Wednesday, July 31, 2019

Human Body: Health & Disease †Pneumonia Essay

Pneumonia is a serious infection or inflammation of your lungs. The air sacs in the lungs fill with pus and other liquid. Oxygen has trouble reaching you blood. If there is too little oxygen in your blood, your body cells can’t work properly. Because of this and spreading infection through the body pneumonia can cause death. Until 1936, pneumonia was the No. 1 cause of death in the United States. Since then, the use of antibiotics brought it under control. In 1997, pneumonia and influenza combined ranked as the sixth leading cause of death. Pneumonia affects your lungs in two ways. Lobar pneumonia affects a section (lobe) of a lung. Bronchial pneumonia (or bronchopneumonia) affects patches throughout both lungs. Pneumonia is not a single disease. It can have over 30 different causes. There are five main causes of pneumonia: bacterial, viruses, mycoplasmas, other infectious agents, such as fungi – including pneumocystis and various chemicals. Bacterial pneumonia can attack anyone from infants through the very old. Alcoholics, the debilitated, post-operative patients, people with respiratory diseases or viral infections and people who have weakened immune systems are at greater risk. Pneumonia bacteria are present in some healthy throats. When body defenses are weakened in some way, by illness, old age, malnutrition, general debility or impaired immunity, the bacterial can multiply and cause serious damage. Usually, when a person’s resistance is lowered, bacteria work their way into the lungs and inflame the air sacs. The tissue part of a lobe of the lung, an entire lobe, or even most of the lung’s five lobes becomes completely filled with liquid (this is called â€Å"consolidation†). The infection quickly spreads through the bloodstream and the body is invaded. The streptococcus pneumonia is the most common cause of bacterial pneumonia. It is one form of pneumonia for which a vaccine is available. Symptoms of the onset bacterial pneumonia can vary from gradual to sudden. In the most severe cases, the patient may experience shaking chills, chattering teeth, severe chest pain, and a cough that produces rust-colored or greenish mucus. A person’s temperature may rise as high as 105 degrees F. The patient sweats profusely, breathing and pulse rate increase rapidly. Lips and nail beds may have a bluish color due to lack of oxygen in the blood. A patient’s mental state may be confused or delirious. Viral pneumonia which is half of all pneumonias are believed to be caused by a virus. More and more viruses are being identified as the cause of respiratory infection, and through most attack the upper respiratory tract, some produce pneumonia, especially in children. Most of these pneumonias are not serious and last a short time. Infection with the influenza virus may be severe and occasionally fatal. The virus invades the lungs and multiplies, but there are almost no physical signs of lung tissue becoming filled with fluid. It finds many of its victims among those who have pre-existing heart or lung disease or are pregnant. The initial symptoms of viral pneumonia are the same as influenza symptoms such as fever, a dry cough, headache, muscle pain, and weakness. Within 12 to 36 hours, there is increasing breathlessness; the cough becomes worse and produces a small amount of mucus. There is a high fever and there may be blueness of the lips. In extreme cases, the patient has a desperate need for air and extreme breathlessness. Viral pneumonias may be complicated by an invasion of bacteria, with all the typical symptoms of bacterial pneumonia. Mycoplasma pneumonia is caused of somewhat different symptoms and physical signs. Because the course of this illness differ from classical pneumococcal pneumonia. Mycoplasma pneumonia was once believed to be caused by one or more undiscovered viruses and was called â€Å"primary atypical pneumonia.† Identified during World War II, mycoplasmas are the smallest free-living agents of disease in humankind, unclassified as to whether bacterial or viruses, but having characteristic of both. They generally caused a mild and widespread pneumonia. They affected all age groups, occurring most  frequently in older children and young adults. The death rate is low, even in untreated cases. The most prominent symptom of mycoplasma pneumonia is a cough that tends to come in violent attacks, but produces only sparse whitish mucus. Chills and fever are early symptoms, and some patients experience nausea or vomiting. Patients may even experience profound weakness which lasts for a long time. Other kinds of pneumonia are pneumocystis carinii pneumonia (PCP) is caused by an organism believed to be a fungus. PCP is the first sign of illness in many persons with AIDS. PCP can be successfully treated in many cases. It may recur a few months later, but treatment can help to prevent or delay its recurrence. Other less common pneumonias may be quite serious and are occurring more often. Various special pneumonias are caused by the inhalation of food, liquid, gases or dust and by fungi. Foreign bodies or a bronchial obstruction such as a tumor may promote the occurrence of pneumonia, although they are not causes of pneumonia. Rickettsia (also considered an organism somewhere between viruses and bacteria) caused Rocky Mountain spotted fever, Q fever, typhus and psittacosis, diseases that may have mild or severe effects on the lungs. Tuberculosis pneumonia is a very serious lung infection and extremely dangerous unless treated early. Treating pneumonia if you develop pneumonia, your chances of a fast recovery are greatest under certain conditions: if you’re young, if your pneumonia is caught early, if your defenses against disease are working well, if the infection hasn’t spread, and if you’re not suffering from other illnesses. In the young and healthy, early treatment with antibiotics can cur bacterial pneumonia, speed recovery from mycoplasma pneumonia, and a certain percentage of rickettsia cases. There is not yet a general treatment for viral pneumonia, although antiviral drugs are used for certain kinds. Most people can be treated at home. The drugs used to fight pneumonia are determined by the germ causing the pneumonia and the judgment of the doctor. After a patient’s temperature returns to normal, medication must be  continued according to the doctor’s instructions, otherwise the pneumonia may recur. Relapses can be far more serious than the first attack. Besides antibiotics, patients are given supportive treatment such as: proper diet and oxygen to increase oxygen in the blood when needed. In some patients, medication to ease chest pain and to provide relief from violent cough may be necessary. The vigorous young person may lead a normal life within a week of recovery from pneumonia. For the middle-aged, however, weeks may elapse before they regain their accustomed strength, vigor, and feeling of well-being. A person recovering from mycoplasma pneumonia may be weak for an extended period of time. In general, a person should not be discouraged from returning to work or carrying out usual activities but must be warned to expect some difficulties. Adequate rest is important to maintain progress toward a full recovery and to avoid relapse. Remember, don’t rush recovery! Preventing pneumonia is possible, because pneumonia is a common complication of influenza (flu), getting a flu shot every fall is good pneumonia prevention. Vaccine is also available to help fight pneumococcal pneumonia, one type of bacterial pneumonia. Your doctor can help you decide if you, or a member of your family, needs the vaccine against pneumococcal pneumonia. It is usually given only to people at high risk of getting this disease and its life-threatening complications. The greatest risk of pneumococcal pneumonia is usually among people who have chronic illnesses such as lung disease, heart disease, kidney disorders, sickle cell anemia, or diabetes. Are recovering from severe illness, are in nursing homes or other chronic care facilities, and are age 65 or older. If you are at risk, ask your doctor for the vaccine. The vaccine is generally given only once. Ask your doctor about any revaccination recommendations. The vaccine is not recommended for pregnant women or children under age two. Since pneumonia often follows ordinary respiratory infections, the most important preventive measure is to be alert to any symptoms of respiratory trouble that linger on more than a few days. Good health habits, proper diet and hygiene, rest, regular exercise, etc., increase resistance to all respiratory illnesses. They also help promote fast recovery when illness does occur. In my conclusion, if you think you have symptoms of pneumonia, call your doctor immediately. Even with the many effective antibiotics, early diagnosis and treatment are important. Follow your doctor’s advice. In serious cases, your doctor may advise a hospital stay. Or recovery at home may be possible. Continue to take the medicine your doctor prescribes until told you may stop. This will help prevent recurrence of pneumonia and relapse. Don’t wait, get treatment early!!! Support organizations to get help is: American Lung Association; contact number 1-800-LUNG-USA (1-800-586-4872) to speak with a lung professional or email address: info@lung.org The American Lung Association provides programs of education, community service, and advocacy. Some of the topics available include asthma, tobacco control, emphysema, infectious disease, asbestos, carbon monoxide, radon, and ozone. Centers for Disease Control and Prevention (CDC); contact number 1-800-CDC-INFO (1-800-232-4636); email address: cdcinfo@cdc.gov or web address: www.cdc.gov. The Centers for Disease Control and Prevention (CDC) is an agency of the U.S. Department of Health and Human Services. The CDC works with state and local health officials and the public to achieve better health for all people. The CDC creates the expertise, information, and tools that people and communities need to protect their health – by promoting health, preventing disease, injury and disability, and being prepared for new health threats. Works Cited Web MD – Better Information. Better Health. Pneumonia. 6 March 2013. Web. 5 June 2014. Mayo Foundation for Medical Education and Research. Mayo Clinic Staff. Pneumonia. 21 May 2013. Web. 5 June 2014. Healthline Networks. Health Reference Library. Pneumonia written by Bree Normandin. 7 August 2012. Web. 5 June 2014

