happened. The patient foresees to stop adding a family member because they already have a son and a daughter. E. Past Medical History or Past Health a. Pediatric / Childhood / Adult Illnesses The patient did not have any pediatric, childhood or adult illnesses. b. Injuries or AccidentsThe patient did not have any injuries or accidents. c. Hospitalization and Operations The patient had a caesarean section last 2006, 2007 and 2013. d. Reproductive History The patient had her menarche at the age of 12. H er last menstrual period was April 27, 2012. Her menstrual cycle was 28 days and her menstrual duration was 3 to 4 days. Her obstetric score was G3P2 T2P0A1L2M0. e. Immunization BCG: /? / At Birth /? / School Entrance DPT: /? / 1st Dose /? / 2nd dose /? /3rd dose OPV: /? / 1st Dose /? / 2nd dose /? /3rd dose AMV: /? / TT: /? / 1st Dose /? / 2nd dose /? /3rd dose /? 4th dose /? / 5th dose HBV: /? / 1st Dose /? / 2nd dose /? /3rd dose Others: None f. Allergies /? / Food, (please specify): Shrimp / / Drugs or medications, (please specify): None / / Chemicals, (please specify): None / / Other environmental allergens, (please specify): None The patient has an allergy in shrimps. The patient experiences hives as an allergic reaction and applies an anti-allergy prescribed by her dermatologist to alleviate the manifestation. g. Medications None G. Socio-Economic History FAMILY MEMBER /RELATIONSHIP TOPATIENT| OCCUPATION /SOURCE OF INCOME| MONTHLY INCOME| R.R. P. | Encoder| P22,000. 00| The p atient works as an encoder. The monthly income of P22,000. 00 can only support the basic needs of the family but not particularly of members’ health. It will be not enough and budgeted exclusively for the necessities of the family. H. Psychosocial Assessment Patient’s Age: 34 years old Developmental Stage: Young Adulthood Developmental Task: Intimacy vs Isolation Occurring in young adulthood, we begin to share ourselves more intimately with others. We explore relationships leading toward longer term commitments with someone other than a family member.Successful completion can lead to comfortable relationships and a sense of commitment, safety, and care within a relationship. Avoiding intimacy, fearing commitment and relationships can lead to isolation, loneliness, and sometimes depression. Patient met the developmental task of being in an intimate relationship with her partner. They are married and have 2 kids. I. Functional Assessment 1. Health-Perception-Health Manag ement Pattern The patient’s description of her current health was weak and difficult to get pregnant. The activities that the patient does to improve or maintain his health was to not get over time in work.Patient’s knowledge about links between lifestyle choices and health was not answered. The extent of patient’s problem on financing health care was hopefully the budget will fit. Patient has the knowledge of the names of current medications she was taking and their purpose. Activities that the patient does to prevent problems related to allergies was to apply an anti-allergy prescribed from her dermatologist. Patient has the knowledge about medical problems in the family. There were no important illnesses or injuries in the patient’s life. 2. Nutritional-Metabolic Pattern The patient’s nourishment was to eat fruits and vegetable.Patient’s food choices in comparison with recommended food intake were not answered. The patient has no any dise ase that affects nutritional-metabolic function. 3. Elimination Pattern The patient’s excretory pattern was constipated. The patient has no any disease of the digestive system, urinary system or skin. 4. Activity-Exercise Pattern The patient’s description of his weekly pattern of activities, leisure, exercise and recreation was to eat outside and considers it as a family bonding. The patient has no any disease that affects his cardio-respiratory and/or Muscoskeletal systems. 5. Sleep-Rest PatternThe description of the patient’s sleep-wake cycle was completed of 8 hours. Patient’s physical appearance was relaxed. 6. Cognitive-Perceptual Pattern The patient has sensory deficit of astigmatism and was not corrected. Patient’s has the ability to express herself clearly and logically. Patient’s education was bachelor’s degree of computer science. The patient has no any disease that affects mental or sensory function. Patient’s pain d escription was of abdominal because of surgical procedure of caesarean section. 7. Self-Perception-Self Concept Pattern There was no unusual about the person’s appearance.The patient was comfortable with her appearance, simple but comfortable. Description of the patient’s feeling state was happy, comfortable because she already has a baby boy and a girl. She was worried about their financial needs because of the added family member. 8. Role Relationship Pattern Patient’s description of his various roles in life was to be a responsible mother. Positive role model of her roles was her mother, to save for family but she is more of disciplinarian than her mother. Important relationships at present were her family. There were no big changes in role or relationship. . Sexuality-Reproductive Pattern Patient’s satisfaction with her situation related to sexuality was good. If both of them were tired, they don’t do sexual intercourse. The patient’s pl ans and experiences did not matched regarding having children because everything changed and she was more matured than before. 10. Coping-Stress Tolerance Pattern Patient’s means/actions of coping with problems were there must be a goal for her to achieve. Coping actions help even though the goal was partially met as long as it was met. Eat, sleep and hang out were treatments/therapies for emotional distress. 1. Value-Belief Pattern Principles that the patient learned as a child which are still important to her was she does not want shortage, she wants everything to be provided. Patient’s identification with any cultural, ethnic religious or other groups is she is a St. Claire devotee. Support system that the patient finds significant was her family. J. Review of Systems and Physical Examination Date of Examination: January 9, 2013 PHYSICAL SYSTEMS| R. O. S. | P. E. | 1. General Status and Vital Signs| â€Å"Okay naman†| (-) fever(-) tachycardia(-) tachypnea(-) hypertension| 2.Integument (Skin, Hair, and Nails)| â€Å"Okay naman†| (+) pallor(-) skin turgor(-) edema| 3. Head and Neck| â€Å"Okay naman†| | 4. Eyes| â€Å"Okay naman, may astigmatism lang yung left eye ko†| (+) astigmatism| 5. Ears| â€Å"Okay naman†| | 6. Mouth, Throat, Nose and Sinuses| â€Å"Okay naman†| | 7. Thorax and Lungs| â€Å"Okay naman†| | 8. Breast and Lymphatic System| â€Å"Di lang ako makapag-produce ng milk kapag di pa ko kumakain†| (+) inverted nipple (-) breastmilk| 9. Heart and Neck Vessels| â€Å"Nagpapapalpitate ako minsan kapag pagod†| (+) palpitation| 10.Peripheral Vascular System| â€Å"Nagkavaricose veins na ko sa bigat ko, laging nakatayo at nung buntis pa ko ang bigat ng tyan ko†| (+) varicose veins| 11. Abdomen| â€Å"Kumikirot kasi tahi ko†| (+) pain| 12. Genitourinary| â€Å"Nagka-UTI ako nung nagbubuntis pa ko†| (+) rubra lochia(-) urinary tract infection| 13. Anus, Rect um and Prostate| â€Å"Hirap akong tumae†| (+) constipation| 14. Musculoskeletal System| â€Å"Okay naman, ngayon lang ako di makakilos ng maayos dahil masakit tahi pa ko†| (+) limited ROM| 15. Nervous System| â€Å"Okay naman†| (+) conscious| 16. Hematologic| â€Å"Okay naman†| | 17. Endocrine| â€Å"Okay naman†| | 18. Psychiatric| â€Å"Okay naman†| |

