Saturday, August 31, 2019

Against School: A Corrupted System

The educational systems purpose is to prepare people with the necessary skills and knowledge so that they can excel and function properly in today’s society. John T. Gatto challenges that idea and begs the question is 12 compulsory years of standard schooling consisting of six classes a day, five days a week, nine months a year needed? Gatto refers to George Washington, Benjamin Franklin, Thomas Jefferson, Abraham Lincoln as they were not formally schooled and yet were very successful. According to Gatto’s, there are three main purposes to formal schooling, â€Å"1) To make good people, 2) To make good citizens, and 3) to make each person his or her best. † (Gatto 3) Gatto believes that the current educational system actually contradicts these three ideals. He claims that there are six basic yet specific functions that intend to hold back and limit the progress and overall success of a student. Of the six functions there are three serve specifically to limit and hinder a students progress. The diagnostic and directive functions, the differentiating function, and the propaedeutic function all seemingly serve to cripple a students success but when analyzed some do hold some truth but in the end they are merely irrational and ridiculous accusations made by Gatto. The diagnostic and directive functions are defined as a litmus test to test where a particular student â€Å"fits† in society based on grade percentages. These percentages are logged and stored permanently in our student records which are then passed on the post secondary schools to place students in their â€Å"proper societal roles† (4). During my freshman and sophomore years in high school I can not help but remember teachers classifying â€Å"ap† students and high academic achievers as those who were going to be â€Å"successful†. My math teacher often referred to more difficult questions as the â€Å"doctor† or â€Å"lawyer† question in an attempt to scale the difficultly of the question. What if one can not do the question? Does that mean that person should be classified as remedial or can not attain the success of a doctor or lawyer? Of course not, the simple idea of that is completely irrational. However, once reassessing and making them less extreme, Gatto’s diagnostic and directive functions can be found anywhere in the academic system whether it be perquisite knowledge for grade twelve programs or university entrance. While this function may seem absurd, Gatto’s differentiating function is one that can be related to actual everyday life. The differentiating function is a more practical function. It states that, â€Å"once a student’s role has been â€Å"diagnosed† through standardized testing, they are to be sorted by role, and trained only so far as their destination in the social machine merits. † (5) The functions practical use is especially seen in post secondary schooling where a more refined and â€Å"specialized training† takes place. We see this in any standard entry test for a specific program such as the SAT, LSAT or MCAT. Based on a students performance on these forms of testing they are then place in their respective programs allow them to focus specifically on areas of study that are important to them. At my old high school there was a standard entry test, SSAT, that examined various categories of schooling (math, reading, writing etc†¦) Depending on how you did on the test would determine not only whether or not you are eligible for acceptance but whether or not you qualify to take ap courses, because if u do not posses the proper knowledge taking a more advanced course would be counter-productive and in fact hurt your academic career. Once one has analyzed the differentiating function there is some truth to it but when one looks at the propaedeutic function, it is completely incorrect. The propaedeutic function is completely incorrect and misleading. According to Gatto, the purpose of the propaedeutic is to create a class of â€Å"elite caretakers †¦ taught to manage this project, how to watch over and control a population deliberately dumbed down and declawed† (5) He’s saying that those who already control the population are going to educate children so that when they grow up they can control the population and train more children to do the same. At this point it seems like Gatto is trying to throw something that is completely and utterly irrational out there trying to catch people off guard and hope to attract some followers. The simple thought that people were training young children to know how to manipulate people in such a way that they simply do not challenge authority and do exactly as their told to is ridiculous. At no point in my life have I ever felt that someone or an organization is trying to limit my personal abilities to comply with this absurd function. Teachers constantly enthuse student to be all they can and achieve as high as they can, not that its ok if u cant because we already got it figured out. While other of Gatto’s functions may have held some truth this particular function is completely incorrect Gatto believes that those who control the way society runs are trying to create a norm in the educational system. That student’s are pre-destined before they are given the ample chance to excel and achieve. Gatto explains that schools traditionally have three purposes: 1) To make good people; 2) To make good citizens; 3) To make each student find some particular talents to develop as best they can. These are all fine standards but because of government schools have become prison like even in there cell block style construction. Gatto’s approach is very liberal and has opened my eyes to certain matters especially the way that educational system is poorly constructed (with it being bases on grades) and how it is mismanaged leading to sub-par performance and disappointing â€Å"success† rates. It is this poorly constructed system and a corrupted way of running it is what I think Gatto was truly trying to revile.

Friday, August 30, 2019

Fourth Amendment Exceptions Summary Essay

The Fourth Amendment of the United States Constitution requires that no search or seizure shall be carried out unless a warrant has been issued. The exceptions are: searches with consent, frisks, plain feel/plain view, incident to arrest, automobile exceptions, exigent circumstances and open fields, abandoned property and public place exceptions (Harr, Hess, 2006, p. 219). Consent to search any property must be given by t actual owners or, as set forth in the United States v Matlock (1974) by a person in charge of that property. If, for instance more than one person owns a property, only one of those individuals must give consent. There are exceptions to that rule as well. Only commonly shared areas of that property may be searched (Harr,Hess, 2006). Take for instance a family living in an apartment which comprises of a husband, wife and sister to the man. The sister would give consent for common areas, such as the living room, den, kitchen, and bathroom, to be searched and she canno t give consent to allowing the bedroom of the brother and sister in-law to be searched. The husband, on the other hand, could consent to having the bedroom searched because it is there joint bedroom and is not off-limits to him. Other conditions on the searches incident to arrest exception include the use of force, the search of other individuals with the arrested individual, searching the vehicle of an arrest person, contemporaneousness and inventory searches â€Å"if a government agent has probable cause to believe the vehicle contains contraband or evidence of a crime without a warrant† because â€Å"in the time it would take to get a warrant, the car, driver and contraband or evidence could be long gone† (Harr, Hess, 2006. p. 231). The 1981 case of Robbins v. California saw the justifications for searching without a warrant. Those specifications include that the mobility of vehicles produce exigent circumstances.

