Browse Month: August 2017

Marcus Jones is the Human Resources Manager for Banks Industries, which specializes in automobile parts.

Marcus Jones is the Human Resources Manager for Banks Industries, which specializes in automobile parts. The company’s CEO, Matthew Banks, has informed Marcus that the company is ready to expand and become a global organization. They recently purchased a building in Hong Kong that will serve as their first manufacturing plant outside of the United States.

The CEO wants Marcus to completely staff the operations in Hong Kong. Marcus is stressed about trying to determine the best strategy and approach for this major project.

What should Marcus do to ensure the manufacturing plant is ready to open in the next six months? Include the following information in your case study summary:

What was the most important impact of the Crusades on Europe

Because of the Crusades, Europeans were exposed to various elements of Oriental cultures, and this exposure had a great impact on Europeans who were greatly impressed by some of what they found. What were some of the influences that flowed into Europe as a result of this exposure? Explain which of these you feel had the most profound effect and tell why you think this.

NOTES: First define what the Crusades were and when they took place. “Oriental” in this context refers to the Middle East. As we saw last week in the Silk Road assignment, this area was a crossroads that connected the Mediterranean world to the rest of Asia.

…….

Why It Necessary To Harmonize Clinical Research Practices

An analysis of why it is necessary to harmonize clinical research practices with the contribution of bodies such as the International Conference on Harmonisation.

Clinical trials are critical to the advancement of valuable treatments. Human testing can be however a challenging task that must be preceded by laboratory studies, which normally encompasses years of non-clinical trials. If the non-clinical trials prove to be successful, the companies sponsoring the research submit the data to the United States Food and Drug Administration (FDA) and request for an Investigational New Drug (IND) process approval (Reisberg, et al., 1996).

Following approval, the research enters the clinical trials stage, which usually involves three phases, with each phase having a large number of participants. Phase I of the clinical trial is usually concerned with the drug’s safety and its potential side effects. Phase II lasts longer than Phase I since it involves double-blinded trials involving an experimental group and a control group. The last Phase, Phase III is also known as the pre-approval phase whereby the new drug is usually involves a series of studies aimed at offering richer understanding of the drug’s efficiency as well as its common side effects.

In 1996, ICH-GCP guidelines (International Guidelines for Good Clinical Practices) (ICH-GCP) were introduced and quality research framework designed and adopted in a good number of countries thus opening up broad opportunities to researchers to take part clinical trials(Britten, et al., 2008).Sharing study materials among different institutions remains to be the main reason behind harmonization of clinical researches (ICH E9 Expert Working Group, 1999). ICH guidelines have made communications among researchers and drug regulatory experts easier and faster. For many years, institutions and researchers have always shared information under a confidentiality arrangement. This has always been beneficial to all parties involved and it has helped in the innovation of better and more efficient drugs.The harmonization of the way clinical trials are conducted further increased the efficiency of these communications since all researchers fully understand the clinical trial process (Britten, et al., 2008).

Over the resent years, there has been growing pressure on researchers to reduce the drug development timelines. This can be done through the implementation of a number of strategies including ensuring that all players are responsible and there is a clear guideline on their duties (Reisberg, et al., 1996). Another strategy that could be used to reduce drug development timeline is ensuring that a high quality drug is produced the first time to avoid any significant modifications of the original product during later stages of development. ICH guidelines play a significant role in the success of these strategies.

The quality of the product being developed is an important area for potential partners in the clinical trial process (Reisberg, et al., 1996). There are two key areas that can be associated with quality, organizational quality and internal quality. Although the application ICH guidelines increase the administrative burden, it helps ensure that researchers follow the right participant recruitment processesand they also conduct the research in an ethical manner (ICH E9 Expert Working Group, 1999).

The introduction of the Common Technical Document (CTD), has enabled electronic submission of documents (eCTD) thus increasing efficiency. In the past, drug development applications were so many that they were conveyed to FDA by a truck. The recent implementation of an electronic submission option that allows new drug developers to submit applications electronically has made the review process much more efficient.The submissions are usually available to the reviewer instantly.

This advancement has eased the need for researchers and organizations within the industry to generate and compile the bulky paper based applications previously used. This has not only lessened the workload but it has also helped save time, thus reducing the drug development timeline (Reisberg, et al., 1996). The eCTD has played a critical role in improving the process of application submission proficiencies and increasing reviewer efficacy(ICH E9 Expert Working Group, 1999). Besides delivering application submissions to FDA, the eCTDapplication format makes it easier for FDA to use harmonized reviewer e-templates as well as review tools for the different review disciplines.

Lastly, harmonized format has made the development and application of harmonized good appraisal practices easier. Whatever is appraised in a review is usually closely related tothe data entreated(Britten, et al., 2008). Consequently, there issubstantialconnection between ICH guidelines and what may be considered as goodevaluation practices. Since ICH guidelines have harmonized most of the materialprovided for marketing approval, ICH regulators can therefore harmonize their practices easily too (Reisberg, et al., 1996). Effective review practices encourage transparency and dependability, whichare keyqualities in promoting industry regulatory structure.

Although the application of ICH guidelines has its disadvantages, it has many more advantages making it an important part of effective clinical trials regulation. To reliably increase the participation of various institutions in clinical studies, there must follow a set of clear rules and guidelines. All institutions involved with clinical trials must adapt to these guidelines so as to increase and maintain their desirability as a suitable base for sponsored clinical researches.

Download full sample paper on why it is necessary to harmonize clinical research practices or order a plagiarism free paper at an affordable price. 

nurse senstive outcomes

nurse senstive outcomes
Ever since the introduction of the Centers for Medicare and Medicaid Services (CMS) refusal of payment for hospital-acquired poor outcomes, nursing has gained visibility because these outcomes are nurse sensitive. Locate an article or website that refers to these nurse-sensitive outcomes and describe its findings. So we are back at nursing services for payment and how technology and standardized languages will assist us in obtaining this.
Your textbook and the other resources will not give you enough to answer this question this week. You are going to have to go above and beyond! The question, itself, requires it!
Now I know this is a really hot topic right now and you probably all have a lot of opinions about it and that’s good. That being said, even if you disagree with your classmates, please keep it civil! Its totally acceptable and even encouraged to disagree but don’t be rude. Debate and disagreement are healthy and can actually help us go forward; rudeness and mean spirited comments only hurt our ability to solve problems. Just remember, it’s much easier to misinterpret something in a written online forum like this than it is in a face to face conversation. Please keep that in mind when you choose how to phrase your responses.

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

What do you think of socialized medicine? Do you think its worked pretty well in Europe? Whether the answer in socialized medicine or something else, most people agree that health care in the US needs reform. What do you think we should do about it? Since many of you are going into nursing, what is your perspective as current or future health care providers? HINT: If you use a website – it MUST be scholarly! If it is not, it will not count for all your points. You are all very adept at how to evaluate this!
So, I would like to breakdown the question to help you truly get a great grade this week! The green is the original question; the blue is my interpretation. This MUST be answered in full by Wednesday to receive full credit on your initial post.
1. Since the introduction of the Centers for Medicare and Medicaid Services (CMS) refusal of additional payment for hospital acquired (HA) poor outcomes (October 2008), nursing has gained visibility because these outcomes are nurse sensitive.
This is background information that you have to understand in order to put together a detailed answer.
Third Party Payors, not just CMS, are refusing to pay for extended hospital stays if the hospital has caused the patient to have to stay longer than ‘was’ expected for the admitting diagnosis.
o The Hospital must ‘eat’ this cost.
o The Insurances have determined a ‘standard’ of care and a ‘standard’ length of stay based on diagnoses and treatments
Give an example of Extended Stays that insurances will not pay for, and their rationales.
Give an example of how a hospital could refute your above example, and get paid for services.
2. Nursing has gained visibility because these outcomes are nurse sensitive. Locate an article or website that refers to these nurse sensitive outcomes.
What are Nurse Sensitive Outcomes?
Based on your example, what does this statement mean?
So, why have nurses gained visibility? After all, we don’t bill for services.

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

Leadership Critique – Transformational And Transactional Leadership

Introduction

The type of leadership in an organization determines how far that organization can go regarding its set goals and objectives. The management is most important part of an organization that provides leadership to the subordinates through the various communication channels. The management may pass various instructions to the supervisor, managers or directors who then pass the information to their departments up to the workers at the lowest level. How the instructions are carried out through the various levels of the organization. Therefore, from the above communication and interactions in the organization one can notice the aspect of leadership and authority in the organization. The various people handling the employees at different levels have to lead their departments and usually use various leadership models that are set by the management. The leadership directs the whole organization, and if those in the management have no vision, then the company is bound to fail. If the management has a vision, they will help the company move in that direction to achieve the desired results. As such, it is important to look at the various leadership models that are in place and choose the best that will help in achieving the specific purpose set by the organization or business (Van Eeden et al., 2008). The way a leadership in the organization leads the employees determines the effectiveness and motivation of the workforce and the efficiency in operations. Leadership is, therefore, an aspect of management that should be closely monitored to ensure that those in authority carry out their tasks efficiently. The various leadership models that the paper will deal with are Transformational And Transactional Leadership.

Transformational leadership

Transformation leadership is leadership that leads to changes in the social systems and the workforce of businesses. Transformational leadership as the name suggests aims to bring major changes to the workplace to ensure that the various work processes are carried out smoothly. The name further implies that the leadership engages in transforming the organization for concerning making improvement in the organization. The main aim of transformational leadership is to change the various structures in place to foster more improvement and bring about changes in the people that are positive and benefit them at the workplace whereby they enable them to increase productivity and thus benefit the company as a result (Gumusluoglu & Ilsev, 2009). It focuses on the workforce and on how it can make the various individuals in an organizational not only followers but also leaders. It, therefore, acts as a transformative process for the both the organization and the leadership in bringing changes that have vast and far-reaching effects on the company’s performance. The effective use of transformation leadership brings about heightened morale, motivation and the eventually improved performance of the followers by the use of various mechanisms. The various mechanism includes linking the follower’s sense of identity to the collective identity and mission of the business. Also the leadership acts as a role model to the followers in inspiring them in the process, and further challenging and encouraging followers to play a greater role in their workplace by creating a sense of ownership in them for the work they do. The leaders further identify their strong and weak areas of the followers and further help them by improving their various their skills through various training and development sessions (Zagoršek, 2009).

Transactional leadership

It is further important to look at another leadership model used by most business in boosting productivity and which differs greatly from transformational while sharing only a few similarities. The model focusses mostly on what it can get out of the employees without focusing on the wellbeing of the employees. The name transaction comes into play where the leadership transacts with the employees for their services (Gong, 2009). The leadership model in question is the transactional leadership model.  Transactional leadership is another model that is used in organizations help improve performance and boost productivity. Transactional leadership is result oriented and usually aligns with an organization structure in addition to the measure of success about the system of punishments and rewards. Transactional leaders utilize their formal authority in the business especially their positions where they are responsible for the organization. The leader usually maintains various constant practices in the organizations by ensuring that the various individuals perform to the level set or expected of them and thereby managing the performance of the individual and facilitating the performance of different teams in the organization (Pieterse, 2010). The leaders in the organization put in place various principles that their subordinates should follow in addition to the requirement spelled out in their work. The leaders review the performance of their workers to judge their performance. Transactional leadership is good for workers who are proficient at doing their jobs and who only get motivation by the reward and punishment method set by the organization. Transactional according to max weber was the use of control in based on knowledge. The leadership style usually encompasses a give and take relationship whereby one group determine what the other will receive by judging their performance. The leadership, therefore, entails an exchange process where workers are given something so that they can provide for want the leaders want. Transactional tends to imply that workers are not usually naturally motivated and need constant monitoring, instructions and structure to ensure that they complete their work accurately and punctually. James Burns had a different view of how the transactional leadership should be conducted and noted that the leaders should manage workers fairly, honestly and honor the various commitments they make.

