Thursday, November 28, 2019

Hidden Valley free essay sample

I call it Hidden Valley.It has nothing to do with salad dressing and everything to do with my vision of a better world.It has become a running joke within my family.Whenever I encounter an injustice, a corruption, or superfluous rule, I plant my feet, square my shoulders and proclaim, â€Å"In Hidden Valley, [insert solution here]!†.For example, in Hidden Valley, political campaigns are all about ideas.Candidates can be anyone.They fire up their laptops and present their ideas to the general public.Citizens vote for ideas, not people.In Hidden Valley, there will be no genetically modified foods, no gratuitous trademarks or copyrights.I would strongly proclaim, â€Å"Humans cannot copyright plant genes.Sorry, Monsanto.†Resting in the rich soil of Hidden Valley are my hopes for a just and peaceful world.I am no idealist. I know what I’m asking. To reach the safety of Hidden Valley, I have to take risks and leave my comfort zone. We will write a custom essay sample on Hidden Valley or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page To realize the safety of Hidden Valley, I have to be dangerous.How ironic. I can build Hidden Valley on my computer screen.In fact, I spend a lot of time looking at screens.It’s not just me; we all look at screens all of the time, a collection of pixels representing the world and all its parts.Pixels are minuscule color dots that, when joined with other minuscule dots, create the illusion of an object.If I want to be inspired, I look at thousands of pixels that make up words and pictures on a screen.What Hidden Valley becomes is up to me. I pour out my heart into shapes and symbols that represent a freshly created world where I am in control and all is well, a Hidden Valley just for me.I am emboldened to express my creativity, vent my frustrations and solve my problems.The impossible is within my grasp; where I can build a base on the moon or construct a castle in a day.Excitement in a hard drive.These simulations of a 2D Hidden Valley can become a collection of my own little realitiesBut when my creation is compared to the real thing, there can be little mistake about which reality is the tangible one.Pixilated sunrises and simulated waterfalls can only sustain my cravings for visual beauty for so long.I long for authenticity.That’s when I realize that the way to Hidden Valley is over a bridge, a bridge that might hide a few trolls. While my idealized safe place is purely fictitious, the bridge is not.It represents a very real quest for knowledge and understanding as well as a desire to better our world.The obstacles are formidable and the path is treacherous, so I must look for companions who share similar goals and wish to collaborate in order to solve problems.Through hard work and like-minded support, the valley can become a lot less hidden.

Sunday, November 24, 2019

Restrictive and Unrestrictive Use of Such As

Restrictive and Unrestrictive Use of Such As Restrictive and Unrestrictive Use of Such As Restrictive and Unrestrictive Use of Such As By Mark Nichol The phrase â€Å"such as† comes in handy for referring to specifics, but whether it begins a longer phrase framed by a pair of commas depends on whether that longer phrase is essential to the sentence or is provided as additional but nonessential information. The following sentences demonstrate erroneous use or omission of punctuation with the phrase; discussion and revision indicate correct usage. 1. In circumstances, such as these, are our strengths and weaknesses revealed. A pair of commas around â€Å"such as these† presumes that the phrase is optional, but â€Å"In circumstances are our strengths and weaknesses revealed,† though a valid statement, misses the point of the sentence, which is intended to relate the sentiment to a particular set of circumstances, so the phrase is essential and should not be set off: â€Å"In circumstances such as these are our strengths and weaknesses revealed.† 2. The use of the technology allows companies, such as World Wide Wickets, to transfer funds faster, cheaper, and in a trackable mechanism. Out of context, it may not be clear whether the parenthesis is necessary, but when one accepts the assumption that the company has already been mentioned, the phrase seems oddly intrusive when treated as an interjection, while its integral placement in the statement is natural: â€Å"The use of the technology allows companies such as World Wide Wickets to transfer funds faster, cheaper, and in a trackable mechanism.† 3. Specific employee information, such as Social Security numbers and I-9 forms for employment eligibility must be transferred in accordance with law. The examples given in this sentence are helpful but not essential, so the phrase beginning with â€Å"such as† and ending before the verb phrase â€Å"must be transferred† should be treated parenthetically. This sentence starts off correctly but neglects to close off the parenthesis with a second comma: â€Å"Specific employee information, such as Social Security numbers and I-9 forms for employment eligibility, must be transferred in accordance with law.† (The sentence is also correct without internal punctuation.) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Style category, check our popular posts, or choose a related post below:Passed vs Past45 Synonyms for â€Å"Old† and â€Å"Old-Fashioned†The Difference Between "Shade" and "Shadow"

