Month: January 2017

Quadrennial Homeland Security Review Policy Statement


Securing the borders is an important task that the county needs to consider though it has not greatly dealt with the security problem facing the country. Texas borders Mexico a country that borders the United States. Mexico is associated with a lot of crimes that usually affects the people in Texas (Guerette & Clarke, 2005). The gangs from Mexico form groups in Texas that provide a hard time to the Texan government and its constituents.  Therefore being on the border requires various measures to be executed to ensure security is maximized and that no more gangs gain entry into the country and further into the country. Various measures can help in handling border security and ensure that any leaks in the borders are dealt with to prevent any mishaps affect that may eventually affect the state.

Cross Country Involvement

The two countries and the Texan county should be greatly involved in various meetings that will help deal with various criminal gangs. Homeland Security should ensure that it call on the Mexican government and law enforcement agencies in Mexico to help them deal with the increasing crime rate in Texas (Longmire, M & Longmire, S., 2008). The cooperation will help the government identify the various tactics that the criminals use and help homeland security to be more effective in finding criminal gangs in Texas. Such criminal groupings eventual move to other states posing problems eventually to the whole country and, therefore, dealing with the root of the problem.

Increasing of Security Checks and Border Patrols

Increasing the workforce at the border is important for the safeguarding of the border. The main issue in increasing security is to ensure that no one accesses Texas illegally especially focusing on criminals from Mexico who are operating in Texas to a small extent. Since Texas County borders, Mexico security should be beefed when compared to other states. The increasing criminal activity associated with the gangs affects the security of Texas, and the killings paint a negative picture on the security agencies. Texas as a county has not much concern for the border about the large numbers of gangs in the county who are a security risk to the constituents of Texas. The ports into Texas are the entry points that form the border points bordering Mexico. Entry points are through land and air.


The legislation is needed in place to support the inclusion of more police officers on the border. This will help in ensuring that the border is secure especially by creating legislation that increases police on the border and helps to ensure that a lot of tools are used especially those that are related to technology including cameras and computers. Technology has proved to capture various things that people would not note and, therefore, using them at the border would increase efficiency in securing it. The legislation would, in dealing with transnational activity involving crime, help greatly in combating crime especially international crime since Mexico is known for the many drug and crime cartels that operate internationally.


Security is a central concern to the county, and, therefore, it should be considered and taken with a great necessity to ensure that no criminals or illegal entries are made into the county. The national government should improve border security in counties that border other counties like Mexico. Texas should, therefore, be considered in being given additional assistance to increase security, and since Mexico has various criminal cartels, the government should focus on providing financial assistance to ensure that the various tools are obtained. Therefore, it is important that the county consider the border issues, and the various ports into the county have loopholes. The loopholes like illegal entry especially involving criminals should be sealed to prevent crime in Texas and in general to America.

Download full Quadrennial Homeland Security Review Policy Statement or Order original paper on any topic at an affordable price.

Public Communication Programs, Processes, Systems, Efforts, and Plans


There are many processes, efforts and various communicational procedures that take place for the purpose of public education. Many processes help in the communication of various risks that affect the public. The risk communicators, therefore, had to go through various efforts like ensuring that the languages used are appropriate and are not imposing to the public. Various efforts are pout in risk communication to ensure that the public understands what is taking place in their environment. The efforts are made in educating the public using seminars or organizing for local meetings with the affected people.  The communication to the public should be clear and concise to the people involved.

An example of a public communication tool is that developed by the World Bank that deals with the privatization programs that will help in mitigating development and development risk. Various approaches are used in the management of risks and even communicating to the affected people who are mostly affected by various environmental hazards. The various approaches are usually in dealing with the agents especially in the release, use and exposure to the various agents. Various efforts and actions are geared towards educating the public in making decisions. The various processes including being open, frank, honest and truthful. The purpose of the various efforts like honesty is to ensure that they listen and understand the public concerns and be sensitive to their needs or grievances. The rules of communication by Covello. Most people may have mistrust against the experts.



Risk Communication

The core principles of the public education are many, include mental, and trust determination theory. There are various efforts that have been progressed by eth government in the event of enraging that the various organizations dealing with chemicals and manufacturing practices educate the public on the effects of the chemicals and whether their lifestyles will be changed in any way (Sellnow, 2009). The government has through various policies and regulations the regulations and laws are set in place by the nation government and in the respective local governments. Therefore, the governments contribute greatly to the welfare of the people in putting the industries into account.  Risk research has been carried out to find out the various risks affecting most publics and how such messages can be communicated to them. Risk communication entails various aspects that provide clarity to the targeted audience and thus makes sure that the affected people get to understand the various impacts such companies may have on them. Some of the aspects are getting the numbers right, informing the public of the meaning of the numbers, explaining the meaning of the numbers, make the public conversant with the past risks that they have accepted, explain the cost versus the benefits associated with the risks, and promote respect towards the public. Lastly, the companies should collaborate with the public to ensure that there are involved in many of the workings of the companies and, therefore, increase transparency.

Theories, Processes and Efforts of Communication to tThe Public

Situation theory publics helps communication towards the intended to be effective.  The theory helps in identifying the stakeholders who should be reached out to and how communication should be carried out especially to the publics. As a result, it clearly identifies the public and then goes forward to determine whom they should be communicated to. The theory has three aspects, which are the extent of involvement, constraint recognition and problem recognition. Information processing and seeking are the core characteristics of the theory used to forecast behavior. The theory, therefore, encompasses communicative practice in dealing with various problems that may arise concerning the publics. The theory helps in making sure that risk analysis and assessment is carried out to ensure that the people understand the various risks associated with any companies operations (Crouhy et al., 2000). The company thus gets to air out the various consequences without possibly reduce the impact of the risks associated with the institutions and organizations.

The heuristics systematic model helps greatly in ensuring that the publics are educated to a greater extent. The various efforts are put into play to ensure that those who educate the public have the necessary information by using the model to predict the behavior of the publics. Another model is the deliberate process model that helps the institution and organizations identify and forecast the public’s motivation and behaviors in processing the various risk messages involved. The model centers various actions and measures that help in processing the risk messages and helping the public to understand the risks associated with the various organizations.

Risk analysis is also carried out to determine the resultant effects of various risk analysis. Risk analysis entails control, evaluation and recognition of a risk (Arvai, 2014).  Most of the areas that focused on public education include public health, geology and earth science, and environment stewardship. Therefore, the companies carry out risk analysis to ensure that they make the public and the government at large understand the various risks involved.  There are many institutions, which are involved in the disseminating important information regarding the various companies and the chemical effects.

The Red Cross organization has many branches globally and deals with related health problems. It has been instrumental in public education specifically in health related matters. The Red Cross is educated people on the various health related matters globally. The Red Cross provides information that is relevant to the communities they operate in. It is mostly centered on various disasters that take place throughout the world and help to ensure that people who are affected by various floods or natural disasters like tsunamis and earthquakes are rescued. Therefore, the Red Cross is a multifaceted organization that helps in dealing in not only dealing with not only health but also rescue and educating the public on various risks. Another approach to educating the public is the crisis and emergency risk communication. It is an emergency awareness program (Vose, 2013).


Most of the models in place and efforts usually help the institutions in ensuring that they predict the various outcomes that may happen when the public get the risk messages. The models and processes help in ensuring that the organizations come out clearing on the various negative impacts and in the prediction of the public’s behavior. As such, the public should be more involved in the decision process especially regarding companies that have extremely negative consequences should they be set up. The government should come up with legislation that is people centered and that required the companies to have the environmentally friendly and health conscious practices that ensure that the publics have little concern on these issues. Companies should, therefore, be accountable to the public in following the laid down procedures by the national government and the local governments in place.


Arvai, J. (2014). Effective risk communication. Abingdon, Oxon: Routledge.

Crouhy, M., Galai, D., & Mark, R. (2000). Risk management. New York: McGraw Hill.

Vose, D. (2013). Risk analysis: A quantitative guide. Hoboken, N.J: Wiley.

Sellnow, T. L. (2009). Effective risk communication: A message-centered approach. New York: Springer.

Course Text: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches


Course Text: Research Design: Qualitative, Quantitative, and Mixed Methods Approaches

  • Chapter 9, “Qualitative Procedures” (pp. 173–202)Creswell guides the reader through qualitative methods and plans. Use this chapter for the Discussions and the Application. Media:
  • “Qualitative Methods: Two Examples” (11:09)Dr. Sreeroopa Sarkar discusses two qualitative research studies. To view this video program, use the media player located at the top of this page.