Burns further notes Avery important aspect in transformational leadership whereby in his model where leaders and workers focus on achieving higher states of motivation and morale. As such, the leaders do not impose on the workers but work in promoting an environment that will motivate and increase the morale of the workers, which is not the case in transactional leadership. An employee who is motivated and has his or her morale boosted operates at a high optimum level in the workplace that one who is not motivated. Leadership in not all about pushing people through working them like donkeys to achieve more but by making the employees self-driven and thus more adept at carrying out the various tasks (Ruggieri, 2009).  The highly motivated environment in transformation leadership brings about a great change in the organization since all the workers are leaders in their workstations and have the best internets of the organization at heart. Such workers are highly motivated and as such they aim at all costs and as much as they can to ensure that, the company follows a path of success if the leadership implements the style effectively. Transactional leadership, on the other hand, focuses on the usages of bureaucratic systems imposed on the workers by the various leaders who ensure that the works be up to standard or face consequences by the systems put in place by the organization. Such a leadership process presents a harsh environment that regards workers as machines who do not have no rights and have to conform to rules without asking or protesting. Such a leadership style focusses only on the output of the employee without considering the worker himself. As such most of the workers under such a leadership style are mostly demotivated and do not have the purpose and even the sense of belonging to the organization. The works usually perfume their duties for the sake of earning a living and may to other organization if given an opportunity especially when there are lucrative offers. The workers receive no motivation to develop themselves and, therefore, they remain at one level that is detrimental to their work functioning. The leadership, therefore, focusses on attaining excellent at all costs. Transformation leadership focusses on both aspects of the workers wellbeing considering the best interests of the business by improving eh ability of the work to function and thus become better at his workplace, and contributing to the development and motivation of the worker. Such a leadership style aims for to produce an excellent workforce in an organization that is self-motivated and that is well strategically placed to bring all efforts on board for the benefit of the leadership and the organization at large. The transactional leadership in focusing on the work apart from the worker leaves the employee at the mercy of deprivation in the development of his thought processes. Furthermore, such a worker may not effectively carry out tasks that require intelligent efforts. Such a leadership style is, therefore, detrimental to the wellbeing of the worker. The workers in such an environment cannot pursue higher professional careers as they are limited to their level of skills from the onset of their careers under such transactional leadership models (Wang et al., 2011). Such workers will tend to look unto the management in engaging them in rewards or penalties. The workers, therefore, develop various attitudes in accordance to how they are treated at work. One may group may have the best performers while another maintains the status quo. As a result, people who are under Transactional leaders tend to have a formed mind that has been developed over a long period to operate like robots.

Transformational leadership has many merits that include the working of employees. The employees usually aim for the sky and even beyond in their performance. They aim to outperform themselves. The company in developing them and helping them tap their potential increase its profitability margins and ensures that the organization performs optimally (Haider & Riaz, 2010). Research has confirmed the outstanding results in organizations with transformation leadership as being true. Such leadership can be evident in the military where platoon leaders motivate their cadets by using transformation leadership. The results from various platoon under the transformational leaders surpass those that were in the control groups.  On another hand, transactional leadership usually benefits the organization in achieving specific goals of the organization. If the model proposed by James Barnes is used it will increase the performance in such organization as the workers will be treated more respectable than with the current state of transformational leadership. Transactional leadership is mostly beneficial to multinationals who have many operations in foreign companies. The workers have diverse cultures and backgrounds and may find it difficult to work without supervision if there are no defined procedures put in place. The simple nature of transactional leadership, therefore, works easily in this process that the complex transformational leadership. The employees thus follow it easily throughout the organization. Other organization that benefit from transactional leadership are the policing, military and security agencies and organizations. The style ensures that there is consistency throughout the whole organization; as such, everyone has to know what to do in a certain situation especially when one is under pressure. Therefore, various places require the use of transaction leadership due to their nature of business like the multinationals.

In the various organizations that I have worked, I found much organization use the transactional model of leadership. The jobs as such have a certain way of doing operations according to the requirement demanded by the management. Some of the industries have a lot of controlling and a worker gets pay according to the work he or she has done. There are fewer companies that exhibit transformational leadership especially those that I have had a chance to work in. Leadership in an organization from my experience in the various organizations is to further the interests of the company first and then the employees later. Most of the employees, as a result, do not feel like part of the organization and may only be present physically and not holistically. A leadership structure according to my point of view should have the interests of the workers at hand. Leadership is only successful when those whom one leads become more successful than the leader. Leadership would thus have achieved its goal. People are led to bring the best out of them. As such, various leadership styles have tried to remove some aspects of leadership and emphasized on other to suit their interests. Transformation leadership as seen above aims to bring out the full potential of the worker (Asgari, 2008). The workers are provided a fertile environment to excel exceedingly without limiting their potential. Though most companies use transactional leadership, it has proven to be effective in the end on the part of the business but not the employees. The organization can, therefore, stress various performance strategies at the expense of the worker. Every person has a leadership potential that can be discovered through training or motivation among other factors. Once the leadership potential of someone is tapped, such a person can achieve milestones. Suppressing the leadership role in passing results in disastrous. Companies who hope to be effective in the business environment should, therefore, focus on leadership potential of the workers and the development of his personality as a whole (Nielsen et al., 2008). Companies should thus change their mentality especially in choosing their leadership models to not only focus on achieving profitability at all costs but also focusing on the development of the workers who will eventually develop the company in the end.

Download full leadership critique paper or order a plagiarism free paper at an affordable price.

Comparison Of Qualitative And Quantitative Research Approaches

A research refers to  an investigation  undertaken  with an aim of generating knowledge, the tasks of research is to generate the exact  information  that will guide in the decision making  process, the systematic  investigation  involves the gathering of information using the  appropriate instruments of data collection, for example use questionnaire or the  sampling process, quality output of the research requires the accurate analysis and the recording of the  data  that will aid researchers’ decisions .

Qualitative research

According to Merriam,(2009).Qualitative research is a type that concentrates its study by trying to understand  the perspective of the study from the  population, normally, the type of research  obtains their accurate information on opinions, values and the behaviors  in their natural social context, most of the  researchers utilizes the mode of the research because of its flexibility, they allow the   adaptation  and mostly it’s an open ended form of  questionnaire  that enables wider maximizing of data collection. It gives a respondent  freedom to respond  depending on their understanding of the subject under he study

Also the existing relationship between the  participants and the  researcher is a casual thus gives an opportunity of giving the response more elaborately and in the detailed form, the  vigorous flexibility  clearly reflects the  much and deeper understanding of  the problem that is being investigated. Moreover, the other  advantage of qualitative research  is that it clearly highlights the  purpose of the research, on other words they try to understand   how people make the  sense in the views of the world, mostly sociologist use the qualitative research since its interpretation  gives a clear  view of the world  practices which  later  transforms to  human behaviors.

Quantitative   research

It is type of research that  bases it study on the numerical  data in   determining  the generalization of   findings, quantitative research  explain the phenomenon in a  statistical manner.(Parkinson &  Drislane,2011). It essentially  collect  data in numerical way  and the question also   suits the  respondent relatively  quantitative research  naturally studies a certain subject matter in nits natural state, most of its data  is in the form  numbers and so the  end findings can be used in giving  assumptions based on  concepts, at the end it helps give  further prediction of the results ,

The advantage of the quantitative research is that the data   is collected constructively ,it  aids in the hypothesis  construction  since  the research findings  has been replicated in  sub-population  hence the  type of research is useful in obtaining more credible results (Leech,1954).

Similarities of the quantitative and qualitative   research

The existing similarities is that both research tries to  give logic triangulations  in their findings, the change  the findings  by using the variables ,they also help to provide  background information  on the context  of the subject that  is being studied. in addition, they effectively facilitate  the interpretation   between the variables by clearly explaining  the  factors underlying their relationships.

Difference between qualitative and quantitative research

Difference refers to  the state of having disparities  or  being unlike  between two objects, however, despite the two  research being utilized   by sociologist, it has some  character disparities, in qualitative research,  its content is based on  humanistic interpretation whereas the   quantitative  research it  is scientific and objective, moreover  in the analysis. qualitative research   experiences  had  description  has human existence in values of data contribution  and while drawing conclusion it does not need the use of numbers, on the other hand the quantitative research  in its analysis, it uses the numbers  and even percentages  in drawing conclusion,  it accounts the  data  in numerical  form. In conclusion the researcher might opt to use any of the two types of research, it depends on the nature and objectives of the study taken .

Program Evaluation Paper

Program evaluation is basically a systematic method for the collection, analyzing and also using information so as to answer question about the policies, projects and also programs. This is particularly about their efficiency and effectiveness. In both the private and public areas, the stakeholders are often interested to know whether the programs and projects that they are funding, voting for, objecting or receiving are producing the effects that are intended(Wholey, Hatry, Newcomer, 2010). Program evaluation focuses on some major considerations which include how much the program costs per the participants, how the same program can be improved, the better alternatives, the benefits of the program, if there are any unintended outcomes, whether the programs goals set are useful and appropriate.

Evaluators can best answer these questions. The best way however to answer this question is for the evaluation to be a joint program between the stakeholders and the evaluators. This process of evaluation is a recent phenomenon. Planned social evaluation has been documented to have dated back as 2200 BC. Program evaluation can be conducted at several stages on a project’s lifetime (Wholey et al 2010). Each of these stages comes up with different questions which are directed to the evaluator. Different evaluation approaches are needed at different stages.

There are some suggested kinds of approaches that are used in the assessment in different stages:

  • Need assessment of the program
  • Assessment of the logic/theory and program design
  • Assessment of the implementation of the program
  • Assessment of the impact or outcome of the project i.e. achievement
  • Assessment of the efficiency and cost of the program(Wholey et al 2010).

There are several types of project evaluation. These include Process evaluations, outcomes evaluations, Cost- Benefit Evaluations, Impact Evaluations.

In this case, we are going to discuss about impact evaluation. These are designed to basically measure the impact of a program by making comparisons of the counterfactual data with the actual program. The necessity of this type of evaluation is to help the evaluator assess the impact that the program might have. It assesses the potential outcome of the project. Impact evaluation should be planned from the beginning of a project and should not be undertaken until the project is mature enough so that the true impacts of the program can be implemented (Fitzpatrick, Sanders, & Worthen, 2004).

This type of program evaluation can be improved by assigning subjects such as cities, counties and individuals to isolate the program impacts to control and treatment groups. These groups must be efficiently isolated to as to avoid the spillover effect. This can end up being challenging since most programs cannot offer the services selectively. Alternatively, the control and treatment groups can be constructed in similar ways that are considered as being important (Fitzpatrick et al 2004).