Thursday, November 21, 2019

FAST FASHION IN USA Essay Example | Topics and Well Written Essays - 1000 words

FAST FASHION IN USA - Essay Example obber market fashion company’s management and profitability ventures, has largely concentrated on strategies adopted by these business, with her key focus being on price competitiveness. The article mainly focuses on one of the largest fast fashion business line, which is Forever 21, a company that is currently valued at $3 billion in net worth, 477 stores worldwide, and has over 35,000 employees. The feature has also outlined some other fashion companies related to fashion 21, accommodating a similar strategy, or focusing on efficiency and speed in the distribution and supply lines, which has resulted in fashion being available to all individuals in the society as opposed to how they were only previously relatable to fashionistas in urban areas. Fast fashion has been assessed from a number of perspectives, from its growing nature, its influence on the job market and the reason for its boom in the 2000s. Additionally, the review has also covered some of the key issues in contemporary international fashion, considering some of the vital considerations such as infringements and copyright violations, brand placement and competition. Forever 21 has opened a fashion stor e on fifth avenue New York, popularly known for large and luxurious fashion companies and not those that adopt price reduction strategies such as the mentioned party. The assessment of supply chain reduction and new innovations is also an impressive aspect of the article since it not only concentrates on the marketing strategies but also shows how these organizations have managed to achieve economic advantages over their competition both in terms of costs and time. The establishment of warehouses all over the world for instance is one of the key strategies that Forever 21 has adopted to ensure that it reduces the lead time from demand to the supply of these products to their retail stores and other departmental stores selling their products as well. The insights offered by this article are highly

Wednesday, November 20, 2019

Advanced Nurse Practitioners effective in the A&E environment Dissertation

Advanced Nurse Practitioners effective in the A&E environment - Dissertation Example Definition of Nursing - Nursing is an art and a science. - Earlier emphasis was on the care of sick patient; now the promotion of health is stressed. - British Nurses Association definition, 2003: Nursing is the diagnosis and treatment of human responses to actual and potential health problems. Roles of Nursing Whether in hospital-based or community health care setting, nurses assume three basic roles: - Practitioner-involves actions that directly meet the health care and nursing needs of patients, families, and significant others; includes staff nurses at all levels of the clinical ladder, advanced practice nurses, and community-based nurses. - Leader-involves actions such as deciding, relating, influencing, and facilitating that affect the actions of others and are directed toward goal determination and achievement; may be a formal nursing leadership role or an informal role periodically assumed by the nurse. - Researcher-involves actions taken to implement studies to determine the actual effects of nursing care to further the scientific base of nursing; can include all nurses, not just academicians, nurse scientists, and graduate nursing students. History of Nursing - The first nurses were trained by religious institutions to care for patients; no standards or educational basis. - In 1873, Florence Nightingale developed a model for independent nursing A & E department to teach critical thinking, attention to the patient's individual needs, and respect for the patient's rights. - During the early 2003s, hospitals used nursing students as cheap labor and most graduate nurses were privately employed to provide care in the home. - After World War II, technological advancements brought more skilled and specialized care to... A & E departments in hospitals throughout the UK, such as investor-owned organizations and corporation chains, earn profit through aggressive marketing and pricing strategies. Emergency room visits to these facilities result in more inpatient admissions than in other (20 percent more) or public hospitals. And, once patients are in the hospital, professionally managed A & E departments more frequently utilize profitable ancillary services--such as the pharmacy, clinical laboratories, and diagnostic radiology --than do other ownership groups. Further, they charge approximately 80 percent more than publics and 38 percent more than A & E departments in downtown UK hospitals for inpatient ancillary services. Profits are also generated through lower salaries and lower staff-to-patient ratios. Though professionally managed A & E departments tend to have smaller facilities than A & E departments in UK hospitals, they utilize a higher proportion of space for patient care. Nurses, although are cost-effective but difficult to maintain and support in the A & E department, their presence is more likely to help the hospital/A & E Department be accredited than otherwise in various hospitals (Gray 2003). Based on a 2002 Joint Commission on Accreditation of Healthcare Organizations study, whereas 14 percent of all hospitals are for-profit, 18 percent of accredited hospitals are for-profit. In contrast, whereas 59 percent of all hospitals are other, only 57 percent of accredited hospitals are.

Monday, November 18, 2019

Internet Banking Master Assignment Example | Topics and Well Written Essays - 2000 words

Internet Banking Master - Assignment Example The present form of online banking finds its roots in the pioneering initiative launched by four of the major banks of New York, Citibank, Chemical Bank, Chase Manhattan and Manufacturers Hanover bank. These banks simultaneously, yet individually, offered home banking services that allowed bank customer to maintain records as well as carry out transactions without leaving the comforts of their home (Mary J.C., 1997) Internet Banking received a major boost with the rapid development and penetration of banking activities conducted over the internet. Activities like money transfer and securities trading can be done through internet banking. It's a virtual bank in itself which is often an extension of its brick and mortar model. With expanding information technology it is wise for the banks to adopt and leverage it, for expansion of business and better and faster delivery of services to the customer. Some of the benefits of internet banking are: Internet banking is being used both in B2B (business to business) and retail banking. There are also some banks which only have a virtual presence, for example Nexity Bank. Generally bigger banks tend to offer internet banking. This is because smaller banks often find the cost of the service unprofitable before they expand to a certain scale (Gup B.E., 2003) Lloyds TSB is the largest retail bank in UK serving over 30 million customers. Being one of the largest banks in UK and the world, it has taken to internet technology in a big way and offers an array of services to its customers over the internet. Some of the internet banking services offered by TSB are like payment of bills, management of direct debit and standing orders, online application for savings account- over draft - credit card -personal loans, online travel money (without commission),online statements and so on. They also provide online banking guarantee and free weekly text alerts and the best is that registration for such services comes free of cost. (Lloyds TSB Bank Plc., n.d.) Internet banking has different stages. The very fundamental or basic stage is about 'information'; it offers information about the bank and its offerings. The next level is 'communication' which offers interaction between the customer and the bank's information or IT system. 'Transaction' is at the core of the next stage, where customers virtually transfer money/funds, pay bills and so on. (Ravi V., 2007) Internet bankin