Friday, November 8, 2019

The success of project management was based on focusing on the objectives of the Project Triangle of cost, time and quality. The WritePass Journal

The success of project management was based on focusing on the objectives of the Project Triangle of cost, time and quality. The success of project management was based on focusing on the objectives of the Project Triangle of cost, time and quality. CHAPTER 1 INTRODUCTIONDissertation conceptProject ManagementProject PlanningActivities or groups of activates that contribute to risks of delaysContingency planning: Strategies that could bring the projects on timeThe three key learning pointsThe critical pathGantt charts  Project Scope ManagementProject failure  Why things go wrongCHAPTER 2 – DEFINITIONS AND CHARACTERISTICS OF RISK MANAGEMENT CRITICAL SUCCESS FACTORSProject Risk ManagementProject environment and risk  Ã‚  INTERNAL  Environment  EXTERNAL  EnvironmentRisk ManagementIdentifying RisksManaging RisksCritical Success FactorsSuccess criteriaSuccess factorsCHAPTER 3 – LITERATURE REVIEWa.  Success of projects implemented in AfricaProjects in African countries:China’s investments in Africab.  Leadership Success  c. International projects and cultureCHAPTER 4 LIMITATIONSMethodologyResearchFurther researchCHAPTER 5 CONCLUSIONCHAPTER 6 BIBLIOGRAPHYRelated CHAPTER 1 INTRODUCTION Dissertation concept The fundamental question considered in this dissertation is, in the past, the success of project management was based on focusing on the objectives of the Project Triangle of cost, time and quality. Although this has lead to the success of many projects, there is an increasingly popular viewpoint that this focus is too limited.   Analyse the importance of the other emerging success factors of projects such as customer focus and a move away from the traditional project end point towards aspects that act through the lifetime of the product or service created. Project Management Projects are temporary organisations with a clearly defined beginning and end with unique defined objectives and resources. Project Management is a method for bringing change in a company (no-repetitive activity) e.g. banking systems; moving from paper based to computer based. It’s a socio-technical system (involvement of humans and technical tools). PM is not only for building a new system but also modifying an already existing system. A project can be defined as an activity with a specific goal occupying a specific period of time. . (Ray Wild 1995 pg 353) Project is a limited activity, not only in time, but also in the use of resources. Project management, therefore is concerned with the pursuit of a specific goal, using given resources over a defined period of time. This will often require the planning and establishment of an operating system, acquisition of resources; the scheduling of activities and evaluation/review of completed activities. Project Management is all about managing these resources in order that the project is delivered To specification On time, and Within budget Project Planning Good project management starts with good planning the objectives of a project should be clear and would conform to the SMART model: Specific Measurable Agreed Realistic, and Time-based Activities or groups of activates that contribute to risks of delays Projects do not always go according to plan and it is generally the case that when this happens, work takes more, rather than less time, than expected. Good project management recognises the internal and external factors that might throw a project off schedule. Monitoring progress carefully will help identify the likely impact of any delays so that action can be taken to get the project back on track. This is explained further in chapter 2 under project environment and risk. Contingency planning: Strategies that could bring the projects on time The three key learning points 1. Identifying risks of the project: Once the risks are identified, it is easy to manage risks properly rather than trying to put out fires during the project. 2. Indentify the critical path using network diagrams 3. Gantt charts The critical path The critical path is the path through the network with the greatest total duration. (Andrew Greasley pg 375 2006) the critical path method was developed by Dupont during 1950s to manage plant construction. The PERT approach was developed by the US Navy during the development of the Polaris Submarine launched ballistic Missile System during the same decade.(Sapolsky,1972, Andrew Greasley pg 375 2006) A project can have more than one critical path, if several paths tie for the greatest duration. Activates on the path must be started and completed on time; otherwise the total project will not be completed on time. Gantt charts Gantt charts are line diagrams, with lines representing both time and activates. They can be used to estimate the amount of resources required for a project. Where activates are continuous ‘chain’ with one activity able to follow immediately after the other, these can be drawn as a continuous line on the chart.   Project Scope Management Project Scope Management includes the processes required to ensure that the project includes all the work required, and only the work required, to complete the project successfully (PMI 2004). In Project scope management the primary concern is to define and control the scope of work that should or should not be included within the constraints of Cost, Time and Quality. This phase can be break down into 5 basic steps: Scope Planning Scope Definition, Create Work Breakdown (WBS), Scope Verification and Scope Control. Project failure Projects fail when they do not meet the following criteria for success: It is delivered on time. It is on or under budget. The system works as required. Only a few projects achieve all three. Many more are delivered which fail on one or more of these criteria, and a substantial number are cancelled having failed badly.   