Government Enforced Cyber Security, a Public Good? Essay

We all know that cyber security is something of great importance to anyone trying to protect their network assets, customer assets, and personal assets. The list of possible risks associated with neglecting to practice good cyber security are endless, and the dangers lurking out in cyber space too numerous to imagine anyone who is controlling any type of company network to ignore; but the question here is whether or not the government should become the cyber security enforcer not only within in its own government sector but also within the private sector as well as a public good. Before we get into the discussion of whether or not the government should play this role, I believe we should have a short discussion on what â€Å"public good† actually means. Generally speaking â€Å"public good† is a loose term used to justify some kind of action one is taking, by saying that it is in the best interest of the general population to do so. The implications behind the use of the term â€Å"public good† is that #1 the action is beneficial to a majority of the population; and #2 that the majority of the population is either too ignorant, or incapable for some reason of performing the action for themselves. The use of the term is also handy because it is non-specific as to WHO is actually benefiting from the actions; is it the general consumer, the small businesses, big businesses, the government, a special interest group, all of the above, none of the above, Who? Who is actually benefiting from the act? By using the term the â€Å"public good† one does not have to account for who is actually benefiting. Nor do they have to identify who might be harmed or negatively affected by the action either. Additionally by using the term that it is for the â€Å"public good†, by default the concept of how much will it cost, and who is going to pay for it, is seemingly automatically a non-concern. So by the very nature of the term for â€Å"the public good† the user of said term has attempted to write themselves a blank check, quantifying and justifying any and all actions they mean to implement and enforce. The term â€Å"public good† has been used by various entities throughout history to accomplish some of the most horrendous crimes against their people, and to extort unimaginable amounts of wealth and goods from their populations. Anytime the term â€Å"public good† is used to ask for justification for an action from any entity it should be immediately critically examined with a very find tooth comb to find what the motivations for such a kind gesture might be, as well as analyzed by a staunch accountant to find out where the money is, and where it leads in the proposition. The term â€Å"public good† more than any other term I can think of, is more often than not the very term used to lead more sheep to their own quiet slaughter then any war cr y ever has. It should always be approached with skeptism and caution when used, especially in conjunction with the word government. Is Enforcement of Cyber Security a Public Good? Should the enforcement of cyber security be considered a â€Å"public good†? This is a very difficult question to answer. In theory, on the surface, enforcement of cyber security seems like it might be a very viable public service. As viable as other protections offered as a public good such as the services of military and police protections. But then you begin to look a little deeper into the subject and you realize that enforcement of cyber security protections has many more layers then the enforcement of physical protections such as military and police. In order to enforce cyber security an entity would have to do much more than simply provide, train, and fund forces to patrol the physical areas that are in danger. Enforcing cyber security is much more akin to forcing a draft of military service on the general population and forcing them to pay for their own room, board, training and service expenses while they are in the military to boot. In order to enforce cyber security you must force each person who has any interaction with the cyber world, into becoming a cyber security guard, whether they wish to be one or not. Additionally you force any entity whether it’s a multi-billion dollar corporation, a single person running a business out of their basement, or a member of the general population at large trying to access the internet, into funding not only the physical equipment and software required to be a good cyber security guard, but the endless training and education expenses associated with it as well. It would be like an entity not only suggesting that people should have locks on their doors, but enforcing it with requirements for double steel enforced 12 inch wide doors with a minimum 3 locks on it. One of which had to be specialty ciphers lock, and penalizing those that do not have said door, by taking away their entire house. This â€Å"public good† if done the way it would be required to be done to actually be minimally effective, has now become a universal burden just like taxes, who’s only community quality would be the unified contempt the â€Å"public† would have for its enforcing entity and enforcement policies; very much like the contempt the general public has for the IRS. This all being said, I think it safe to say that calling the mandatory enforcement of cyber security a â€Å"public good† is about as accurate as calling the mandatory taxes we pay a â€Å"public good†. Most people when left to speak of their own analysis as to whether or not taxes are really something that is good for the majority of the public would tend to beg to differ. Should government enforce cyber security in the private sector? The government of the United States has many roles. Some of these are roles it was intended to have by the Founding Fathers, as written into the Constitution, and most others were assumed, inherited, given, or seized by some means still unknown to me. One of the proper roles of the government is to provide protection to its citizens by the creation and enforcement of laws that protect the people, ie..Murder is a crime punishable by death; and the creation of protection entities/forces such as police, fire, and military, to physically patrol the areas our citizens inhabit to protect the lives, and property that they own, which is inclusive of the land they occupy as a nation. These concepts were pretty cut and dry, although our congress still found a way to somehow muddy them; but until recently with the invention of the internet and cyber space it was pretty easy to tell where the borders of our nation ended and another’s began, and what constituted a criminal action against a nother person’s being or property. At least the common man could tell these things, lawyers, judges and politicians can be excluded from that statement. In cyberspace, there are no boundaries. The line of what to protect and what is outside the realm of required government protection is very gray. Therefore the government up until now has restricted its enforcement of cyber security to its own government networks. This level of protection is the proper responsibility of the government, because it is protecting its networks in the interest of national security. The department responsible for the protection of its citizens as well as national security is the Department of Defense. The past 15 years with the explosion of Information Systems the DOD has found that its workload and responsibilities have increased dramatically with the government use of Information Technology systems. In the past 5 years alone the cyber security workload on the DOD has more than doubled. Although the U.S. DOD is probably the most secure and efficient government entity in the world, it is far from ideal on levels of security, and it lacks the manpower and r esources to keep up with its own demands of cyber security implementations. I have worked in the DOD for over 10 years now, and can tell you first hand that security incidences occur daily, and the security risks to our government networks is a constant ebb and flow of action/reaction. Rarely does the department get a chance, have the time, or the resources to be pro-active instead of re-active. Ultimately as well, with the very best security technologies in place, even the government must remain dependant on the human elements to protect the networks, and information. The Wiki-Leaks internet postings are a perfect example of that dependency gone badly. It may or may not have been a technical mis-security that allowed that government employee access to all that sensitive data, but it was ultimately several human failures that allowed for that information to be posted on the internet. The failure of the trusted government employee to keep the information he was entrusted with secret, and the failure of how many internet web site owners to work at protecting sensitive national data of the country some of them were actual citizens of. The idea that the current DOD could even enforce cyber security in the private sector is not only laughable, but also an extremely menacing and terrifying concept. The government enforcement of cyber security in the private sector, â€Å"for the public good† of course†¦would be nothing more than a ruse to cover its real aim; which would be regulation of the internet, or to put it bluntly the control of the last totally unregulated vestige of free speech. Besides the obvious issue of lack of integrity behind its intentions there are numerous reasons why the U.S. Government should stay out of the business of regulating the enforcement of cyber security in the private sector. The government, as stated above does not actually have the time, or the resources to manage or enforce any other security implementations outside of itself. †¢ The government already spends most of its time in reactive mode on the security frontier; trying to find additional time to analyze or validate the security set ups of private sector companies as well would be near impossible. †¢ The government does not have the money. Funding for such things as IT equipment hardware and software upgrades is already spread extremely thin. Many times government offices and system are running on hardware and software that are years behind the current releases due to replacement funding issues. †¢ The government lacks the technical expertise in its ranks to be able to support or even audit / validate the security implementations in private businesses. Over 80% of the technical workforce working on government systems are contract workers, hired in because of the lack of security/tec hnical expertise in the government employee workforce. The government does not have within its scope the right to enforce cyber security implementation within the private sector. †¢ The government scope as outlined by the constitution is to protect its citizens against foreign attack on its own sovereign soil, as well as to protect its citizens from physical attacks and destruction of their private property within the boundaries of its nation. There are no boundaries to cyber space; therefore when a citizen of the U.S. chooses to enter into the boundary less area known as cyberspace, they are choosing to inhabit an area that is outside the scope of their countries ability to protect them. They do this at their own risk. If these same citizens left the safety of the U.S. and put themselves willingly into the middle of Egypt right now, they are taking their chances full well knowing that they are willingly giving up the safety and protection of the U.S. If they are taken captive, the U.S. will attempt to negotiate for their release, but it cannot, and will not guarantee it. If it can secure their release or do anything at all for them, it will, but many ti mes it can do nothing so far outside its jurisdiction; just ask Nicholas Berger, the American beheaded in Iraq several years ago. †¢ The government’s responsibility to provide protections to its citizens is a provision of protections that are within reason. Although the government provides police, fire, medical and military services to their citizens; I for one do not have my own personal police officer, or doctor escorting and to attend to me in case I should run into a mugger on the street or get a sniffle in the middle of the night. The services provided are broad, sweeping, and for the use of the general population to both reduce and deter its own population from being criminals as well as to protect and serve its own population. Cyberspace is not its own population. †¢ The government was never given authority to regulate business, in any way, shape, or form; not for the â€Å"public good† or for its own expansion. Not in the name of protections for its people, and not with its intent to create legal monopolies, or cater to interest groups. Regulation of any business interests, including the enforcement of cyber security on business networks is outside of what the government is supposed to doing, and a conflict of interest to the type of government that was originally established for the country which was a democracy. The government does not have the flexibility to efficiently enforce, and manage the cyber Security regulations and compliancy of the private sector, and in trying to do so, would only hinder the progress of the cyber security technologies industries, and protections implemented by the private sector. †¢ Cyber Security is a MOVING target. The government is a lethargic beast. Government bureaucracy consumes easily 60% of all the time, money and resources spent by the government. Time being the biggest issue on this point. Cyber security in order to be the most effective has to be able to be tweaked, re-configured, and updated as fast as your average cyber criminal can re-invent ways to penetrate. The higher value the data is that you work with as a company, the quicker and more flexible you must be to maintain a secure network status. An individual with little valuable data on their system does not need to be all that concerned with the security posture of their system. Not all systems, businesses, and networks can be considered the same, and each ones security posture is going to be based on the value of what they are trying to protect. All cannot and should not be regulated the same. †¢ Creating any type of tiered regulation for cyber security enforcement will add layer s of bureaucracy and therefore delays in actual implementation. Once again being counterproductive to the enforcement in the first place. Who is going to pay for the government to take on this further endeavor? I don’t know about you but I pay enough in taxes for useless programs, counterproductive government measures, misrepresented & abused government powers, and generally overall government meddling in the private sector, both businesses and personal. Even if they charge the businesses for their â€Å"services† the cost will ultimately end up on the general population. This is where the cost always ends up; and this will be no exception. What is the point of the government enforcing cyber security regulating the portion of the internet that runs through the U.S. internet gateways and DNS servers, when it has absolutely no control, or jurisdiction to control anything outside of it. All you would be doing is creating a black market for â€Å"foreign† internet feeds; creating yet another flourishing criminal market. Does â€Å"prohibition† – the very act that gave the organized mob their greatest power and fastest wealth windfall, or the more modern â€Å"war on drugs† that is only serving to create some of the most vicious cartel wars seen, why†¦ because the attempt to regulate and control it only serves to make it an even more profitable illegal industry. Shouldn’t the government stay focused on where it should be focused? Especially since IT has the largest network, with the most valuable and sensitive data in the country on it. Protection of this data actually falls within the scope and responsibility of the government, in the interest of national security. The data on its network actually does have life and death consequences to people. Very few other enterprises process data with such importance and consequence. So shouldn’t the government worry about its own house and worry about maintaining it; instead of trying to regulate the private industry which is not only outside of their scope of responsibility, but is also a project with so much less importance then their own. It seems insane to wish them to focus on anything other than their own networks, and data. The one exception would be for them to have a level of standards required of any business network that was allowed to connect directly to them. I am happy to report, these are relatively few. What would be the impact of government enforced cyber security in the private sector? There would be numerous impacts to the private sector if government tried to enforce cyber security regulations. Many I can name right now, and numerous I am sure would be unexpected results. †¢ The price for such regulation would ultimately fall on the average citizen to bear. †¢ The price for such regulation would drive numerous smaller companies unable to bear the cost (and also processing information not much worth hacking) out of business. †¢ The overall security posture for the private sector as a whole would be reduced- business that needed increased security then government standards would even out with businesses needing very little security carrying all kinds of security they don’t need. †¢ The rights of a business and the people to use their own judgment to decide the amount of security needed on their enterprises is once again diminished, and compromised, as well as them to suffer the consequences of misjudgments nullified. Building dependency on the government for critical thinking and analytical skills as well as basic survival skills is continued. †¢ A flourishing and profitable black market for â€Å"non-regulated† internet feeds is created. †¢ The integrity of the biased lean of the information being â€Å"regulated† through to the general population is immediately under question; resulting in further distrust of the regulating entity†¦ie government. †¢ Overall to both the businesses being regulated and the businesses that produce technology instruments and devices the impact would be negative. Should private industry have the responsibility to protect national security? Private industry has a duty to protect national security when it’s a situation that is a direct action to do so. For example, a company that processes government information has a duty to protect that information. A company that sells porcelain dolls has no responsibility to protect the national security. Just as they would not load up their employees with camouflage and weapons and send them out to a base to somewhere to â€Å"assist† the troops for a day every week, they don’t have a duty or responsibility to practice cyber security out on the internet like some kind of mercenary. It is good business sense for them to practice some level of cyber security that is appropriate to the sensitivity and value of the data they process but that is an act of self interest; and a show of good business intelligence. Not only does private industry not have a responsibility to protect the national interest by practicing cyber security, but once again should protect their own interests and leave the national interest to the appropriate experts. Only companies that process government information, or connect to government systems should be attempting to apply cyber security in the name of national interest. Those are the only people who have that duty and the only people properly schooled in the expertise to do so, and should have an interest to. Any other business or entity should remain concerned with their own business interests, or be brought under suspect for spying or espionage; they have no business being concerned with the national defense and should stay out of it. References: Tuutti , C. (2010, September 13). Cyber experts: espionage, apts, malware among most dangerous cyber threats. Retrieved from http://www.thenewnewinternet.com/2010/09 /13/cyber-experts-espionage-apts-malware-among-most-dangerous-cyber-threats/ Stenbit, John.P. Department of Defense, Command, Control Communications and Intelligence. (2003). Information assurance implementation (8500.2). Washington, DC: DISA. Bavisi, J. (2010, July 26). Biggest national security threat: cyber attack. Retrieved from http://www.foxbusiness.com/personal-finance/2010/07/26/biggest-national-security-threat-cyber-attack/ Dhamankar, Dausin, Eisenbarth, King, Kandek, Ullrich, Skoudis, Lee, R., M.,M.,J.,W.,J.,E.,R. (2009, September 09). The top cyber security risks. Retrieved from http://www.sans.org/top-cyber-security-risks/ Aitoro, J. (2010, August 17). Employees still pose biggest security threat, survey finds. Retrieved from http://www.nextgov.com/nextgov/ng_20100817_1347.php Bishop, M., & Irvine, C. (2010). Call in the cyber national guard! IEEE Computer and Privacy, 8(1), Retrieved from http://www.computer.org.ezproxy.umuc.edu/portal/web/csdl/abs/html/mags/sp/2010/01/msp2010010056.htm Clarke, R.A. (2010). Cyber war: the next threat to national security and what to do about it. New York, NY: Ecco.