Tuesday, July 30, 2019

Issues in Corporate Governance

CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE ADVANCED FINANCIAL MANAGEMENT †¢ †¢ †¢ Investment decisions Financing decisions Dividend decisions Financial objectives Primary objective – maximise shareholder wealth Secondary objectives – meeting ‘other’ predetermined targets Stakeholders †¢ †¢ †¢ †¢ †¢ †¢ Shareholders Management and employees Customers Suppliers Lenders Government w w w . s tu d yi n te ra cti ve . o rg 1 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE Stakeholders Suppliers Measures Price Payment Security Liquidity Taxable profit Inflation Employment Investment Lenders Government w w w . tu d yi n te ra cti ve . o rg 2 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE w w w . s tu d yi n te ra cti ve . o rg 3 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE Corporate Governance Are the board effective? Are they making good decisions? Can we obtain assurance that they are? Are the board effective? Combined Code Board of Directors Chair CEO Execs Non-execs w w w . s tu d yi n te ra cti ve . o rg 4 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE Are they making good decisions? Higgs Report Cadbury Report Greenbury Code Key guidance Smith Turnbull Can we obtain assurance that they are?Disclosure FSA Listing Rules FSA Disclosure and Transparency rules Combined Code w w w . s tu d yi n te ra cti ve . o rg 5 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE More formalised Independent audit committee Quarterly reporting USA Sarbanes Oxley Independent directors PCOAB Critical accounting policies Germany EU company law Two-tier board of directors Board of directors Supervisory board Management board w w w . s tu d yi n te ra cti ve . o rg 6 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE Japan â€Å"Consensual management† Policy boards Functional boards Monocratic boards w w . s tu d yi n te ra cti ve . o rg 7 CH AP TER 1 – I S S U ES I N COR POR ATE G OVER N AN CE SUSTAINABILITY AND ENVIRONMENTAL RISK †¢ Sustainability – balancing growth with environmental and social concerns â€Å"At BP, we are working hard to restore trust in our ability to operate safely and responsibly wherever we do business. Our approach to sustainability covers issues relating to governance and risk management, safety, the environment, the energy future and our local and global socio-economic impact. We aim to report on these issues in a way that answers key questions raised by our stakeholders. Carbon Trading 1. Governments hand out free tradable rights to emit carbon dioxide to big industrial polluters 2. Companies buy additional pollution credits from projects that claim to emit less greenhouse gas than they would have without the investment Environment Agency 1. Protects air, land and water used by society in England and Wales 2. Offers guidance to busine sses on environmental issues †¢ †¢ †¢ †¢ †¢ Environmental Permitting Flood Pollution and emissions Waste Water Environmental Audits †¢ †¢ †¢ Energy saving Waste reduction Business processes w w w . s tu d yi n te ra cti ve . o rg 8

Monday, July 29, 2019

Read the requirement i send you carefully, Essay

Read the requirement i send you carefully, - Essay Example However, this has since changed as today organizations recognizes and appreciates the role played by employees in ensuring performance and productivity of the company. In addition, the emergence of field or organizational behavior created an avenue through which companies can use various strategies to promote performance of employees. One of these strategies is effective communication in the workplace. This promotes interaction, creates trust and loyalty allowing employees have freedom in the workplace. In addition, it promotes employee motivation and job satisfaction leading to good performance. Organization functions that utilize communication include leadership and management. When it comes to leadership there are different leadership styles and organizations need to focus on those that promote open communication. Good examples of use of leadership to promote effective communication are seen in the case of Starbucks and Google.Inc, which are discussed in this paper. Introduction O rganization behavior refers to the concept of managing the behavior of individuals in the workplace, for instance, organization of the human resource, organization’s response to employees and employees’ welfare issues. These strategies help the organizations in improving performance at the workplace and achieving competitive advantage over other organizations in the industry (McShane & Glinow 2010). Other aspects of organizational behavior include understanding several behaviors that applies to the organization and motivating them to achieve the best of organizational performance (Luthans 2011). Furthermore, organizational behavior involves an investigation of the impacts of groups, individuals, and organizational structures on the behavior of actors of organizational behavior. Therefore, organizational behavior is an imperative aspect of the organization especially in this 21st century where much emphasis is put on people and their contribution to the company. Accordi ng to Luthans (2011), people are the key to success of every organization as the employees’ contribution to the organization is irreplaceable. Thus, organizations strive to capitalize on this aspect for productivity. A good example of organizational behavior is communication. Communication refers to the technique of transmitting and understanding information between two or more individuals. It involves sharing of feelings, thoughts, expressions among other things transmitted through verbal and non-verbal communication modes. Communication is highly essential in an organization often referred to as the life wire of the business. Nelson and Quick (2012) defines communication as, ‘the evoking of a shared common meaning in another person’ (p.278). The evocation plays a fundamental role in the organization because it enables formation of effective interpersonal associations in the workplace. These then translates to successful job performance and eventually, attainmen t of the organization’s goals. However, the concept does not top at communication, but requires effective to communication to achieve organizational success. According to Nelson and Quick, four elements of communication must be fulfilled to achieve and enhance effective communication, and these are the receiver, the communicator, the message, and perceptual screens. Evidently, communication is highly beneficial in the workplace; hence, this paper explores the application of communication on various aspects of the