Friday, November 15, 2019

The Computer Ethics | Essay

The Computer Ethics | Essay The computer and the Internet is probably the greatest tool that people rely on in the modern world today. However, they are the most unrestricted form of technology. Identity theft, stealing, fraud, and plagiarizing can now be done electronically and anonymously. There are people in the world that intend to hurt others through the computer. As such, it is important to not only understand a code of ethics to prevent harming yourself and others, but to also develop methods to protect yourself. Code of Ethics It is always important that when operating a computer that one does not harm other people. Unethical decisions in the use of the computer are as varying and harmful as acts committed directly against other people. The internet is very vast, and it does contain information and data, but it also provides dangers. There are as many dangerous activities through the internet as outside the computer and then some. Viruses, hacking, committing fraud, plagiarizing can all be done through a computer. Therefore, a code of honor should be established for anyone wishing to use the computer. Ten Commandments of Computer Ethics. The Computer Ethics Institute created the Ten Commandments of Computer Ethics. 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other peoples computer work. 3. Thou shalt not snoop around in other peoples computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other peoples computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other peoples intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans. (Lee) Personal Care. A computer is personal property to the owner, and he or she may do as they wish with the computer. However, a computer is the same as any property such as a house or a car. It is important to take care of the computer so that it operates safely as long as possible. This means to avoid any behaviors that would harm the computer or that will harm you. An example is giving personal information to sites that should not be trusted and could result in identity theft. Maintain an anti-virus software program to prevent virus attacks and always maintain and update the Computer. If a computer was a car, the same rule applies. A car should regularly be checked and sent for a tune-up. Respect Property. As always, it is important to take care of your computer. However, it is just as important to respect and properly use other computers. The same old rule applies; treat others property as you want your property to be treated. There are several risky behaviors on the computer that can harm it, and should be avoided on another persons computer. As a general rule, treat another computer better than your own. Not only does this apply to a friends personal computer, but also to the computers at school or at the library that provide public access. Remember that access to these computers is a privilege and should be respected. There are several important behaviors to observe when operating a different computer than your own. First, never operate a computer without permission. There may be special circumstances that you may be unaware. Second, always take good care of the equipment; the keyboard, the mouse, CDs, and hard drive itself. Finally, never download material or do anything potentially harmful to the computer. An illegal act could cause trouble for the owner or harm the computer and information it contains. Intellectual Property Intellectual property is any creation of the mind. Certain property is protected under Copyright Law, such as: Scientific discoveries Works of art or literature Inventions Designs Films or television programs Trademarks and names Computer programs Entertainment The Internet and Intellectual Property. As mentioned several times, the Internet is a source of a vast amount of information. The Internet is not a library or book, the Internet is for the most part unmanaged, unedited, unsupervised; anyone can post information on Internet for all to see. (Emmans) Information or creative works are not limited to copyright protected companies or organizations. Anyone can place information or creative work on the Internet. There are no physical boundaries to protect against the infringement of copyright. With free access to the Internet, any user may steal information anonymously and claim it as their own and this makes Intellectual Property almost unenforceable on the Internet. Protecting Against Plagiarism. Fortunately, there are tools available on the Internet to ensure users that they properly give credit to the information on the Internet. First, many sites available assist students in creating the proper citations for their sources. Good examples of these include Easybib and Citationmachine. These sites allow the user to enter the information of the source that they used, from either the Internet or elsewhere, and the device creates the proper citation. Jus the same, there are websites available to check the authenticity of a source of information, either a website or another type of information. An example is Turnitin.com, which allows teachers to analyze students work for plagiarized information. Other sites can be used to find if other website is credible or not. Finally, databases are an excellent tool for student or researchers. Databases contain well-documented articles from professional journals to even whole books, while also providing the sour ce information. Any student should take advantage of the tools available on the Internet to properly cite information and to find real sites. Placing Information on the Internet. When placing items on the Internet always make sure that the source of the information or media is cited. Also, when running a website, always include information to the ownership of the site and when it was updated. In this way, people can cite your website if they wish. Also, when maintaining a website, update regularly and maintain the site constantly. A website that has not been updated in years or does not have the proper links does not appear to be a good website. Limiting Access Free Speech. In American, everyone has a right to free speech, but where does this cross the line on the Internet? While people have a freedom of speech, there are limits in the physical world. For example, a person cannot slander or falsify against someone that will harm them. For example, claiming that a political opponent stole money from the treasury when this is not true is illegal. However, in the realm of the Internet, where there are no boundaries or enforcement, anything that can be said is said without punishment. The Internet is an excellent source of information, but as said before, websites should be evaluated before they are considered trustworthy or capable. An excellent example is Wikipedia, a free-access reference site. The site is well maintained and there is plenty of information with credible sources. However, anyone can edit a page on Wikipedia, and some of the facts may be false if not blatantly. In addition, on the Internet, there is a large amount of media, music, videos and images, even derogatory images and videos. Given that there is free-access, children may accidentally find these inappropriate images from innocent searches. Schools and Libraries. Schools and Libraries can help protect students and children from unrestricted access to the Internet. School and Library servers can now be fitted with restrictions that will block harmful or inappropriate websites. For students, this is very helpful in keeping them from exploring harmful sites while still having access to find information. In Libraries, it is important to protect the computers and restrictions on the internet help in this task, since many people come and go on the computers. (Emmans) Parental Control. Still the best protection for children is parental oversight. Children should not operate the computer or navigate the Internet themselves. This should also be applied to teenagers. Cindy Emman writes, A minor walking into a store to try to buy pornography can be stopped; a minor logging into the Internet can easily pose as an adult no one is the wiser. Parents should monitor teens use of the computer and teach their children proper use of the internet. (Emmans) Conclusion There are many concerns for the use of the computers. There are many harms that are created by others and there are harms created by the operator. Fortunately, there are methods developing to defend against harmful viruses, internet theft, and plagiarizing. The key for the prosperity of the computer is that each owner of the computer exhibits proper behavior, and anyone can turn to the Ten Commandments of Computer Ethics as a guide. Remember; never do anything that would harm another.