Why things go wrong Marsh (2000) proposed an analytical framework to categorize project failures. Quality Problems The wrong problem is addressed – A primary cause of failure is that some projects are started with no clear idea of what exactly are the goals and strategy of the client organization. Analysis is carried out incorrectly – Team is poorly skilled, or inappropriately resourced. Majority of projects fail as a result of poorly skilled and unqualified staff, resulting in poor project management. Project undertaken for wrong reasons – Technology pull or political push. This was evident during the DOT.COM crash during the year 2000. Many companies were simply following a trend set by either their competitors or by internal personnel. Productivity Problems Users change their mind – Many projects have failed over the years as a result of change of requirements by users of the project. This has resulted in increasing costs and time constraints that many projects cannot handle. External events change the environment – New legislation or political intervention can result in failure of projects. Natural environment hazards put projects at risk. Implementation is not feasible – Many projects are over-ambitious and result in project failure. Poor project control – Inexperienced project manager, he/she is ultimately responsible for the completion of the project and therefore it can be argued that any project failure is also the failure of the project management. Quality and productivity play an important part in the success of a project. Quality in terms of the purpose and measurement of what the project is intended for. Productivity relates to the potential rate of progress a project could have. This is in terms of both financial and time invested in a project and its potential return. CHAPTER 2 – DEFINITIONS AND CHARACTERISTICS OF RISK MANAGEMENT CRITICAL SUCCESS FACTORS Project Risk Management What is Risk? â€Å"A risk is any uncertain event that, if occurs, could prevent the project realizing the expectations of the stakeholders as stated in the agreed business case, project brief or agreed definition. A risk that becomes a reality is treated as an issue.† (Young, 2007: 107) Project environment and risk Kathleen Schwalbe (2003): p6 suggests: The project management environment directly affects a project The environment affects HOW a project should be managed Projects are influenced by stakeholders and issues The Project environment has two main sections known as the Internal and External Business/Project environment.   Ã‚  INTERNAL  Environment There are a number of issues in the internal business environment that need to be considered when assessing the risks to the project. The three main stakeholders of a project include the owner, the technical staff and the end-user. Their involvement will ultimately determine the success of the project. In terms of end-users their participation will include the outputs of the system both directly and indirectly. Project managers’ view is that they are the ones that will produce and oversee the projects, finally those of whom will finance and commission the project (owners). Within this group it only requires one stakeholder to conflict with another for the project to fail. All stakeholders will determine whether the project succeeds. End-users may not have enough input into the system and thus resulting in a poorly produced project. Developers/project members may feel that budget and time constraints may overshadow the completion of the project, while the owners may feel that the project has exceeded its budget or may be delivered too late leaving it irrelevant. Factors such as technological advances and changes in the business environment all affect the success of a project.   EXTERNAL  Environment When assessing the risks to the project there are a number of issues in respect of the business environment external to the organisation that need to be considered. Is there likely to be any major governmental or political change , that may occur during the development of the project, which may affect the stability of the market place, the reason for the project and the scope or content of the project. Is there likely to be any major change in the economic environment that might occur during the development of the project that may affect the financial aspects, the market place the project provides products or services for now. The project environment is very important in regards to a project. By understanding factors both internally and externally, only then can a project manager plan a project effectively that will not affect the completion and performance of the project system. Risk Management All projects bring with them an element of  Risk. In the best-planned projects there are uncertainties and unexpected events can always occur for example project staff might leave unexpectedly, the budget might suddenly be cut or a fire or theft might affect the project progress. The majority of risks are however related to the fact that a project manager’s plan is based on estimates and they are therefore manageable. Risk management is a mechanism that allows project managers to predict and deal with events that might prevent project outcomes being delivered on time. Identifying Risks When identifying a new project a Risk Assessment will have to be conducted in order to manage a project without the possible effects of disruption. In order for this to happen the following questions have to be asked: What could possibly go wrong? What is the likelihood of this happening? How will it affect the project? and What can we do about it? The sort of areas that risks are associated with includes: The  activities  along the timeline and any threats to completion and to timescales. The project  components: stuff, equipment other resources. Dealings with  contractors  and  suppliers. Other projects  that might have an impact. Organisational  changes that might occur during the project. Outside influences  that might affect the project such as changes in financial support or government policy The assessment of likelihood of the risk occurring and potential impact if it does occur will come from the experience and knowledge of project stakeholders and others consulted during the risk analysis process. You can think of risks in terms of a matrix (see figure 1) jiscinfonet.ac.uk/InfoKits/project-management/InfoKits/infokit-related-files/risk-matrix-picFIGURE 