Thursday, August 29, 2019

Write about ocean resource economic Essay Example | Topics and Well Written Essays - 1000 words

Write about ocean resource economic - Essay Example There are many types of fish found in the ocean thus making the ocean a source of food to a huge number of people. Fishing industry has extensively grown due to a lot of competition. However, individuals engage in fishing as a way of getting their food and others do fishing as a source of their revenue. For those people who engage in fishing for food are just do it for consumption purposes. However, for those people who engage in fishing activities for commercial purposes are industrial fisheries. Therefore in connection with the problem of unemployment is partially solved through the act of fishing. There are both skilled and unskilled persons employed in the fish industries that arise from the existence of the oceans. Therefore, fishing is a factor that leads to decrease in unemployment levels ((Acheson 1975). As a means of transport, oceans are a medium of transport by the use of boats and ships. This marine industry is a source of employment to a big number of people. Some people are self-employed while others get work in the harbors and others in the ships. Therefore, marine transport helps in reducing the levels of unemployment since quit e a big number of people get employed in the marine transport related sectors. Also, for the business persons involved in the business, they increase the level of tax income in a country and this revenue if used in carrying out a profitable project, and then other people get employed. Hence, marine transportation reduces unemployment both directly and indirectly. The ocean is a site for recreational activities for people during their leisure time. It has led to the coming up of the tourism industry. Many hotels have come up along the beaches of the oceans. Many people love having fun in different countries that have beautiful sites along the beach and a favorable weather condition. This is a source of employment for many persons either directly

Wednesday, August 28, 2019

Will You Sign the Constitution Essay Example | Topics and Well Written Essays - 250 words

Will You Sign the Constitution - Essay Example Thus, on the fact that the US constitution did not achieve its aim, I would not sign this constitution as there are some flaws in the US constitution that some Americans are actually using against their fellow Americans on the issue of slavery due to the comprises in the constitution (Levinson, 2006). If I had been in Independence Hall on September 17, 1787, I would have endorsed the US constitution. The reason for my resolve to endorse the constitution is not far-fetched. The fact that, I was opportune as one of the few elites to set America on the path of freedom is enough factor that would propel me to endorse this constitution. Though, this may seem rather sentimental, but the fact of the matter is that, I would be happy to be part of the people that would create a country that dwells on the ideals of freedom of equality. Thus, if I was in Independence Hall on the 17th of September, 1787, I would have endorsed this

Tuesday, August 27, 2019

Managing strategic change is fundamental to business success Discuss Essay

Managing strategic change is fundamental to business success Discuss - Essay Example Lewin attempted to explain organizational change by using the example of the physical changes an ice cube undergoes over time. He noted that if you have an ice cube that you want to change to a cone of ice, you melt the ice cube (unfreeze) then you model (change) the water into the cone shape you want by freezing the water (refreeze). By analyzing the change as a process, with specific stages, a manager can begin to monitor and manage the transition. Understanding the reason why the change has to take place is very important in any successful process of change. During the unfreezing stage, some factors have to be accomplished. The organization is prepared in order to accept the changes required. It entails breaking down the existing procedures and management strategies to facilitate the adoption of changes. An important aspect of this process is identifying and developing a good reason why the organization cannot continue in its current way of doing things. Pointers such as poor financial results, declining sales figures, negative feedback from customer satisfaction surveys can be useful in developing the message necessitating the need for change that other people can see, preparing the organization for the impending changes is necessary and the process begins at the center of the organization. Beliefs, attitudes, values, and behaviors that are currently held must be challenged to pave way for the implementation of the needed changes. This is the most problematic stage because by disrupting the way things are usually done, you destabilize people in the organization who depend on routine to perform their daily duties, which may evoke very strong reactions from the people affected. There is uncertainty created. Through challenging the organization to change, a controlled crisis is created that can be a tool for motivation in order to establish a new equilibrium where people are comfortable with the new changes. At

Monday, August 26, 2019

Assessment and Evaluation in the Work Place Essay

Assessment and Evaluation in the Work Place - Essay Example It is in the light of this that recruiters in such organizations must be conscious of the need for these diversity of skills and abilities and the most effective means of developing and utilizing them in the achievement of the aims and objectives of institutions such as the open and distance learning system (David). The present object of the study is to critically analyse and reflect upon your learning styles, skills, strengths & weaknesses, plan how you can develop them and learn from the experience. The study aims is to enable learning from the whole experience of work including a focus on learning generic skills and knowledge from the workplace. These include: understanding organisational structures, induction programmes, personal development and lifelong learning through reflection and critical analysis. The stakeholders of workplace include consumers, workers, managers, supervisors, and union officials, etc. who each bring their own perspectives and expectations. There are different types of workplace regarding various corners of life and various corners of working. The Coordinator position must be supported by the grant and/or match funds from the business and/or labor union. There are work places where students work for their academicals, workplace for workers who work for their profession. Our present concern is the workplace regarding students. 3. Difference of Assessment philosophy in the World Assessment methodology is differed in various regions in various respects in the world. Teachers often differ in the way they like to collect data. Some prefer to have a single checklist, naming all the students in the class (or in one work group) across the top and listing the criteria to be assessed down the side. The students' columns are then marked if a criterion is met. In this case some information would have to be transferred later to a student's individual record. Other teachers prefer to have one assessment sheet per student, which is forms part of the student's record. That sheet would list the factors for assessment down the side, but along the top might be a series of dates indicating when assessment took place. Such an individual file would illustrate development over the year. In this case, information might have to be transferred from the record to the official class mark book, as required. 4. Assessment in the Work Place Much research in education around the world is currently focusing on assessment and evaluation. It has become clear, as more and more research findings accumulate, that a broader range of attributes need to be assessed and evaluated than has been considered in the past. A wide variety of ways of doing this are suggested. Assessment and evaluation are best addressed from the viewpoint of selecting what appears most valid in allowing students to illustrate what they have learned. Time management in the workplace is great resource for employees to help manage their daily activities. This article

Sunday, August 25, 2019

CHOOSE ONE QUESTIONS FROM FOLLOWING QUESTIONS ON THE INSTRUCTION LIST Essay

CHOOSE ONE QUESTIONS FROM FOLLOWING QUESTIONS ON THE INSTRUCTION LIST - Essay Example Globalization basically involves exchange of ideas, labour forces, knowledge, products and services internationally. Globalization exploded in the 1980s with the advances in internet and telecommunication infrastructure which made it easier for people to travel, communicate and do international business. [2] Capitalism refers to an economic structure that allows people to put their private property into use however way they want with little interference from the government. It can also be referred to as a free-market system.[5] Under this free-market structure, people are at liberty to work and undertake jobs of their own choice, buy and sell products from or to whoever they wish or consume a service from a service provider of their own choice. The domination of finance capital over the export of commodities constituted the world’s major features of new age. ... This was fuelled by the fall of the Berlin Wall followed by the dissolution of the Soviet Union that led to freeing of over 400 million people from closed economies. These fall of communism led to a free market and economy hence globalization. This led to countries to stop depending on imports hence formulation of trade and economic policies that aimed at advising that a country can increase its wealth by encouraging local production and few imports. However this failed and most countries resorted to globalization in order to promote capitalism hence welcoming foreign investments and opening their markets. [7] Its capitalism that gave birth to the current modern states and economies. The economics of capitalism was defined by the political structure and its social relations. Therefore globalization in modern day operates in a manner that it is undermining the national state in which it originated from. This therefore brings out the difference between third wave globalization and seco nd wave imperialism. The impact of the speeds and carrying capacity of digital telecommunication networks has led to capital to spread globally. This has changed the whole way in which production of goods is carried out and also how wealth is created. It has also created a new international legal structure, redefined sovereignty and how states control economies and also helped in the restructuring of the labor force and brought the ideologies for international free markets. [6] Globalization and revolution of information has not only affected the movement of capital but also it has affected the ways in which production is carried out and these produced goods are sold. Therefore transnational corporations have responded to the accumulation crisis by setting world market strategies. With the