RSCH 8100 Video Transcript: “Qualitative Methods: Two Examples”


Narrator: Dr. Sreeroopa Sarkar’s research study is an example of qualitative research. Its design was made particularly interesting because of cultural questions and decisions that guided the design process. Listen as she explains.


Dr. Sreeroopa Sarkar: Today I’m going to describe two research studies that myself and Dr. Bonnie Nastasi of Walden University have carried out for promoting mental health among the schoolchildren in the South Asian countries of Sri Lanka and India. These two studies were formative in nature, and it aimed at assisting the mental health needs of the adolescent school students in these two countries and resources available to them to deal with any kind of mental health issues.


The first study was initiated in Sri Lanka. We wanted to test the model in a similar culture, so, as a native of India, I wanted to extend this study on the model that we developed in Sri Lanka and wanted to test it in a similar culture in the neighboring country of India. We expected that India and Sri Lanka has many similarities in cultures.


I’d like to share with you why we decided to carry out these two studies in two different cultures. We have been involved in a sexual risk prevention project with the youth in Sri Lanka, and during our interviews with the young adults, many of the mental health issues that came up such as suicide, alcohol and drug abuse, and so on. For example, suicide rate among the adolescents in Sri Lanka was very high. That was also the case for adolescents in India. Sri Lanka has the highest rate of suicide in the world. And the rate of suicide among the adolescent population, particularly between the age of 15 to 18, is highest in India. We also found out that drug and alcohol abuse is on the rise in both cultures, and there are also incidents of gang activities or criminal activities, community violence, that are affecting the adolescents and the young adults in both countries.


We started looking into the literature, and we also found that there is very limited emphasis on mental health issues in both cultures. There are also very limited resources available. For example, in Sri Lanka, there are only 19 psychiatrists available for a population of 20 million. There are also misconceptions as well as widespread ignorance about mental illnesses and mental disorders, and there are also cultural stigma about mental illnesses in both of these cultures.


In this background, we decided to initiate our first study in Sri Lanka, and for conceptualizing mental health for the purpose of our study, we used three theoretical frameworks. One was Bronfenbrenner’s ecological developmental framework, which emphasizes on the rule of ecology in influencing a person’s development. We also used personal and environmental factors model, which emphasizes the importance of personal factors as well as environmental factors in influencing a person’s mental health. And the third framework that we have used was the primary prevention of mental illnesses through promotion of personal social competencies.


So based on these theoretical frameworks, we generated six major mental health constructs, or variables, that are related to mental health. First was the culturally valued personal and social competencies. And the second construct was social stressors as viewed by the adolescents in that culture. Third was what kind of coping strategies that the youth utilized to deal with major mental health problems and stressors. Fourth was what kind of social resources that are available to the youth to deal with mental illnesses. Fifth was personal and family history that makes an individual vulnerable to mental illnesses, and the last was socialization practices and agents that influences a person’s development.


We realized that using a qualitative research method would be very effective in this formative research stage. We have decided to use the ethnographic research tradition because we were trying to understand mental health from the perspective of the people from two different cultures which are very different from the cultures that we see in the United States. We wanted to learn about the culture from the perspective of the people of the culture. We wanted to get a definition of mental health as the people from that country defined it: how they viewed mental health, how they viewed different mental health problems, what kind of attitudes they have towards mental health. So we felt that ethnographic research method will enable us to get a very culture-specific definition of mental health.


We conducted focus group interviews with the schoolchildren. We started with open-ended questions, and based on what kind of responses we are getting– for example, if they wanted to discuss a particular topic, we also wanted to focus on the particular topic and discuss it with the children in details. I’ll give you an example. When we are conducting interviews with them and we ask them about social stressors, many of the children were very vocal about academic pressure. And we wanted to explore that issue in details, and we asked them more questions about academic pressure. And we found out that there are several factors, such as rigorous examination system in the country, high level of competition, parental pressure for academic achievement, as well as lack of opportunity for literary creation were identified as major stressors by the children.


Another example would be, when asking female students about social stressors in India and Sri Lanka, girls talked a lot about sexual harassment and molestation that they encountered in everyday life. So we are very interested and asked them more questions about that, and we wanted to discuss it in details. We found out that girls are regularly teased by boys on the streets and they’re also molested frequently in the public transportation by men. They identified that problem as a major social stressor for them. We expected that the findings from the studies will help us developing a culture-specific survey questionnaire and intervention tool that we can use with the larger population of adolescent students in both of these countries.


I’ll give you some of the examples of our findings. Some of the characteristics of personal social competencies as defined by the adolescents in that culture included: honesty, hard work, ability to balance between work or play, and respect for elders. Social stressors, as viewed by the adolescents, included: poverty, academic pressure, sexual harassment, family violence, fights between the parents, and divorce of their parents. Some of the coping strategies that they described included: crying; pouting; isolation; listening to musics; or seeking support from family members, from parents, and from friends. Social resources available to the adolescents included: seeking support from family, friends; or seeking support from private tutors who particularly help them in their academic needs. Interestingly, students never discussed getting any kind of support from professionals, such as psychiatrists or psychologists.


Based on our findings from both of these research studies, there are several implications. First, the findings from this study suggested a strong need for mental health services for the adolescent school students in both of these countries. Secondly, based on the qualitative data as well as our intervention data, we expect to recommend to the policymakers of the country several things. We expect to recommend them that they may explore the opportunity for integrating personal social competency promotion, or life skill training, to the children in the schools, such as how to deal with stressors. It will teach them resiliency, or it will teach them how to seek support when they are having some kind of mental health problems.


One of the challenges that I personally had to deal with while carrying out this research was keeping out my personal biases. I am a native of India, and I’m very familiar with the culture of India as well as Sri Lanka, so I had to make sure when I went out there and I was carrying out interviews, I had to make sure that my personal biases doesn’t interfere with data collection or data interpretation. And I think that’s important for any qualitative researchers to remember, that we have to be careful. We have to be aware of any kind of personal biases that we bring in with ourselves into the research. In closing, I would like to say, that as we expected, qualitative research was found very effective for this particular study. We found a very culture-specific definition of the major mental health constructs that we were looking into, and, based on the definition of this construct, we were successful in developing a culture-specific instrument for collecting data as well as– we developed an intervention program that we implemented in Sri Lanka. We hope to do the same in the future in India with the qualitative data that we have collected there.


The Assignment

Qualitative Research Design and Methods

As you did last week, you will begin this week with a general examination of qualitative strategies and methods in this Discussion, along with a comparison of those methods to the quantitative strategies studied last week.

To prepare for this Discussion:


Review Chapter 9 in the course text, Research Design and the “Qualitative Methods: Examples” media segment.

Explain how quantitative and qualitative strategies and methods/procedures are similar and different.

Determine which kinds of research questions would be served by a qualitative strategy of inquiry and explain why.

Generalize about the popularity of qualitative methods in your discipline.

With these thoughts in mind:

Post by Day 3 a 2-to 3-paragraph comparison of quantitative and qualitative strategies of inquiry.

Be sure to support your postings and responses with specific references to the reading(s) and/or media segment(s) and use APA format.

The Code of Hammurabi

The Code of Hammurabi

Persuasive Writing Assignment (Essay #3)

The Code Of Hammurabi

Consider the works that we have discussed this semester. Select one or two specific works and explain in detail why the work(s) not only had the most significant impact on you, but also why it (they) should have the most significant impact on the rest of us.

In the opening paragraph, it is important that you powerfully express your position in a clear and convincing thesis statement. Keep in mind that your objective is to persuade the reader that this work(s) stood above all the rest. Simply giving a summary of the work does not meet the requirements for this assignment.

Obviously, there should be a strong sense of personal conviction that runs throughout the paper. Cite at least three (3) passages from the text(s) to support your opinions.

Be sure to pay close attention to writing mechanics (grammar, punctuation, transitions, etc.)