Impact evaluation can be of great value to future projects as they help one to assess the changes in the households, in the well-being of individuals, firms or communities which can be attributed to a particular policy, program or project. It helps answer the question of what would have happened to the people if at all they would have not received the program of the project. This type of program evaluation is very beneficial as it helps to avoid adverse impacts by the time the project is at an advanced stage or by the time it is over.

Author’s Perception of Death and The Treatment of Death in “Everyman”

Introduction

The “everyman” is a morality play and its complete title is “The Summoning of Everyman”. The play is the most well-known and the best recognized among the other historical morality plays. The play is a depiction of what Christians gets suppose to do or how they get suppose to spend their lives to prevent conviction of their souls by death (Yaw Adu-Gyamfi P.265). For the plot and the morals understanding, every character of the play is very vital. However, Death has the most important responsibility. Certainly, the main character is the Everyman, but no would be there if Death was not there in the play (Rindfleish, p23). Additionally, Everyman would not be illuminative or informative to any person. Death gets represented in the play by the author as God messenger, liberator of people, and unkind arbitrator. The author clarifies that people must suffer for the fault made by the Adam, and the bad acts elevates the sin of Everyman. Although, Death has precise aspire, he carries out various other purposes and objectives. As a result the author perceives deaths in various perspectives.

The Author’s View of Death and the Treatment of Death

. Death is symbolized as a unrelenting antagonist of Everyman, who unsuccessfully endeavors to confer. Not only is the Death a character of the play, but also the objective of Everyman as story is a clarification of what man should do and what he should not do prior to his death. However, Everyman has decided to do more wrong acts and few good acts (“Everyman”, 28). As death clarifies to Everyman various appealing things particularly about only on opportunity for every person, Death becomes best tutor of life, and conveys judgment. As a result, Death changes the Everyman’s approach to his life and acts.

The author of the play identifies death as a servant and a messenger to God. The author directs reader for additional thoughts about actual fundamental nature of Death in the play by leaving many spaces in his description. However, this makes the character of death irrefutable. Death is the one that every person in the world must and can expect. The anonymous author under the image of Death signifies an account of bodily and allegory of ethical death. This picture of mind is an immense convincing proof of the truth, which is imperceptible in the normal life.  It puts individual in dread. Furthermore, it causes an immense concern to individual. Ironically, Everyman is afraid of Death and at the same time Death serves God. The chain of these associations in the play has an objective of changing the mind of the readers, in addition to persuading him predictability of death in real life and power of God.

The author perceives Death as very strong particularly to the common individuals; although he is God’s servant and achieves his assignment bring back people to God. Death is an element of human being condition. In such way, from beginning to end of the play the allegorical portrayals and depiction of the relations of Death with God and Everyman with Death, the writer indicates the discernment of the person prospect in the medieval people’s eye. The reader gets brought closer to apprehending of Christian faith. Nevertheless, the discernment of Death as God’s servants discloses the unordinary point of view on this relationship. In the beginning of the play the dialogue amid God and Death opens the actuality of the service of death. The dialogue illustrate Death is unhappy due to his deeds, his not generous, and as full ill motive and immense malice on persons as he requires Everyman to get punished his preceding acts. However this is illustrated on the play as he says “thy reckoning to give before his (God’s) presence” (“Everyman” 31), an indication of an approach of a prisoner.

The author also reflects Death as the manifestation of estrangement and loneliness. He shows the catastrophic characteristics of life terminating in personal accountability. In front of judgment of God every person is accountable of his own deeds. Therefore, no can assist, support, or save. The inescapability of Death opens the eyes of Everyman. It is then he recognizes that worldly things cannot save him before the God. However, although this reassessment could be the commencement of fresh life dedicated to the right and good, it could be impossible to have a complete change due to all previously wrongly spent years. Consequently, the advancement of Everyman to self-development and apprehending is an answer to preliminary summons of Death.

Death in the play remains terrifying and evil. Therefore, the author illustrates Death all through the play as an unwanted guest. However, as Everyman tries to keep away from Death during events, Death supremacy gets symbolized in the play. The phrase : “Everyman: O Death, thou comest when I had thee least in mind; In thy power it lieth me to save, Yet of my good will I give thee, if ye will be kind” (“Everyman” 29) illustrates Everyman fear.

Death gets perceived by the author as being unkind, swift, pitiless, and fearless. No one can keep away from the Death and he lives with people all over their times. Death kills time for Everyman, as he gets acquainted with that nearer or afterward Everyman will meet his time. As a result, Everyman is toothless against death. However, regardless of the all unenthusiastic in the Character of Death, he has a sky-scraping aspire: to confirm Everyman the supremacy and kindness of God. Death makes known the glory of God. Therefore, he is explanation to everything: to the know-how of God, to which he shows the way to Everyman (Slocum, p173).

The author also perceives Death as the depiction of ethical death. Everyman has decided to live a life that will guide his life to a downfall. Death has come to Everyman before his actual physical death to represent his real moral death. Therefore, the main aspire of death is to arouse Everyman and to show him the right decision. In spite of Death’s disagreeable features of the character, he still continues to be more of a mediator of correction than penalty. The deeds of Everyman in the play are an illustration of treatment of death by the author. The meeting of Everyman and Death bring sufferings and confuses to him, therefore he is afraid of Death. However, all this is because he had spent his life in sin, and now he recognizes his destiny at the end. This thought develops with the narcissism of his effort to put off death.

Conclusion

Death is an adversary of the central character Everyman. He exemplifies the only doubtless reality in life: every person is going to die. Therefore, the only question of time is meeting with death. No one can keep away from it. The adversary of the play portrays, at the outset, the physical death. The word Death creates a center of attention people since it sounds influential. The powerful, unpleasant word “death” replicates a certainty. The author comprehends the insinuations of death and utilizes it to draw the attention of the reader. Death in the play is the allegorical illustration by the author of the physical death. The reader recognizes that God have power over Death, that bring certainty, and which will in the long run visit every person. The play is a lesson to everyone that all the deeds that a person does in life are determination of his or her destiny. Death is omnipresent to remind people that whatever they do will count in the time of judgment. The play also shows that God has control of everything.

PepsiCo Compensation Plan Outline Sample Paper

A compensation plan is coordination and structure of details that illustrates employee’s pay schemes and incentives that accurately define the pay system of every company (Salary.com, 2014). Additionally, a compensation plan is created and implemented to assist, ease, and recompense the performance of employees. The compensation plan can either be in monetary or non-monetary benefits. Further, the incentives and benefits can be in the form of overtime compensation, bonus, travel allowances, stock options, insurance benefits, medical and health benefits. In this regard, I will discuss the evaluation of the existing compensation plan of PepsiCo. I will also shed light on current pay structure and proposals for improving the discretionary benefits.

Evaluation of the Existing Compensation plan of PepsiCo Inc

PepsiCo Inc. is a worldwide food, beverage, and snack food established in the United States, its headquarters are in New York. PepsiCo Inc has interests in manufacturing, marketing, and also distributing snacks, food, and beverages, made from grains, and many other products (PepsiCo careers, n.d). The operation of PepsiCo Inc is to provide its universal and comprehensive consumers with corresponding, suitable, inexpensive, and scrumptious food and beverages varying from complete breakfast lunch, and superb and terrific delicacies in the evening. The PepsiCo recognizes and acknowledges the purpose and intention of implementing employee support system through the creation of the compensation plan. The compensation plan of PepsiCo Inc centers on offering monetary and also non-monetary benefits. These incentives include wellness programs, retirement, and healthcare benefits. The purpose of the compensation plan is to reward and recompense the employees of the company for their outstanding and excellent performance.

Further, the company has also created a compensation committee, which is responsible and deals with the structuring of an ample and satisfactory compensation plan and strategy that primarily endeavors at employing, maintaining, and inspiring a larger team of skill and talent from sundry nationwide and intercontinental markets. The compensation committee devices and creates short-term and long-term incentives for recompensing the employee performances and also follows its effectiveness on the efficiency of the employees. Additionally, the committee designs compensation plans that are competitive regarding the industry principles and also in accord with the objectives and goals of the company. Also, the compensation plan established and implemented by the committee provides for the tiny and little requirements (Bailey, 2012). It also operates as a resolution for any problem and challenge experienced by the employees. The compensation plan of PepsiCo Inc values, honors, and esteems every individual employee effort and involvement in the accomplishment and success of the company. Therefore, the compensation plan enhances the employee confidence and poise. Finally, the compensation plan inspires a sense of reliance on employees and also motivates the employees to perform well as their performance is recompensed and rewarded.

The most beneficial ratio of internally consistent and market consistent compensations systems for PepsiCo Inc

An excellent and high- quality compensation plan consists of a balance amid internal equity and external competitiveness. Compensation and benefits influence the productivity and contentment of employees, as well as the capacity of every company to achieve its goals and objectives. It is a benefit and an advantage for every company to ensure that its employees creatively compensated, and they are aware of their benefits. A company’s compensation plan has outstanding outcome and achievement on its competitive advantage. Further, for a company to develop and expand a competitive advantage in the international market, it has to ensure that compensation plan supports totally the strategic plans and also the proceedings and dealings of the company (Bailey, 2012).The employment costs greatly affect the competitive advantage of a company as they signify a great portion of a company’s operating budget. Therefore, efficiently controlling these costs, a firm can achieve cost leadership. The impact of employment costs on competitive advantage is predominantly strong in service. There are other labor-intensive in some companies, where the employees expand between 40 and 80 cents of the revenue on the labor costs. PepsiCo Inc has a balanced ratio of internal equity and external competitiveness, which has highly influenced the growth of the company in the international market.

Evaluate the current pay structure used by your company and assess the recognition of employee contributions

Pay structures are used to regulate a company’s compensation plan since; they replicate the Confederacy of jobs found on relative worth. Additionally, distinctive pay structures have some rating and rank such as job clusters and career bands, which every cluster has a least or utmost salary connected. PepsiCo Inc uses various pay structures to pay its employees these include, Job Family Structures, Graded structures, and Broadband salary structures. The company uses internal equity and market pricing to create salary ranks and clusters for its employees.  These pay structures assist the company to implement a designed framework, which is reliable, reasonable and impartial, finally, the salary structures determine clusters of pay jobs and people.

PepsiCo Inc as multinational company equates its success to its employees, so it highly recognizes the efforts and contribution of its employees (Salary.com, 2014). The company recompenses and rewards employees that surpass performance principles. The rewards and the incentives show the employees that they are recognized and valued by the company. Further, the company has created a recognition system, which is straightforward, reasonable and fair to all employees. These have always inspired and motivated the employees to work hard and improve their performance.

Make two (2) recommendations for improving the effectiveness of the discretionary benefits provided by the company you selected.

According to the researched I carried out of PepsiCo Inc, revealed that although the company has created a steady compensation plan and a recognition system, there are some employees that are discontent with the benefits (PepsiCo careers, n.d).Therefore, the company should create and execute a contentment assessment to review and evaluate the employee’s perception, and feelings concerning the current compensation plan and the benefits accrued. The analysis should include the interest of all the employees and the findings from the assessment reviewed. Secondly, the company should carry out an assessment to analyze the compensation plan, and identify the ones that need to be reviewed. Finally, Pepsi as an international company should also implore opinion and responses from the headquarters all over the world and assess how their employees are treated.