Saturday, August 24, 2019

Global Development Politics Policy Brief Essay Example | Topics and Well Written Essays - 1250 words

Global Development Politics Policy Brief - Essay Example How can the international society continue to maintain sustainable development of its population without inducing further effects of climate change? This question continues to remain a nightmare to experts in environment and economist, alike. Experts mandated to ensure practical climate change policies face this similar challenge. The policy options identified, discussed and proposed include applying costs and benefits analysis exhibition to the public. This, in turn, would inform the public on the effects of climate change on health and environment including the economy. Analysis and exhibition of climate change effects would evoke initiatives for early mitigation of climate change among the population. The second proposal is to ensure reduced level of emissions, on a global scale, would help address climate change. These include agreement on acceptable amount emitted by countries (Posner & Weisbach 2010, p.3). The third proposal is to find means that would change the human behavior and help reduce human causes of this global environmental threat. To sustain the ever-escalating human population growth rate and the ability to support their demands for natural resources, without inducing climate change-causing processes, we recommend initiatives that would correct human norms and behavior to control development. Situation brief Why should the world address climate change? The apparent pursuit to implement sustainable development raises concerns on the necessity to have a succinct policy regulation that control developmental effects. World organizations including institutions sets up by the United Nations face the challenge of ensuring developments that guarantee an uncompromised future. Climate change is among the major challenges that are at the focus of issues that call for redress and attention from the world community, through a united approach. Most conventions and treaties set by international bodies, since the 1972 meeting at Stockholm have climate change as one of the priority challenges. The scope of climate change implications on diverse sectors including the economy, food production and health makes it a grim issue that is better when addressed than left to escalate. Noteworthy is the concern that climate change implications are not region-specific but a matter that is all-inclusive of the entire world society. Scientists point at an alarming change in world temperatures and an anticipation of potential increase in ice melt rate. What are the challenges to existing climate change control policies? Existing policy initiatives to control the rate of emission have little, so to say, effectiveness. The policy frameworks available to suppress over emission from development activities, in developed countries especially, have failed. The carbon credit initiatives tend to assure the world population of insignificant influence and effects. Climate finance is another unsuccessful idea that has least impact in controlling climate change. T he current situation calls for a workable framework that would leave the world population staying in a clean atmosphere that is free of contamination and related effects. The high extent of uncertainty in predicting possible impacts of the alteration of world climatic conditions is the key threat to existing policies. Policy discussion Climate change economists

Friday, August 23, 2019

Exploration Of Neptunes Moon Triton Essay Example | Topics and Well Written Essays - 750 words

Exploration Of Neptunes Moon Triton - Essay Example The presence of the geysers brought ideas that the interior of the Triton id probably geologically active. ("Neptune's Moons") The interior of the moon may have been warm enough at one time to contain a liquid layer just under the surface. And just as the Earth's case, there are some creatures that can survive in very cold water such as those living creatures under the ice of the North Pole. ("Life") On the other hand, since Triton is located inside the magnetosphere of Neptune, which is very harmful to life, the speculations have altered. But the presence of Nitrogen in the atmosphere is believed to be a waste product left behind by life forms. Its presence in Triton's atmosphere only makes the speculations of the presence of life forms in the Neptune's largest moon even stronger, provided that the interior is warm enough that may just be enough for living creatures under the icy surface of the moon. ("Life") Map surface temperature and composition of Neptune's moon Triton. ... Other elements found in its atmosphere may aid in finding out the questions for determining the distribution of volatiles and major photometric units on the moon. ("Mapping") Characterize the surface geology and morphology of Triton. The surface geology and morphology of the Neptune's moon Triton will allow scientists to discover its physical structures. Geological and morphological features found in its surface may help find out whether there had been creatures that were present in the satellite. Characterize the neutral atmosphere of Triton. Finding out the neutral atmosphere of Triton as well helps identify whether it could sustain a life of a creature that may have lived in the moon.

Thursday, August 22, 2019

Law In Practice - University Level-3-CIVIL PROCEDURE Essay

Law In Practice - University Level-3-CIVIL PROCEDURE - Essay Example ct 2007, states that a solicitor cannot act for two or more clients where there is a conflict of interest between them or a significant risk of such a conflict arising. Conflict of interest would arise in case the firm is responsible for the case of both the parties that is Mr. Bragg or Mr. Johnson in relation to the RAT or any related matter. A check should therefore be carried out and assured that the firm is not representing Mr. Johnson either in this case or any other case as a matter of fact.1 But from the file it looks that there is no conflict of interest and a note to this extent will be made in the file. Section 24 A (2) of the Limitation Act lays down the limitation period for claims for damages for personal injuries arising out of negligence, nuisance or breach of duty. The limitation period is the later of: In this case the accident took place on 12th April 2007 and based on Section 11(4) Chapter 58 of the Limitation Act 1980 (as amended by the Latent damage Act 1986) the time for calculation of the limitation period began to run from the date the accident took place. The limitation period for this accident is 12th April 20102. Thus Mr.Bragg can be given an assurance that he still is within the limitation period to make the claim. After the file is studied properly it is clear that there is very little time on hand for the limitation period 3 within which the procedure has to be started. But there is no evidence in the file with regard to the fact that any application is made to the court4 for extension of the limitation period so that the documents and other evidences supporting the case can be accumulated. Also time is required to carry out the pre-action protocols with regard to the personal injury claim. In the event the claim is barred by the statute and refusal on the part of the court for extension of the limitation period then under such circumstances the client can sue the firm for negligence on its part. The driver Mr. B. Johnson was

Oil and Fuel Prices Essay Example for Free

Oil and Fuel Prices Essay Since 1980s, the price of fuel and oil has assumed an upward trend. The price of crude oil per barrel was being sold at 40 dollars. In 2007 it was 92 dollars and in February 2008 the price per barrel hit 103 dollars. The rise in oil and fuel prices has led to the rise in the living standards as most commodities are either directly or indirectly affected by it. Many items that are used in our homes are the products of petroleum and those that are not are affected in that the transport cost go high when the price of oil and fuel go up. Though the price of oil has always been on the increase, the recent soaring of these prices had risen to the levels of concern in America as well as to the rest of the world. In June 2008, the price per barrel in USA cost 142$ a figure that has never been witnessed before in the history of oil prices. Why is it that the price for oil and fuel is always increasing, what are the factors that have led to the rise of these prices? This is what this paper will mainly focus on. There are various factors that are attributed to the rise of oil and fuel prices and one of them is the ever growing economies for Asian countries like China and India. As the economies of these nations grow, they demand more energy than before thus causing the demand for oil to go up. Oil demand in China is growing by eight percent annually since 2002 and this is a double to the rate prior to this period. As nations become developed, more industries are built that demand a lot of energy to run them also many people are able to buy vehicles that consume a lot of oil thereby leading to the rise in the price of oil and fuel. (Williams. J. L. 2007) The other cause of the rise of oil and fuel prices is rate at which oil is supplied by those nations that are responsible. If the demand for oil is higher than the rate at which the oil is being supplied, what results is the rise of oil prices. This is what is known as the market forces that control the price of the product or simply the law of the market. Of late, the amount of the oil that is being produced by OPEC has been on the decline and the causes for this problem are many and complex. Some countries have deliberately decided to cut the amount of oil they produce so as to save their oil wells from being depleted. Those countries that are threatened by oil depletion, the cost of production goes up because when the level at which the oil is found deepens it becomes hard to extract it. This has a domino effect as the burden of meeting this cost is placed on the consumers so; if the production cost is high then the price of oil and fuel goes up. (World Bank, 2000) In as far as that some oil producing countries might be experiencing oil shortage, the theory might not be hundred percent true as it is not the sole cause for the rise in oil prices. There are other factors that have contributed to the rise in these prices. Political turbulence in the Middle East has also contributed to the oil shortage in the world. When US attacked Iraq in a bid to terminate the regime of Sadam Hussein, the rate of oil production was affected because the state was subjected to a state of anarchy. This affected the world’s oil prices immediately. The same was witnessed in West Africa and to be particular in Nigeria where the rebels targeted the oil companies and the pipelines. Also in Venezuela strikes, civil unrest and political turbulence hampered the normal production of oil in 2007. All these factors leads to the low supply of oil globally something that causes the rise of oil and fuel prices. This adds weight to the fact that it is the forces of the market that determines the price of the commodity. The price of oil in the United States of America varies from place to place for example in the West Coast, the price of oil is higher than that of the Gulf Coast regions which enjoys much lower prices. It is believe that the difference depends on whether the infrastructure of that region or country are good and more particularly the pipeline network that makes it possible for oil to be transported easily and fast. The other reason that is put forward is the manipulation of prices by the suppliers for example, California has a big population and this means that the rate of energy consumption is very high. The problem that faces California is that there is no competition among the oil companies as far as oil supply is concerned so, what these companies do is that they manipulate the oil prices to suit them. They cause an induced oil shortage leading to increased prices. (World Bank, 2000) Though reasons such as increase in oil demand, environmental issues, weather changes, depletion of oil reserves and poor price control mechanism especially by OPEC has been blamed for the rise in prices. Political turmoil in the Middle East, in West Africa and in Venezuela and the reduction in oil supply could lead to the hiking of prices, there are still other reasons that could lead to the same for example, in 1972, the price per barrel was three dollars but by 1974, the price had already doubled. The reason for this was not necessarily the political disturbance in the Middle East because the United States decided to support Israel but the reason was that the Arab countries whose majority are the main oil producers, got angry by the US move and decided to cut the amount of oil they produce in the normal circumstances. In response, the Arab nations placed an embargo against the United States and its allies infact they decided to cut the amount of oil they produce by five barrels per day. This move has adverse effects on the oil economy as it led to the oil shortage in the world and in turn the rise of oil prices. Associated press, 27th 2008) Whenever oil and fuel prices go up, the Organization of the Petroleum Exporting Countries (OPEC) is held responsible by politicians and the media. According to Clough, (2006), OPEC is not in anyway responsible for this as its role is to stabilize the price of oil by making sure there is availability of oil in the market by regulating the de mand and supply. The other problem if it not lack of competition among the oil supplying companies, is the merging of companies. In USA companies joining together for better service provision are allowed but the problem is that these companies become a formidable force that exploits the consumers for in US, there are five mergers which are among the biggest in the world and they control 62 percent of oil in the market. These are companies such as Conoco Phillips, Exxon Mobil, Royal Dutch-Shell, BP Arco and Chevron Texaco. Because of the part of oil they control in the market, they alter prices the way they want or in other words, they form a cartel that no other person can challenge. This dramatic increase in the control of the top five companies†¦makes it easier for the oil companies to manipulate gasoline supplies and to intentionally withhold supplies in order to drive up prices. †(Clough, RG. 2006, 32) To conclude, the tensions that were experienced in Turkey in 2007 and the destruction of pipelines by the leftists could also be contributory factors to the rise in fuel and oil prices but the cur rent rise in oil and fuel prices is not necessarily as a result of political instability but it is also believed that the growth in Gross Domestic Products (GDP) of many nations leads to high oil demands. This is because, as the economy of a country improves, people are able to buy cars and therefore the demand for oil due to increased transport. The prices of fuel and oil are projected to rise to greater heights if the demand for oil by the developing nations continues in the same trend. Political instability in the Middle East is also leading to this problem and if peace would prevail, then the prices would tremendously come down.