Sunday, July 28, 2019

Technical Writing Essay Example | Topics and Well Written Essays - 1000 words - 9

Technical Writing - Essay Example The product’s description reflects the quality of the product through specifics and imagery. For example, the purpose of this description is to invite awe and desire of the diamond ring in the intended audience so that he or she will purchase it. The description needs to state the specific 4 C’s of the diamond, i.e. cut, clarity, color, and carat weight to properly inform the consumer and to be compared to with competitors. If the audience has this information, he or she will be able to make an informed decision of whether or not to buy the product. I would propose that Micron should immediately rewrite their descriptions, set up short workshops with sales personnel to teach them how to use the product and provide easier means of acknowledging and functioning the new features via video demonstration in the store. Darlene should recommend to Claude to become hands-on with the product as much as possible to self-teach as they wait for enhanced, appropriate instructions and descriptions from the company. Rather than drop the motto and quit selling it, Claude and the other staff members should self-teach to ensure good customer

Saturday, July 27, 2019

Accident Victim Interview Report Assignment Example | Topics and Well Written Essays - 500 words

Accident Victim Interview Report - Assignment Example He has an excellent safety record with the injury I interviewed him about being the only injury he has received in the past ten years. One of the tasks that many people in the kitchen have to perform is porting heavy sheet trays to and from the dish pit downstairs. On one especially busy service on the seventeenth of October 2009, the sous-chef took it upon himself to deliver them downstairs because everyone else in the kitchen was incredibly busy and he had a free moment and wanted to clear the space to (somewhat ironically) avoid injury from the clutter. As he was approaching the staircase down to the dishpit, he slipped on a puddle on the floor and fell, hitting the back of his head on a table in the narrow space and twisting his ankle significantly. His head bled somewhat, but the major injury was in his ankle. He was a bit dazed by the blow to his head but remained conscious with no serious cognitive symptoms; however, he could not stand on his ankle. He was taken by a co-worker to the emergency room immediately, where he was diagnosed as probably not having any concussion (he had no post-concussion symptoms e ven in the days that followed) but did have a break in his ankle from rolling it as he slipped. The immediate treatment was to cast his ankle, but because of the type of injury he was unable to be put in a walking cast. It is impossible for him to complete his job duties whilst in a cast and unable to walk, so Ted was forced to miss nearly a month of work. The injury, however, had very little ligament damage and ted was able to make do with only very basic physical therapy once he got his cast off for the duration of just under a month, meaning that he was back to essentially full capabilities two months after the injury, though he could perform all work related and most personal tasks fine immediately after the cast was taken off. The physical therapy was simple elastic band strengthening of his ligaments to ensure no

Friday, July 26, 2019

Why water is our thirst - Quencher Essay Example | Topics and Well Written Essays - 750 words - 1

Why water is our thirst - Quencher - Essay Example Whenever thirsty, most animals including human beings search for water event if it takes them to cover long journeys to exact points of open and reachable water. Similarly, plants would dry and curl their leaves during dry spells but regain full life during cold or wet seasons. From the above, it is totally arguable that water is the perfect thirst quencher. It is important to note that most of the body organs in human body and any animal works and properly execute their functions when moist. To be moist, the organs must be able to absorb nearly fresh water with little salt concentration. Failure to absorb water will leave the organs dry and at high temperatures. The high temperatures will cause serious burning effect that will work to suffocate that particular animal (Nicholson, 2010). In case of human beings, concentrated drinks like sodas, tea or coffee among others will have insignificant effect when taken during serious thirst. This is due to the significant acidic and sugar contents characterized with most of the drinks. Instead of lowering the body temperatures and in effect moist dry body organs, the acid will increase the burning effect due to thirst. It is also worth noting that most if not all of the concentrated drinks contain numerous chemical substances that may pose threat of poisoning the body. This therefore makes them the worst option a person can regard when thirsty. Instead of supplying plenty of fresh water to the liver and kidney to facilitate the process of detoxification, the drinks will inject more poisons to the body system and eventually paralyze basic physiological processes (Nicholson, 2010). However, there are certain drinks that have low levels of acid concentration but with high water concentration. Such drinks include and not limited to blended fruit juices, which when taken can help reduce thirst. In fact, natural fruits tend to

Confidentiality as a Nurse Essay Example | Topics and Well Written Essays - 750 words

Confidentiality as a Nurse - Essay Example However, these cannot be considered as separate entities as confidentiality is interlinked with privacy and trust and most of the time means that the information should be kept a secret from others (Butts & Rich, 2005). Breach of confidentiality in the nursing practice leads to an encounter with ethical dilemmas, however, different circumstances call for unique decisions. The code of ethics includes confidentiality as an important and significant part of the nursing practice to ensure a trustworthy and open relationship between the clinician and the patient. The ANA Code for the Nurses states: â€Å"Associated with the right to privacy, the nurses have a duty to maintain confidentiality of all patient information.† The ANA Code for Nurses also states: â€Å"The patient’s well-being could be jeopardized and the fundamental trust between patient and nurse destroyed by unnecessary access to data or by the inappropriate disclosure of identifiable patient information† (Benjamin & Curtis, 2010). These principles of confidentially and respect to other people’s information establish the confidential nature of the communication between the patient and the nurse and the duty of the nurse to maintain the trust and privacy. If a nurse shares information about the patient during her nursing practice, she not only creates breach in confidentiality but also fails to respect the patient. Nevertheless, the nurses are encountered with a plethora of circumstances which place them in a dilemma about whether to preserve the confidential relationship or disclose the information for the patient’s benefit. An ethical case presented by Pamela G. Nathanson discusses the case of nurse Carol Hathaway where she promises her two young patients to keep their information a secret and will not disclose the patient’s information to the parent’s or any other person. The sole reason of her act was because the adolescents were reluctant to enter int o care thus she ensured them of privacy and secrecy. The two girls were suspecting sexually transmitted diseases (STDs) and one of the girls is diagnosed with human papillomavirus and later she also tests positive for cervical cancer. The girls had been a part of various â€Å"sex parties† with multiple partners which led to the current circumstances and, therefore, are reluctant in telling their parents. This is an ethical dilemma for the nurse Hathaway as she is obligated to keep the information a secret. However, she is advised by the physician to report the parents as the treatment for the cancer requires parental consent as well as their support for the adolescent girl. Moreover, the physician also advised the nurse that the school authorities should be informed of the girl’s condition so that action could be taken about the sexual activities prevalent among the students (Nathanson, 2000). The case represents a complicated situation faced by the nurse where ethics of confidentiality have to be questioned or compromised for a better good. Confidentiality specifically in cases of adolescent or young patients is an important subject as most of them are hesitant or reluctant to share their information, fearing disclosure of their condition to friends, family or social circle. In such circumstances, the nurses have to gain the trust of the patients and show

Thursday, July 25, 2019

Supply and Demand in the Global Automotive Industry Essay

Supply and Demand in the Global Automotive Industry - Essay Example According to the report findings the greatest machinery that has been behind the progression of the automotive industry are the principals of economy known as demand and supply. The law of supply states that keeping all other factors constant, the more the price of a particular product goes up the more the quantity of that particular product is supplied. On the other hand, the law of demand also provides that keeping all factors the same, when the price is high the demand for the product will be great. Therefore, the automotive industry has survived on these two principles to sustain itself in the market. It has always been about the quality of the cars manufactured and the prices about the market and customers. As the paper stresses economic ways, the global market, has been enjoying a relatively stable growth characterized by profits, and sales had improved to prerecession levels in countries. A substantial ambiguity concerning the future of the industry is still an issue. The European market looked much weaker around 2008, as it was just recovering from a six-year depression. Aggressive competition within the fluctuating market have risen customers’ expectations, consumers have become demanding and have increased on their preferences . Market fluctuation is caused by mobile client’s earnings; that is to say, customer’s earnings being seasonal. It affects the producers in a way that they cannot predict the size of the market and therefore, cannot be sure of the quantity to produce.