Evaluate the types of employer-sponsored retirement plans and health insurance programs provided by the company you selected and compared them to that company’s major competitors.

PepsiCo Inc offers a profuse retirement package that includes of legal assistance plan, and education compensation. These comprise of the total compensation plan for all the employees. It also has a saving retirement plan for its employees; the retirement plan offers income to its employees even after they retire. Also, the company awards its employees with insurance plans that cover them together with their families. The main competitor of PepsiCo Inc is Coca- Cola, which offers viable benefits and compensation to its employees. The Coco Cola company has created and established a compensation plan that permits its employs access to savings and pension benefits (Strauss, 2014). Coco- Cola displays high loyalty and dedication to minorities and diversity and has created flexible compensation plan to suit the needs of its varied employees.

Should A Start-Up Organization Invest In An Information System Immediately

An Information system is systems that include and consist of people and computers to interpret and process information. It is also software used to sort out, arrange, classify and scrutinize data. It is essential for every business to invest in information technology to be able to acquire competition advantage (Freelock, n.d). Consequently, application of information system is a cost of doing business and also an opportunity to invest in more business dealings and transactions. However, it may not be obligatory, and essential to apply and invest immediately in an information system in a start-up organization. The

The Information system includes and consists of two sub-systems these are; Technology sub-system and Social sub-system. Further, the information system includes and comprise of four components namely; Information technology that consist of; telecommunication appliances, hardware, and software. Additionally, other components of the information system are; people, process sub-system, and structure, the four components must work together to ensure the information system to perform and achieve its needed objectives (Mc Cubbrey, n.d). For instance, if a start-up organization decides to apply information system to carry out its operation, the people involved need to be trained to carry out the processes.

Therefore, start-up organizations should invest in information system when they can offer the organization with tangible benefits as they require money and time. It is very vital and imperative for every start-up organization to have skills and trained personnel before they invest and apply information systems in their operations (Mc Cubbrey, n.d). Further, an information system application assists organizations in innovation, efficiency, and effectiveness; therefore, it is a mistake for a start-up organization to wait for long before implementing information system application. Since a sturdy plan for technology should be a part of every organization goals and objectives.

Tactical And Strategic Intelligence Collection Plans

Strategic intelligence

Intelligence Plan

Details

Getting access to technology Once a targeted candidate has been identified, the first step is to use technology in order to be able to track them down from any destination. Every detail about the candidate is collected using platforms such as telephone, directories or other recruited agencies.
Getting people who have access to other knowledgeable people In gathering strategic intelligence information, the person who is selected for the work must be one who has a connection to the local culture. Understanding of the people’s culture is important because such a person may not be seen as an alien in such a community. On the contrary, using a person who has no understanding of the culture may make the whole process to be so difficult.
Use of allied intelligence agencies In collecting intelligence information, it is important that other allied intelligence agencies should be incorporated to make the work much easier. The contacts of the targeted candidate(s) can as well be obtained from the allied agencies who are well acquainted with the candidates that are targeted. Additionally, one agency can relay critical information to other agencies who are capable of handling a given case in a much better way. For instance, a CIA officer can get intelligence information about a terrorists meeting planned to take place at a certain destination. Such a meeting can then be distorted through laying an ambush on such evil planners.
Application of intelligence information to get a target Even if an agency has very little or no information about a given target, there is still a chance for information to be gathered about that population. The use of intelligence information can always work for the purposes of getting the necessary information about the desired target. There is a chance that the agencies can gather fine details of their target through the use of social platforms or alternatively they can decide to tap phone lines and even intercept other communication that may give those links to their target.

 

Intelligence Collection Methods

Method of collection

Details

SIGINT (Signal intelligence) This type of intelligence is collected from the interception of signals that are used by the targeted candidate(s). The signals can come from the communication signals or even from the electric emissions. The SIGINT facilities are used to monitor the transmissions that emerge from the communication satellites. This type of intelligence collection is particularly useful because it enables information to be collected beyond the borders of a country. The use of the satellite enables the information to be gathered through the use of fiber optics and air waves.
HUMINT This type of intelligence is normally collected from the use of human sources. In most cases, it is the diplomats and the military attaches that use this type of collection process to gather information. HUMINT activities include the exploitation of the unclassified publications as well as conducting congressional hearings. Additionally, it involves the use of debriefing of travellers especially those who reside in the refugee camps. It is easy to gather information from the refugees especially from those who travelled to countries that are of importance to that country’s intelligence. HUMINT collection process can help in gathering information that even those who are considered to be the most proficient collectors cannot get. The technical collection systems used in HUMINT are used to determine the capabilities of the intelligence information gathered. The human collectors are normally given the duty of giving key insights of what the intentions are meant to achieve.
ELINT This type of intelligence is gathered from the interception of the non-communication signals that are sent over the electromagnetic waves.
TELINT This is a type of intelligence that is gathered through the interception of the foreign signals. For instance, a foreign country can send signals when conducting a test on the aerospace. Such signals can then be trapped by a foreign country and in turn used for gathering intelligence details. This method also allows for the collection of information using the video data links that are used by the targeted population(s).
MASINT This is intelligence that is gathered from the use of scientific methods such as qualitative and the quantitative analysis of data. Such data are in most cases retrieved from the technical sensors. The data is then used to identify the existence of distinctive features that are related to the source emitter or the sender of that information. The details gathered are then used to identify the equipment that has been used to emit the data that is under analysis. Additionally, the data can be measured in order to come up with the fine details of the metric parameters. Once the analysis is done, then the equipment and the phenomenon that was used in creating the information can then be identified.

 

Socialization Sample Research Paper- Social Behaviors

Factors that contribute to attitude

            A feeling, opinion or belief of either disapproval or approval towards something, constitute an attitude. Attitudes are acquired over a lengthy period of time through the process of learning. More often than not, behavior is a reflection of formed attitudes and beliefs. The formation of attitudes can occur in the following ways:Classical conditioning, operant condition, modeling and repeated exposure(Hewstone, Fincham, & Foster, 2005). Classical conditioning involves the process of learning where an individual repeatedly draws an association between two different stimuli. Operant conditioning refers to learning that takes place after the repetition of behavior that bears desirable outcome or consequence. Modeling or observational learning takes place when an individual observes anotherand picks things that guide their future behavior, feelings, or thoughts. Lastly, repeated exposure in the form of constant contact or experience with something reinforces attitude.

The role of prejudice, aggression, and attraction in social interaction

Prejudice, aggression, and attraction facilitate the process of social categorization and eventually helps to decode social interaction as in the structures in society that facilitate how people communicate and with others.

Prejudice is an acquired negative attitude held by a person about members of a particular social group. Attraction refers to the desire to have a relationship with others or a liking of other people.Aggression refers to physical or verbal behavior that is intended to destroy or hurt another person.People are often attracted to other people who are similar in certain ways to them but they can also be attracted to others who are unlike them especially if the differences between them offer complementary support for what they may be lacking(Millar & Tesser, 1990). Together with people that an individual identifies with, he or she forms an in-group, which is in opposition toout-groups; that are formed by those whom the in-group holds or directs prejudice and aggression.

The influence that groups play on a person’s behavior

The behavior of an individual and the attitudes that inform an individual’s behavior can be affected both negatively and positively by the presence of others. Groupthink, group-shift and de-individuation are the key concepts that explain group influence on an individual. While aspiring for conformity or group harmony, the groupthink concept suggests that, an individual’s motivation for decision-making may sway in favor of the group’s values and belief, even if they are erroneous. Since people in a group assess risk differently, group shift concept describes a scenario where one is likely to hold exaggerated and extreme positions, making riskier decisions than one would make as an individual. The process of de-individuation occurs when one loses themselves in terms of self-control and self-consciousness to the beliefs, structures, and values of a group.

Difference between conformity and obedience

Conformity differs from obedience in that when conforming, an individual seeks to match his attitudes to the norms of a group whereas when obeying, an individual is yielding to explicit orders or instructions from a figure of authority. In obedience, there is the element of outright command that is not there in conformity.

The role of social psychology in the workplace environment

Since people’s behaviors and beliefs are influenced by their interactions and perceptions of themselves relative to the world they live in, social psychology allows to understand ourselves and others betterand especially allows us to co-exist and work together more harmoniously. This would reduce conflict, increase trust, collaboration, and consequently productivity at the workplace.

Financing International Trade – Answered

Financing International Trade Assignment Instructions

“Financing International Trade” Please respond to the following:

  • Compare two (2) methods that a company can use in order to finance international trade.
  • Examine the advantages and disadvantages of financing with a portfolio of currencies.
  • Provide two (2) examples of how companies or MNCs finance international transactions by using their own “bank” or by keeping currencies on hand (marketable securities).
  • Analyze Interest Rate Parity (IRP) and two (2) methods for forecasting exchange rates.
  • Determine the primary manner in which they all affect a company’s short-term financing decision.

Support your response with one (1) example of the manner in which IRP and forecasting exchange rates methods affect a company’s short-term financing decision

SAMPLE ANSWER

Methods of financing international trade

Open account terms

This is a financing method in the international trade which may be accorded in a situation of regular or trustworthy customers. First the goods are dispatched and then paid for at a later date, or on a quarterly or monthly basis (Baker, 2003). While the high purchase method is carried on the basis that the customer makes a deposit or a down payment and then make regular payments for the hire for a specific term. The customer is immediately given the possession of the goods, though, the ownership of the item remains with the seller until the payment of the last installment.

Advantages and disadvantages of financing with a portfolio of currencies

Advantages

Many currency financing strategies aim at profiting from the trends that are completely unrelated to other asset classes, therefore they also generate a return series which are uncorrelated to the returns from other asset class (Collins, & Fabozzi, 2009).

A number of profit making investment strategies aim at taking the advantage of perceived valuation of differentials across the currency pairs.

Disadvantages

Even though diversification reduces the amount of risk involved in the investment of a portfolio of currencies, it is disadvantageous due to dilution.

The currency exchange risk is another big disadvantage in the use of a portfolio of currency. Changes in the exchange rates between one currency to another can result into a reduction of your return on the foreign investment in converting the proceeds.

Interest Rate Parity (IRP)

Interest Rate Parity (IRP) is used in the analysis of the relationship between the spot rate and a corresponding forward (future) rate of currencies (Madura, 2009). The IRP theory states the interest rate differentials between two different currencies as reflected in the discount or premium for the forward exchange rate for the foreign currency where there is no arbitrage.

Methods for forecasting exchange rates

Purchasing Power parity (PPP)

The Purchasing Power parity forecasting method works on the basis of the theoretical law of One Price, which stipulates that identical goods in different countries should have identical prices (Moosa, 2010). Based on this principle, the Purchasing Power parity method predicts that the exchange rate will change to offset price changes as a result of inflation.

Relative economic strength approach

This approach give the insight of the strength of economic growth in the different countries with an aim of forecasting on the direction of exchange rates (Moosa, 2010). The short-term financing decisions of a company can be affected by the relative economic strength approach on the basis that a strong economic environment and a potentially high growth attracts investments from foreign investors.