Essay Requirements:

Length: 3 – 4 pages, typed, double-spaced
Format: MLA style
Due: See syllabus
• Title your essay (title should capture the essence of your thesis)
• In the upper left-hand corner of the first page: Your name, Course Number, Instructor’s name, Date
• Beginning on the second page, your last name and page number should appear in the upper right-hand corner.
• No separate cover page is necessary.
• Staple pages
• Grade may be reduced if essay is submitted late

Monopoly Vs Perfect Competition – Answered

Whether a firm is operating under PC or under MONOPOLY the objective or the goal of the firm is to maximize the profits. This suggests rationality on the part of the producer of both the market. In both the models the owner of the firm is also the manager entrepreneur there is no separation of ownership and management in both the models. In both the models profits maximization condition is satisfied when the necessary and sufficient condition are fulfilled.
The product is homogeneous in poor competition while in monopoly the product may or may not be homogeneous. In monopoly the total supply of the product is concentrated in single firm. While under prefect computation there are large numbers of sellers and none of them can influence the price by changing his price.
As PC and monopoly models are traditional models. Accordingly both depends upon the traditional cost concepts and curves. I other word the behavior both the models are explained with the help of U shaped cost curves. Shaped cost curves both in SR and LR.
Such cost curve suggests that from each plant specific level of output can be produced.
Monopoly is often considered to be inefficient compared to perfect competition.
1.Compare and contrast monopoly with perfect completion. Use graphical as well as verbal explanation. (View Sample Answer)
2.List and discuss the sources (reasons) of monopoly inefficiency. (View Sample Answer)
This writing assignment should be three pages. Two pages for paper and one page for work cited.
Would you like help in comparing and contrasting monopoly and perfect competition? has professional writers ready to help you. We provide high quality and original papers that will guarantee you a good grade. Click on the Order Now button below to place your Order.

Using the appropriate tables in the text, Required: Determine: a

Using the appropriate tables in the text,

a. the present value of a single $14,000 cash flow in seven years if the interest (discount) rate is 8 percent per year.
b. the number of periods for which $5,820 must be invested at an annual interest (discount) rate of 7 percent to produce an investment balance of $10,000.
c. the size of the annual cash flow for a 25-year annuity with a present value of $49,113 and an annual interest rate of 9 percent. One payment is made at the end of each year.
d. the annual interest rate at which an investment of $2,542 will provide for a single $4,000 cash flow in four years.
e. the annual interest rate earned by an annuity that costs $17,119 and provides 15 payments of $2,000 each, one at the end of each of the next 15 years.

degree of operating leveverage, percent change in profit

Sharda company is considering two different processes to make its product – process 1 and process 2. Process 1 requires Sharda to manufacture subcomponents of
the product in-house. As a result, materials are less expensive, but fixed overhead is higher. Process 2 involves purchasing all subcomponents from outside
suppliers. The direct materials costs are higher, but fixed factory overhead is considerably lower. relevant data for a sales level of 30,000 units follow:

process 1 process 2


sales $6,000,000 $6,000,000

variable expenses 2,700,000 4,200,000

contribution margin 3,300,000 1,800,000

less total fixed expenses 1,925,000 600,000

operating income 1,375,000 1,200,000

Unit selling price 200 200

unit variable cost 90 140

unit contribution margin 110 60


1. compute the degree of operating leverage for each process.

2. suppose that sales are 30 percent higher than budgeted. by what percentage will operating income increase for each process? what will be the increase in
operating income for each system? what will be the increase in operating income for each system? what will be the total operating income for each process?

3. what if unit sales are 10 percent lower than budgeted? by what percentage will operating income decrease fom each process? what will be the total operating
income for each process?

Customer-Focused Approach

Customer-Focused Approach

Paper instructions:
A wholly owned subsidiary of a large American automobile manufacturer from 1984 to 1994, outlines the successful and unique adaptation of a new approach to organizing in the U.S. automobile industry. The organization represents many of the characteristics typified by “Quality of Work Life” programs, and allows you to see the benefits of a cooperative and customer-focused HRM approach. Use the Library or other Web resources to research and answer the following questions:

What aspects of quality of work life (QWL) programs does the experiment at this case study automobile plant illustrate?

How can the case study automobile manufacturer ensure that employees have not only the willingness to take responsibility but also the ability to do so?

In this case, a completely new company was started with considerable autonomy from the larger manufacturer. Why do you think so many large organizations turn to “Greenfield” operations such as this when undertaking major changes in corporate culture and operations? Do you foresee any problems down the road for the larger manufacturer in this regard?

Rulemaking Authority of Foreign Administrative Bodies and Their Effect on U.S.

Foreign Administrative Bodies


International trade plays an essential obligation in the prosperity and growth of the United States. Similar to how the open trading among the 50 states of America develops extensive benefits, open trading enhances great benefits at global level.  Trade promotes technology transfer, creates competition, and permits businesses and consumers access to the global best products. This yields to income rise, higher productivity and innovation all around. The foreign administrative bodies are highly involved in regulating international trade operations. The international trade administration is involved in developing export strategies creating limits to the international trade. This include developing rules and regulations that control countries relation in international trade. This paper evaluates how the foreign administrative bodies’ rulemaking authority influences the US global businesses.

The Foreign Administrative Bodies’ Rulemaking Authority Influences the US Global Businesses.

The foreign administrative bodies’ authority to make rules regarding international business gives them the ability to control the international business. This implies that they can develop a role to favor trade relation between countries in a certain region and to stop malicious business act among members of countries to be involved in trade agreements. They are basically involved in setting international trade policies that should act as a guidance to business operation among different countries. This simply means that the foreign administrative bodies with authority to make laws can highly influence international trade in the United States. They set trade requirements, and thus, they highly influence what can be exported to certain countries whose global business operation they protect. This include the procedures to be followed to enhance international business relation, the quality standard of exports and imports in different countries.

The international regulation cooperation is important to the US government for two main reasons. First it assists the regulatory agencies of the US attain their missions of statutory regulatory domestically. Actually, in some aspects such as drugs and food safety regulation, where the biggest portion which are US imports, participation and awareness in processes of foreign   regulatory participation might be important to guarantee the safety of the goods getting into the US market. International regulatory cooperation can also eliminate non-tariff barriers to exports and trade, enhancing U.S. competitiveness and global commerce. Furthermore, the international regulatory cooperation benefits are consistent. This implies that they can frequently be employed in unison (McCarthy, 2011).).

Although the global regulatory cooperation demonstrated some advantages to the country, it still create some key barriers to the US international trade, both practical and legal barriers. A number of agencies in the US claim that with global regulatory cooperation, they lack the constitutional power to constitute international impacts when making governing decisions. High level leaders and agency officials demonstrates that the foreign administrative bodies gives them low priority since it limits the visibility of their success. Information sharing legal restrictions can hinder cooperation at international level. Agencies coordination in the government of the United States is a challenge, especially for regulatory agencies independency in order for agencies to center on competitiveness and trade are not permanently aware of the other federal regulators activities (McCarthy, 2011).

TTIP also play a major part in enhancing cooperation between nations. These bodies set rules that enhance the growth of International Corporation and also eliminate any form of acts that would results malicious practices. They set production standards for goods to be traded in certain international. The international trade administration empowers the U.S. industry competitiveness, promote investment and trade and guarantees fair trade via the rigorous trade agreements and laws enforcement. It operates to enhance global business settings and to assist U.S organizations contest at abroad and home market. It assist in supporting the national export and recovery agenda initiated by President Obama (Stewart, 2015).

The rulemaking ability of the foreign administrative bodies defines a better business environment for the US in the international market. For instance the ITA in the US is structured into three different though complementary units of business. They include the unit of global market, the unit of industry and analysis, and the compliance and enforcement unit. The global market unit integrates the ITA’s regional and country experts, domestic and overseas field stand and particular programs of trade promotion to offer the US companies full particular country export suit promotion services as well as advocacy to market access, while indorsing the US as an investment destination.  The analysis and industry unit unites the ITA’s economic experts, trade and industry to advance US industry competitiveness via the execution and development of investment policies and international trade as well as promotion techniques. The analysis and industry leverage ITA’s association with services and manufacturing industries to raise U.S. exports. The compliance and enforcement unit promotes the responsibilities of ITA to enforce the trade laws in the US and guarantee compliance with negotiated trade agreements for US industry (Trade, 2015).

The foreign administrative bodies also develop rules to protect country’s local industries from facing unhealthy competition from the foreign investors and traders. This is done by developing laws such as antidumping laws that restrict the prices of imports into a country selling substitutable goods. This protect the local industries from facing competition from companies that can manage to sell their products at cheaper prices. The bodies’ administrative role give them the power to control the pricing of foreign goods (Edwards & DeHaven, 2009). This gives the United States a great advantage in different foreign markets in the world. This it does not only protect the local countries with unhealthy completion, but also the US products competition over other exporters from countries with low production cost. For instance, production of an electronic product in China would be cheaper as compared to production of a similar product in the US. In this regard, without prices regulation, exporting this product to another country the two producers would recover their production cost and profit. Thus, the product imported from US will be expensive than a product imported from China and thus this would make most consumers to prefer the China manufactured product. However the antidumping laws may force China produced product to raise their prices to prevent unhealthy competition with local companies, an aspect that benefits other exporters.