Wednesday, July 24, 2019

Critical Analysis of the Documentary My Kid Could Paint That Research Paper

Critical Analysis of the Documentary My Kid Could Paint That - Research Paper Example The media questioned whether she is the real artist behind the artwork or if she is just being used and exploited in order to sell up the â€Å"masterpieces.† Moreover, this argument is found to be important in this analysis because it has a relation with the focal question whether or not Marla Olmstead can be considered as â€Å"an artist.† There definitely are young people that are called child prodigies. But considering that art is construed as the mode of expression and the manifestation of emotion or pleasure, a four-year-old child is questionably capable of expressing herself or explain the reasons behind her artworks to be categorized as an artist. Thus, this paper would seek to determine the various criteria and theories of arts in order to consider someone to be an artist. For the purpose of providing reliable answer for this issue, the researcher would support the argument based on various theories of arts such as mimetic, expressive, aesthetic and institution al art as well as the three basic criteria in order to consider something as an art. Discussion Art, whether generally accepted or not is a representation of the artist’s knowledge and skills. ... tist’s intention so that a work is considered art if it is done by someone as a representation, for the purpose of attracting an aesthetic response from the audience. Hence, in creating art, the artist does not only want to provoke or please audience but also want to communicate something and the artwork would not only be perceived by the senses (Hermanson, pp. 2-3). The criteria also include the quality of the work, which means that it should be closely associated with the idea of skill wherein there is technical competence as well as traditionally associated with the idea of beauty. It is about form or the way the elements of the work is put together, or content which usually answers what it depicts or describe (p 5). A work is considered as an art if there is response from the audience (p 6). These criteria are also included in various theories of arts. The art theories include the mimetic, expressive, aesthetic and institutional art. Mimetic art theory is considered as the most basic theoretical principle because it is simply the imitation, mimicry or representation of nature. Coined from the Greek word â€Å"mime† which means â€Å"imitation† or to copy reality (Mr Hermanson, p 14; Spiegel, P1), this theory of art was established by Plato and Aristotle suggesting that all artistic creation is a form of imitation and the artist is the â€Å"imitator.† In the case of painting, subject should exist in reality and should be a type created by God in order to perceive the representation of the ideal type. Hence, a painting is supposed to look just like the real thing or recognizable, whatever it is portraying or resemblance of the model (Berleant, p.167). Aristotle further detailed that art is the imitation of an action of life. Hence, he theorized that art is the

Tuesday, July 23, 2019

Comparison and Contrast of the Story of Joseph in the Bible and the Essay

Comparison and Contrast of the Story of Joseph in the Bible and the Koran - Essay Example The Koran and the Bible present similar accounts only for Joseph and Moses, whereas they widely differ in accounts of Noah, Abraham and Jonah. The story of Joseph has the main basic theme, but some of the details presented differ in some ways. The Biblical story of Joseph is presented in detail, whereas the Koran presents a broader version. The paper will analyze the differences between the two stories. These are discussed in detail; 2. The Dreams In the Bible two dreams are mentioned. The first dream is of sheaves that bow down to Joseph’s sheaf. The second dream mentions eleven stars, the Sun and the Moon bowing down before Joseph. The Koran mentions only one dream which is the second dream. There is no mention of the first dream. Furthermore, both versions vary in accounts of Joseph telling his father Jacob about the dreams. In the Koran version Jacob advised Joseph to keep the dream to himself and not tell his brothers. Jacob seems to understand the meaning of the dream an d understands that Joseph has been selected by God and may possess special knowledge to interpret dreams. As per the Koran the reaction is as follows: â€Å"My little son! Relate not thy vision to thy brothers, lest they concoct a plot against thee: for Satan is to man an avowed enemy! Thus thy Lord choose thee and teach thee the interpretation of stories and perfect His favor to thee and to the posterity of Jacob† (Sura 12:5-6). He believes the dream to be true. Whereas, as per the Biblical account, Jacob seems unsettled and keeps the dream under consideration that it may come true. 3. Cause for Hatred The Bible has explained the cause of hatred of Joseph’s brothers. Joseph shared his dreams with them. The brothers are jealous of his dreams and that he has been granted higher position and respect. Other reasons explained also include more affection of Jacob towards Joseph since he was born to him in his old age. As per the Bible, â€Å"because he had been born to him in his old age† (Gen 37:3). Furthermore, Joseph also brought his father bad reports about his brothers. Apart from these reasons, signs of favoritism are shown towards Joseph from his father. This specially includes the colored shirt given to him. The Koran on the other hand does not mention any colored shirt, though the favoritism is the only cause explained for the hatred of his brothers for Joseph. 4. Sending Joseph with his Brothers The Koran mentions detail account of Jacob not trusting his sons. They ask permission from him to take Joseph along with them. The Koran mentions this part in a way that Jacob had knowledge of enmity that his sons were against Joseph and their intentions were not good. He was worried but allowed his sons to take Joseph along with them after some pressure and pleading. This account is not mentioned in the Bible. Furthermore, the plan to kill Joseph or to get rid of him was not premeditated as per the Bible, whereas, as per the Koran this comple te activity was planned before and the permission to take Joseph along with them was a part of this plan. 6. Selling Joseph Both the books have account of Joseph being sold into slavery. The Bible has detailed account in this act. Though, the plot is the same that Joseph was sold to a caravan headed