1 Your greatest effort will be focused on addressing the risks that are most likely to occur and those that will have the biggest impact if they do occur. Managing Risks In order to effectively manage risk it is important that each risk is allocated to an identified owner. This should be someone within the project team whose responsibility it is to keep an eye on the situation and ensure that the necessary mitigating actions are actually carried out. Responses to the initial risk assessment may include: Risk Transfer  Ã¢â‚¬â€œ move the risk to someone more able to deal with it e.g. contract out the supply and support of the hardware infrastructure Risk Deferral   alter the plan to move some activities to a later date when the risk might be lessened. Risk Reduction  Ã¢â‚¬â€œ Either reduce the probability of the risk occurring or lessen the impact e.g. increase staffing resource on the project. Risk Acceptance  Ã¢â‚¬â€œ Sometimes there’s not a lot you can do other than accept the risk and ensure that contingency plans are in place. Risk Avoidance  Ã¢â‚¬â€œ Eliminate the possibility of the risk occurring e.g. use alternative resources or technologies Managing risk is an ongoing process. The nature of the risks that are faced will alter as the project progresses e.g. staff recruitment may be a big issue at the start of a project whereas staff retention is the issue as the project draws near to an end. At the very minimum project managers should review the risk assessment and management plan at each phase boundary before moving into a new phase of the project. This would allow the project to be managed effectively throughout the system development life cycle. Critical Success Factors Critical Success Factors are measures used to verify if a project is successful or not. Traditionally the success factors have been those used by the Iron triangle(Time, Cost, Quality) to determine if the project has been a success I terms of; the project is completed on Time, on budget and as required/specified(good quality and performance). However, other factors have arisen for example; clients, stakeholders, contractors, etc. These are some of the CSF that is used to determine the success of a project. â€Å"Research on project success further shows that it is impossible to generate a universal checklist of project success criteria suitable for all projects. Success criteria will differ from project to project depending on a number of issues, for example, size, uniqueness and complexity†,J. Wateridge, IJPM 16 (1998) Success criteria Success criteria are those benchmarks against which the success of the project will be measured. Success factors Success factors are those factors that assist in the achieving of criteria. CHAPTER 3 – LITERATURE REVIEW a.  Success of projects implemented in Africa â€Å"The term ‘African countries’, refers to all those countries on the African continent including the Islands of Madagascar, Mauritius, Reunion and Seychelles. African countries are by no means homogeneous. They have different religion, social and economic conditions. Modern African states were constituted with no reference to ancient kingdoms, so that each new state includes rival ‘nations’ with nothing other than colonial institutions holding them together. Despite these differences, African countries are characterised by some or all of the following conditions† Ndiritu Muriithi, IJPM, Vol21, Issue5 African countries have different religions and economic conditions. There are some conditions that characterise African countries. It is important for organisations to go through these conditions and conclude if it’s a risk or gain for a project. These include:  ·Ã‚  Ã‚  Political conditions: The political situation in countries e.g. Uganda and US is different. The political stability is very important for a company implementing a project because changes in political environment such as war or other factors may affect the overall strategy of the company. The government taxes and policies on a company can affect the project strategy for the company as certain new policies could affect the movement of capital and resources across countries.  ·Ã‚  Ã‚  Ã‚  Social conditions: The social and cultural influences on the business vary from country to country. It is very important that such factors are considered. The company must consider the effect of working culture on the business. The cultural differences can lead to lack of communication and co-ordination, especially in a highly creative and rapidly changing industry such as china.  ·Ã‚  Ã‚  Ã‚  Economic conditions: The effect globalisation encouraged many companies to outsource many of their projects to developing countries. This helped many companies to achieve a strategic advantage in terms of cost saving. For example, salaries of Ugandan workers are much less than for those in USA.  ·Ã‚  Ã‚  Ã‚  Technology conditions: The technology is rapidly changing, this is led to increased competition and developing countries which have the low cost skilled labour could soon be a direct competition to developed countries. The companies must manage their resources efficiently in order to gain the first movers advantage and gain market leadership. However some African countries face power shortages which can have a great impact on a project. A company must be prepared for this by investing in Captive Power Plants (CPP) which is generator driven.    Some of the major problems African countries face that could affect the outcome of a project includes:  ·   Corruption: Corruption is like a disease that has spread all over Africa. If projects are not properly supervised or monitored, money can be diverted into other areas; be it personal gain or into other operations.  ·Ã‚  Ã‚  Ã‚  Inflation: Inflation causes many distortions in the economy. When prices rise consumers cannot buy as much as they could previously.   This discourages savings due to the fact that the money is worth more presently than in the future.   This expectation reduces economic growth because the economy needs a certain level of savings to finance investments which boosts economic growth.   Also, inflation makes it harder for projects to be planned for the future.   