The foreign administrative bodies’ ability to make rules gives them a great ability to influence the United States global business operation. The bodies can set rules that can positively or negatively influence business operation in the United States. However, based on the above analysis, the bodies have demonstrated that their rules have highly enhanced the US global business operations. Although there are a few limitations, their ability to make global business rules have highly facilitated positive business relation between different countries.


Edwards, C., & DeHaven, T. (2009). International trade administration. The Federal Government. Retrieved from< >

McCarthy, M. (2011). International regulatory cooperation, 20 years later: Updating ACUS recommendation 91-1. Retrieved from <>

Stewart, R. B. (2015).  US administrative decision making procedures and international regulatory cooperation. Retrieved from<>

Trade. (2015). About the international trade administration. Retrieved from <>


Film Proposal Essay


This film is created by the DMX family, one of the best film writers and directors within the California region. DMX has been in the film industry for a very of close to ten years. The unit has been successful in its previous script writing and it has even won three awards. The first award was awarded as the runners up in script writing and later two awards were won as the best script writers in California. Some of the scripts that were previously written by DMX family have featured on some of the local television stations due to the message of the contents and the quality of the plays. Moreover, the level of creativity has been appreciated in the past not only by the producers but also by the fans that enjoy watching the plays. DMX level of creativity and dynamism goes beyond the expectations of the viewers because a lot of research is done before a play is fully composed. This unit also derives its creativity from watching a lot of plays especially on the national theatre as well as getting ideas from the daily occurrences that happen in the society.

Title of the Film

The film has been given the title “love infidelity”. The title gives a brief explanation about what the film is all about since it primarily focuses on the infidelity that most families go through in this century. The film is all about three young men who are married to very beautiful wives whom they love so much. One of the men is a banker, the other one is a basketball player while the third one is a taxi driver. All the three men are never at home during daytime due to the tight schedule that they go through on a daily basis. Their wives on the other hand are equally employed with an exception of one who runs her personal business venture within the city.. Coincidentally, the three wives are all cheating on their husbands with three other men. Every woman creates for both the husband and the “side dish” almost on a daily basis. The women find time to hang around with their other men either during the daytime, or later in the evening before they drive back home. Once they get home, they give their husbands the full attention that they need as if nothing had just happened before they got back home. The husbands on the other side are non-suspecting of the foul play by the wives. In the long run, the tricks played by these beautiful women come crashing when their husbands learn of the dirty games the women have been playing behind their backs.  The expose puts the marriages through turmoil for a very long period until that point when they all decide to file for divorce papers because the marriages cannot work anymore. The “side dishes” also disappear once they realize that the women were hanging out with them yet they were married. The end result is that the children are left in such a confused scenario where they have to live without the care and love of both parents.


The budget of the film is expected o be a little expensive considering that the some scenes will have to be shot in some of the five star hotels within the city. Moreover, the film will have to be shot within a span of one week for it to be complete. The estimated amount needed for the entire process will be at least $ 250, 000. The money will be used for various purposed during the shooting process. For instance, part of the cash will be used to settle rental fees for the hotel rooms that will be used by the crew members for the one week period. Additionally, part of that money will be used to cater for the computer graphics and imagery. The cameras that will be used during that process will be hired using weekly rates. Apart from that, the cash will also be used for talent and marketing purposes so that the film can able to sell to the end co0nsumers once it will be completed.

Film Contract

The contract to this film will be guided by the following terms and conditions.

The writer of the script will be engaged in the in all the production stages of the love infidelity film.  The producer should be in agreement that the writer be included in the production stages from the star to the end. The producer should also agree that his work will be done according to the stipulations of the terms and conditions of the agreements.

The creator, DMX family hereby gives the producer, Doughty producer the position of being the executive producer of the love infidelity film. Both parties agree to play their roles as per the already mentioned agreements

Download full film proposal essay or order original essay at an affordable price. 

Contract Clause – Dispute Resolution Clause

Contract Clause


The contract clause to be considered in this case is dispute resolution clause. Dispute resolution clause is a section in a contract or agreement that sets out the techniques for solving disputes between two or more contractual parties. The agreement scope is resolute in clause drafting. The dispute resolution clause requires to be unambiguous and clearly drafted. This highly determined if the clause can be used to resolve any contractual conflict or can just be dismissed as irrelevant due to a high level of ambiguity. A good dispute resolution (DR) clause constitutes of contingent in what the parties anticipate to attain from the inclusion of clause of such kind in their agreement. The DR clause need to forestall future issues and efficiently have provisions which resolves the issue satisfactorily in a way that is advantageous to both parties. Therefore, a suitable DR clause will be founded on a different variables which include the parties’ relationship and interest, the contract nature and subject matter and the respective bargaining power of the parties.  In this regard, DR clause need to be deliberately drafted, instead of routinely, with every contract customization in order to attain the most desired outcome of the parties. Thus, there is no any single DR clause which can handle all agreements (Bihancov, 2014).

Legal Issues regarding Dispute Resolution Clause

According to Bihancov (2014), a suitable DR clause must be enforceable, be a condition model to litigation, be certain and clear as to the process and mechanism to be followed, be able to foresee the issues that might arise as far as possible and be able to preserve the association of disputing parties. Different to arbitration, there is basically no basis of legislative for an agreement enforcement to mediate. Thus, a good DR clause which integrate processes of dispute resolution for instance mediation must be created to address the enforceability needs, else the insertion of a clause of that nature is objectively purposeless. The DR Clause enforceability guarantees that parties try to perform their duties under the DR clause prior to considering litigation. The probable outcomes from obligations of breaching under the DR clause gives incentives to try to resolve a conflict without litigation.

An enforceable DR Clause should not expel the court’s jurisdiction, but instead it should state clearly that the process of dispute resolution is a situation practice to litigation. This clause must be clear on the procedure to be followed to resolve a dispute and the strategies to be used to choose a third party to assisting in resolution process. The clause must also provide a clear steps to be taken in case there will be no a compromising position attained with the intervention of the third party. The clause must foresee all possible problems that they may occur which may result into unresolvable disputes in the future. Problems definition and DR clause drafting must be done to suit the expected problems which will highly be determined by the interest of individuals needing protection and representation as well as the agreement. This is a very extensive scope that expects any probable problem that include contract breach, subject or validity matter associating to the agreement, and contract termination. Finally, an enforceable clause need to enhance the preservation and maintenance of the contractual parties’ relationship. Designing the dispute progress via a suitable DR clause might assist the parties in preserving their association and finding it to be more valuable as compared to the matter of the dispute (Bihancov, 2014).

Application of Dispute Resolution Clause in Real property Management

In real property management, disputes are common between the landlord and the tenants based on different aspects. These aspects include the use of the property, the rent payment, property maintenance, property lighting, and the shared utilities among other disputes. Basically, the tenant and the landlord may develop a contract on how to resolve their issues. The contract may be drafted by the landlord and a tenant may be required to sign upon agreement. In this case, signing of the contract implies that the tenant agree to be guided by the structured contract. In case of unresolvable dispute, both the tenant and the landlord will employed the dispute resolution clause to identify the third party to assist in resolving the issue. The third party will then review the contract that binds the two and listen to the case. In this case, the third party will try to assist them resolve the case. In this case, the two parties will be anticipated to compromise to reach an agreement. The DR clause will be used to ensure that the dispute is settled without destroying the association between them, since they both need each other. In case the problem is not resolved even with the aid of a third party. In case the problem even with the aid of the party, the dispute resolution clause, the clause should guide on how they two can settle their issue in a litigation. However, this will try to be avoided by ensuring that the clause addresses all problems that can occur between a landlord and the tenant or a buyer and a seller in case the property is being sold (Scott, 2014).


Bihancov, A. (2014). What is an example of a good dispute resolution clause and why? Australian Center for Justice Innovation Civil Justice Research Online, 2, 1-19

Scott, M. (2014, 14 Jan). Dispute resolution in real estate contracts. Retrieved from <>

Order original paper at an affordable price. 

Smallpox Biological Attack Dissemination Strategies

Overview of the Threat

Smallpox is a contagious, acute, and most cases fatal diseases that is caused by an orthopozvirus variola virus. It symptoms include body and head aches, high fever, and in some cases vomiting. This is followed by a unique rash that spread in the body and eventually pus-filled blisters and bumps which scab, crust and fall off approximately three weeks after, leaving a bumpy scar. Although most people infected by the virus recover, the disease can cause 30% death to the total number of the infected individuals. Majority of survivors are left with permanent scars on most parts of their skin particularly face while some turn blind. There is no yet any treatment for the disease though there is vaccine. The only possible measures are drugs to control fever and antibiotics to prevent secondary bacterial infection. However, research is going on to establish possible cure for the disease (CDC, 2009).