Monday, July 22, 2019

Family and marriage ten theories Essay Example for Free

Family and marriage ten theories Essay 1. Family Ecology- The ecological context of the family affects family life and children’s outcomes. It explores how the family is influenced by the environment.This theory studies how family lives and decisions. It basically brings forth the idea that every choice that you make affects your family, your lifestyle, the surrounding events as well as historical events. Key Concepts Natural physical-biological environment- This concept deals with climate and climate change, soil, plants and animals. Social- Cultural environment- This concepts deals with human made things as well as cultural artifacts. Theorist/ Individual- This concept was discovered/ or created by ecologist Strength and Weaknesses- Some strengths of this theory is that What You Think- I think that this theory is totally correct. I feel like every choice I make does affect my family. It affects their lifestyle as well as how they view things, as well as how they form their opinions. These decisions that I am making now, affects how we live and will affect how they decide they will live when they get older. These decisions are things like, where we live, how we live, work ethics, as well as the food we eat. 2. The Family Life Course Development Framework Families experience predictable change over time. This basically brings forth the idea that families go thru unpredictable changes, which add and subtract from their family composition. This means birth, death and the leaving home of a family member. Key Concepts Family Life Course- Events that add and subtract from a family’s composition Developmental Tasks- tasks that have to be completed before you can transition to the next stage. On Time Transitions- Events that occur when they are supposed to, as opposed to being too early, or too late. Role Sequencing- The order in which major transitions take place. Theorist/ Individual- Life Course Therapist, and Ueker and Stokes Strength and Weaknesses Some of the strengths of this theory is that it analyzes the family as a unit. What You Think- This theory basically states that family life begins with marriage. This is crazy and untrue. I say this because nowadays family life begins when you have a kid as opposed to when you get married. 3. The Structure- Functional Perspective- The family performs essential functions for society. This deals with the way families fulfill basic societal needs, such as raising children responsibly, providing economical support, and emotional security. Key Concepts Social Institution- Family Structure Family Functions Functional Alternatives Theorist/ Individual- Social Scientist Strength and Weaknesses- Some of the strengths is that it analyzes the way families raise their kids, as well as how the family meets the needs of its members. The weaknesses of this theory is that it analyzes the family as a whole, as opposed to analyzes each person individually and how they deal with each other. What You Think- I think that each perspective is uniquely different and this perspective analyzes how families fulfill its members needs. The needs that they analyze, are basically what makes a family functional. These needs are things that each members needs to feel like they play a part in the unit. 4. The Interaction- Constructionist Perspective By means of interaction, humans construct socio-cultural meanings. The internal dynamics of a group of interacting individuals construct the family. Key Concepts Interaction Symbol Meaning Role Making Social Construction of Reality Destruction Postmodernism Theorist/ Individual Strength and Weaknesses- The strengths of this theory is that it looks at the family as a whole to see what is being done collectively to create the closeness. One of the weaknesses is that it does not look at the obvious, it should analyze the person that keeps the family together. Each member is following the lead of one person, who’s main goal is to keep the family together. What You Think- I think this theory basically analyzes family practices and what things, like rituals, bring them together, or create a apparent closeness. These are things that can be used to identify, or analyze another persons behavior, when they don’t come from a family like structure. 5. Exchange Theory- The resources that individuals bring to a relationship or family affect the formation,continuation, nature and power dynamics of a relationship. Social exchanges are compiled to create networks and social capital. This meaning that when people are engaged in social exchanges they limit their costs and maximize their rewards. Key Concepts Resources Rewards and Cost Family Power Social Networks Social Support Theorist/ Individual- Social Therapist Strength and Weaknesses- The strengths of this theory is that it analyzes relationships and people’s economic perspective on forming the relationships. The weaknesses are that the perspective analyzes the people’s economic perspective on forming relationships but it doesn’t analyze thoroughly what type of person they are, and how they attract friends, and form relationships. What You Think- I think this is a great theory. It basically means that when you are forming relationships with people you are analyzing what you can get from the relationship, as opposed to what you are giving in return, or what you have to bring to the table. It basically states the person with less committment to the relationship has more power.  This is because the person with less committments not the person competing for the relationship,as if they don’t care either way, whereas the other person actually cares and wants the relationship to bloom. 6. Family Systems Theory- The family as a whole is more than the sum of its parts. This meaning that the family, becomes whole, although it is comprised of interrelated parts. Key Concepts System- a combination of elements or components that are integrated and organized as a whole. Equilibrium- balance Boundaries- ideas about who is in the family and who is out  Family Therapy- Theorist/ Individual- Psychotherapist Strength and Weaknesses- Some of the strengths are that the theory is that it bases its theory off of research of the family and how it is comprised of different parts. One weakness is that it does not analyze the different personalities within the family as well as the family interactions to determine what keeps them balanced. What You Think- I think that the Family Systems theory is a theory that basically researches the family and it looks at a system as a combination of elements. This is good because it looks at how the family actually interacts together. 7. Conflict and Feminist Theory- Gender is central to the analysis of the family; male dominance in society and in the family is oppresive of women. It is the opposite of structure functional theory. The theory argues that human physiology, genetics, and hormones predisposed individuals to certain behaviors. Key Concepts Male dominance Power Inequality- Theorist/ Individual- theoretical scientist/ social scientist Strength and Weaknesses- Some strengths of these two theories are that they basically analyze what causes certain people to be treated unfair and unequally. It basically tries to ask and answer the question as to what makes males more dominant than females. One of the weaknesses is that it can not effectively  answer this problem, nor solve it because it still exists. What You Think- Conflict Theory analyzes unequal Power. Feminist Theory analyzes gender issues. 8. The Biosocial Perspective- Evolution of the human species has put in place certain biological endowments that shape and limit family life choices. Key Concepts Evolutionary heritage Genes Hormones Brain Processes Inclusive Fitness Theorist/ Individual- Behaviorist Strength and Weaknesses- One of the strengths is that it analyzes the fact that a persons environment helps shape them. One of the weaknesses is that their research found that they could not the factors considered were dependent upon each other, as opposed to just one. What You Think- I think that this theory basically analyzes how a person sees the world and how their behaviors are affected by their environment and family life. 9.Attachment Theory- Early Childhood experience with caregivers shape psychological attachment styles. This brings forth the idea that during infancy and childhood a young person develops a style of attaching to people. Key Concepts Secure Insecure Anxious Attachment Styles Theorist/ Individual- Behaviorist Strength and Weaknesses- some of the strengths are that it analyzes why kids act the way they do and how they get attached to people. The weaknesses are that it does not leave the door open to explain if they are conditions that worsen the child’s ability to attach to a person, or What You Think- I think that the theory is dead on and it explains why a child acts a certain way towards people they don’t know, meeting new people, and why they don’t want to be seperated from their care giver.