 

Importance of Cultural Diversity in Multinationals

Globalization has made the need and the diversity in multinational organizations an inevitable aspect. According to the fact diversity remains a significant organizational challenge, with employees finding it vital to have the abilities needed in a multicultural work place. Managers, supervisors as well as leaders have to be open to training themselves and others within the organizations to benefit multicultural differences in both customers and stakeholders to ensure that everybody is treated with dignity. Moreover, the cultural intelligence creates ability to make the diverse board of directors and workforce understand and forge ability to create a fruitful collaboration in such an environment where cultural differences play a critical role. The cultural intelligence make the workforce of the corporation to act appropriately across various cultures; interact effectively in multiple cultures. This is important in the global business of today in order to benefit and bridge cultural difference (Hofstede & Hofstede, 2011).

Cultural diversity is discovered to create a focus on teamwork that builds better relationships within a department and geared towards promoting identity within the department or organization that moves beyond surface level differences. Departments which develop a strong culture of involvement, one in which all workers were encouraged, empowered, and developed to work as a team, are perceived as managing workplace diversity better than those departments which have a weak participation culture (Hofstede, 2007). It should be acknowledged that the national culture of the country in which the individual workers are from should be integrated to a standardized relationship between participation culture and diversity management perceptions.

Geert Hofstede’s Cultural Dimensions

Geert having operated in the international environment since 1965, he has given a platform for comparisons of nations into four clusters. This paper gives insights of the cultural dimensions as provided in the Geert’s four dimensions for the United States and Thailand

Power Distance

The power distance dimension states that all the individuals in the societies are not equal –thereby expressing the attitude of culture towards such inequalities amongst us. That is, power distance refers to the extent to which the members of institutions and organizations who are less powerful in a country accept and expect that power is distributed unequally (Hofstede & Hofstede, 2011).

Thailand score a Power Distance index (PDI) of 64 above the United States’ 40, showing that Thailand is a society in which Inequalities are accepted; highly strict protocol and chain of command is observed. The low PDI score of 40 for the U.S. is a clear indication of the America’s premise of “liberty and justice for all.” The American society and governance emphasizes on the aspects of equal rights.

Individualism

This encompasses the degree of interdependence a society has maintained among its members. The members of individualistic societies look after themselves and their direct family. Unlike a collectivist society in which individuals belong to group which take of them in the exchange of unquestioning loyalty.

The U.S. PDI score on individualism is 91 while the Thailand’s is at 20. With a PDI score of 20 for Thailand is a show that it is a highly collectivist country. The members commit to “groups,” that is, a family, extended relationships, or extended relationship. The highly individualistic society of America with a score of 91 reflects a society which is loosely-knit where the expectations of people is that they look after themselves and their immediate families only and there shouldn’t be too much reliance on the authorities for support.

Uncertainty Avoidance

This dimension refers to the way a society deals with the fact that the future is always unknown. The U.S. PDI score on uncertainty avoidance is below average at 46. This is perceives to put America as a society in which there is a fair degree of accepting new ideas, innovative findings and the willingness to try new or different things (Hofstede, 2007). On the other hand, the Thailand’s score of 64 on uncertainty avoidance dimension shows preference for avoiding uncertainty. There are strict laws, policies and rules to be followed in order to reduce or minimize any level of uncertainty.

Consumer’s Bill Of Rights As A Road Map For Future Legislation By Obama

In February 2015, President Obama announced the release of the Consumer Privacy Bill of Rights Act’s draft. The draft offers more comprehensive legislations that will help protect the rights of U.S. consumers better than the existing legislations do. Presently, the existing laws regulate privacy on sectorial basis such as financial privacy laws, health privacy legislations, and children’s privacy legislations among others. Each of these sector laws has a different definition of the protected data as well as the different protection types required (House, 2015). The 24-page proposed consumer protection bill is designed to codify the already established privacy principles. Additionally, the bill initiates new concepts that are anticipated to offer flexibility as well as help in keeping pace with the ever-changing technologies and business practices.

The United States remains to be one of two developed countries that do not have personal data privacy protections (Computer and Internet Lawyer, 2012). Instead, the U.S. has a number of sector-specific laws that are only applicable torelatively narrow classes of personal information, and it also has general-purpose consumer protection laws, which are enforced by the Federal Trade Commission that does not map perfectly into privacy rights (Schwartz, 2012). Since 2012, when Obama administration put forth the consumer’s bill of rights as a road map for future legislation, the administration has continued to provide leadership on the consumer privacy issue (House, 2012).

Under the existing legislation, consumers are apprehensive about how sellers collect and use their personal information and with the ever-developing technologies;consumers have a prevalent sense that majority of those sellers have lost control of their privacy (Larose & Day, 2015).  In line with this, Obama administration’s legislative proposal has tried to address this issue.  Although the bill, just like the existing one has a number of significant flaws, it seems acknowledge this and explicitly labels this section of the bill as a discussion draft.  Several elements of this section will need to be modified if the proposed bill will offer consumers comprehensive privacy protection (Allocca, 2015). As a part of my analysis, I have compiled a number of current legislatives, their provisions and their proposed changes.

The bill’s fundamental protections follow in the footsteps of the Fair Information Practice Principles. The core of the bill and one of its best feature is that the bill’s rations are deep-rooted on the Fair Information Practice Principle’ notions. The bill Focused Collection, demands Transparency, Access, Respect for Context, Accountability, Individual Control, security, Responsible Use, and Accuracy (Kang, 2010). However, a good number of the bill’s protections are founded on the harm of risk.  Majority of the bill’s FIPPs-based protections are only applicable in proportion to the possessed data’s privacy risk(Schwartz, 2012).  The bill’s definition of privacy risk israther narrow as, “The potential that data could “cause emotional distress, or physical, financial, professional or other harm to an individual” (House, 2015).  This is a notable shift from theother privacy legislations’ rights-based formulation.

Furthermore, the bill exempts several business records from numerous fundamental protections. Just like personal data, which does not pose a privacy harm risk,a good number of business records are similarly exempted from given protections including data minimization as well as individual control (Allocca, 2015). Certainly, majority of data records should be immune from individual control;nonetheless, the bill’s exceptions categories are exceedingly broad (Landau, 2015). . This is a shift from the existing legislations that have a little less broad exception categories.

The bill relates correspondingly to both companies and non-profits. Under the existing legislation, the Federal Trade Commission is only given the power to handle cases that relate to for-profit commercial firms (Landau, 2015). The new bill however expandsprivacy requirements substance as well as the range of organizations to which those requirements may be applicable. This means that under the proposed bill, CDT may start being subjected to extensive privacy requirements (House, 2015).  This is a practical change since non-profits, political campaigns included, are capable of collecting substantial amounts of sensitive personal information.

The proposed bill’s definition of personal information is relatively broader than the traditional definition, which is used in most current legislations. Due to this broad definition, the bill can apply to a wider range of information as compared tothe current sectoral legislations that define personal information as “personally identifiable information (Computer and Internet Lawyer, 2012).  As privacy analysts have documented in the past, consumers have developed an increased interest in pseudonymous identifiers including cookies and device IDs since they can be used to influence user’s experience. Identifiers that cannot belinkedto a particular individual may be realisticallyexcluded from personal information.

The collection of out-of-context data necessitates opt-in consent. This aspect makes the proposed bill rather complicated.  Although consumers are given certain rights in the event that the data poses a privacy risk, in the case of out-of-context data collection, the consumers have to be given a Heightened Transparency and Control over that data (House, 2015).  When data processing is considered unreasonable in the light of context, it is usually hard to analyzesince there is an eleven-factor test for determining “context” (House, 2015).  However, previous privacy bills and legislations, such as the Rush’s Best Practices Act and the Kerry-McCain Commercial Privacy Bill among others, have adopted a much easier approach, which involves opting-out most data’s controls, and opting-in sensitive data controls.  The traditionally applied approachis much more predictable and much easier to apply as compared to the approach used by the new bill.

Privacy policy retrospective revisions no longer require permission.  Under the currently existing law, the Federal Trade Commission is responsible for bringingenforcement actions to all firms thatattempted to retroactively modify privacy policies or attempted tomodify the guidelines for data that was previously collected (Larose & Day, 2015). This is justified since one cannot collect consumer’s information and then change the original terms such as not sharing the information with third parties and then modify this rule later on to accommodate third party sharing. Surprisingly, the proposed bill reverses this principle’s course (Landau, 2015).  Under section 102(e) states that if a firm changes its policy, it is only required to inform its customers about the changes in advance and then proposition compensating controls in order to easethe privacy risks that may result from the change (House, 2015).  This shift will result to a weaker law than the existing one, which will be bad for consumer privacy. This provision should therefore be removed from the bill.

The Obama administration is committed to working together with the American people in order to get a strong privacy standard bill that will cover all consumer privacy issues. The proposed bill shows remarkable progress in the achievement of that goal. Although the proposed bill is far from flawless, it is an important aspect of achieving this objective. The President and FTC calling for comprehensive privacy legislation were important steps toward that goal.  And this draft bill is an important step along the way.

Assuming the bond speculator wants to hedge her net bond position, what is the optimal number of…

A bond speculator currently has positions in two separate corporate bond portfolios: a long holding in Portfolio 1 and a short holding in Portfolio 2. All the bonds have the same credit quality. Other relevant information on these positions includes:

CLICK HERE TO GET THIS PAPER WRITTEN

Portfolio Bond Market Value
(Mil.)
Coupon Rate Compounding
Frequency
Maturity Yield to
Maturity
1 A $6.00 0% Annual 3 yrs 7.31%
B 4 0 Annual 14 yrs 7.31
2 C 11.5 4.6 Annual 9 yrs 7.31

Treasury bond futures (based on $100,000 face value of 20-year T-bonds having an 8 percent semiannual coupon) with a maturity exactly six months from now are currently priced at 109–24 with a corresponding yield to maturity of 7.081 percent. The “yield betas” between the futures contract and Bonds A, B, and C are 1.13, 1.03, and 1.01, respectively. Finally, the modified duration for the

T-bond underlying the futures contract is 10.355 years.

a. Calculate the modified duration (expressed in years) for each of the two bond portfolios. What will be the approximate percentage change in the value of each if all yields increase by 60 basis points on an annual basis?

b. Without performing the calculations, explain which of the portfolios will actually have its value impacted to the greatest extent (in absolute terms) by the shift yields. (Hint: This explanation requires knowledge of the concept of bond convexity.)

c. Assuming the bond speculator wants to hedge her net bond position, what is the optimal number of futures contracts that must be bought or sold? Start by calculating the optimal hedge ratio between the futures contract and the two bond portfolios separately and then combine them.

CLICK HERE TO GET THIS PAPER WRITTEN

Recent Trends in Juvenile Delinquency

The late 1980s through to the early 1990s, United States of America experienced a serious rise in juvenile crime. This resulted to the introduction and enforcement of state laws that unlike the existing legislations that emphasized on rehabilitation, they were tougher and emphasized more on disciplining offenders. Since then, juvenile crime rates have been reported to decline significantly. Currently, state legislatures continue to rebalance their strategies of dealing with juvenile crime and delinquency so as to identify techniques that are likely to pro­duce better results at lower cost.  Nowadays, policymakers have more and enriched information available to them in regards to juvenile crime, factors influencing it and ways it can be prevented (Levitt, 1997). This paper will analyze the reliability of some of the sourced of this information, the recent trends in juvenile delinquency, analysis of juvenile arrests between 1980 and 2012, and finally discuss the importance of determining a chronic offender at an early age.