Smallpox is spread through fairly and direct prolonged physical contact. The virus can also be spread via air in enclosed environment such as trains, buses, and buildings. However, it can also be spread via direct contact with contaminated object that include clothing and bedding or infected fluids from dead bodies. The disease is infectious during the fever onset and turns to be more contagious on rash onset. One remains contagious until the last scab of the disease falls off. The disease has incubation period of about 12 days. Previous research demonstrates that administration of smallpox vaccine within 4 or 3 days after exposure could substantially reduce the disease severity or abort the disease despite of the immunity level of an individuals. The disease was said to be eradicated in 1980 though the United States government has been taking precautions regarding the possibility of its use as a bioterrorist weapon since 2001 terrorist event in the country (CDC, 2009). The current threat should thus be taken serious and preventive measures employed. The possible means of spreading the virus is through air in enclosed settings. Therefore the public should consider avoiding mall and other enclosed regions one week from now.

Prevention of Mass Hysteria within the Population

Mass hysteria refers to swift development of heighted anxiety and fear that translates into immense disruption to the activities and behavior of the involved individuals. Mass hysteria can be very destructive and thus, it should be prevented. The best way to prevent mass hysteria is by identifying the best channel to alert the public about the threat and the right message to give structured in the right way (Balaratnasingam & Janca, 2006). Therefore, the government should ensure that this information is not reported carelessly by the media. Instead, the government should call for a media briefing and address the Los Angeles’ state and the nation in general.

Download full research paper on smallpox biological attack Or Order original paper at an affordable price. 

Ethics in Action Scenario Review

Ethics in Action Scenario

According to respondeat superior, principal or employer has legal role for the agent or employee wrongful act if this act happens in the agency or employment scope. This is irrespective of whether the act was reckless or accidental. Based on this provision, the employer has an ethical obligation to take preventative or corrective action if he or she know that an employee poses danger to others. Being the employee commander and supervisor, an employer has the ability to control the employee’s move and actions through supervision and tight jobs scheduling. Moreover, employers have been provided with the rights to develop the organization policies and action measures to be taken in case one fails to act based on the polices and the identified employees code of conduct. Thus, employee is supposed to rule the employees’ behaviors and to discipline any employee who poses danger to others (Duffy, 2008).

Although the employer is the principle of the employment place, employees also have rights that protect them from any form of mistreatment or unjust dismissal or unjust punishment. This right provide them with an opportunity to contest any form of mistreatment from their employer. In this regard, the employer can never interdict or discipline the employee with simple speculations. Just like any other litigation that needs evidence and proof, the employer need to have enough proof before taking any action. In case the employee is suspicious of the employee’s action, ability or plan to cause any danger to others, the employer has the responsibility of carrying out an investigation, or a close monitoring to prevent the danger from taking place. In addition, the employer should also do own investigation to obtain enough prove to be able to discipline the employee as required. However, the suspicion is enough to employ measures to ensure no danger is caused by the employee. The employer may never have proof, but that only prevent the employer from accusing the employee and punishing the employee for any mistake. However, the employer must take precautions to ensure that the suspicion does not come true and cause harm to employees. The proof provides the employer with the right to punish the employee while the suspicion only pushes the employer to investigate and employ measures to prevent any form of suspected danger (Duffy, 2008).

The employer has an ethical duty to take preventive or corrective action to all employees in the company and the customers who are attended by the employees as well as the surrounding community. The employer has a role to ensure employee safety in their work place. According to the law, the employer should protect its employee from any form of discrimination and harassment. In this regard, the employer should ensure that the environment is conducive enough for all workers environment. The employer is also responsible of protecting the employees against sexual harassment which is a form of discrimination (SHRM, 2014). Employees have the right to equal treatment and should not be discriminated based on their gender. This can only be assured by the employer by enhancing good supervision and scanning the employees conduct before employment. Good work policies and code of conduct should also be employed to enhance promote good behaviors in the working environment.

Employer also has a duty to the society to ensure that he act for the best interest of the society. This is defined as utilitarianism theory where the employer is demanded to act for the best interest of the society irrespective of whether the society best interest will interfere with the company’s wellbeing (Bilych, 2014). However based on the profit maximization theory, the employer is entitled to do all that is possible to maximize the profit of the company. However, this should be done without interfering with the rights of the employees or the best interest of the society. In this regard, an employer is needed to balance the situation to ensure that the company maximizes on its profit, ensure that the society interest is satisfied and that the workers’ rights are effectively employed in its operation. Thus, the employer has ethical obligation over the society, the workers and company’s wellbeing (Hussain, 2012).

In this case, an employee is involved in sexual assault during the working hours. However, the case does not clearly state whether this happens in the workplace or outside the workplace. In case this happened in the workplace, the employer will definitely be responsible since the employer has ethical obligation of ensuring anybody in the work place is safe. However, if this happened outside the workplace, the employer never had control of the employees’ acts outside the workplace. However, if they were involved in work mission at the place where the act took place, the employee is surely responsible under the respondent superior doctrine. On the other hand, the employer may not be able to force moral behaviors in an employee and thus, the employer may not be able to control the situation and thus, he or she may not be liable (Women UN, 2012).

There are a number of torts demonstrated in this case. They include the intentional tort of battery committed by the employee. There is also a tort of negligence where the employer neglected the role of supervision, an act that resulted to the sexual assault.

In this case, an employee of XYZ is involved in sexual assault which is definitely an act away from the employee’s job description. In this regard, it is clear that the employee was not working for the interest of the employer but for personal interest. However, the act takes place in the jobs regular working hours which means, the act happened when the employee was entitled to employment role and maybe to customers who anticipated good services as directed by the company. The ability to be involved in such a crime during working hour demonstrates poor supervision and thus a fail to the employer’s responsibility. With supervision, this could have been prevented. In this regard, both the employee and the employer has a liability to the crime.



Bilych, G. (2014). The theory of justice and profit maximization. Business and Economic Research, 4(1), 188-210.

Duffy, J. (2008). Prevention and correction of retaliation in the US workplace. Management Practices Group Best Practices Series. Retrieved from <>

Hussain, W. (2012). Corporations, profit maximization and the personal sphere. Economics and Philosophy, 28(3), 311-331.

SHRM.  (2014). What are an employer’s obligations under California law with regard to sexual harassment prevention? Retrieved from <>

Women UN. (2012). Employer obligations under law. Retrieved from <>

Order original Ethics in Action Scenario Review at an affordable price. 

Technologies in Department of Homeland Security Cyber Security Division

Technologies in Department of Homeland

Department of Homeland Security plays a big role in strengthening the security of America. One of the branches of the Department of Homeland Security is Cyber Security Division. Cyber attackers pose a big threat not only to the United States government, but also to private organizations. As the use of internet technology continues to rise in critical infrastructure sectors, many people aim to gain profit from it through hacking, espionage, and many other tactics. In order to prevent negative impacts that may arise from cyber attacks, the United States needs to enhance the security and resilience of its Internet system. Cyber Security Division of the Department of Homeland Security strives to promote cyber security through application of advanced technology (United States Department of Homeland Security, 2015b).

The mission of Cyber Security Division is to enhance security and resilience of America’s critical information infrastructure and its Internet systems by fulfilling a number of objectives. First, Cyber Security Division seeks to develop and deliver new technologies and techniques that will enable the Department of Homeland Security and the United States to protect its current and future infrastructure against cyberattacks. Second, Cyber Security Division aims at conducting and supporting technology evolution (United States Department of Homeland Security, 2015b).

Third, Cyber Security Division leads and coordinates research and development to improve the security systems of the internet in collaboration with both public and private agencies. Generally, Cyber Security Division intends to improve critical vulnerabilities that exist in the cyber security landscape including internet infrastructure security, critical infrastructure resources, national research infrastructure, leap-ahead technologies, cyber security education, identity management, cyber forensics, and software assurance. Cyber Security Division is adequately prepared to fight the next-generation cyber threats such as digital provenance and enterprise-level metrics.

In order to accomplish its mission, Cyber Security Division applies various forms of modern technology as a way of protecting the United States’ critical infrastructure systems and the Internet from cyberattacks. The three technologies employed by Cyber Security Division include mobile apps archiving technology, Federated Malware Analysis System, and AMICO and ZeroPoint technologies. Cyber Security uses these technologies well and this explains why many cyberattack plans on the United States internet systems are detected before they are executed.