Influences of the Norwegian Language

Influences of the Norwegian Language Task A Do you have a rack at home with a CD player, tuner and equalizer? Or do you simply use a discman? If nothing else you may have a walkman? What kind of clothes do you wear? Is it a sweatshirt, jeans and boots? Do you eat fast food, or use a food processor to make something good? The Norwegian language is in relation to the majority of the worlds languages a medium-sized language. Most people are probably wondering whether the Norwegian language will survive in the next thousand years, or will more and more Norwegians go on to use English, so that within a short time, Norwegian will have gone completely into oblivion? So why do we really have all those English words in our language? There are several reasons for it, and thats what Im going to talk about in this article. I could have written 20 pages about the influence in the mass media for example, but I am going to focus on giving you a general overview of English influence instead. One of the reasons of this influence is that we constantly get new products, with English names. Just think of all those words that has followed with computer technology. Take for example: Software, hard drive and back up. Its entirely possible to find a Norwegian name for these new products, but I am not alone when I say that most people in Norway say PC (personal computer) instead of PD (personlig databehandler). English has a strong position as an international language in many areas of society, as in business, in science, in technology and not least in the mass media. American culture dominates in many areas in Norway. Ask yourself these questions: How many times a year do you go to the cinemas? On how many of those visits do you watch American films? Another thing is if you listen to a local radio station, I dont think that its wrong to say that 90% of the music being played is English. Previously it has been German and French who have given us the majority of foreign words, but today, it is English, which gives us the majority. It is said that English words and influence, is the biggest problem for the Norwegian language today. Education in Norway has been far better when it comes to English and it is said that the Scandinavian countries are world champions in English! Language Scientists believe that many English words from teaching at school go straight into the daily speech of youths. In youth environments its easy to be influenced by English. This applies especially to such persons who enjoy music. Pop and rap artists usually sing their songs in English. The young people learn the lyrics and use the English words in their everyday speech. Retail chains have found out that young people buy more clothes if the goods have English names, such as jeans, boots, shirts, and that young people eat chips, snacks and burgers. Advertising and marketing play a key role in the English influence. Words such as hot, happy, fun and sexy are often used to spice up their sentences and make the advertisements more attractive. Earlier all titles of English language movies were translated into Norwegian. Today however most movies keep their original titles, and only a few titles are translated, mainly movies meant for kids. Science is also a contributor to this. The United States has been leading the scientific research in the recent decades, and therefore new discoveries and theories are presented in English. Tons of new products and new product categories are created in the United States and spread worldwide with English names. Moreover, just think of something as ordinary as a car. There are many English words used. We say: gear, clutch, coil, choke, dash, etc. The technological development gives us many opportunities, but at the same time, there is no doubt that new technology and new media represent a risk for small language communities. Also local cultural activities and traditions are in danger of becoming more and more uniform in globalizations wake. Last but not least, we have everyday language and slang. We are messengers spreading the English on to others. One can, for example, say that some new expressions have come with immigration. Another thing is that foreign words are more likely to come into the language of a big city than in a small village. There are several people in a metropolis and, not to mention, several immigrants. These are reasons why the language is affected. We can adapt a lot of English words to Norwegian without major problems. This is especially true for words like stress, sports, bullying, plotting, tackling and smart. These words can easily be used in Norwegian, because they can follow the Norwegian inflection. But just as many words create problems in the system. Many of the words like jeans, thriller, image, seed, slide and walkman, are difficult to adapt to the Norwegian writing rules. We have become so accustomed to English being around us 24 hours a day, that we do not always notice its there. It has become so uncommon making own words, that many people find it funny when people resort to our own language elements and create a new word of them. When the word utblà ¥sing was launched as the replacement for the English word blow-out, there is no denying that some people wrinkled their nose a bit. Yet the word has now been through, and is an example of how words can seem a bit comical at first, but after a short time become quite natural to use. Sitting down in front of the computer at home today, you can communicate with people from all over the world. For only a hundred years ago it would have taken weeks from a letter was sent, to the recipient in another country would receive it. New technology has made the world smaller. Norwegian media are more likely to communicate with the foreign media, and therefore gain insight into foreign news. It is no longer for granted that one must study in Norway, or work here. Norwegians have become internationalized, and we know that there is more than Little Norway. The question on whether the Norwegian language is going to disappear, I personally think no, but it is frightening to think that in the future there may be a completely different Norwegian language than the Norwegian language we speak today. You are influenced by your mother, your father, your siblings, the boss at your job, the TV program you saw last night, the commercial that was shown before the television program you saw , you heard the radio broadcast on way to school this morning, the newspaper you read at the breakfast table. All this has given you English influence, perhaps without you even thinking of it. The world community has an impact on how language changes, and as long as people in society changes, the language will do the same.