  1. Are the official and unofficial sources of data on delinquency reliable and valid? Talk about the reliability of the UCR (Uniform Crime Report) and self-reporting.

Self-Report Studies

Self-report reports are intended to offer participants an opportunity to reveal information relating to their law violations (Brown, 2014). This method is founded on the basic assumption that the anonymity of the participant and the confidentiality guarantee supported by academic qualifications will inspire more and more people to disclose and accurately describe their criminal activities.

There is a notable discrepancy in research findings regarding the reliability of this method of crime data collection. Consequently there have been heightened criticisms of self-reports as a criminal data collection instrument. Some of the critics claim that this method may provide inaccurate data due to a number of reasons including, the respondents may lie, they may exaggerate situations, they may also forget, or understate their illegal activities. There are also other issues that are linked to unreliability of this method (Brown, 2014). They include definitional and interpretational issues of the data collected.

A research conducted in 1980 revealed that very few youths commit serious inconsistent offenses (Spaeth, Weichold & Silbereisen, 2015). Additionally, majority of the samples used for such studies are not always fully representative of the population being studied and in most cases, they do not include sufficient high-rate lawbreakers to help the researcher differentiate them clearly from other delinquents. Consequently, self-reports are not 100 percent reliable but when conducted under due diligence, they can still provide the researcher with the information they seek.

Uniform Crime Reports (UCR)

The UCR is the most popular and most widely used source of criminal data, including juvenile crime data. One of the major advantages of this method of crime data collection is that the information collected is usually accurate as compared to that collected using self report studies. Furthermore, the UCR provides information of the frequency of arrests as well as the gender, race, age and other characteristic of the individuals arrested. While UCR provides more reliable information than most other criminal data collection instruments, it still has a number of shortcomings that critics claim could alter the accuracy of the data collected. The UCR provides information relating to crimes that were reported to the police only and since not all victims report their ordeals to the police, the data collected may not be accurate. Additionally, in an incident where more than one crime was committed, the UCR does not record all the crimes but only reports the most serious crime. This means that some crimes. Although reported may not be reflected in the UCR database (Gallupe, Bouchard & Davies, 2015). This can greatly affect the reliability of the data collected. Although UCRs are not 100 percent reliable but they can still be relied upon to provide the researcher with the information they seek.

  1. Trends analysis of juvenile arrests between 1980 and 2012

1n 1980, the juvenile crime arrest rate was about 300 in every 100,000 persons ages 10-17. This figure remained relatively constant until 1986 when there was a significant rise in arrests hitting an all time high, 500 arrests in every 100,000 persons ages 10-17, in 1994 (ojjdp.gov, n.d). The number of juvenile arrests decreased slightly in the following year, 1996 and was then followed by a steady decline that was experienced between 1997 and 2001, taking the number of arrests just below the initial 300 in every 100,000 persons ages 10-17 that was recorded in 1980. There was a slight increase in the number of arrests between 2002 and 2006. This saw the number of arrests rise back to 300 arrests in every 100,000 persons ages 10-17. In 2007, the number of arrests remained relatively constant followed by a steady decline since.

In mid 200s, there was a notable increase in the number of juvenile Crime arrests, which was then followed by a steady decline since. This saw the trend heating its lowest level since 1980 in 2012 (ojjdp.gov, n.d). In 2012 the recorded arrest were only 182 for every 100,000 youth between 10 and 17 years, a rate that was 38% lower than the rate that was recorded in 1980 and about 63% lower than the rate that was recorded during the peak, 1994.

3.Why is it important to determine the chronic offender at an early age?

Identifying a chronic offender at an early age is a crucial aspect in curbing crime. Most organizations, including schools, juvenile justice, and social services focus more on preventative or remedial measures. Studies show that prevention is a much better and more fruitful approach (Spaeth, Weichold & Silbereisen, 2015). Experts claim that out of all the measures taken to reduce juvenile crime, preventive interventions are most likely to have the largest success rate in terms of crime reduction. Determining a chronic offender at an early age means that the offender will not have committed any serious crimes thus preventative measures can be implemented on time.

Parents Should Not Let Their Kids Play Football Due To The Serious Injury Risks?

When one thinks about football, the mental images that he or she is likely to have include those of children tackling others rather thoughtlessly, the NFL (National Football League), and dangerous touch downs. However, one is unlikely to consider the Alzheimer’s disease, the crippling diseases, or the concussions that any child playing football is highly likely to suffer in the days ahead according to Lehman, Hein, Baron and Gersic (2012). Clearly, these are some of the commonest consequences of playing football. These consequences bring up grave questions: Are the threats that football pose too high to be ignored? Why should one expose his or her beloved child to the threats by allowing him or her play football? Evidently, football is so unsafe that children should not be allowed to engage in it.

Football Increases the Risk of Developing Chronic Traumatic Encephalopathy

Children should not be allowed to play football since it makes them rather susceptible to developing CTE (chronic traumatic encephalopathy). CTE is a degenerative and fatal disease that afflicts the brain. Commonly, it develops from the recurring tackles and hits experienced by footballers and other athletes, especially the young ones. Those diagnosed with CTE are likely to have long histories of suffering brain traumas, some of which are in the form of asymptomatic sub-concussive pressures, or hits, on athletes’ heads. They would not have suffered CTE had they not engaged in games that put pressure on their heads, hence brains.

It is a well-known actuality that many professional footballers who have since retired suffer CTE. The CTE is attributable to the footballers’ histories if recurrent brain trauma. The trauma causes brain tissues to degenerate progressively as tau, an odd protein, builds up on them. The degeneration of the tissues can commence shortly following a particular brain trauma or series of brain traumas. In other cases, the degeneration commences long after the footballers who suffer the traumas retire. When a child suffers CTE, his or her life becomes characterized by memory loss, aggression, progressive dementia, depression, impulse control difficulties, impaired judgment, and confusion.

Depression

Children who play football are at a heightened risk of suffering painful depression, which predisposes them to engaging in activities like drinking, which expose them to varied injuries according to Lehman, Hein, Baron and Gersic (2012). When they are no longer able to able to play for their favorite football teams their risk of suffering depression rises significantly. Notably, at times, children are unable to play for their favorite teams owing to poor health, particular domestic commitments or schooling obligations. At such times, the children suffered decreased adulation from their peers and friends. Others feel as if they if their teammates have suddenly isolated them. They feel detached from the camaraderie associated with the world of football. Notably, even experienced footballers retiring from active football action experience depressing withdrawal pangs.

Casual surveys show that the majority of football retirees struggle with repeated bouts of depression, which increases their chance of engaging in injurious activities. Previously, the retirees were only likely to discuss their struggles with depression away from the public limelight. They viewed discussing their struggles with depression in public as an expression of weakness. Even then, presently, they come out strongly in advising children they should gear up for futures possibly defined by depression. The retirees are now rather likely to open up on the effects that the bouts of depression that they suffer repeatedly owing to their professional histories have on themselves, their loved ones, in addition to the future of football.

Are young footballers who suffer CTE likely to suffer depression that may lead them to engage in injurious activities? Depression is closely related to CTE. Children who are kept away from football are less likely to suffer CTE and depression than children who play it. CTE impacts on an individual’s capacity to control her or his emotions. CTE impacts on an individual’s capacity to think rationally. Footballers are conditioned to think about the next football assignment. They are likely to have difficulties laying down long-term plans for their lives and follow them through. That makes them face lots of challenges in life especially following their retirement from football. The challenges are well-known risk factors for becoming depressed. Many young footballers even develop suicide-related thoughts, which predispose them to grave injuries as they try to actualize them.

Alzheimer’s disease

Commonly, the injuries that children sustain in football matches predispose them to developing the debilitating Alzheimer’s disease. Particularly, the concussions that the children suffer place them at a heightened risk of developing the disease. Tau accumulates in the children’s brains, which is widely thought to cause the disease. Research shows that those who suffer memory losses or concussions owing to head injuries are quite likely to develop the disease. If one is keen on ensuring that his or her child is not unnecessarily exposed to a heightened risk of developing the disease, he or she should not allow the child to engage in football.

One should be well-advised that up till now there are no drugs that are even slightly effective in blocking the evolution of head injuries into the debilitating disease. Consequently, if particular children got concussions while playing football, they always remain at a marked threat of coming down with the disease even if they access the best of the available medical care. The children are as well at a marked threat of suffering premature death according to Lehman, Hein, Baron and Gersic (2012). Lehman, Hein, Baron and Gersic (2012) submit that their finding that the concussions and related injuries to the head increase a person’s predisposition to developing the disease is consistent with numerous previous research findings.

Lehman, Hein, Baron and Gersic (2012) appraise reports on the deaths of thousands of NFL players who were active in the NFL league from the late 1950s to the late 1980s. They established that the players were fourfold more likely to have had their deaths caused by the disease than all the other cause combined. As well, deaths were highly likely to have stemmed from complications that are largely associated with amyotrophic lateral sclerosis (ALS).

Notably, ALS afflicts the brain just like Alzheimer’s disease and causes general body paralysis. The researchers come off as acutely aware of the numerous dangers of football and other contact sports with respect to memory problems, including Alzheimer’s disease. They urge parents, doctors, and others who care for children to find ways of keeping them away of keeping them safe from activities that may ultimately trigger the onset of contact illnesses such as Alzheimer’s disease. The probability that a child who engages in football will develop the disease is highly comparable to the risk that the child who engages in risky sports like hockey horse racing, and boxing will suffer the disease at some point in his or her life owing to repeated injuries to the head.

Lehman, Hein, Baron and Gersic (2012) come off as dissuading care givers from allowing children engage in football since it puts them at the risk of suffering rather hard blows to their brains, which is are Alzheimer’s disease risk factors. Particularly, they submit that those most exposed to the blows are the footballers defined as speed players. A speed player mounts marked momentum prior to experiencing a hard tackle or prior to tackling others. The speed players in football teams include linebackers, safeties, tight ends, halfbacks, defensive backs, quarterbacks, fullbacks, running backs, and wide receivers. To ensure that one’s children are not unreasonably exposed to the risk of developing the incapacitating Alzheimer’s disease, he or she should not allow them to as linebackers, safeties, tight ends, halfbacks, defensive backs, quarterbacks, fullbacks, running backs, or wide receivers in any football team.

Post-Concussion Syndrome

The possibility that a child is likely to suffer injuries leading to post-concussion syndrome owing to football engagements is one of the numerous grounds why no child should be allowed time along with space to engage in football. It is clear from the research executed by Strauss and Savitsky (1934) that the probability of continuing symptoms after particular concussions has been established and widely known for numerous decades to date. The post-concussion syndrome term refers to unrelenting symptoms. The symptoms include dizziness, memory loss, irritability, and headache. Strauss and Savitsky (1934) came up with the term in the 1930s.