The Department of Homeland Security developed mobile apps archiving technology purposely to track copyright violations in mobile apps across various applications available in the mobile app market such as iTune, Google Play, and Amazon. Currently, the Cyber Security Division uses mobile apps archiving technology to secure mobile applications by using it to conduct cyber-crime investigations, infrastructure defense, and forensic techniques. The main advantage of mobile apps archiving technology is its ability to discover approximately 19, 000 apps across Android and Windows app platforms that associated with copyright infringement (Kimery, 2015).

One major disadvantage of using mobile apps archiving technology in preventing cyber attacks is high cost associated with its implementation. Since the Cyber Security Division began to use mobile apps archiving technology, the rate of e-crime in relation to copyright infringement in the United States has greatly reduced. This is a clear indication that mobile apps archiving technology is used well by the Cyber Security Division (Kimery, 2015).

Download full paper on Technologies in Department of Homeland Security Cyber Security Division Or Order original paper on this or any other topic at an affordable price.

Intelligence Gathering And Informational Sharing Within Al Qaeda

Intelligence Gathering

Al-Qaeda, a global terrorist network, was founded by Osama bin Laden more than ten years ago. This terrorist network remains a major threat across the United States, Middle East, and Africa. Al-Qaeda’s leaders understand that they are being targeted by the United States government. For this reason, they often use every means possible to share information and gather intelligence in order to make necessary preparations on how to fight their enemies whenever they strike (O’Neil and Gray, 2011). Traditionally, Al-Qaeda largely relied on the local population to gather intelligence. In addition, the terrorist network used basic communication strategies such as face-to-face communication to share information (Global Security, 2015).

However, with technological advancements in the contemporary world, Al-Qaeda now uses technology to share information and to gather intelligence. Moreover, Al-Qaeda currently implements various technological concepts similar to those employed by the United States such as, communication networks, fusion centers, information sharing environment (ISE), detection tools, and surveillance capabilities. Al-Qaeda is unconcerned about ethics and it unethically employs technology in its attempt to attack the United States and its allies. The United States has powers to employ technology in similar ways as a strategy towards defeating Al-Qaeda (Global Security, 2015).

The five main technological tools used by Al-Qaeda with regard to information sharing and intelligence gathering include mobile phones, Skype, emails, various websites on the Internet, and different forms of media such as television, radio, and newspapers. According to Theohary and Rollins (2011), Al-Qaeda largely uses mobile phones, emails, Skype, and the media to spread terrorism-related information and to gather intelligence from their sympathizers distributed in different countries globally. In addition, various websites on the internet provide very good platforms where Al-Qaeda delivers threats that are meant to instill fear among the United States citizens and their allies.

Al-Qeada also uses videotapes to disseminate horrific images of their actions and attacks to members of the public to render them helpless. Moreover, Al-Qaeda leaders spend their time examining national websites in order to gather intelligence that can assist them to stay safe from attacks planned by the United States. Since counterterrorism plans are sometimes documented in various forms of media, Al-Qaeda currently find the radio, newspapers, and television to be very good sources of intelligence gathering (Theohary and Rollins, 2011).

In order to Al-Qaeda to be successful in implementing their attack plans on America, they have to maintain a status quo which is only possible through rigorous recruiting, resource acquisition, training, surveillance, targeting, communication, attack, and spread of propaganda (O’Neil and Gray, 2011). The most important component on the list is communication. As the United States used network technologies to facilitate effective communication in order to counter terrorism, Al-Qaeda employs the same strategy including mass media and the internet to spread messages of attack. The group has a strong multi-national network that involves Islamic militant in Kosovo, Afghanistan, Eritrea, Germany, Somalia, and Algeria, just to mention but a few (Global Security, 2015).

Download full paper on Intelligence Gathering And Informational Sharing Within Al Qaeda or Order original paper on any topic at an affordable price.

Finance P6-17 Midland Utilities, P6-22 & P6-5 U.S. Treasury securities

P6-17 Midland Utilities has outstanding a bond issue that will mature to its $1,000 par value in 12 years. The bond has a coupon interest rate of 11% and pays interest annually.
a. Find the value of the bond if the required return is
(1) 11%,
(2) 15%, and
(3) 8%.
b. Plot your findings in part a on a set of “required return (x axis)–market value of bond (y axis)” axes.
c. Use your findings in parts a and b to discuss the relationship between the coupon interest rate on a bond and the required return and the market value of the bond relative to its par value.
d. What two possible reasons could cause the required return to differ from the coupon interest rate?

P6-22 Bond – Par Value – Coupon Interest Rate – Years to Maturity – Current Value
A – $1,000 – 9% – 8 – $820
B – $1,000 – 12% – 16 – $1,000
C – $500 – 12% – 12 – $560
D – $1,000 – 15% – 10 – $1,120
E – $1,000 – 5% – 3 – $900

a.) Calculate the yield to maturity (YTM) for each bond.
b.) What relationships exist between the coupon interest rate and yield to maturity and the par value and market value of a bond? Explain.

P6-5 Nominal interest rates and yield curves: Are recent study of inflationary expectations has revealed that the consensus among economic forecasters yields the following average annual rates of inflation expected over the periods noted. (note: Assume that the risk that future interest rate movements will affect longer maturities more than shorter maturities is zero; that is, there is no maturity risk.)
Period Averages Annual rate of inflation
3 months 5%
2 years 6
5 years 8
10 years 8.5
20 years 9

a) If the real rate of interest is currently 2.5%, find the nominal rate of interest on each of the following U.S. Treaury issues: 20-year bond, 3 month bill, 2-year note, and 5-year bond.
b) In the real rate of interest suddenly dropped to 2% withouth any change in inflationary expectations, what effect, if any, would this have on your answers in part a? Explain
c) Using your findings in part a, draw a yield curve for U.S. Treasury securities. Describe the general shape and expectations reflected by the curve.
d) What would a follower of the liquidity preference the theory say about how the preferences of lenders and borrowers tend to affect the shape of the yield curve drawn in part c? Illustrate that effect by playing on your graph a dotted line that approximates the yield curve without the effect of liquidity preference.
e) What would a follower of the market segmentation theory say about the supply and demand for long-term loans versus the supply and demand for short-term loans given the yield curve constructed for part c of this problems?

Mass Casualty Incident and their Psychological Impact


Mass-Casualty Attacks

Bali Nightclub Bombings, Indonesia (2002)

Bali Nightclub bombing is an incident that took place on 12th of October 2001. Two bombs blasted a few minutes past 11 pm on Bali Island in Indonesia. The blast completely destroyed two bars in the Kuta Beach in the holiday resort in the tourist district. The explosion resulted to the death of about 202 individuals who originated from 21 different nations. In this case, over 300 individuals were also injured. Tourists were the most affected individuals in this blast. The injured were assisted by a number of volunteers who took a number of the casualties to various clinics and hospitals on Bali. Most of the casualties were treated at Sanglah General Teaching Hospital at the Bali largest hospital. Initially the casualties were taken care of by the hospital staffs as well as the volunteers. However, there was reinforcement in terms of the medical personnel from different hospitals in Indonesia and international hospitals (Brookes et al., 2014).

Most individuals who were directly affected by the Bali bombing were psychologically affected. They witnessed a lot of unfolding which include the death of their friends or other people who they were faming fun with. They also experienced injuries and fear of death. Some got unconscious and even lied next to dead people who were only pronounced dead in the emergency room. Moreover, there were no paramedics to give them any good attention and thus, the incident created tension, confusion and uncertainty. In this regard, most directly involved individual were anxious and they most suffered from posttraumatic stress disorder later on. Among the common symptoms demonstrated by these individuals include nightmares, intrusive memories, development of negative thoughts regarding tourisms, change of emotional reactions, and reacting to any small sound that demonstrate danger in their surroundings and the feeling of insecurity (Stevens et al., 2013).

The incident also impacted those that are indirectly affected by the incident. This includes family members, friends, colleagues and countrymen of the victims. Some of these psychological impacts include development of touring fear, development of stress based on the need for money to assist with treatment and to assist the victims related to them to receive proper treatment as well as proper counseling. They also suffered from fear of uncertainty and thus, turning to be anxious since no one was sure of the fate of their beloved ones. The family members experienced a state of confusion due to lack of exact information regarding the situation or the status of their loved ones. Accepting the new life after the incident which includes living without a family member, friend or colleagues for those that lost their loved ones and living with the injuries impacts and disabilities for those who survived the attack also resulted to the development of stress and to some extent depression (Brookes et al., 2014).