Wednesday, August 21, 2019

Mount Rainier National Park

Mount Rainier National Park Mount Rainier National Park is placed basically in west central of Washington around forty eight miles southeast of Tacoma, WA. The park is roughly a one to two hour drive from Seattle, Yakima as well as Tacoma, also Washington and Portland, Oregon. In addition, the Nisqually Entrance, found on the southwest side of the park on Stateroad 706, is open year round. Other park roads are actually open just in the time of midyear months. Mt. Rainier is one of United States most vigorously gone to national parks also, pulling in more than two million travelers a year. This is expected not just to the astounding nature of its landscape additionally to its nearness to the significant populace focuses in the Puget Sound territory of western Washington State. It is found around ninety five miles from Seattle and seventy from Tacoma. Around 3.3 million individuals live inside three hour drive of the park and around 1/2 of the parks yearly travelers are from the area of Washington (John, 2007).. In excess of two million individuals visit the park every year. Among the unmistakable individuals who have gone to the park are three presidents- Firstly, Theodore Roosevelt in year 1910, secondly, William Howard Taft in year 1911, and last Harry S. Truman in 1945. With its grand summit pushing up into the sky and its enormous ice sheets cutting its flanks, Mount Rainier commands the Pacific Northwest. Perceiving the picturesque quality of this sublime mountain and the excellence of its high glades and of the virgin forests that encompassed it, I really inspired from these features but my most favorite feature about this park is the ice on the slants of the mountain. There are twenty six named icy masses on the flanks of the top. This is the biggest glacial mass framework on any crest in the America. As far as my experience with Mt. Rainier Park before doing research is concerned, I thought that it would be a far flung area and could not be easily accessible. I was also of the view that it would be a dangerous place for visitors so one should be careful while visiting it. But its beauty and climate really attracted me. Despite the fact that the park is widely acclaimed for its expound wild flower shows, the vegetation of Mount Rainier National Park is surprisingly assorted. Climate and rise change incredibly in the park, making an extensive variety of environments supporting a far reaching number of plant species. There are in excess of eight hundred and ninety vascular species and more than two hundred and sixty non-vascular plant species and organisms in the park. There are more than hundred fascinating plant species, particularly along transportation halls, close trails, and in riparian regions. (U.S. National Park Service, 2014) More or less fifty eight percent of the park is secured by woods. Low rise forests are circulated from the parks limit from seventeen (1700) hundred feet to twenty seven hundred (2700) feet height and are overwhelmed by western hemlock, Douglas fir, and western red-cedar. Mid-rise forests reach out from 2,700 feet upward to four to six thousand feet height relying upon angle, and contain Pacific silver fir, Alaska yellow cedar, western white pine, and respectable fir. Above around 4,500 feet, high height forests are portrayed by subalpine fir, mountain hemlock, and Alaskan yellow cedar (U.S. National Park Service, 2014). Whitebark pine and Englemann spruce are available in drier destinations on the east side of the park. Timberland ages range from youthful stands (short of what hundred years of age) to old-development stands thousand or more years old. The young stands can be found in regions of unsettling influence, for example, zones cleared by flame or trash streams, or recovering moraines and other uncovered land deserted by subsiding ice sheets. The meadows are a most loved exhibition for park travelers, who group to the mountain to see the showy wild flower showcases blossoming in the meadows. The sub-alpine glades can be shrouded in snow well into the month of June if not later, driving the wild flowers to blossom forcefully keeping in mind the end goal to exploit the short developing season. The short season additionally influences the kind of plant groups found in the meadows. A rise contrast of more or less thirteen feet makes a mixed bag of natural surroundings and life zones in Mount Rainier that stay secured. Youll likely see diverse creatures at every life zone change. This difference accommodates an expansive arrangement of spineless creatures, warm blooded animals, fowls, fish, creatures of land and water, and reptiles. The seasons and rise assume an enormous part in figuring out where you may best discover wildlife. In summer, chipmunks, chickarees, ground squirrels, marmots, and pika are regularly seen warm blooded animals (U.S. National Park Service, 2014). Clarks nutcrackers, ash jays, Stellers jays, and ravens are ordinarily seen feathered creatures. Deer are often seen, however dark bear, elk, and mountain goats are trickier. Search for elk on the east side of the park in September. The shade of dark bear may be tan, brown or blond, and to see one is an uncommon treat. Mountain goats stay near the high nation precipices. The profoundly obvious Columbian dark tailed deer, Douglas squirrels, loud Stellars jays and normal ravens are creatures that numerous individuals recall. The most various and plenteous creatures in the park, be that as it may, are the spineless creatures, the creepy crawlies, worms, scavengers’, insects to name a couple of that involve all situations to the highest point of Columbia Crest itself. At Mount Rainier you can discover sixty five well evolved creature species, fourteen types of creatures of land and water, five types of reptiles, 182 types of winged animals, and 14 types of local fish. Spineless creatures presumably speak to 85% of the creature biomass in the park. About fifty percent of the fowls saw in the park settle here and a lot of people are vagrants that winter in the southern America or Central America (John, 2007). Inhabitant creatures of land and water can be found in both amphibian situations or ashore and reptiles are commonly found in upland living s paces. A portion of the more well known warm blooded creatures like elk and dark bear go in numerous territories all through the mid year. Mountain goats commonly stay in elevated or sub-alpine life zones. Climate designs at Mount Rainier are emphatically impacted by the Pacific Ocean, height, and scope. The climate is by and large cool and stormy, with summer highs in the 60s and 70s. While July and August are the sunniest months of the year, downpour is conceivable any day, and likely in spring, fall, and winter. Travelers ought to be mindful that mountain climate is extremely alterable (MRNPA, 2014). Wet, frosty climate can happen whenever of the year. Albeit late-July and August are for the most part the driest and hottest time of the year, summer can likewise be wet and cool. Snow will stay at the five thousand to eight thousand feet height well into mid-July. Mount Rainier can rule the horizon for hundred miles before you achieve the park named after it. At about three miles in stature, Mount Rainier is the tallest crest in the Cascade Range; it overshadows six thousand-foot encompassing summits, seeming to buoy alone among the mists. Mount Rainier may be the center piece of the national park; however it is barely the main fascination. Here, short of what three hours drive from Seattle, you can walk around apparently unlimited fields of wild flowers, listen for breaking ice sheet trash, meander among trees more than a thousand years of age (U.S. National Park Service, 2014). The parks helpful area, be that as it may, additionally prompts weekend congested roads, both summer and winter, and certifications you organization on prominent trails. Mount Rainier is the posterity of flame and ice. Still dynamic, it was likely conceived more than a large portion of million years prior, on a base of magma heaved out by past volcanoes. Magma and slag surged out of the youthful well of lavas vent a large number of times, filling the neighbouring galleys’ and developing a summit cone, layer by layer, to a tallness of around 16,000 feet. Indeed while Mount Rainier was developing, ice sheets cut valleys on and around the mountain (John, 2007). The 25 noteworthy ice sheets/glaciers here structure the biggest accumulation of lasting ice on a solitary American crest south of Alaska. Mount Rainiers summit disintegrated about whether, yet emissions in the most recent two thousand years remade it to its present tallness of 14,410 feet. The mountain last emitted around a century prior. There are in excess of sixty named paths on Mt. Rainier. The Disappointment Cleaver or Emmons Glacier paths are two of the most well known by a wide margin and the straightest forward. An alternate standard course is the Gibraltar Ledges. You pick up very nearly 9,000 from trail head at Paradise inside the Park to the summit and spread eighteen miles round-trek. Each course to the summit obliges protective cap, crampons and an ice hatchet (the base meaning of specialized) in addition to setting out restricted up because of chasm risk (John, 2007).. A not very many climb solo. You must be in top physical condition with an amazing mentality to remain on the top. Likewise it respects have some fundamental experience added to you repertoire with lower mountains and snow trips to make your experience more charming. It is concluded that Mount Rainier National Park is a position of the cool air, the curious and snow capped glades, the lofty and tough landscape. It is an exceptional spot, loaded with numerous common marvels. From the thick, thick, old development forests, to the high, windswept mountain inclines. The mountain is beautiful to the point that simply gazing at it is an action in itself. The climate is very nearly like tundra. With the frosty, dry air, and the sun high in the sky, is appears to be as though the sun gives off no hotness. As one navigates the rough incline, he at last achieves the highest point of Burroughs mountain. One likewise gets a glance at the mind boggling glacial masses. My opinion about accessibility to the park and safety was incorrect that there are about sixty routes to the park. There are also several measurements available in order to ensure safety to the visitors. The Golden Access Passport is a free pass accessible to all perpetual American occupants who are qualified to get government advantages focused around inability, whether you are really accepting them or not. This pass entitles the bearer, and prompt family or going hand in hand with travelers in a private vehicle, to free admission to all American National Parks, Monuments, Forests, and Historic Sites, and reduced cost outdoors. Apply in individual at any National Park Service or United States Woodland Service region (MRNPA, 2014). Albeit a considerable lot of the created ranges at Mount Rainier National Park originate before laws obliging completely open offices, the organization is attempting to protect that all park travelers have the chance to experience and appreciate the park. Explorers and mountain climbers ought to be arranged for evolving climate. The prime climbing time is from late May to mid September. However a few specialists climb it year round yet these climbers have huge amounts of experience. Climate can simply be an issue, even in midsummer it can snow, rain or hail whenever. Give careful consideration to climate conjectures, one day and long range, torrential slide warnings, and extraordinary climate alarms. Have additional apparel, downpour gear, and a tent for assurance against storms at whatever time of the year. Know the climate conjecture and arrangement your outing likewise. References: United States. National Park Service. Mount Rainier National Park (U.S. National Park Service). National Parks Service. U.S. Department of the Interior, 31 Oct. 2014. Web. http://www.nps.gov/mora/index.htm>. John William Uhler. 2007. Mount Rainier National Park National Parks. National Parks. Web. http://www.mount.rainier.national-park.com/>. MRNPA Home Page. Mount Rainier National Park Associates. Web. 9 Nov. 2014. http://www.mrnpa.org/>