Wednesday, November 13, 2019

Racial Profiling in America Essay -- Black Lives Matter Essays

On February 4, 1999, Amadou Diallo, an unarmed 22 year-old immigrant from New Guinea, West Africa, was shot and killed in the narrow vestibule of the apartment building where he lived. Four white officers, Sean Carroll, Kenneth Boss, Edward McMellon and Richard Murphy fired 41 bullets, hitting Diallo 19 times. All four were members of the New York City Police Department's Street Crimes Unit, which, under the slogan, "We Own the Night," used aggressive "stop and frisk" tactics against African- Americans at a rate double that group's population percentage. A report on the unit by the state attorney general found that blacks were stopped at a rate 10 times that of whites, and that 35 percent of those stops lacked reasonable suspicion to detain or had reports insufficiently filled out to make a determination. Thousands attended Diallo's funeral. Demonstrations were held almost daily, along with the arrests of over 1,200 people in planned civil disobedience. In a trial that was moved out of the community where Diallo lived and to Albany in upstate New York, the four officers who killed Diallo were acquitted of all charges. (â€Å"Persistence† 21) Racial Profiling is any police or private security practice in which a person is treated as a suspect because of his or her race, ethnicity, nationality or religion. This occurs when police investigate, stop, frisk, search or use force against a person based on such characteristics instead of evidence of a person's criminal behavior. It often involves the stopping and searching of people of color for traffic violations, known as â€Å"DWB† or â€Å"driving while black or brown.† (Meeks 17) After 9/11, racial profiling has become widely accepted as an appropriate form of crime prevention. People were s... ... as far back as any of us can remember. Racial profiling stems from racism, and fear of people who are different, ethnically and culturally, than the person making the judgments. Sadly, it spreads even further than that, and clouds the judgment of the people who are in positions of authority, even when they come from the same ethnic background. Racism, classism, sexism and all the other –isms combine to create trends such as these, which affect more than just the person being judged; it affects their families, friends, neighborhoods, communities, etc. Like all other issues that deal with the problem of –isms, the only way to change the dominant perception is to change the way people are programmed throughout life and their experiences. Until that day, no legislation or rule is going to change the way people feel about the minority, or perceived lower class, group.