Sunday, July 21, 2019

Itgc review of the foods fantastic company

Itgc review of the foods fantastic company Several months ago, you started working at a large public accounting firm as an IT staff auditor. You are currently working on your first assignment, an ITGC review of the Foods Fantastic Company (FFC). FFC is a publicly traded, regional grocery store chain, headquartered in Mason, Maryland, and includes 50 stores located in the mid-Atlantic area. The centralized data center is in Mason. FFC relies on an integrated suite of application programs that include state-of-the-art software to manage merchandise replenishment, store- level sales forecasting, and point-of-sale data. For example, FFC relies on bar code scanners and credit/debit card readers. To maintain its competitive edge in its market area, FFC recently implemented a fingerprint bio-coding payment system in all of its stores. This new systems implementation required that FFC change several of its general-ledger application programs; in particular, those related to its cash receipts processing. FFC does not use any outside s ervice organizations to provide its IT services. Sophie Ewing, the audit senior who heads up your team, decided that because of FFCs complex and sophisticated IT processing, an IT General Control (ITGC) review is man- datory to meet SAS 109s risk assessment procedures and SOX Section 404 Management Assessment of Internal Controls requirements. You know that an ITGC review is very important because ITGCs provide the foundation for reliance on any financial information FCCs systems produce. Your evaluation will affect the financial auditor in assessing the risk of material misstatement in FFCs financials, and consequently, the audit plan. At your first team meeting, Sophie announced that your firms network security specialists would review the technical issues related to FFCs internal controls. They will evaluate FFCs operating systems, its telecommunications software, and its network configuration and firewalls. In preparation for the meeting, Sophie encouraged you to review the key provisions included in SAS 109, SOX Section 404, applicable sections of PCAOB Auditing Standard No. 5, and your firms internal guidance, which groups ITGCs into the following five areas: IT management, systems development, data security, change management, and business continuity planning (BCP). IT managements key concepts include ITs position within the organization, whether IT goals are aligned with the organizations strategic goals, the use of an IT steering com- mittee, and whether the IT departments structure promotes proper segregation of duties to protect the organizations assets. Your primary concerns are: Does FFC have an IT strategic plan? To whom does the Chief Information Officer (CIO) report? What key responsibility areas report to the CIO? Does FFC have an IT steering committee? Is so, who are the members? Issues in Accounting Education, February 2009 Assessing Information Technology General Control Risk: An Instructional Case 65 Systems Development The key concepts within systems development include the existence of a new systems implementation methodology, project management, pre- and post-implementation reviews, quality control, adequate testing, and demonstrated compliance with the selected imple- mentation methodology. Based on this understanding, your teams primary concerns are: Does FFC design, develop, and implement systems in a logical fashion? Does the organization consider internal controls as an integral part of systems design or does it retrofit them after implementation? To what extent is FFCs Internal Audit department involved in systems development activities? Is it part of the project review team? Is it a voting member of the team? In particular, how well did FFC manage the development and implementation of its new fingerprint bio-coding payment system? Data Security The critical concepts within data security include adherence to an established infor- mation security policy, access approval on a need-to-know basis, periodic rotation or change of access controls, monitoring, exception reporting, and incident response. Data security has both physical and logical aspects. On the physical side, data security includes physical access and environmental controls over the data center computer room. On the logical side, data security includes policies related to password configuration, change, and history re- strictions. Logical security also includes prompt review, modification, or removal of access due to personnel transfers, promotions, and terminations. Your teams primary concerns are: How well does FFC control physical access to its data center computer room? Is FFCs computer room adequately protected against environmental dangers, such as fire? Does FFC control logical access to its information systems? In particular, how does it control the logical access of terminated or transferred employees? Does FFC have a current IT security policy? Does FFC produce access violation reports? Do FFC IT personnel adhere to IT policy and follow IT procedures? For example, do appropriate personnel review any access violation reports and take the prescribed action? Change Management Change Managements key concepts include documented change procedures, user au- thorization and approval, separation of duties in implementing changes, management re- view, quality control, and adequate testing. Your audit teams primary concerns are: Does FFC have (and follow) formal change management procedures? In particular, did FFC follow these procedures when making any necessary changes to its current application programs because of the new bio-coding payment system? For example: Were the changes approved? Did the programmers adequately test the changes before putting them into production? Did the application programmer(s) that made the code changes, test the changes, and/or put them into production? Business Continuity Planning Key concepts of BCP are managements expectations regarding a timely recovery of processing capabilities, the existence of a written plan, the currency of the plan, offsite Issues in Accounting Education, February 2009 66 Norman, Payne, and Vendrzyk storage of both the plan and data files, and testing of the plan. Your audit teams main concerns are: Does FFC have a written BCP plan? Is it current? When is the last time FFC tested its plan? Does FFC back up its software and data? How often? Where do they store the backups? Did FFC need to recover its systems using its backups during the past fiscal year? Information Collected During the ITGC Review Under Sophie Ewings direction, you and other members of the audit team worked very diligently reviewing FFCs policies and procedures, interviewing FFC client personnel, and observing FFCs various operations and procedures related to its ITGCs. First, your team created an organization chart to document the FFCs management structure (see Ex- hibit 1). Exhibit 2 reflects the information your team collected from interviews, observations, and reviews of corroborating documentation related to FFCs ITGCs. EXHIBIT 1 Foods Fantastic Company Organization Chart Executive Vice President and Chief Financial Officer (CFO) Senior Vice President and Controller Senior Vice President, Internal Audit Senior Vice President and Chief Information Officer (CIO) Senior Vice President and Treasurer Vice President, Applications Vice President, Operations Vice President, Information Security Vice President, Database Administration (Currently V acant) Issues in Accounting Education, February 2009 Assessing Information Technology General Control Risk: An Instructional Case 67 EXHIBIT 2 Foods Fantastic Company IT General Control (ITGC) Review Notes Notes from meetings with the Chief Financial Officer (CFO): Foods Fantastic Company (FFC) implemented a new bio-coding payment system in all of its stores this past fiscal year. FFCs IT Executive Steering Committee develops IT policies and reviews the overall operations of the IT department. The voting members of the committee are: 1. the Senior Vice President (SrVP) and Chief Information Officer (CIO) 2. the VP, Applications 3. the VP, Data Base Administration (DBA) 4. the VP, Operations 5. the VP, Information Security (IS) 6. the Executive Vice President and Chief Financial Officer (CFO) 7. the SrVP, Internal Audit The IT Executive Steering Committee revised FFCs security policy in 2005. The policy addresses all organizational security issues including IT. FFC has no documented business continuity or disaster recovery plan. Management believes such a plan is cost-prohibitive for an organization of its size and FFC has never experienced any major business disruption. In case of disaster, the data center manager would retrieve the most recent backup tapes that are stored offsite. FFC would use these files to recover its systems. Notes from meetings with the SrVP, Internal Audit: FFCs Internal Audit Department is involved as a voting member of the project teams responsible for design, development, and implementation of new projects. Internal audit performs post- implementation reviews on all projects over $2 million. The new bio-coding payment system was 25 percent over its initial time budget and 40 percent over its initial dollar budget. Notes from meetings with the CIO: The VP, Applications is currently responsible for the DBA function. However, the CIO reviews the logs that show the actions of the Application VPs user ID. FFC has an IT strategic plan, which is consistent with its corporate strategic plan. The IT strategic plan outlines the objectives and strategies that the information systems group will implement to assist FFC in meeting its overall business objectives. FFC adopted Structured Systems Analysis and Design Methodology (SSADM), an industry- recognized standard for systems development and project management. All projects (buy or build) follow the applicable SSADM phases. The CIO periodically reviews each projects required budget-to-actual reconciliation. FFCs security policy states that the VP, IS is to conduct a user audit on a quarterly basis. The appropriate department manager reviews electronically submitted reports that list each users profile, note changes on the reports, and return the reports to the VP, IS. The VP then makes the appropriate modifications based on the returned reports. The VP maintains the reports, and initials and dates the report after completing all modifications. Notes from meetings with the VP, Human Resources: FFC is currently interviewing individuals to assume the DBAs responsibilities and hopes to hire someone within the next six to eight months. Aside from the security policy, management does not provide any formalized security awareness programs related to data security. Each month, the Human Resources department forwards a Transfers and Terminations report to the VP, IS. (continued on next page) Issues in Accounting Education, February 2009 68 Norman, Payne, and Vendrzyk EXHIBIT 2 (continued) Notes from meetings with the VP, Applications: The VP, Applications assigns a project manager and develops an initial time and dollar budget for each new development project. IT personnel adequately tested the new bio-coding payment system prior to its implementation. This testing included integration testing, stress testing, and user acceptance testing. User depart- ments corroborated their testing and acceptance of the new system. Application programmers do not have access to the computer room unless escorted