Tuesday, August 20, 2019

Qualities And Philosophy Of Leadership In Nursing

Qualities And Philosophy Of Leadership In Nursing The first quality of a good leader is that he has passion for the craft and challenges me to be the best that I can be at whatever I am going to do. If things are made easy or handed to you, you wont work as hard to accomplish it. You are already aware of the outcome and it is always in your favor. A good leader challenges your highest level of your ability and always expects the best from you. He wants you to put your best foot forward and rewards you when you have done your best. A good leader always sets a good example because he leads by example. If your leader is unprepared, unmotivated, has no confidence and has lost his passion then you will be the same way. Your leader always needs to be #1 because he wants the same determination from you. A good leader finds ways to keep his team motivated and you will always benefit from his experience. A good leader always offers a complete explanation of the job to be done. He always offer clear and consice directions so that you will do a great job the first time. A good leader always wants his team to be successful with every task because that reflects back to him. Some of the traits of a good leader are that he is always visible. In order to provide strong leadership he needs to have a strong visual presence with the workers. They need to see him in the middle of a task working along side them getting the job done. He needs to be available for questions, comments and just general discussions. He needs to always be in the forefront so that the followers can have him at their disposal when needed. Another trait is that a good leader always needs to be consistant. Dont be a bully one day and try to be friends with your followers the nest day. Changing styles only confuses the followers. . Stick with one style of leadership. Those who look to you for leadership must know what to expect, that is consistency on a daily basis. Also, make decisions consistently. It is so important not to let your personal feelings cloud your decisions. Stay focused on the situation or issue, not on any one particular person. Many times we are more connected with some workers than others. Never let the work relationships change your response. Treat all employees equally and with the same amount of fairness. Always treat employees with the same amount of respect, showing favoritism makes you a terrible leader. Enforce the rules fairly. Try to always include employees in finding better solutions to problems. A good trait of the leader is to ask open ended questions, asking questions is always a great conversation starter. When you include your followers it always makes them feel like an important part of the team. Always encourage suggestions for improvement and changes that will set your team apart. The leader improves the team by listening to them, discussing and challenging their skills and complementing on a job well done. Set the tone for the work environment. An optimistic attitude from a leader can excite and motivate the team to always do the best job they can do. Confidence is contagious; so is having none. Employees feed off the tone that leaders set. A good leader is an encourager and always says well done or thank you when the job is finished. Many times leaders make mistakes, they are human beings just like everyone else. They arent perfect and will make many mistakes. But a good leader says, I made a mistake. Every team member will have more respect for the leader if they are always open and honest about all events. Honesty is always and forever the best policy. Leaders make the mistakes of sometimes putting business before people. Being insensitive and having a I am the king attitude, recognizing the outcome when it is good and not the people who do the work. My preceptor Mrs. McKenzie is a wonderful leader. She is always ready to teach you something new and has the confidence that I will do a good job. She is a good leader because she doesnt have the Im the teacher, youre the student attitude. She is always open to suggestion and the many questions that I have for her each and every time I am in clinic. When there is a code or another stressful situation she never looses her cool. She is full of useful information for both myself and the doctor. Ms Angela who is the charge nurse that is over the ER, now when I first met her she seemed cold and stuffy but once you see her in action she wants the students to be involved in all aspects of patient care. She even informs the MD on duty that they have a student and makes sure you are in the middle of everything that come thru the ER. The positive traits I noticed on my clinical rotation is that all the floors I have been on are all about team work. When a new patient comes in no matter whos patient it is all the nurse converge on the room and make sure the core nurse has all she needs. One nurse starts the IV, one nurse disrobes the patient, one nurse applies the ECG leads and the other starts the initial assessment along with the vital signs. As the student if you dont move fast you will miss out on everything. Students needs positive roles models and positive feedback to make sure that what they see in their nursing rotations make them a good nurse throughout your entire career. Many things make you a reliable nurse but I believe proper training and education plays a large role in being able to perform effectively, thus increasing reliability. The negative traits that I have observed is that some nurses dont want to have a student or a oriente for that matter. They forget that at one time they were a student or a new nurse on the job. They just want to have less intereference as possible to make their day go by. You are not allowed to ask them any questions or be in their patients room. I observed nurse not always using the proper techniques for different duties around the hospital. They are not washing their hands between patients, they arent using sterile technique when necessary and sometimes just over looking hospital protocol all together. The one negative trait that I will never possess is that I will never be a nurse because of the pay, I will always be the kind of nurse that loves nursing and that is why I do it everyday. I will never forget where I came from and treat someone like they are less than me because they work in a different area than me. I will never be the type of nurse that speaks negatively about a MD or a nurse in front of the patient or anyone else for that matter. More than likely I am a transformational leader. I work well with others, I have been trained and highly motivated with everything I do. I love to see people do well under the title that they work. I always try to be a good example and promote nothing but positive attitudes in the work place. I provide the guidelines and would allow the employees to do what they do. I like this style because it utilizes the skills that you know your employees already have, it makes them into their own leaders. My peers come to me for advice on a daily basis because they know that I really have a No-nonsense attitude when I am working towards something. I offer strong but friendly words of advice and never sugar coat anything to them. When a plan needs to be made normally I am the one who implements the stages. To my friends I am a strong leader because I get it done and take no excuses. Now will that make me a good RN? I hope so, but time will tell. A RN has to be a strong selfless leader who never turns down a challenge unless it is unsafe for the patients. Always ready to give the right information when needed and always learning new things everyday. How was your day as team leader? As a team leader, it wasnt anything different for me. I had a job to do and got it done in the safest, quickest manner it could be done. What is a true team leader? As stated by Wikipedia ,A team leader or team lead is someone (or in certain cases there may be multiple team leaders) who provides guidance, instruction, direction, leadership to a group of other individuals (the team) for the purpose of achieving a key result or group of aligned results. The team lead reports to a project manager (overseeing several teams). The team leader monitors the quantitative and qualitative result that is to be achieved. The leader works with the team membership The nursing profession is no different than any other profession when it come to leadership. Leadership is critical to managing patients toward optimal clinical outcomes. Changing patterns of care delivery and constrained resources require nursing leaders to be responsive, demonstrate flexibility, and hold what Kantor describes as the C skills: know the concepts and principles of leadership, demonstrate competence in the role of leader, and make the interpersonal connections needed to be successful in the role. 1 Mergers, flattened organizational structures, and increased spans of control have resulted in heightened nurse executive role expectations. The literature reflects the call for extraordinary nursing leadership, with articles describing the importance of leaders incorporating multiple theories into practice, including transformational leadership, organizational empowerment, and care-centered governance. What did you learn? What is your personal philosophy of leadership? I believe that nursing is a profession when using the criteria that Pavalko used to define the eight dimensions of a profession. I plan to show that nursing has relevance to social values, education, self-motivation, a code of ethics, commitment to life long work, a theoretical framework, and that there is a common identity. Additionally, I will discuss how the ADN prepared professional nurse has many roles, such as a caregiver, teacher, advocate, manager, colleague, and expert. It is my opinion nursing is a remarkably rewarding profession that consists of various obstacles that are triumphed over in order to pave the way for a rewarding and honorable future. There are many significant achievements accomplished by nurses in todays society including the values instilled in our social lives, as well as the education attained by individuals in order to seize the ability to give great care to the community. I believe it takes a unique type of person with a great deal of motivation and ambition to be capable of performing as a caretaker for others. It is crucial to believe in what you are doing by always using superior judgment, and by following the Code of Ethics in each decision you make in your working institution or at home with friends and family. Using the term Career in regards to nursing seems to be an understatement of my outlook on this astounding health care position, I have always considered this opportunity as a permanent gratifying commitment not on ly to myself, but to all of those whom rely on my specialized training and care for their well being. Although maybe not suitable for each person, nursing is a profession of choice for general public to apply themselves to if they so desire. There are numerous different regulations and system policies the nurses adhere to in order to maintain safety and quality care for all people. I believe nursing colleagues may be able to unite as one group with the same values in their trade in order to work harder on leading by example, and following each others strategies as well; furthermore, overcoming the obstacles of modern day traditional standards and excelling beyond the current generations outlook of the nursing profession. Nursing leadership and management is crucial in the foundation of nursing care. There is a direct correlation between leadership and quality of care. Poor nursing leadership leads to poor patient outcome and, inversely, good nursing leadership leads to excellent patient outcomes. I believe that a profession has a commitment to a lifelong work because you get involved in your establishment. It is very hard for me to think of leaving the nursing field, or the hospital I work in now, because there are so many people relying on me for my knowledge of this hospital. I have grown attached to those I work for and with. The rules of this hospital differ from others and after familiarizing myself in such depth here I could not just leave in hopes of finding another place to be so comfortable or appreciated. However, in todays generation many nurses do not feel the same way. There are many nurses that choose to work short term in one hospital and then leave to work in another facility. Due to this constant battle for hospitals and other health care provider facilities to keep continuous adequate nursing staff, the United States has had to find other means of populating our health care systems. For instance, According to the American Hospital Association, 17% of hospita ls recruit from abroad to fill nursing vacancies. New Trends in foreign Nurse Recruitment, Texas Nursing Voice, April, May, June 2008.