Basically, the treatment of each victim depends on the specific injuries that a patient incurred. However, it is important to realize that all individuals who were directly involved in the incident were traumatized in one way or another. In this regard, apart from the medical or physical treatment, the victims will require psychological therapy that will enable them to overcome the psychological problems that developed as a result of the incident. This will also help them accept the new changes that came about as a result of the incident, and accept the new normal. This includes any form of disability or loss associated with the incident and that the victims or the family members have to live with. Thus, a continuous therapy would be highly required among the incident survivors and their family members to assist them overcome the shock, to heal from PTSD and other psychological conditions, and also to ensure that their life perception is not highly influenced by the incident.

Natural MCI: Tsunami, Indian Ocean (2004)

Indian Ocean Tsunami took place on 26th of December 2004. The Tsunami was initiated by an earthquake which was believed to contain 23, 000 energy of Hiroshima-type atomic bombs. The earthquake had 9.0 magnitude quakes, with its epicenter situated in the Indian Ocean close to the Sumatra west coast. The aggressive movement of the tectonic plates of earth displaced a huge volume of water, passing strong shock waves in all directions. The rupture was over 600 miles long, relocating the seafloor a few yards vertically and horizontally by 10 yards. This resulted to movement of rock measuring trillions tons resulting to the biggest magnitude earthquake in a period of 40 years. The Tsunami was very destructive. It is approximated that it caused the death of 230,000 people. There was also an extensive destruction of properties where more than 500000 individuals were left homeless where approximately a third of the casualties were children. The Tsunami created a great change in the life of people living along the Indian Ocean coast with destruction of properties, loss of life and injuries among other changes.  People displacement resulted to scattering of families and thus, most people were left without families (Frankenberg et al., 2008).

The Tsunami created great distress to the victims since they lost a lot in life. The loss of life left most children without parents, parents without children, villages completely destroyed. This resulted to great trauma since most of them had to be relocated and to continue with life without what they lost. The main psychological symptoms for the victims were stress and depression. Other symptoms include panic disorder particularly among children, schizophreania, posttraumatic stress disorder, and anxiety or fear of the unknown (Agustini & Matsuo, 2012).

The incident will also impact the psychological health of the victims that were not directly affected such as friends, family members, neighbors and others with one or more association with the victims. One of their major psychological conditions includes stress and anxiety due to uncertainty regarding the condition of their friends, families and their close associates. In addition, the family members will experience the fear of the unknown due to the uncertainty of the news that they are most likely to receive regarding their loved ones (Frankenberg et al., 2008).

The long term treatment plan for the victims include assisting them with material needs, social needs, and physical needs before considering providing them with psychological needs. Basically psychological wellbeing is enhanced by providing the victims with a new life, a place to live in; food, medical attention and social or new community where one can fell secured. After all this, the victims will be engaged in a psychological therapy which will include personal counseling, group or community therapy, and family therapy based on individual losses. This is a process that will take place for a while to ensure that victims have accepted what happened, their losses and that they have accepted it and that they are ready to move on.



Agustini, E. N., & Matsuo, H. (2012). Children and Adolescents-Survivors of the 2004 Indian Ocean Tsunami: Prevalence of Long-Term PTSD and Coping Strategies (chapter 3). doi: 10-5772/51478

Brookes, G., Pooley, J. A., & Earnest, J. (2014). Terrorism, trauma and psychology: A multilevel victim perspective of the Bali bombings. Routledge

Frankenberg, E., Friedman, J., Gillespie, T., Ingwersen, N., Pynoos, R., Rifai, L. U., Sikoki, B., Steinberg, A., Sumantri, C., Suriastini, W., & Thomas, D. (2008). Mental health in Sumatra after the Tsunami. American Journal of Public Health, 98(9), 1671-167.

Stevens, G. J., Dunsmore, J. C., Agho, K. E.,  Taylor, M. R., Jones, A. L., Ritten , J. J., & Raphael, B. (2013). Long-term health and wellbeing of people affected by the 2002 Bali bombing. Medical Journal of Australia, 198(5), 273-277.

Order original paper on this topic or any other topic at an affordable price.


Research Areas of Emphasis in Professional Psychology

Read the “Research Areas of Emphasis in Professional Psychology” article and select a topic of psychological research discussed in the article (e.g., evidence-based treatments, veterans/active military, multicultural issues, ethical issues, natural disasters, forensic, health, child psychology, suicide, chronic pain, rural practice, interpersonal violence, graduate/internship training and education, managed care issues, or professional roles). This topic will be used as the focus of the literature review you will be creating as part of your Final Project, as well as for aspects of other assignments within this course, so select a topic that is of personal interest to you.

In your post, discuss some of the methodological issues unique to this psychological research.

• State the topic you selected and then write two potential research questions that could be explored on the topic you selected. • Identify at least to answer each of the research questions you wrote (you will identify a total of two designs). • Each question will require a different research design to be selected to investigate the topic.


I chose the topic of Child Psychology: The impact of divorce on young children. 1. What are the possible effects or consequences of divorce for children? I will use quasi-experimental design. s

2. What are some effective interventions, to help young children deal with divorce? I will use a True experiment

Preparing for a Company Wide Migration to Windows 8

Assignment 1: Preparing for a Company-Wide Migration to Windows 8

Many organizations running on Windows Vista, Windows 7, or Windows XP are keen on upgrading them to Windows 8. Crescent Manufacturing Inc. (CMI) runs on Windows 7 and is keen on upgrading all its systems to Windows 8, which became available in the market from 2012. Windows 8 is now one of the most commonly utilized personal computer (PC) operating systems (OS). Microsoft developed it as one of the OS in its Windows NT OS family. Windows 7, which became available in the market in 2009, preceded Windows 8 (Paul, 2012). This paper explores the dynamics that may characterize CMI’s efforts geared towards the upgrade.

SWOT Analysis

A SWOT appraisal of CMI’s upgrade to Windows 8 is essential in determining its viability. There are various strengths that CMI can leverage on to ensure that the upgrade is successful and carried out effectively. First, the company has accumulated experience in the upgrading of computer systems to run on Windows 8. It recently upgraded the systems to make them able to run on the new OS. Second, all its servers are now capable of supporting computer systems running on the new OS.
Each of the servers in now running Windows Server 2012 in an environment based on Active Directory. Third, the company has a dedicated Information Technology (IT) department charged with the running of the systems and upgrading them as need arises. Notably, the department is populated with highly experienced IT professionals, with vast experiences in running Microsoft OS. The majority of CMI’s IT staffs were recently trained on the new OS. They are now adept at supporting, as well as operating, Windows 2008 along with Windows 2012.
There are diverse weaknesses defining the upgrade. First, the non-IT staffs in the company have limited knowledge on running not only Windows 8 but also running its predecessor. The non-IT staffs are unlikely to become proficient in using the new OS quickly since it is difficult, as well as confusing, to learn. Second, the company lacks some of the elementary Windows 8 requirements. Notably, to run the OS, an organization requires system requirements that are more advanced than those needed in relation to Windows 7.
To run Windows 8 throughout its branches and departments, an organization must have all its CPUs supporting PAE (Physical Address Extension), SSE2 as well as NX bit. To run Windows 8 throughout its branches and departments, an organization must have all its monitors are capable of running on a resolution of at least 1024 by 768. An organization can only run the new OS’ snap functionality throughout its branches and departments if all its monitors have a resolution of at least 1366 by 768.
There are various opportunities that CMI can exploit to ensure that the upgrade is done successfully. First, there are many trainings that it can afford all its staff members to make them adept at using computer systems running on Windows 8. Second, there are many training programs available to IT specialists to enhance their skills in upgrading OS, including all the available Microsoft OS.
There are diverse threats defining the upgrade. First, CMI may have difficulties in accessing Windows 8 to use on its computer systems since the OS is no longer distributed by retailers. The distribution of the Windows 8.1 is not favored by retailers at the expense of distributing Windows 8. Second, Windows 8 is unavailable in full-version online and the retail level for downloading. That means that all the computer systems that CMI would require to upgrade to Windows 8 must first be running on other Windows OS.

Download full paper on Preparing for a Company Wide Migration to Windows 8 Or Order original paper at an affordable price.

Impacts of Immigration in America

Organizational Impact on Immigration

  • Legal and illegal immigration into the United States has been increasing over the years.
  • The united States immigration system has not been quite restrictive since the year 1891
  • Evidence can clearly be seen from how easily the terrorists committed the attacks on 9/11
  • Interior security and enforcement could however be the change needed to curb the issue of immigration in America

Immigration impacts on human resource and budget

  • The foreign born population in America has been on the rise in recent past. The foreign-born workers have been estimated to account for 11.5 percent of the entire workforce.
  • It is estimated that the American tax payers have had to part with a cost of two hundred and thirty dollars every single year to cater for the immigrants.