It is very difficult to decide how much to produce, because businesses cannot predict the demand for their product/project at the higher prices they will have to charge in order to cover their costs. Disease:   The most common diseases in Africa are transmitted by insects, contaminated food and water. Foreign employees need to be provided with information such as; protecting   themselves from insect bites by wearing proper clothing, using mosquito nets, applying an insect repellent to exposed skin and clothing, and if possible, avoiding high risk situations. As well as getting vaccinations for diseases such as yellow fever. If employees are well informed and trained, they can be prepared and this will not affect their performance hence reducing on risk of project failure. Civil war:   Take the case of Libya where citizens are rioting in order to change the president however, the president of Libya; Muammar Gaddafi does not want to step down. This brings along a number of issues such as; business closing, foreigners leaving the country because of the risk of safety. The country is unstable and any operations or projects that have been implemented may have to be put on hold or shut down. â€Å"Saif al-Islam Gaddafi also hit out at those behind the violence. He said protests against his fathers rule, which have been concentrated in the east of the country, threatened to sink Libya into civil war and split the country up into several small states† Aljazeera Projects in African countries: China’s investments in Africa In recent years, Chinas rapid economic development, enhanced national strength, and the gradual opening to the outside world have attracted the attention of the world. African countries can learn from Chinas successful experience from economic and trade exchanges with China, particularly in infrastructure facilities constructions and choosing an economic development model suitable for their domestic situations. For example, in Zambia, government learnt from China to establish export processing free trade zone, took a series of measure of facilitate investment and trade and exempted enterprises from import duties and value-added tax. To sum up, a long history of friendly political relationship and continuous support of each other paved the way for the economic and trade boom between China and African countries in the recent years. The advantages in resources, capital, products and technology are highly complementary that makes the cooperation possible. China’s preferential policy towards the investment in Africa further encourages Chinese enterprises to enter into the African market.  African countries also devoted themselves to  reduce the deficit, control inflation, reform state-owned companies,  adopt policies to attract foreign investment and actively improve the investment environment.  It is estimated that the following 5 to 8 years will be the â€Å"Golden age† for the Sino-African relationship. Chinese corporations will continue to increase investment in Africa and the mutual trade and economic cooperation will have an optimistic prospect. b.  Leadership Success Leadership has been exercised since the very start of civilization. The Chinese philosopher Lao Tze was writing about leadership 2,500 years ago and his work is still referred to (Crainer, 1996). Quality of leadership is central to the survival and success of project groups and organizations. As  The Art of War, the oldest known military text puts it as, the leader of armies is the arbiter of the peoples fate, the man on whom it depends whether the nation shall be in peace or in peril (Sun, Undated). The way a project is managed can either lead to its success or failure. Different Project Managers use different leadership styles. The types of Leadership styles are listed below: Autocratic: autocratic leaders are authoritarian; they keep most of the authority to themselves; they do not delegate much or share information with employees. Democratic:   democratic leaders by comparison, like to involve their workers in decisions; they also take the views of their subordinates into account when making decision. Laissez-Faire:   laissez-Faire leaders encourage freedom of group or individual decisions with little leader participation. A leader would supply information about tasks but would take no further part in the discussion process. Finally no attempt to praise or criticise others would take no place apart from the occasional comment or remark. Paternalistic: paternalistic leaders believe he or she knows what is best for the employees Which style of leadership is most effective depends on the kind of situation the leader is dealing with. Assume that a consultant company with clear and structured tasks. Each consultant knows his own job. Under this circumstance, we can predict that the company will work more efficiently if the leader is relation-related than task-related. On the other hand, the assembly line, the leader comes under pressure of an urgent demand. Although the workers know exactly how to do their jobs, can you predict whether it will be fulfilled before lead time led by a task-related leader or a relationship-related leader. But in very favourable situations, task-related leaders can focus on cultivating good interpersonal relations because they know the job will get done. Therefore, the most effective leadership style depends on; the organizations, the skills of their managers, the characteristics of employees, the nature of their tasks and their structures. No one style of leadership appears universally better, although a good deal research indicates that a considerate, participative or democratic style of leadership is generally (not always) more effective. Furthermore, as there more and more  MNCs, managers should be sure to consider national culture as an important variable in choosing a leadership style. Factors which affects leadership style Risk when a decision has to be made urgently and involves a high degree of risk e.g. selling a football player. The leader is likely to be quite  autocratic. Time constraint if there is plenty of time to discuss matters and only a low chance of it going wrong (low risk) the style may well be more democratic. Skills of manager and workforce The leaders are expected to be backed up by a well-trained support staff of experts in a range  of relevant fields. However workforce has to be well skilled and trained in the following: Responsible Teamwork Communication Friendship Self-respect Recognition Relationship Abilities Teams depend on the culture of the company in which the team exists.  Ã‚  When I say culture, I mean watch how people act and interact.  Do people do things for one another?  Ã‚  If a project team is supportive and trusting then likewise there is a good chance that teams will be successful.  Ã‚  Also, it is important that members of teams have realistic expectations.  Ã‚  The unrealistic expectation that is usually assumed by leaders is that team members are expected to put aside their own personal goals and work strictly for the team.  