Monday, August 19, 2019

Cell Matrix Adhesions and Fibroblast Essay -- Biology

Missing results figures How are cell matrix contacts regulated? The two papers explained in this website: "Regulation of protrusive and contractile cell-matrix contacts" and "Dynamics and segregation of cell-matrix in cultured fibroblasts" explore both the types of cell matrix contacts and the interactions between these contacts in many different bodily cells. Cell matrix contacts are parts of the cell surface where specialized adhesion receptors in the membrane attach to the extracellular matrix (ECM), the matrix outside the cells. These receptors are also linked to the inside of the cell, to the cytoskeleton (the skeleton of the cell) and to the signaling pathways of the cell (the biochemical steps that cause cells to act in a particular way). An extracellular matrix is a structure that is made of proteins, glycoproteins and other materials that cells are surrounded by or in contact with. Cells inside or near the matrix create the matrix by secreting these substances. Cells interaction with the ECM is very important for several reasons. Contact with an extracellular matrix is fundamental to the organization of both the cell and the tissue of which the cell is a part. Cell matrix interactions maintain and regulate cell adhesion and motility. Cell matrix contacts also act as sites for transmission of mechanical force and electrical signals between cells. Cell matrix interactions serve as the cells indicator for its surroundings, and its messenger for where this particular cell needs to be according to the vicinity of others. Cell adhesion is very important in embryonic development, regulating how tissues are built, the function of tissues and signaling across cells. The protein complexes involved in adhesion are very dive... ...l switch is matrix deformability or pliability. This kind of a switch would allow a cell to respond to environmental cues such as a rigid substrate by switching to an adhesion mode that provides firm anchorage. 4. Large focal contacts are generally stationary but small focal contacts can translocate. One end makes a polar extension then the other end contracts making for an inchworm like motion. This movement also seems to be dependent on contractile actomyosin. Specific cell types may use only one adhesion mechanism. Some cells can switch on fibrillar adhesion formation when fibronectin is present. In summary the authors found that the cell-matrix adhesions were very dynamic and diverse in their range of form, molecular components and locations. This dynamic and diverse system allows cells to have great variety and flexibility in their matrix contacts.

Sunday, August 18, 2019

The Real Sucker Essay -- essays research papers

The Real Sucker Geoff Karanasos CARSON McCULLERS December 12, 1996   Ã‚  Ã‚  Ã‚  Ã‚  Many Different experiences in a child's life help form the personality and attitude he or she will adopt later in life. One such example of this is a fictional character named Sucker. This young boy really admired his cousin Pete, whom he lived with. Sucker was just an innocent child who would believe anything Pete said. The more Sucker admired Pete, the more Pete resented Sucker. This went on until Pete met a girl. Pete was so happy that he didn't mind Sucker's admiration toward him. Sucker became a bright enthusiastic child who loved being around Pete. He was so happy that he didn't want anything to change. After Pete got dumped, he turned all of his frustrations toward Sucker. Sucker then...