Policy and politics impacts on immigration

  • One of the policies that should be put in place is the restrict border laws
  • Policies that will also ultimately affect the federal budget should also be put in place.
  • The state should also come up with an immigration modernization act to control the population of the immigrants in the most civil way


  • Government Accountability Office. Immigration Benefit Fraud, Focused Approach is Needed to Address Problems. GAO Report GAO-02-66. Washington, D.C.: GAO, 2002,
  • Nancy T. Kinney (2005). The Impact of Restrictive Immigration Policies on Political empowerment. Print
  • Vernon M. Briggs (1999). Immigration Policy and Human Resource Development. Cornell University

Download full powerpoint presentation on ways that organizational, human, and budget resources impact immigration in America or order original power point presentation at an affordable price.

Commodities shipped by rail. The following table, extracted from Railway Age (May 1999), lists the number of carloads of different types of commodities that were shipped by the major U.S.

Commodities shipped by rail. The following table, extracted from Railway Age (May 1999), lists the number of carloads of different types of commodities that were shipped by the major U.S. railroads during a week. Suppose the computer record for a carload shipped during the week is randomly selected from a masterfile of all carloads shipped that week and the commodity type shipped is identified.

Type of Commodity Number of Carloads Agricultural products 41,690 Chemicals 38,331 Coal 124,595 Forest products 21,929 Metallic ores and minerals 34,521 Motor vehicles and equipment 22,906 Nonmetallic minerals and products 37,416 Other carloads 14,382 Total 335,770 Source: Railway Age, May 1999, p. 1.

List or describe the sample points in this experiment. Find the probability of each sample point. What is the probability that the railcar was transporting automobiles? Nonagricultural products? What is the probability that the railcar contained chemicals or coal? One of the carloads shipped that week was in a boxcar with serial number 1003642. What is the probability that this particular carload would be the one randomly selected from the computer file? Justify your answer.

Dynamics of the Global Economy

For many global companies, China represents a highly attractive market in terms of size and growth rate. Yet China ranks lower in terms of economic freedom and higher in political risk than some other countries. Despite these risks, hundreds of companies have established manufacturing operations in China. This is because the Chinese government makes selling in China contingent on a company’s willingness to locate production there. The government wants Chinese companies to learn modern management skills from non-Chinese companies and to acquire technology. Some believe that Western companies are bargaining away important industry know how in exchange for sales today by agreeing to such conditions.

Address the following in your short paper:

Should companies go along with China’s terms, or should they risk losing sales by refusing to transfer technology?
What do you think might be the long-term results of either solution?

MKT 571 : Numerical Market Segmentation And Target Market Selection Process

Write a white paper on a company of your choice and discuss the market segmentation within that industry along with the target market for the company and the selection process for that target market.

Required Elements:

  • No more than 2100 words
  • Include demographic, psychographic, geographic, and behavioral characteristics for the selectedcompany.
  • A positioning statement for the company with careful consideration of their brand and strategy
  • Paper is consistent with APA guidelines.

Numerical Market Segmentation And Target Market Selection Process Sample Paper

Segmentation and Target Market Paper


Apple Inc. is an international technology company that deals with electronic and software marketing, manufacturing and designing. Apple Inc. was established in 1976 by Ronald Gerald Wayne, Steve Wozniak and Steven Paul Jobs where its headquarters were placed in Cupertino, CA. The company was initially developed as a computer company focusing on Mac computers and OS X operating system. However, the company advanced its operations to include media devices, media communication devices, and portable digital music prayers. It also deals with a number of related software, network solutions, peripherals, and third party applications and content. The company has a wide range for products. However in this case, the paper will only focus on evaluating its iPhone product.

iPhone is one of the Apple Inc. products that integrate an international communication, iPod and mobile phone device in a single handheld product. Founded on the firm’s multi-touch user interface, this product features web browsing, desk-top email, maps, searching and it is compatible with Windows and Mac-based computers. It automatically synchronizes with users’ content from iTunes libraries, email account and bookmarks. It permits customers to iTunes stores for downloads. The company owns accessories of iPhone, compatible accessories of third-party iPhone are available via the company’s retail and online store and from third parties.

Numerical Market Segmentation

Apple Inc. is employing different techniques to segment its market. Some of these strategies include demographic segmentation, user-related segmentation, Psychographic segmentation, primary target market, three groups of targeted consumers and benefit segmentation (Dib & Siskin, 1996). In the demographic segment, the company considers demographic features that include gender, age, income, occupation and education. The company has been releasing different series of iPhone from iPhone 1st generation, iPhone 3G, 3GS, 4, 4S, 5, 5C, 5S and the most recent 6/6 plus and 6S/6S plus each providing a unique fulfillment that would be preferred by different customers from different demography. The above series differs in features and prices and thus, catering for the need and preferences of different customers based on their demography. The newest release (series 6) focuses more on technology advancement and thus they may highly be preferred by highly educated and those that have a high level of income. Other such as series 4 focuses more on middle income level individuals in the society. The phone features make it suitable for people of different demography and interest and thus, it is widely marketable (Gaulle, 2014).

The market is also segmented based on rate of usage where by some people can be classified as heavy users, light users, medium users and non-users. In this regard, heavy users are more probable to purchase the product as compared to light users or even medium users. In this case, medium and heavy users should be targeted since they stand a higher chance of purchasing the device than light and non-users (Panda, 2009). iPhone market is also being segmented based on the benefits the product gives to the consumers. Individuals purchase smart phones for different purposes which include social interactions, accommodation of different applications based on the users preference and others since product has a high level of reliability and simplified system. In this regard, different customers will be interested to the same products due to different benefits they enjoy by using the product based on their interest in life. Psychographic segmentation is employed where by the company only focuses on social status of its customers. The company basically focuses individuals in the middle and upper class who can afford to purchase their product. iPhone is quite expensive for low class individuals and thus, the company only focuses on the well-educated working class, business men and women and other individual who affords a higher lifestyle.

Download full Segmentation and Target Market Paper or Order original paper at an affordable price.

how the Department of Homeland Security has changed since its inception in 2001

The Department of Homeland Security (DHS) has made a number of strides in recent years, including 2011. The department’s organization and cooperation with other agencies continues to strengthen.

Write a ten to fifteen (10-15) page paper in which you:

  1. Explain how the DHS has changed from its inception in 2001 to what it has become today.
  2. Describe how the relationships between the DHS and other law enforcement and intelligence agencies have transformed over the years.
  3. Analyze the current structure of the DHS and other agencies protecting the United States from internal and external threats. Suggest three (3) changes to the current structure of the DHS and justify your suggestions.
  4. Describe the top three (3) characteristics of homeland security that the United States needs to address in the immediate future and why.
  5. Discuss the existing roadblocks that are preventing the DHS from addressing these top concerns.
  6. Predict the role cyber terrorism could play in future attacks against the United States and its allies. Describe what you consider to be the largest cyber threat(s) to the nation.
  7. Use at least five (5) quality resources in this assignment. Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

View a Sample Answer to this assignment or order a plagiarism free answer at an affordable price. 


You are a research analyst for the U.S. Department of Homeland Security (DHS). The department has received credible intelligence from the NSA.

You are a research analyst for the U.S. Department of Homeland Security (DHS). The department has received credible intelligence from the NSA, FBI, and Department of Defense that Al Qaeda is planning a biological attack using smallpox against Los Angeles, CA. Although the dispersal method is unknown, it is believed the most likely method will be airborne, through a populated shopping mall’s ventilation system. The lax security at these locations, coupled with a wide social and economic population sampling, will make identifying victims and stopping the spread of the disease difficult. The intelligence indicates that the attack is scheduled to occur within 7–10 days.

Your department has been tasked with reviewing historical incidents of smallpox, including academic assessments of its use as a biological agent for terrorism. Use the Centers for Disease Control and Prevention’s smallpox Web site as a guide to available resources and current planning (CDC Smallpox Information). With these tools, develop a communication plan that addresses the following:

Assignment Guidelines

  • Address the following in 5 pages:
    • Provide an overview of the threat (disease characteristics).
    • How can mass hysteria be prevented within the population?
    • What should the federal government share with the state, and can this information be controlled?
    • What should the federal government share with the city, and how can this information be controlled?
    • What should the federal government share with the nation?
    • When should information be disseminated to each recipient (state, city, and nation)?
    • What should be the characteristics of this information’s release to the public (consider medium, frequency, and timeliness)?
  • Be sure to reference all sources using APA style.