Ã‚  The best teams have leaders who do not make these unrealistic expectations. A team can also become stronger through bonds that are created over time.  Ã‚  When there are certain situations that the team has encountered before, then how much easier is it to go into that situation again and perform better. ANALYSIS Leadership style will depend on factors such as the task, the people involved and the amount of risk. Effective management training could be a useful way to persuade leaders to be flexible. The best style of management at any moment will depend on an enormous range of factors such as personalities and abilities of the manager and the worker and the nature of the task. The way in which a leader deals with his or her colleagues can have a real impact on their motivation and how effectively they work. Leader who always involves discussion with his or her workers will gain better ideas and a more highly motivated workforce. Leadership is a process through which a person tries to get organizational members to do something the person desires. The leader’s influence extends beyond supervisory responsibility and formal authority. Leadership is very important. The reason is because they provide vision and direction and are therefore a key element of business success. As a result, any successful project shows that it has strong leadership. When autocratic leadership is used at the beginning of a leadership it helps to show how people will think that you are serious when leading them. But I prefer when democratic leadership is being used because it helps the employees to feel responsible of what they do; they get a chance to make opinions and decisions.   c. International projects and culture Organisational climate and project success can be linked to international projects. More and more projects are being done abroad. The culture of an international organisation can affect the performance of a foreign employee. â€Å"Few managers would dispute that the climate or atmosphere of an organisation  - loosely, what it feels like to work there  - is likely to have some impact on its performance. There is less   agreement about what is an ideal climate for optimum performance, and the influence managers can have in creating and maintaining it† Organisational climate and project success, Roderic J. Gray To ensure implementation of successful international project, emphasis on planning and management tools should be placed for Project Managers to use to ensure control of time, cost, resources and quality of performance. However, risk or most problems arise because of the environment itself and not from the control of the project manager. In this case the environment refers to the culture of a new country and the difficulties employees face in adjusting or working in these new business environments and how this can an affect on a project’s success or failure. A method that can be used to decide whether a country is risky or not to implement a project is the Hofstede Cultural Dimensions Framework. Hofstede is a Dutch researcher most famous for his theory of cultural dimensions framework. Hofstede’s (1980) dimensions of culture have become the most widely used model for explaining various effects across cultures (Yoo and Donthu, 1998).   Stedham and Yamamura (2004) describe culture as stable and enduring but also somewhat changeable due to external forces. Hofstede’s five dimensions include the following. a) Power Distance.   The power distance dimension has to do with inequality in a society.   In a high power distance environment there would be greater tolerance for, and expectation of, inequality in prestige, wealth and power. b)   Uncertainty Avoidance.   Hofstede focuses on uncertainty at the organizational level looking at the use of rules and strategies to reduce exposure to an unsure future. c)   Individualism and Collectivism.   This dimension has to do with the relationship the individual has with the group and more generally with society.   Hofstede points out that the nature of this relationship determines not only how people think about themselves and their immediate group but the â€Å"structure and functioning of many institutions aside from the family† (p210) d)   Masculinity and Femininity.   There seem to be two elements to this dimension.   One deals with the values held and the other with role expectations.   Hofstede (1980) notes that in a work setting, males value â€Å"advancement, earnings, training, up-to-dateness† while females value â€Å"friendly atmosphere, position security, physical conditions and manager cooperation† (p281).   The second aspect of this dimension has to do with what people in a culture expect of sex roles.   In a very masculine culture, sex roles would be differentiated while in a feminine culture sex roles would be more similar. e) Long Term Orientation (LTO).   This is a recent addition to the Hofstede model, added as a new dimension to the model in the second edition (2001).   It is based on the philosophy of Confucius and has to do with â€Å"persistence, thrift, personal stability and respect for tradition† (p351).   It describes a longer term, higher level view of life. Just as there are differences seen in the dimensions between countries, it could be expected that there would be differences expected between groups of individuals within countries.   Differences between attitudes and behaviours of males and females are extensively studied and well documented in Western culture.   Similarly, individuals have been observed to change in their attitudes and behaviour as they age.   Variations in Hofstede’s cultural dimensions across age and gender have been studied by some researchers.   Stedham and Yamamura (2004), for example, examined the cultural differences between Americans and Japanese with a focus on sex and age differences.   They found no differences due to age and differences between males and females on the power distance dimension in  Japan  (mf), individualism (mf) in both countries. Effects of globalization:   Hofstede notes changes in measured levels of his dimension between 1968 and 1972.   It seems very likely that changes between 1972 and now would be much more profound with globalization of business and telecommunication and the shift of  China  to more free-market economy.   While there has been some debate on whether there is convergence of world culture, Inglehart and Baker (2000) concludes that while cultural differences will persist there is a trend to more common cultural values as countries industrialize.   