Sunday, November 10, 2019

Research Ethics

A research study is defined as an activity involving collection of data with an aim of solving a specific selected problem. The above is followed by recording of the data then subsequently its analysis so as to arrive at meanings. Finally the results are generalized so as to make the findings applicable to whole populations and therefore deductions as well as suggestions also known as recommendations. Finally the researcher makes conclusions which are an opinion which expresses the researchers stand concerning the research problem. A researcher should ensure that the suitable data collection instruments and methods are used. The suitable data analysis techniques should be employed so as to enable the researcher draw the relevant conclusions of a study. A research study involves costs, which are incurred in various ways including data collection, carrying out interviews as well as costs associated with data analysis. In any given research study there is usually an involvement of usually three or more groups of participants. The participants include the researcher, the respondent and the sponsor. For a marketing research, the sponsor is usually the supplier. Research studies require that some ethical norms be considered to ensure that the research being carried out is meets ethical standards as well as regulations guiding various professions. These ethical norms are usually observed with reference to the rights and obligations of each participant in a research. In any given study, the researcher is supposed to adhere to ethical norms something aimed at ensuring that, the research does not interfe with peoples fundamentals rights no harm the research subjects in any way. All particiapants in a research are required to adhere to the given regulations in their interactions amongst themselves as well as in their interactions to the public in whose midst the research is conducted. When handling the respondent a researcher should apply certain ethical norms in order to observe and guarantee the respect of respondent’s rights. Such respondent’s rights in an interview can include amongst others: (i) Informed consent – it’s the right of the respondent to be informed about a certain research to be carried out and that the respondent is supposed to be a participant. The researcher is obliged to respect the respondent and give details of the research study. With an informed consent, the relationship between the researcher and that of the respondent is enhanced something which results into a good working rapport hence contributing to the success of the research study. Incases of lack of consent before a research begins co-operation lacks in the data collection process and therefore chances that the data gathered may be unreliable become high. (ii) Confidentiality – Ethical norms dictate that the respondent should be treated with a sense of confidentiality in handling the respondents’ information. The respondents’ information should not be exposed to third parties or used for purposes other than those for which consent was sought for. The information obtained from the respondent should be given to the right person. Incase of a marketing research the supplier should get the information. The researcher should make sure that he/she remains truthful and ensure that he /she does not expose the respondents’ information (Dooley, 2002, P160-170). (iii) Anonymity – It is the right of the respondent to maintain his or her anonymity. Anonymity refers to the concealing of the respondent’s identity. It is the right of the respondent to decide about his identity hence the researcher should respect that decision. The researcher should not disclose the identity of the respondent when the instructions demand so. The researcher should posses the value of promise keeping so as to succeed (Emerson 1990, P89-103) The researcher should be able to be responsible when handling the respondents’ identity. He/she should not be able to misplace any documents containing the respondents details this would contravene the respondents right to immunity. The researcher should be honest to the extent of involvement of respondent in the research study. The researcher should inform the respondent whether there is any risk of harm involved. This will help the respondent in preparing himself or herself. This honesty should not be compromised. This point to the obligation of the researcher in taking into consideration the respondent’s safety. The researcher has the obligation towards the research staff. Ethical issues will enable him or her handle the research team as per the ethical norms (Gray 2003 p 67-83) The researcher should be honest towards the research staff in terms of their remuneration. The researcher should also consider the safety of the research team. He or she should ensure that no acts of negligence or carelessness should occur which might cause safety risk of the research team. The researcher should also ensure that he or she practices patience while handling the respondent, the research team and also the sponsor (incase of a market research study; the supplier) Patience will be required in negotiations and discussions since a research study mostly involves teamwork. Each participant in a research study usually has a set of obligations to be taken care of. The researcher usually has an obligation towards the supplier who is the sponsor of a research study. The researcher is supposed to achieve these obligations through the guidance of ethical norms. The obligations of the researcher to the sponsor executable through application of ethical norms include: (i) Obligation to submit a conclusive research study worthy of the cost paid. The sponsor usually takes more of the research cost; therefore the researcher has to submit research work, which is worthy the amount paid for. To succeed in these obligations the researcher should remain honest. The researcher should be ready to account for the research project to the satisfaction of the sponsor; In the case of a marketing research the supplier ***** (ii) The researcher has the obligation of submitting the researcher has the obligation of submitting the research work within the specified time frame. This obligation requires that the researcher posses the quality of commitment. The researcher should be truthful in giving the expected time for completion of the research work. (iii) The researcher has the obligation of submitting research work of the right quality. The supplier or sponsor will expect the researcher to carry out a research study, which serves the purpose. This will include use of the suitable data collection methods, proper analysis and reasonable conclusions drawn. The supplier (sponsor) will expect the researcher to provide him or her with the suitable data evaluation techniques so that he may be able to understand well the research work (flick 1983 p 10-26) We must be aware of the fact that the sponsor who is usually the supplier in a market research study has an obligation towards the researcher. The sponsor has to be honest towards the researcher in terms of the scope of the research work required. He should not exaggerate on details required in a research study, which might be out of scope. Failure to be honest the researcher will definitely submit irrelevant information upon research (Johnson 1985 p 17-36) The supplier (sponsor) should remain truthful about the research costs. The sponsor should clear the costs of research and also remunerate the researcher. The supplier should not create complications after the research work has been completed. This would contravene the researcher’s right of remuneration. CONCLUSION Research studies are aimed at alleviating certain problem or learning more about a specific problem. For any research study to be successful the participants should be able to co-operate well towards attainment of the research objective. This co-operation will be brought about by each participant playing his or her role under the guidance of the ethical issues required in a research study. The ethical issues shouldn’t be largely dependent on the specific participants’ rights and obligations.