Saturday, August 17, 2019

Research Proposal Essay

1TITLE An assessment on how product branding effects consumer purchase decisions in Food Market Chain Group (FMCG) goods and durable goods. 2BACKGROUND TO THE STUDY Branding is a vital element in a business. Without a brand, retailers may be confused or give the customers the wrong products, while the customers have to explain in detail the type of products they want to fully satisfy their needs and wants. It can therefore be assumed that a brand acts as a sign, name or symbol for products and services. The main aim of a brand is to identify the products or services of a seller or a group of sellers and differentiate an offering of a seller from that of its rivals (Kotler, 2003). In recent years, brand played a significant part in the market as the marketers added value to the brand to make it more preferable compared to other brands in the same market segment. For example, when quality rice is mentioned, most people will think of Tastic rice. This is just one of the successful branding strategies 3STATEMENT OF THE PROBLEM The purpose of the study is to know the effect of brand elements on customer purchasing decision. The brand elements are brand image, brand association, brand name, brand logo and brand awareness. The findings from the literature and the primary data shows that brand elements have significant impact on customer purchasing decisions as well as the success of the retailer. It is common knowledge that the customer’s choice is influenced by many surrogates of which the simplest of them all is the brand name. Products offered by the retailer may be equally satisfying but when the consumer is satisfied with some brand he or she is not willing to spend additional effort to evaluate the other alternative choices. Once he or she has liked a particular brand, the customer tends to stay with it, unless there is a steep rise in the price or discernible better quality product comes to his or her knowledge which may prompt the consumer to switch the brand. Companies spend a lot of money and time on the branding and thus it needs a careful evaluation on the effect of branding on consumer buying behavior. 3.1RESEARCH OBJECTIVES The above examples show that some customers prefer one brand over another even though that brand is more expensive. Price may not be the important factor while the psychological factor may be greater, for instance .Therefore, the research aims to achieve the following objectives: * To establish if any relationship exists between branding and consumer’s purchasing decision. * To identify the major aspects of branding that influence the consumers’ purchasing decision. * To examine the consumers tendency to recommend brands and its effects on purchasing decisions of their friends and family. * To establish the changes in the relationship between branding and consumers’ purchasing decision when other factors such as price are introduced. * To understand the choice of the customer on whether it is branded or non-branded goods. 3.2RESEARCH QUESTIONS The study will answer the following research questions: (a)Does any relationship exist between branding and consumer purchasing decision? (b)What are the major aspects of brand elements that influence consumer purchasing decision? (c)To what extent do consumers tend to recommend brands and the effects of consumer purchasing decisions on their family and friends? (d)How do other factors such as price when introduced affect the relationship between branding and consumers’ purchasing decision? (e)Is the choice of the customer branded or non-branded goods? 3.3Significance of the study To theory The research will help in a way because it equips readers with the requisite knowledge about how brands and their elements affect consumers’ purchasing decisions. Readers can learn through the suggested recommendations provided by the researcher hence they can be able to make wise purchasing decisions during shopping. Therefore it helps to bridge the gap in areas not being addressed and also to advance knowledge in product branding and consumer purchasing decisions. To practice The recommendations from the findings of the study may assist retailers in the Food Market Chain Group (FMCG) to effectively brand products that help them gain a competitive advantage by influencing consumers on their purchasing decisions. Therefore the research enlightens companies in the FMCG on not to spend a lot of money and time on branding and thus it helps them to careful evaluate on the effect of branding on consumer buying behavior. To self The research is conducted in partial fulfillment of the requirements to acquire a Bachelor of Commerce (Honours) Degree in Retail Management. The research also equips the student with the relevant skills and knowledge which he will acquire during the research. 3.4Limitations The following are the limitations envisaged in the carrying out of the proposed research: a)Availability of resources The researcher is a full time student with limited financial resources therefore it is a challenge to obtain the required material for the research. Money is needed for typing, printing and travelling costs to gather the required information. To cut costs the researcher will use questionnaires to collect data in order to cut expenses. b)Access to information The type of research will mainly depend on available information from leading retailers in the FMCG. Some of the Branch Managers may consider the information confidential depending on the aspects of branding asked to them by the researcher. They may fear that the information will be used against them by their competitors. Therefore the researcher will assure the information will be used for academic purposes only. c)Time constraint The research is running concurrently with final year semester courses therefore the time may be inadequate considering other important and competing academic commitments. Therefore to balance the forces the researcher will use a small sample of the population to save time. 3.5Delimitations The study will be carried out at leading retail supermarkets especially TM and OK supermarkets. The research is limited to the leading supermarkets because they offer all kinds of product brands. The respondents will include customers and employees of the retail outlet. 3.6Definition of terms Brand The name ,term, design and symbol that allow consumers to identify the goods and services of a business and to differentiate them from those of the competitors ( Jones and Hall 2008 ) FMCG (Fast Moving Consumer Goods) The industry includes food and non-food everyday consumer products that are usually purchased as an outcome of small-scale consumer decision so they are heavily supported ( advertising ) by the manufacturers. Customer Refers to a person, organization or other entity that buys goods or services from a store, person or other business. 4LITERATURE REVIEW 5 METHODOLOGY The sub heading outlines the techniques that are to employed by the researcher to collect the relevant data and its subsequent analysis.Haralambos (1992) postulates that methodology is concerned with detailed research methods through which data is collected and analysis of data are used. It discusses the research design ,target population and respective sampling techniques ,data collection methods and the research instruments. 5.1 Research design Fisher (2004) defines research design as the specification of methods and procedures for acquiring the information needed to structure or solve the problems.The function of a research design is to ensure that the evidence obtained enables us to answer the initial question as unambiguously as possible.Dawson et al (2002) postulates that a research comprises of redefining problems and is thus ,an original contribution to existing stock of knowledge making for its advancement.Therefore searching for information and presenting it is the job of the researcher. The qualitative approach is the best research methodology which leads to a better understanding of how product branding affects consumer purchasing decisions. The qualitative approach includes questionnaires, observations and interviews. Interviews will allow the researcher to probe the respondents for more information. Saunders et al (2007), notes that survey design is a popular and common strategy in business and management research. 3.2Study Population Frankel and Wallen (1996) highlights that the study population includes all individuals whom the researcher is interested in getting information from and making conclusions. They further explain that study population consists of those subjects whose characteristics are similar to those of the in the sample and one makes conclusions from the sample drawn from this study population. In this study a population will refer to TM supermarkets specifically in Harare, Gweru and Karoi.O.K supermarket Gweru can also be included for the research to be effective and also to cut transport costs to the researcher. 5.3Sampling Allison, Scott and Russel (2001) stress a sample as a group of subjects whom the researcher collected information. A sample is a small part of the population which has the same characteristics of the population. The concept of sample arises from the inability of the researcher to test all the individuals in a given population (Castillo 2009). Sampling is therefore a process of selecting group(s) of subjects for a study in such a way that the individuals represent the larger group from which they were selected. The main decision which the researcher has to make is to whether go for a census or sample research. The sample was selected on a random basis that avoids bias and makes the findings more representative and credible. According to Kothari (2007) census means each and every element which forms part of the research will be investigated and sample means few elements which represent the entire research would be investigated. Practically it is not possible to conduct a census. Hair (2003) defines sampling as a process of selecting a relatively small number of elements from a larger defined group of elements so that the information gathered from the smaller group allows one to make judgments about the larger group. Sampling Techniques a) Random Sampling Method Basically there are four methods of sampling under random sampling. Simple random sampling is a method, which ensures that each element of the population has an equal chance of being selected to become part of the sample (Peatman 1947). Systematic sampling is when elements are chosen from the population at a uniform interval that is measured in time, order or space. Saunders et al (2007) describes stratified sampling as involving the dissection of a population into groups of strata along some dimension that uniquely distinguishes each stratum from the rest and is relevant for the information sought after. Stratified sampling involves dividing the population into strata, with each stratum having relatively homogeneous elements. Once the strata have been identified a simple random sample is selected from each stratum separately, the sample corresponding to the proportion of elements in each stratum. Stratified sampling is used when the population is thought to consist of a number of smaller subgroups or sub populations such as male/female, different age/ethnic / interest groups, which are thought to have an effect on the data to be collected (Allison et al; 2001). Cluster sampling involves splitting the population into groups called clusters and is usually used when the population covers an area that can be divided by regions (Allison et al; 2001). The sample elements are then chosen from the different clusters to come up with one sample. b) Non Random Sampling Non-random sampling can be done through four ways, which are convenience, quota, judgmental and snowball sampling. Convenience sampling is where the sample is drawn for the convenience of the researcher. Convenience sample only includes those subjects that are immediately to hand (Allison et al; 2001). Quota sampling is where the respondent selection is in the same ratio as found in the general population. Judgmental sampling includes elements thought to be representative of the population and in this case the researcher attempts to come up with sample using judgment and the amount of error depends on the expertise of the researcher. Snowball sampling is commonly used when it’s difficult to identify members of the desired population (Saunders et al; 2007). The researcher adopted a non- probability sampling method because of limited resources at her disposal since it is based on available elements. Only operational managers and departmental heads of short term insurance brokers firms were targeted. Views were also taken from assistant insurance brokers. Sample Size According to Saunders et al (2007) the sample size is determined based on a 95% confidence rate interval, an estimate of margin of error and the total population which the sample was to be drawn. A general rule of thumb is to always use the largest sample possible. The larger the sample the more representative it is going to be, smaller samples produce less accurate results because they are likely to be less representative of the population (Wood and Haber 1998). The selection of respondents will the sample more representable of the retail sector and the findings credible. 2 questionnaires will be distributed per each retail supermarket. 5.4Instrumentation 4 Research instruments and Data collection For the purpose of this study, the researcher employed the survey design in which data was collected by way of questionnaires and interviews. This was done to ensure more internal validity of the research. According to Cohen and Manion (1980: 280), â€Å"the use of two or more methods in data collection is referred to as the triangulation method† The data sources can be divided into primary and secondary data sources. 3.4.1 Primary Data Primary data is that first-hand information collected directly from public. The data obtained through primary means usually accurate and provides more reliable information about the subject investigation. When primary data sources are used, data is acquired from the main source and is not derived from any pre-existing research. The primary data sources the researcher used in doing this research were (a) Questionnaires (b) Personal Interviews 3.4.1.1Questionnaires According to Saunders et al (2007) a questionnaire is a technique of data collection in which each person is asked to respond to the same set of questions in a predetermined order. Brian White (2000) postulates that a questionnaire is regarded as a series of questions; each one providing a number of alternative answers from which the respondents can choose. The questionnaire was used as this enabled the researcher to gather as much data as possible since the question was in both standard and open ended questions. Advantages (a) Questionnaires are cheap and the researcher does not incur high travel and accommodation expenses. They are printed on bond paper which is not costly though and need not to be necessarily colorful. (b) They provide anonymity of respondents and thereby giving assurance of their confidentiality. (c) Questionnaires are a relatively quick way of receiving a response. In some instances, the researcher had to wait while the respondents filled in the questionnaires and some of the questionnaires had to be collected a day after they had been dropped. (d) They avoid interview bias. Personal questions are often more willingly answered as the respondent is not face-to-face with the interviewer Disadvantages (a) As questions cannot be complicated, and need to be simple and straightforward, the richness of information that is sometimes collected with other methods is lost. (b) You may not receive a spontaneous answer as respondents may discuss the questions with others before completing the questionnaire. As all questions are seen before they are answered, the answers cannot always be treated as independent. (c) Respondents gestures and facial expressions could not be observed as these are essential communication signs that can effectively be used to evaluate responses. (d) The targeted respondents may not complete the questionnaire. For instance, a busy manager may ask a personal assistant to complete it on their behalf. Personal Interviews The targeted interviewees were busy people due to the nature and demands of their roles in their organizations therefore the researcher did not carry as many interviews as the number of questionnaires that were distributed. Appointments were made with respondents prior to interviews. Since the interviewees were busy with other company commitments, the researcher had to save on time and used a structured approach where a set of prescribed questions for the interview were set. Advantages (a) The real benefit of an interview is that you are face-to-face with the interviewee and thus any misunderstandings are cleared immediately. (b) In addition to the above benefit, also during the interview the researcher can re-word or re-order the questions if something unexpected were to happen. (c) The interviewer can encourage the respondents to answer as fully as possible and check as appropriate, that the question is correctly understood. (d) Response rates are usually higher than for other methods of questionnaire administration (e) Materials that need to be shown to respondents can be properly presented Disadvantages (a) They are time consuming, taking into consideration the length of the interview, the time taken traveling to and from interview and notes revision. (b) Interviews are subject to bias as some interviewees may tend to please the interviewer and as a result may not tell the truth. (c) Relatively costly time wise and in monetary terms. Secondary Data This refers to information from sources other than the main source, whereby some intermediate agent has compiled data or information in their own research and has now presented it as some part of a bigger study. This proved to be the most helpful method and thus accounts for much of the data used, especially in the literature review and the analysis sections of this research project. The Internet The internet unarguably forms the most endowed ‘library’ ever. The researcher accessed e-journals, e-books and works by other scholars and organizations via the internet. With ease, the researcher could check both technological and legal developments in electrical safety of other countries. Some of the questionnaires were sent to respondents via e-mail. Advantages (a) Provides the researcher with current updated information (b) The Internet is user friendly and provides the researcher with all referencing and cataloguing done electronically. Disadvantages (a) Internet speed and efficiency is dependent upon how congested the network server is and the higher the congestion, the slower it will be to retrieve information there from. (b) The internet is vulnerable to the virus risk. Computer viruses can easily corrupt documents before or after the researcher completes his work. Textbooks and Journals The researcher made reference to numerous text books and journals on competitive advantage. These journals and textbooks showed the researcher the different views of writers from all over the world. Data analysis and presentation Data collected from both primary and secondary sources will be analyzed and presented through tables, pie charts and graphs.