Individuals are diagnosed as suffering post-concussion syndrome if they express symptoms such as dizziness, memory loss, irritability, and headache three weeks after suffering head injuries. Some individuals are diagnosed as having the concussion about a month after suffering the injuries. Others are diagnosed as having the concussion many months after suffering the injuries according to Bazarian, Wong, Harris, Leahey, Mookerjee and Dombovy (1999).

Bailes and Cantu (2001) indicate that it is now well-known that teens and children, and particularly young females are at a higher threat of sustaining post-concussion syndrome and the usual concussions than grownups. The symptoms expressed by those having post-concussion syndrome are thought to stem from metabolic adjustments that happen with concussion. For many years, the NFL downplayed the marked prevalence of concussion along with post-concussion syndrome among players who suffer head injuries. Even then, owing to researches such as the one executed by Bailes and Cantu (2001), the NFL admits that football exposes players to heightened risks of concussion along with post-concussion syndrome.

There Is No Safe Helmet 

A child should not be permitted to engage in football even when wearing a helmet since it does not confer to him or her adequate protection from head injuries. Some parents think that their young footballers are safe since they always have helmets in place when playing. They need to reconsider that thought. There are no specific helmets that can keep any footballers absolutely safe from head injuries.  The famed Xenith helmets present their wearers with substantial risks of suffering the injuries.  The famed Riddell helmets present their wearers with substantial risks of suffering the injuries.  As well, the famed Schutt helmets present their wearers with substantial risks of suffering the injuries.

The bio-mechanists who design helmets are unlikely to design ones that are concussion-proof owing to the cost implications on helmet manufacturers. The padding found in any of the presently available helmets in the market is only effective in decelerating the head of a player adequately slowly to ensure that he does not suffer substantial head injury. It cannot prevent all the possible injuries to the head altogether. Notably, those who are involved in car crashes stop in a scope of a few feet but in football impacts, those involved stop in a scope if few inches. Those who design helmets are keen on extending the periods of the impacts by even thousandths of seconds. There is a high chance that ongoing studies may not yield to helmets that will offer more protection than the extant ones. That is because of the bother or nuisance of the amount of padding that would be required to make the helmets concussion-proof. The lack of helmets that provide absolute protection from concussions is one of the numerous grounds why no child should be allowed time along with space to engage in football. There is no helmet that can keep him or her safe for ever and a day.

Conclusion 

Football is evidently rather dangerous. The young people who play it are at heightened risk of suffering CTE owing to the many head injuries that they experience. They are at heightened risk of suffering depression. They are at heightened risk of suffering Alzheimer’s disease. As well, they are at heightened risk of suffering post-concussion syndrome. The lack of helmets that provide absolute protection from concussions is one of the numerous grounds why no child should be allowed time along with space to engage in football. Football is capable of occasioning life-changing conditions. Parents should consider all these actualities when reflecting on whether or not their children can take up football as a sport. The consideration of the actualities may mean whether one’s children will live normally or lead handicapped lives.

Company’s Important Assets To Be Protected From Threats

The company’s site has a high level plan for security where main applications, network and servers data or resources will be secured from any threat. There are main areas where this high security level plan will be employed to protect main assets. This areas include:

  • Servers holding financial data
  • Analytical application server for the company bond and stock
  • Application servers for market tracking
  • Methods and sites for online trading
  • Servers holding human resource data
  • The company internet data
  • The company data transmission system
  • The company email server
  • All servers holding different data

General Security Architecture

The company network system will focus on enhancing a high level of security to the system. This will be effected by developing the right security architecture. The system will involve the installation of a firewall which will connect the company’s LAN into the company WAN and the internet. This will be followed by routers which will be connected to the Cisco IPS and Cisco ASR Edge Router. The routers are then connected to the web server that is connected to MacAfee antivirus. In addition, the routers are connected to two distribution layer switches which have control access system and the TACLANE-Micro Encryptor. The switches in this layer are then connected to access layer which distribute the signal further to terminals and servers that are installed with MacFee products.

Twelve Specific Security Policies

The company will adopt a number of unique security policies to ensure that all concern individual employ the right measure to prevent the development of some network security loopholes. These policies are provided below:

  1. Security response procedure should be defined to assist users to report any malicious act they notice prior to IT personnel detection and also to assist in knowing and being prepared for measures to be taken and impact of any security response procedure
  2. All critical company’s internal servers must have host IDS to assist in preventing local attacks
  3. The company should ensure file system integrity check
  4. The use of the company mail must be consistent with the company policies and procedures for compliance safety and ethical conduct with proper business practices and applicable laws.
  5. There should be the employment of system monitoring technique to be able to identify any attempt to interfere with the system network or any loophole that would facilitate an attack.
  6. Each user should use a unique and strong password which cannot be cracked. Password will not be shared and users will be required to lock their accounts while not in their work station
  7. Every device in the network system must be installed with an antivirus and antispyware which will be updated on daily basis
  8. Users’ system access should be limited based on individual operation level by providing different system access rights
  9. Data used in all company department should be backed-up regularly to prevent total loss of data in case of an attack
  10. All data transmitted through the company’s network system should be encrypted
  11. The company will frequently designate the network security audit personnel to check on the company compliance with set security policies
  12. The employee should be prohibited to access network through unsecure wireless communication mechanism

Details and Rational for Each Policy

Every device in the network system must be installed with an antivirus and antispyware which will be updated on daily basis

In this case the company servers and all other computers will be installed with McAfee antivirus and antispyware to prevent them from being affected by viruses, trajons, or spywares either from individual user activities online or from any other external input or storage devices. This kind of infection would interfere with the functionality of the servers and computers interfering with data integrity, confidentiality or accessibility.

Each user should use a unique and strong password which cannot be cracked. Password will not be shared and users will be required to lock their accounts while not in their work station.

The company users should use standard password with not less than eight characters. The password should not be associated with anything that can be linked with the user for instance family members’ name, name of a hobby, favorite user’s celebrity, date of birth or important known even in the user’s life. The password should comprised of letters both capital and small letters, numbers and special characters. This is basically meant to ensure that each use has a strong password that can hardly be hacked. Users should always lock their machine to prevent others from using their accounts to perform malicious activities using their accounts or accessing information which they could not access due to rights restrictions.

Users’ system access should be limited based on individual operation level by providing different system access rights

Each user should be restricted on the information to access, based on the individual operation level in the company. These rights prevent junior workers from accessing sensitive information or data that they are not supposed to access for security purpose. It also control inappropriate data update for malicious purposes. Junior workers can be used by competitors to get data or certain information from the company and thus, this is normally limited.

Data used in all company department should be backed-up regularly to prevent total loss of data in case of an attack

Normally, it is hard to establish a 100% efficient systems. Systems are normally impacted by one problem or another. Thus the company should ensure 100% data redundancy to safe the company from any form of data loss in case of security attack. The best secondary storage should involve saving the backup take away from the entire original system possibly in a separate building to ensure 100% restoration.

All data transmitted through the company’s network system should be encrypted

Hackers normally take advantage of data in transition while trying to hack a network system. This is normally done through interception. If this data is not encrypted and the hackers succeed in their interception mission, the company’s data would either be interfered with or blocked from reaching the destination or be used to weaken the company’s competitiveness. However, if data is encrypted it would be impossible to decrypt the actual meaning of the data and thus, saving the data integrity and confidentiality. This would also save the company from any malicious act that can be conducted using the company’s data.

The company will frequently designate the network security audit personnel to check on the company compliance with set security policies 

The system audit ensure availability, confidentiality and integrity of resources and information. It also allows the investigation for probable security incidences to guarantee the conformance to the security policies of the company. It also ensure effective monitoring of system and users activity to guarantee they are suitable. The audit is anticipated to identify all the loopholes that would increase to system vulnerability. Therefore, it is very effective for the company’s security implementation.

There should be the employment of system monitoring technique to be able to identify any attempt to interfere with the system network or any loophole that would facilitate an attack.

System monitoring gives the system administrator an opportunity to identify any loopholes and other systems weaknesses. This ensures that the company has recognized its system vulnerabilities before they are taken advantage of by the attackers. Thus, system security monitoring prevent the company from successful attacks.

The use of the company mail must be consistent with the company policies and procedures for compliance safety and ethical conduct with proper business practices and applicable laws.

Email policy is placed to guarantee proper utilization of the company’s email system and to ensure that the users are aware of what they can and cannot do with the company’s email. It protect the company from being ruined through passing of important information to unauthorized individuals in the company. Email can easily facilitate the leakage of the company data to outsiders and that is why its operation must be limited to company based activities as guided by procedures.

The company should ensure file system integrity check

The file system integrity depends on an internal tables set to keep track of available blocks and inodes used. When the internal tables are not synchronized properly with a disk data, file systems and inconsistencies resulted to be replied. This prevent abrupt termination of file system and thus, it assist in ensuring effective file system operations.

All critical company’s internal servers must have host IDS to assist in preventing local attacks 

Host founded intrusion detection identify intrusion in a single host system. In this regard it prevent that one particular host from being impacted by the intrusion. This will ensure that there is no any form of intrusion gets into the company system via the hosts.

Security response procedure should be defined to assist users to report any malicious act they notice prior to IT personnel detection and also to assist in knowing and being prepared for measures to be taken and impact of any security response procedure. 

Response procedure is provided to eliminate chaotic situation in the company in case the company managers need to fix any identified security problem based on the actual location and its magnitude.

The employee should be prohibited to access network through unsecure wireless communication mechanism.

Unsecure wireless network is likely to cause havoc by permitting viruses, trajons, and malwares among other things into the company’s network. Thus, this need to be prevented since it can results to compromise of the data confidentiality, availability and integrity.

 High availability secure design for the locations

The possible four forms of attack in an organization include malware infiltration, denial of service attack, intruder threat, and reconnaissance attacks. To eliminate malware infiltration, the company will require to install antimalware or antispyware which can be provided by MacAfee’s products in the servers and other terminal devices. Data protection solution and endpoint protection installation prevent all possible malware in the company.

Denial of service attack are based on the concept which by overloading resources target, the system will eventually crash. This can easily happen in web server applications among other WAN connections. To prevent this, the company will need to install a firewall. Web application firewall will be very efficient in countering denial of service attack.

Intruder threat can be prevented by a number of measures. One of the measures is by enhancing data encryption especially all data to be transmitted via the network system. This will be done by the installation of TACLANE-Micro Encryptor. Another measure include the enhancement of file system integrity check, system monitoring and the employment of security policies. The installation of Cisco IOS IPS will assist in detection of IP attacks.

Reconnaissance attacks is an attack where in the attacker engages with the targeted system to gain more information about the system vulnerability. To prevent this, the company needs to enhance high security policies which can be supplemented by the installation of Cisco Access Control System and Cisco IOS IPS in the routers point where the company’s local system connects with the WAN.