Friday, November 8, 2019

The Broken Family

The Broken Family Free Online Research Papers America is the best country in the world. We have the best doctors, the best military, the best schools and best of all the most freedom. But as with any system there are possible improvements. One of America’s biggest current problems is the broken family. In America one out of two marriages ends in divorce. This drop in stable marriages also increases the number of children being raised by single parents of whom eighty three percent are female (Wood). This is creating a generation of children who have no idea how a family should be run and they don’t understand how to be a good spouse. This experience in a child’s youth also causes kids to try and have all of the things that come with marriage with out the commitment because they are afraid of it. This decrease in lasting marriages can be accounted for by many factors. One contributing factor is the idea today that love is what you want it to be and only lasts as long as things are easy or comfortable. This misconception causes many couples to just forget about the â€Å"till death do you part† section of the vows and decide that they should sleep with whoever makes them feel good (Wilson). These decisions can also cause a large spread of diseases. With our youth going and having sex with many people to whom they are not married, many diseases are being passed along and spreading through the society. If these people had the traditional values of marriage and abstinence then the diseases wouldn’t be a problem. The fall of traditional values in America has brought an increase in the spread of STDs. As more and more teens decide that they are mature enough or free enough to pick a mate at the age of sixteen and sleep with them shows: for one, a lack of general education on health and risks that come from this, and a lack of value placed on the family. This new generation of unmarried teenagers at risk of STDs and not caring should scare the decision makers and educators into action but regardless of this they choose to ignore what is happening and cover it up. The frequent divorces that leave behind children with only a single parent cause these children to grow up without some of the guidance that they need. As many children only have a mother they lack the strong guidance that can come from a father. Because of this America has seen a rise in gang participation and violence. Gang membership provides a fatherless child with a level of guidance, acceptance and discipline that all youth desperately need. At the beginning of 2002 there were approximately 18 active gangs; now there are around 89 active gangs on record. (Atkins) According to Toney Atkins, the courier for The Southern Poverty Law Center, the gangs are now more violent and more active, committing more atrocities and pulling in new members daily. The American media is one of the largest culprits of poor education to our youth. Every day the news is flooded with all of the problems in America and all of the youth know everything that goes wrong. Every single murder, rape, divorce, sexual scandal, and the next top model all show up to tell them what the worlds problems are and how horrible it can be to be out in the world and its strife. These children are deeply influenced by everything they hear and will see these things as normal. One proof of this is seen in the growing rates of teenage violence. These problems all compounded with each other and America’s drift away from absolute truth and right and wrong are making America a much scarier place to be than it was fifty years ago. The easiest solution to these problems is education and awareness. If the American schools were willing to tell their students the truth about what their actions do to them, then the American public could begin its path back to strength and unity. Dr. Ann Crickard, while giving a lecture on STDs to a Westland high school health class, stated â€Å"†¦Condoms are not 100% protective against STDs especially HIV†¦Ã¢â‚¬  The teacher of the class immediately stood up and said to Dr. Crickard â€Å"You can’t say that!† disallowing Dr. Crickard the right to defend her statement. The teacher quickly removed her from the classroom.(Crickard) This symbol of America’s ignorance and attempt to hide information from the youth needs to be stopped in order to protect our f uture generations. If America opens the minds of its youth to the studies and facts around them, then the many problems arising from and with the broken families could begin to fade. To use an old clichà © â€Å"the youth of today are the leaders of tomorrow†. If our generation is kept completely ignorant and uninformed then the results will destroy our country. A strong education and a belief and hunger for absolute truth are forces that will put America back into a rush forward to a strong leadership role in the world. Improved strength in the American family and a return to the traditional family values can bring American society out of the scare that it is in due to all of the crimes occurring and bring back the common â€Å"hello† to passing strangers. If America gives the new generations an education about the value and strength of a close family, then the family can come back and give America the strength and values to be a light shining in a dark and scary world. Research Papers on The Broken FamilySexually Transmitted DiseasesBooker T. Washington, W.E.B. Du Bois, Ida B. Wells-BarnettProbation OfficersIs the Use of Psychotropic Drugs in the Treatment ofThe Story of Beatrix PotterMRSA Staph BacteriaCauses of the 2008 Financial CrisisStandardized TestingDistance Learning Survival GuideCombating Human Trafficking