Perhaps  China’s values are beginning to change and that change is seen especially in its cohort of young people. Hofstede regarded both national and organisational culture as phenomena at different levels. However he felt that they were both linked. â€Å"Organisational cultures are supported by employees’ societal values, while national cultural differences reside in practices at organisational level† (Huczynski Buchanan, 2001). Hofstede argued that peoples` behaviour in the work place is largely influenced by societal cultural values as careers are a trade off between risk, security, success and family life. â€Å"One could expect that societal power distance norms between countries would impact differently† (Huczynski Buchanan, 2001). However for the success of an Organisation it is important to keep in mind the national culture and adhere to it. Let’s take the example of the HSBC bank whose catchphrase all over the world is â€Å"your local bank†.  Ã‚  As the worlds local bank, their employees need to reflect the diversity of the communities they serve. Their commitment to diversity starts at the top. Their Board is one of the most ethnically diverse among leading international companies, so is their employee base: half are women, three in 10 are Asian, one in seven is Latin American; Caucasians are a minority. As a result they are able to easily adapt to the national culture in which they are based. Their organisational goal consists of adapting to the national cultures in which the bank is based, among other missions. They employ local employees to help in building the bank with the norms and beliefs in keeping with the society and its culture (www.hsbc.com). As a whole they are extremely success, accepted and recognised Organisation worldwide. How to measure success [[International Journal of Project Management, A new framework for determining critical success/failure factors in projects, Volume 14, Issue 3, June 1996, Pages 141-151] CHAPTER 4 LIMITATIONS Methodology When looking at the options available for conducting research I looked at the three aims that need to be met when collecting information.   The research must be reliable and valid, the validity gives a true picture of what’s being measured and the results are reliable if another person can conduct the same method and achieve the same results. Research Further research CHAPTER 5 CONCLUSION Projects exist in every sphere of business, markets, segment, and industry. Projects would come in a myriad types, sizes, and complexity- from small initiatives, medium-size initiatives to mega-projects. Nowadays, project management is no longer special-need management. It is rapidly becoming a standard way of doing business. Project managers need to communicate with everyone in the company who’s responsible for implementing and reviewing projects. To work effectively, it must enable communicating about a project’s progress, goals, costs, and availability of personnel. In addition, the effective project manager should have skills and a good working knowledge of project management process, and pay attention on risk management plan, which will enhance a project success and a long-term benefit to a corporation. It is important to adapt the organisational/project culture and get the correct mix between the organisational culture and the national culture in order to come up with the sufficient mix for the smooth running of the project, especially in regard to its employees. Therefore it is important to keep up to organisational cultural values but it is essential to adapt these organisational cultures in order to keep in line with the national culture. By this the organisation will be accepted by the population in that country without them feeling that it was changing their lifestyles in some way. Therefore with increasing Globalisation, Organisational culture should be taken into account but should not be considered be more important than National cultures. In this way, projects can run smoothly. CHAPTER 6 BIBLIOGRAPHY Adel Al Khattab, John Anchor and Eleanor Davies (2007)International Journal of Project Management: Managerial perceptions of political risk in international projects. Volume 25, Issue 7, Pages 734-743. Andrew G, 2006, Operations Management: John Wiley Sons, Ltd Cacioppe, R (1997) ‘Leadership moment by moment!’  Leadership Organization Development Journal.  Volume 18 Issue 7 pp335–345 Crainer, S. (1996) Leaders on Leadership, Northants: Institute of Management Foundation Hofstede, Geert H. (1980),  Cultures Consequences: International Differences in Work-Related Values,  Beverly Hills: Sage Publication. Huczynski, A. and Buchanan, D.(2001)  Organizational Behaviour: An Introductory Text, ch.19, Prentice Hall:  London Inglehart, Ronald and Wayne E. Baker (2000), â€Å"Modernization, Cultural Change and the Persistence of Traditional Values†,  American Sociological Review, 65, Feb, 19 – 51. Marsh, D, 2000,  The project programme support office handbook,  Volume one,  Great Britain: Project Manager Today. McKenna, E (1998) Business Psychology Organisational Behaviour, Sussex: Psychology Press Ltd Mullins, L.J. (2006)  Management and Organisational Behaviour, Essex: Prentice Hall. Edition 7 M.S. Nawaz and J. Hood (2005), Managing international business risk – political, cultural and ethical dimensions: a case study approach, J Insurance Res Practice 20 (1), pp. 16–24. Ndiritu Muriithiand Lynn Crawford (2003) International Journal of Project Management: Approaches to project management in Africa: implications for international development projects. Volume 21, Issue 5, Pages 309-319. Ray W, 1995, Production and operation Management,  London: Cassell educational ltd Roderic J. Gray (2001) International Journal of Project Management: Organisational climate and project success Volume 19, Issue 2,Pages 103-109 . Schwalbe, K., 2003,  Information technology project management,  London: Course  technology. Stedham, Yvonne E. And Jeanne H. Yamamura (2004), â€Å"Measuring National Culture: Does Gender Matter?†,  Women in Management Review, 19, 5, 233 – 243. Stogdill, R.M. (1974) Handbook of leadership: A survey of the literature, New York: Free Press Sun, T. (undated) The Art of War hackcraft.net/SunTzu/wagingWar/20/ J. Wateridge, How can IS/IT projects be measured for success. International Journal of Project Management 16 1 (1998), pp. 59–63. Yoo, Boonghee and Naveen Donthu, (1998), â€Å"Validating Hofstede’s Five-Dimensional Measure of Culture at the Individual Level†,  American Marketing Association, Conference Proceedings, 83. Yoo, Boongee, Naveen Donthu and Tomasz Lenartowicz (2004) Working Paper. Young, T. L. (2007) The Handbook of Project Management: A practical guide to effective policies, techniques and processes. 2nd Edition, London: Kogan Page. Fig 1. â€Å"Risk Matrix† (online) jiscinfonet.ac.uk [located] jiscinfonet.ac.uk/InfoKits/project-management/InfoKits/infokit-related-files/risk-matrix-pic â€Å"Gaddafis son in civil war warning† english.aljezeera.net [online]  Ã‚   Available from: http://english.aljazeera.net/news/africa/2011/02/2011220232725966251.html ‘The case of HSBC’ [located] www.hsbc.com