Security Devices and their Specific Roles

Device Name

Description and Role

Cisco IOS IPS It is an inline feature of deep-packet inspection which effectually mitigates different forms of network attacks. The device integrates threat control framework and Cisco IOS feature of flexible packet matching. The device offers the network intelligence to correctly block or stop, classify, and identify malicious traffic in actual time.
Cisco ASR Router This router will be placed at the edge of the company’s network linking the company network to the internet service provider. It will be involved in managing services which include firewall and VPN. It will provide the company with inspection of deep packet and also offer encrypted, secure WAN connectivity and WAN aggregation.
Cisco Access Control System It is a highly sophisticated platform of policy offering TACACS+ and RADIUS services. The device supports the augmenting complex policy required to address new current demands for access control compliance and management. It offers access policies central management for wireless and administration device, remote VPN and wired 802.1x network access situations. It offers standards-compliant services of  accounting, authorization, and authentication to the wireless and VPN users of the company
TACLANE-Micro Encryptor It is a high assurance IP encryptor and an encryptor of crypto modernization compliant. It is optimized for strategic and tactical environment.  It will be used to encrypt all transmitted data from the new York company to other locations. Will enhance remote keying for HAIPE to HAIPE and enhance the compatibility of the IPv6/IPv4 dual stack, Ethernet.
McAfee ePolicy Orchestrator server It offers host base security to safeguard data loss, service denial, malware, reconnaissance, intrusion, and exploitation. It allows scanning of virus at all levels , data loss prevention and prevention of the integrates host intrusion

 

High Level Security Diagram

Improving the Efficiency of Replication

Apart for very minute networks, directory data have to reside in over one place on the network to be correspondingly efficient to all users. The Active Directory through replication services upholds directory data replicas on multiple controller of domain, enhancing availability of the directory and all users’ performance. Active Directory depends on the multimaster model replication, permitting one to make changes in the directory at any controller domain, not just as the primary designated domain controller. Active directory depends on the site concept to assist keep efficient of the replication and the Knowledge Consistency Checker (KCC) to establish the most suitable replication network topology automatically.

To assist in enhancing replication efficiency, Active Directory depends on sites. Sites refer to groups of well linked computers which establish the replication of the directory data. Directory information in Active Directory site is replicated more frequently as compared to other sites. In this regard, the best linked domain controller, which are normally the domains that requires specific directory information, gain replicated update first. Moreover, the domain controllers in different sites also obtain the changes, through less often, as a way of lowering the consumption of the network bandwidth.

However, things are a bit different in this case. The network system does not have a reliable connection and thus, some of the sites are not routed completely and thus, they cannot receive active directory updates. To address this, the Server 2012 must be installed in more than one site manually. The installation should focus on the connection. Each complete connection should have an active directory site to create two or more Active directory to serve the two or more incomplete connections. This way all sites will be receiving updates and replication efficiency will be enhance (Technet.Microsoft, 2005a).

Hamburger Advertisement analysis

Hamburger is a common snack you can find in any fast food shops. However, though many have heard about, only few know how it looks like or what it is made of. Therefore, for any fast food shop to familiarize its customer with it, they must come up with the best advertisement ever that will alert the costumers what it is and if it is yummy. The number of customer convinced by an advert depends on how persuasive it is to the viewer.

The above advertisement of hamburger is so enticing just from it colors as they make it so yummy. The advertisement of the hamburger is very precise as it indicates to everyone that a hamburger is a sandwich that consists of one or additional cooked pastries of ground animal protein, generally beef, positioned inside a wedged bun. As a result, the costumer does not require asking what a hamburger is prepared from. The color of the tomatoes slice, onions and greens makes it so amazing and attractive to everyone since the colors are attractive also.

The lady beside the hamburger who seems to be enjoying it so much makes this advertisement sex appealing. The way the lady is dressed makes also makes it more sex appealing. Additionally, the lady beside the hamburger is a clear indication that the advertisement is targeting ladies and most likely the young ladies.

The placement, color, and the size of the text of this advert makes every viewer to read them since they are placed on top of the hamburger so everyone thinks that they are explaining about the hamburger. Their white color on a black background makes them very visible to everyone to see. Moreover, the arrangement of the pictures makes the advert marvelous as the viewer will be in a position of recognizing what a hamburger is from its picture and realize at the same time how appealing it is from the picture of the lady who seems to be enjoying it very well.

This advert attracts me by the colors that have been used to draw the pictures and to write the text.  The way the lady on the advert seems to be enjoying the hamburger too much makes me imagine how I could also feel if I have it. The arrangement of the pastries between the slices of the hamburger with different colors looks very amazing, therefore attracting my attention.  The way the images of the hamburger and the lady enjoying eating it have been composed makes this advert to make an aesthetically gratifying end result.  However, this is an indication that the advert made use of The Rule of Thirds.

However, sometimes individual opts to use the image of celebrities in their advert. This is because most celebrities have a lot of fans who by just seeing their picture they would like to know what is written about them and since they have a lot of influence on them they even like imitating them by having what they are having on that advert.

Download the full advertisement analysis paper together with the sample advert or order a plagiarism free analysis of any advert at an affordable price.

One of the concepts you encountered in the readings this module was how to recognize the use and misuse of information presented in the form of percentages.

One of the concepts you encountered in the readings this module was how to recognize the use and misuse of information presented in the form of percentages. In this discussion assignment, you will conduct anInternet search to find several examples of the use of percentages. These can be examples of percentages used in advertising claims, reported results from a study, or information shared by a government agency.

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

In a minimum of 200 words, post to the Discussion Area your response to the following:

Find an example of two of the following types of usage of percentages.

  • Use of percentages as a fraction. Remember that this type will use the word of to imply multiplication. Explain whether this was an effective way to represent this information within the context of the example you found.
  • Use of percentages to describe change. In the example you find, determine whether the reported percentage demonstrated absolute or relative change. Show your work. Explain whether this was an effective way to represent this information within the context of the example you found.
  • Use of percentages for comparison. In the example you find, determine whether the reported percentage demonstrated absolute or relative change. Show your work. Explain whether this was an effective way to represent this information within the context of the example you found.

Now, find an example of two of the following misuses of percentages.

  • Use of a shifting reference value. In this situation, the base values are changing as differing values of percentages are applied as increases, decreases, or both. Percentage increases, decreases, or both do not have a cumulative effect. Be sure to demonstrate why your example fits this category.
  • Use of percentage to represent less than nothing. Look for an example where you are seeing a reduction of some percentage greater than 100. Be sure to demonstrate why your example fits this category.
  • Situation where the average percentage is reported. In general, you can not average percentages. The result isn’t representative of what actually has occurred in the situation in question. Be sure to demonstrate why your example fits this category

Need a Professional Writer to Work on this Paper and Give you an A+ 100 % Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

Fetal Protection Policy

ETHICS ASSIGNMENT

 Please review the following questions and comment on their acceptability.

  1. After learning that when women are exposed to high lead levels their fetuses may be harmed, Barnett, Inc. adopted a “fetal protection policy.” The policy prohibited women of childbearing age from working in the company’s Battery Division where lead is used in the production process. Female employees objected to this policy by arguing that it deprived them of employment in the higher paying jobs in the Battery Division. Is it ethical for Barnett to adopt the “fetal protection policy”? Is Barnett obligated to protect its employees from this risk?Remember to use the supplemental materials to answer the four aspects set forth in the instructions.  (West, 20003, p. 822, 40-8)

 

  1.  Grant Gibson was employed byKeystone State Steel Corp. to sell tubular steel products to the oil and gas industry. Although Gibson was not a safety expert, he believed that one of the company’s new products, a tubular casing, had not been adequately tested and constituted a serious danger to the environment and to anyone who used it. Even though Gibson at all times performed his duties to the best of his abilities, he continued to express his reservations with respect to the company’s new product but bypassed the ordinary company procedures in making his complaints. Because of his complaints, Gibson was discharged from his job without notice. Did Gibson have an ethical duty to complain about the product? Did Keystone Steel act ethically in response to Gibson’s concerns? Remember to use the supplemental materials to address the four aspects set forth in the instructions.(West, 2003, p. 820, 40-1)
  2. For decades, communities have offered tax abatements, low interest loans, and other financial incentives to induce companies to locate in their communities. From 1984 to 1988, Ypsilanti, Michigan gave General Motors (GM) $13 million in tax abatements to keep its Chevrolet plant in the city. In 1991, GM announced that it was closing the Chevrolet plant in Ypsilanti and moving the work to its plant in Texas. Did GM act ethically in deciding to close the plant in Ypsilanti? Remember to use the supplemental materials to address the four aspects set forth in the instructions.(Cheeseman, 5th, p. 151)

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

impact of a health program intervention carried out precisely according to the intervention protocol is which of the following?

A process evaluation conducted for the purpose of establishing the maximum possible impact of a health program intervention carried out precisely according to the intervention protocol is which of the following? Answer Efficacy study Effectiveness study Efficiency study None of the above Question 17

Which of the following explains the need for process evaluation? Answer To help identify whether implementation of the program contributed to the program’s failure To provide operational information to new sites so that the program can be successfully replicated To meet requirements of funding agencies, specifically regarding demonstrating the extent of program implementation To provide data upon which to make midcourse corrections in the delivery of the program All of the above .

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

1 points Question 18

Which of the following data would NOT be useful in monitoring participants and recipients? Answer Demographic characteristics Participant/recipient contact information Participant/recipient program satisfaction Number of persons denied program None of the above .

1 points Question 19

Which of the following is a source for program variability? Answer Staff preferences and interest Material availability and appropriateness Participant expectation and receptivity Physical environment of site and organizational support All of the above .

1 points Question 20

Qualitative, in-depth interviews with individuals who understand the priority population are called: Answer Informal interviews Substantive interviews Key-informant interviews Targeted-individual interviews

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

Spy Case from PERSEREC

You work as a mental health professional in an organization that is examining methods to avoid potential intelligence compromises. You have been asked to evaluate an existing spy case in order to achieve a greater working knowledge of the motivation of espionage in an effort to avoid future compromises in the organization.

In a formal report, conduct an evaluation and case conceptualization. Identify the risk factors, vulnerabilities, and threats; identify the potential mental disorders, symptoms, and prognoses; and explain how this type of indirect assessment relates to the ethics code as prescribed by APA.

Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN

Tasks:

Create an 8- to 10-page report responding to the following:

  • Select a spy case from the Defense Personnel and Security Research Center (PERSEREC) case page. You cannot select a case that has already been examined or discussed in this course.
  • Conduct a case study evaluation and case conceptualization of your selected spy case as described below.
    • For the case study evaluation:
      • Summarize the case facts. Include not only the case details as outlined by evidence and a description of the act but also the characteristics of the perpetrator, such as demography, socioeconomic status, work history, and relation with the intelligence community (IC) organization where the espionage occurred. Articulate what, where, when, how, and who of the act of espionage in the case you have chosen.
      • Identify the risk factors and vulnerabilities in the spy and the threats of the case. Risk factors and vulnerabilities are intrinsic to the perpetrator and include factors that made the perpetrator more susceptible to committing the act of espionage. Threats are extrinsic to the perpetrator and bring dangers to the asset. In these cases, the asset is national security information.
    • For the case conceptualization:
      • Describe the cognitive processes, behavior, and emotional makeup of the spy, such as how he or she thinks, acts, or feels, using a major theoretical orientation on personality psychology (such as cognitive behavioral and psychodynamic behavioral).
      • Identify any potential mental disorders or symptoms that may exist and include them in your prognosis.
      • Explain how this type of indirect assessment meets (or does not meet) the ethics code as prescribed by APA. This section should be supported by the existing body of psychology literature.
    • Need a Professional Writer to Work on this Paper and Give you Original Paper? CLICK HERE TO GET THIS PAPER WRITTEN