Wednesday, November 6, 2019

AIDS in Sub Saharan Africa and in San Francisco

Key Drivers of HIV/AIDS in Sub Saharan Africa and in San Francisco Introduction HIV/AIDS continues to be a leading cause of alarm globally. New infections and deaths due to HIV/AIDS related complications are major issues that need to be dealt with urgently. It is particularly alarming in the sub-Saharan Africa where an average of 10% HIV prevalence in adults has been recorded. This is very high compared to the global average of 1%. The Southern Africa region accounts for about 40% of the global population living with HIV.Advertising We will write a custom research paper sample on Key Drivers of HIV/AIDS in Sub Saharan Africa and in San Francisco specifically for you for only $16.05 $11/page Learn More However, the female gender is more affected by the pandemic with women and girls accounting for about 60% of this population. Although the records indicate optimistic results, there is still need to enhance the campaign. In San Francisco, the new infections and death tolls may be on a down slope but the marginalized groups are still at a risk and this needs to be addressed. In this paper the key drivers of HIV/AIDS in Southern Africa and San Francisco will be discussed. HIV/AIDS in Sub Saharan Africa The extent of the HIV/AIDS pandemic in the region can be attributed to such things as; Sexual behavior-many men and women in the region have different sex partners concurrently; these may be in cases of polygamy, small houses (side partners apart from spouse) and prostitution. Many of them do not use condoms consistently meaning that safe sex practice has not been cultivated in them (Jana et al, 13-16). Secondly, male circumcision is practiced in very low levels and as we know, male circumcision is a major boost in the prevention efforts so lack of it is on the contrary. A third driver is the stigma associated with infection. This lack of acceptance by the individual and the community forces an infected person to keep their status secret which leads to further spread of the virus. In some cases some people d o not want to know their status for fear of stigmatization and this brings down the efforts of treating the infected persons. Also many sexually transmitted infections go untreated mainly due to this fear and they are a factor that encourages HIV infection. Male attitudes towards gender related issues such as reproductive health is also another contributing factor. Men do not involve themselves in such issues and therefore many of them lack the knowledge to curb the pandemic. They involve themselves in intergenerational sex, gender based violence and sexual violence. This means that the women and girls are the major victims of the men’s ignorance hence the high number of infections in females (Expert Think Tank Meeting on HIV Prevention in High-Prevalence Countries in Southern Africa 5-7). HIV/AIDS in San Francisco In San Francisco, the efforts of prevention and treatment have born fruits since the number of new infections and HIV/AIDs related deaths is on a downward trend. T he reduction in these numbers can be highly attributed to the change of sexual behavior in heterosexual men and women and non-injecting drug users.Advertising Looking for research paper on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Cases of new infections in these groups of people are very rare. However, there are still other driving forces in the spread of the disease and these include; Homosexual behavior; men who have sexual relationships with other men are at a major risk of infection. Transfemales are also another group of people who are on the higher side of the risk and hence their behavior is a key driver for the epidemic. Injection drug use is another major driving force. HIV transmission among this group of people is very likely and so the risk of new infections is unacceptably high. Disparities and unequal treatment for different groups of people may have been a major drawback on the efforts but it is now on the downward slope. This is as a result of the efforts by different care groups to involve representation of all the communities; including the marginalized groups, in the decision making process (San Francisco HIV Prevention Plan 1). Comparison between the key Drivers in the two regions The driving forces in these two regions are very different since they are driven by the people’s lifestyles which in these cases are worlds apart. As a comparison of the key drivers in these regions, we look at the drivers the way they affect the efforts made to eradicate the disease. As we have seen in the discussion earlier, the major driving forces in the sub Saharan Africa can be attributed to the regions position in terms of development. Most countries in the region are developing countries; and factors such as gender and sexual violence, poverty which leads to intergenerational sex and prostitution especially in women are inherent in these countries. This makes the prevention and treatment processes very hard since some people are driven to the wall by circumstances; meaning that they may be willing to change their ways but the situations they are in cannot allow that. In San Francisco however, the major driving force is the sexual orientation of individuals as well as drug and substance abuse. These can not be attributed to under development, therefore, the efforts to curb the epidemic can only be strengthened by the people’s willingness to change their ways. If the high risk groups of people are willing, they can put in their efforts; for instance, the gay community can accept to learn and use preventive measures, the drug users can accept rehabilitation plans or in extreme cases they should take precautions in their sharing.Advertising We will write a custom research paper sample on Key Drivers of HIV/AIDS in Sub Saharan Africa and in San Francisco specifically for you for only $16.05 $11/page Learn More The Response o f the Church to the Key Drivers of HIV/AIDS The church has made a lot of efforts in the fight against HIV/AIDs; However, this has not prevented the spread of the disease. This continued deterioration can be attributed to the churches ethical, liturgical and ministerial practices. These have encouraged the spread of the disease both passively and actively. These factors include the lack of an open, realistic way of involvement due to the shyness in addressing sex education and sexuality issues which are involved in prevention of HIV spread. Exclusion, theological interpretation of scriptures and definition of sin have contributed to increase stigmatization and suffering. A plan has been put forward to add an ecumenical dimension to the church’s effort and if implemented, it is bound to yield better results (Global consultation on the ecumenical response to the challenge of HIV/AIDS in Africa 9) In the US, the church’s involvement is mainly through faith based organizati ons. These have continually offered support to the infected and affected in terms of medical care, food supplies, cancelling and the general support needed morally and spiritually. They have also offered care to the care givers and education to the communities on the risk factors and prevention services. The government has since supported these organizations through federal funding. Laws have also been put down to prevent discrimination against such organization, the beneficiary or volunteer on the basis of religion. Also, it ensures that nobody should be forced to get involved in any religious activity involuntarily. These partnerships ensure that the church’s efforts are delivered painlessly and the beneficiaries are satisfied. Conclusion From these findings, we can conclude that the spread of HIV is highly dependent on a people’s lifestyle. This covers the level of development, the cultural beliefs and religious beliefs. The Church and the various arms of government can play a major role in the effort to curb the pandemic especially when they work together. Expert Think Tank Meeting on HIV Prevention in High-Prevalence Countries in Southern Africa. SADC 2006: 5-10. Web. â€Å"Global consultation on the ecumenical response to the challenge of HIV/AIDS in Africa.† The Ecumenical Response to HIV/AIDS in Africa 2001: Web.Advertising Looking for research paper on health medicine? Let's see if we can help you! Get your first paper with 15% OFF Learn More Jana Mere, Nkambule Paul and Tumbo D; One Love: Multiple and concurrent Sexual Partnerships in Southern Africa: A Ten Country Research Report. 2008:13-36 Web. â€Å"San Francisco HIV Prevention Plan.† San Francisco HIV Prevention Planning Council 2010: 1-3. Web.