Wednesday, November 6, 2019

what about bob essays

what about bob essays In the movie, What About Bob, the main character Bob Wiley is one of Dr. Leo Marvins newest patients. Dr Marvin is an uptight, egotistical psychiatrist who cant wait to get on Good Morning America to introduce his new book about emotional disorders. When Leo goes to New Hampshire to prepare for his TV appearance and vacation with his family, Bob decides to tag along, tricking the doctor's answering service into revealing his location. Before long, Bob turns Leo's vacation into a nightmare, winning over Leo's wife and kids even as he drives his psychiatrist to the brink of psychosis. Bob Wiley had quite a few disorders which, Dr. Marvin was unable to control. Bobs phobias and disorders are all serious and immediate medical attention is needed. One of Bob Wileys biggest neurotic disorders was social phobia, or an irrational anxiety elicited by exposure to certain types of social or performance situations, also leading to avoidance behavior. Bob told of his troubles of being in certain situation, and his symptoms of nausea, illness, pain, etc. that lead me to believe that he needs treatment of his social phobia, or he may even be agoraphobic, which is the abnormal fear of open or public places. Social phobia is a very prevalent and debilitating disorder, with public speaking anxiety being the most common fear among socially phobic individuals. Although there are a number of effective psychosocial treatments for social phobia (i.e., cognitive-behavioral treatments and exposure therapy) very little is known about the underlying mechanism of therapeutic change, and the variables that are predictive of treatment outcome. Among his trouble in social situations, he also has a phobia of being dirty, Automysophobia, and hypochondria, the persistent neurotic conviction that one is or is likely to become ill, often involving experiences of real pain when illness is neither present nor likely. His ten...

Sunday, November 3, 2019

Mass Spectrometry Essay Example | Topics and Well Written Essays - 500 words

Mass Spectrometry - Essay Example The first step involves production of ions of the compound by electron ionization. Each product ion is generated from the molecular ion. The result results are then displayed in a plot of a graph of ion abundance against mass to charge proportion. The ions give information concerning the structure and nature of their original molecule. However, the spectrum of a molecular ion appears at a greater value, which gives the total molecular mass of the substance. Mass spectrometry instrument consist of various components, the detector system that detects ions and record relative abundance of every compound, ion source, which produce gaseous ions and analyser, which resolve ions into their respective mass components. In addition, a computer is also required to monitor and control the instrument, get and manipulate data then use it to compare spectra. With the help of these components, a mass spectrometer can perform various processes. This includes, separating ions in accordance to the ratio of their mass to charge, producing ions from the compound, which is done in the ionization source, fragmenting and analysing ions, processing signals from detector, which are then transmitted to computer system and control the instrument via feedback and detect the ions from the last analyser and measure their abundance. This can be done using the detector, which converts the ions to electrical signals. Mass spectrometry has several advantages compared to the other analytical techniques used. It is highly accurate, can be coupled with liquid chromatography to separate samples further, and has a large mass range, fast, auto runs with sampler or direct injection. On the other hand, it has some drawbacks like it is complicated spectra, salts drown signal which takes more time to filter from the machine, a high intensity peak can eclipse smaller intensity peaks, fine tuning work. In conclusion, although Mass

Friday, November 1, 2019

Summary Essay Example | Topics and Well Written Essays - 500 words - 93

Summary - Essay Example articles is the spreading of this crime in the recent years and the hype created by the mass media, political and economic forces against the threat of such crime. The lack of trail and reporting of such incidences makes this threat question itself. The articles have clarified the concepts of hacking, hactivism, cracking and their relation with and the comprehensive meaning of the word cyberterrorism. In my opinion, the increasing use of information technology does make us vulnerable to the cyberterrorism more than ever before. I agree with the writer where he talks about the more unconventional routes adopted by the terrorists for spreading terror because of the anonymity, cost effectiveness and mass destruction capabilities. The book ‘Black Ice’ also shows the possibilities and realities of the cyberterrorisn and the vulnerabilities of the sectors to these crimes. The biggest fear is the ability of the terrorist to command the data once he gets into the system posing threats at national level. The absence of physical landscape and defying the constraints of the law of nature, cybercrime can be very tricky at times. The various religious groups fight for their right through the cyber encroachment and the history has also witnessed credit card threats and invasion of bank internet facilities through the cybercriminals. Apart from the above agreements there are few po ints in the articles where I disagree with the writers. The point that no real cases of cyberterrorism is reported or witnessed, I still believe that the hype is not just for the sake of it. The hype for me is the call of awareness, the information required by the general public in order to foresee what is coming. Although no such incidence has happened the proactive human nature says awareness should be at every doorstep to fight what is as quiet as a snake and more devastating than an earthquake. In real life, schools and universities can spend a part of their budgets on creating better fire