Monday, November 4, 2019

Can torture be ethical Discuss in relation to the War on Terror Essay

Can torture be ethical Discuss in relation to the War on Terror - Essay Example There were often many manuals given to convey the torture techniques and the implications. Written codes and conducts were also regulated to redefine the process of torture and differentiate what is acceptable and what is impermissible (Scott, 2003, p27). As the theories enhanced, there is a huge debate on the torture ethics which is going on since years, and especially after 2001 when there was an initiative of the war on terror by collaboration of many countries. Some debate that torture has always been immoral and unjustifiable, whereas many of the modern theorists and socialists suggest that if torturing an evil man because of which many lives can be saved, then there is no better moral decision that could be taken (Wisnewski, Emerick, 2009, p 78). Thus, war on terror is a justifiable process which is carried out throughout the Western world, and if it includes the practices of torturing then torture can be considered ethical too, in a broad scope. There are many ethical argument s that have risen up related to torture and its value to the society. The major argument that supports the ethics or torture is the fact that it is an essential tool. Many of the countries condemn the use of torture and consider it not only unethical but also unlawful. Whereas many countries still use it as their tool and consider it as effective in many circumstances (Harbury, 2005, p95). There are many arguments placed forth and the basic debate lie in the views presented by deontological and utilitarian viewpoints. Both the viewpoints hold justification in their own way. The utilitarian viewpoint suggests that torture can be justified if the overall outcome of the action is positive. This refers to the process of torture which is used as a tool to investigate and weed the evil out of a person or criminal. In this belief, the utilitarian thinker might consider the outcome as the only source of judgment and to decide whether the act of torturing is moral or not. The outcome can def ine the long term effects in which lives may be saved and evil may be finished. This is the primary factor on which torture is used as a tool (Greenberg, 2006, p50). Opposing the utilitarian view is the deontological view which came from the word duty. This viewpoint suggests that the rules and values hold immense importance and they should be fulfilled as the first priority rather than the outcome. Utilitarian thinkers give immense respect to the moral values and ethics over the outcomes of allowing torture or restricting it. However, if the outcome is uncertain or can not be known, then the utilitarian thinker would state that torture is wrong and unjustifiable (Skerker, 2010, p154). There are any arguments seen favoring the utilitarian views against torture and in some parts of the world, the laws support these views as well. The war on terror or war on terrorism is known to describe the campaign set out by the US and includes many other countries such as the UK. The term is comm only used and it applies to the campaign which is initiated against the al-Qaeda and other militant groups which are associated to it. The aim of this campaign was to eliminate the powers and actions of such militant organizations. The September 11 attack on the World Trade Centre gave rise to many militant groups that tend to declare war against America. These groups were the terrorists and in regard to those, the phrase War on Terror was used and made popular by the military organizations of the US. Soon it became

Friday, November 1, 2019

Effect of Progressive Muscle Relaxation Techniques on Chronic Pain in Dissertation - 1

Effect of Progressive Muscle Relaxation Techniques on Chronic Pain in Cancer Patients - Dissertation Example As the discussion declares studies relating to methods of pain relief in cancer patients using alternative methods of pain relief, other than pharmacological-based methods, are inconclusive on the effect of relaxation towards alleviating pain. In view of the fact that pharmacological methods use is prominent among cancer patients, these drugs exposes them to serious side effects such as loss of effectiveness with time or even inadequate pain relief among other side effects. NPPRIs are complementary pain management approaches and they include cutaneous stimulation such as massages, transcutaneous electrical stimulation and cognitive behavioral such as relaxation techniques. Muscle tension is minimized through relaxation techniques as they create powerful distractions. Cancer pain relief through relaxation techniques such as PMR is gaining ground among patients. PMR, as a relaxation technique, may break the cycle of pain, anxiety and reduce muscle tension. This review will examine evid ence of PMR where it is linked to relieving chronic pain in cancer patients. Data will be mined from systematic literature and analysed so as to identify the role, effectiveness and degree onto which PMR techniques can be used to relief pain in cancer patients. According to the research findings progressive muscle relaxation, a non pharmacological pain relief intervention (NPPRI) technique, involves the systematic tensing and relaxing of skeletal muscles of the body. PMR may involve a few muscles for patients in acute pain in a clinical environment.