by data center personnel (e.g., an operator). FFC instituted formal procedures for change management. The VP, Applications is responsible for change management and maintains all documentation in a fireproof vault in his office. A Change Request form initiates all application software changes, including required software up- grades. A user completes the form, which the users department manager approves. The user forwards the request form to the VP, Applications, who logs each request in a Change Request Log. The VP performs an initial analysis and feasibility study and estimates the required devel- opment hours. The Change Request log is a listing of all requested changes and the status of the change request. The VP, Applications uses this log to track open items and follow up on changes not completed within the original time estimate. The VP, Applications assigns the change request to an applications programmer and issues the current systems documention to the programmer. The applications programmer copies the source code from the systems production region to its development region and makes the change. The pro- grammer works in the systems development region using test data. The programmer tests the change first within the affected module and then within the entire application. Changes are never tested against production data. The programmer updates the necessary systems documentation. The applications programmer migrates the code to the systems test region. A second programmer performs systems integration testing, volume testing, and user acceptance testing, again using test files. The second programmer then performs a quality review of the change, including a source- compare analysis, and reviews the updated systems documentation. Upon completion of testing, the user who requested the change and the appropriate department manager review the test results and accept the change by signing the original request form. The VP, Applications reviews the user-approved request form on which the department manager has indicated that s/he is satisfied that the program is ready for implementation. The VP, Applications also reviews the documentation prior to implementing any new or changed program to ensure that the documentation is adequate. The VP, Applications approves the change, initials the change request form, and transfers the change to the VP, Operations, who officially accepts the change. The VP, Applications then updates the Change Request log and returns the revised systems documentation to the fireproof vault. Notes from meetings with the VP, Operations: FFCs computer room, within its data center, is locked at all times. All outside contractors or visitors must first contact the data center manager for entry into the computer room. Each must bring an official picture ID, sign a visitors log, and be escorted at all times by data center personnel during the visit. In 2002, FFC installed video cameras on all doors entering the computer room to record activity 24/7. Building management staff, who report to the facilities manager, are responsible for main- taining these tapes. The VP, Operations has not needed to review these tapes for at least six months since no unathorized access attempts have been reported. Environmental controls are in place in the computer room (i.e., temperature controls, uninter- rupted power supply, a backup generator, fire-extinguishing equipment, and raised floor). Appro- priate maintenance staff test these controls semi-annually. FFC backs up all of its data each day. It stores its most recent daily backup once a week at a company-owned offsite location, along with the most recent version of its software. FFC did not test backup tapes during the past year and has no plan to test these tapes in the future. The VP, Operations assigns IT operations personnel the task of placing new or changed appli- cations programs into production after the VP, Applications has approved the work. (continued on next page) Issues in Accounting Education, February 2009 Assessing Information Technology General Control Risk: An Instructional Case 69 EXHIBIT 2 (continued) Notes from meetings with the VP, Information Security: The VP, IS grants keycard access to the computer room. The VP, IS receives a keycard access report for the computer room on a monthly basis. The VP, IS determines if an unauthorized access attempt into the computer room has occurred. Passwords are not displayed on terminals or reports. Password standards are enforced by security software. FFC requires a minimum password length of six alphanumeric or special characters and a maximum length of nine alphanumeric or special characters. The software prevents the same character from being used more than once in a password and prevents numbers from being used next to each other in a password. The security software forces users to change their pass- words twice each year. The security software maintains a history of two previous passwords and does not permit employees to reuse their two most recent passwords. The security software does not display statistics regarding employees sign-on information. For example, there is no infor- mation regarding a users sign-on attempts (such as date and time of last sign-on), number of invalid sign-on attempts since last successful sign-on, or number of days prior to password expiration. The system allows three access attempts. If the third attempt is unsuccessful, the user ID is automatically disabled. The user must contact the VP, IS to reset the user ID. The system gen- erates a logical access violation report on a daily basis. User access is limited to workstations within the corresponding responsibility area. For example, users with access to the Accounts Payable module can only log in from workstations located in the Accounts Payable area. A workstation can stand idle for up to 60 minutes before the user is logged off. The VP, IS is responsible for maintaining user profiles and authorization lists. The VP grants access to the system to new hires. The appropriate department manager completes a computerized form that specifies the proper level of access. The VP reviews the request form for proper approvals and then either approves or denies the request. If approved, the VP issues the necessary ID and initial password with the requested access via encrypted email. Normal users may have multiple IDs. Each user ID can log on to one sign-on session at a time. The VP, IS, who has unlimited access, can log in from any workstation and have multiple sign- on sessions. The VP, IS is responsible for modifying and/or disabling user IDs for personnel whose job duties change because of promotions, transfers, and/or terminations based on the Transfers and Ter- minations report. The VP, IS maintains the report, and initials and dates the report when the VP, IS has made all of the modifications. Notes from meeting with the facilities manager, who reports to the VP, Human Resources: According to the facilities manager, no one asked to view the computer room video tapes during the past six months. Observations of the audit team: Documentation of the systems development process for the new bio-coding payment system confirms that the VP, Applications complied with SSADM requirements when implementing this new system. The data center is on the first floor of FFCs building. The data center manager reports to the VP, Operations. Company policy requires the VP, IS to review the keycard access report at least once per quarter. During the past six months, the VP has not reviewed the report for any unauthorized access attempts. The team observed no instances in which application programmers were in the computer room without a proper escort. The team observed no instances in which visitors or outside contractors were in the computer room without a proper escort. (continued on next page) Issues in Accounting Education, February 2009 70 Norman, Payne, and Vendrzyk EXHIBIT 2 (continued) Documentation of the computer room environment controls test results for the last 18 months shows no irregularities. These files are in the CIOs office. If someone attempts to enter the computer room without authorization, company policy requires that the VP, Operations review the video tapes from the computer room cameras within 24 hours. The FFC security policy requires each employee to sign an acknowledgment that s/he read the current policy. A review of the personnel files of a sample of employees found no exceptions. A review of the selected user profiles and passwords revealed the following: User Vice President, Applications Vice President, Information Systems Password 7LiAcOf# QSECOFR1 Note: The acronym QSECOFR looks familiar. Remember to review A Beginners Guide to Auditing the AS/400 Operating System (Bines 2002). During the past six months, the dates of the modifications were about three weeks after the VP, IS received the HRs Transfers and Terminations report. The VP, IS performed the most recent user audit eight months ago. Company policy requires the VP, IS to review the unauthorized system access report on a monthly basis to check for unusual activity (e.g., multiple violations, changes to the authorization lists, etc.). During the past six months, the VP, IS has not reviewed the report for any unauthorized access attempts. The audit team verified that FFC followed its approved change management procedures when making the bio-code payment-related changes to its cash receipts processing and other financial reporting application programs. In the past fiscal year, no incidents occurred that required FFC to recover its systems using its backup tapes. Case Requirements Sophie Ewing assigned your team the following tasks: 1. For each ITGC area, identify the control issues and classify them as strengths or weak- nesses, using Exhibit 3 to document your work. Exhibit 3 will be part of the audit teams work papers. 2. Determine the level of risk (High, Medium, or Low) that you believe is present in each particular ITGC area. 3. Assess the overall risk of the organizations ITGCs, taking into consideration the five separate risk assessments that you just made (task #2 above), and their relative impor- tance to internal controls over FFCs financial reporting. 4. Prepare a report that documents and appropriately supports your overall IT risk as- sessment (task #3), using the guidance Sophie provided in Exhibit 4. You must include a statement explicitly stating your overall risk assessment in the reports concluding section and attach your completed ITGCs matrix. Issues in Accounting Education, February 2009 Assessing Information Technology General Control Risk: An Instructional Case 71 EXHIBIT 3 Foods Fantastic Company IT General Controls Matrix Part A: Strengths and Weaknesses ITGC Area Summary of Issue Strength or Weakness IT Management FFC has an IT strategic plan Strength Part B: Risk Assessment for each ITGC area (Indicate Low, Medium or High) ITGC Area IT Management Systems Development Data Security Change Management Business Continuity Planning Risk Assessment Issues in Accounting Education, February 2009 72 Norman, Payne, and Vendrzyk EXHIBIT 4 Report Guidance IT General Controls Risk Assessment Report Foods Fantastic Company Students Name Date Background: Write a short description of Foods Fantastic Company (FFC) and why the ITGC review is necessary (2-3 sentences). Purpose: Briefly describe the purpose of an ITGC review and why it is important (2-3 sentences). Scope: Provide a short description of the work your team performed at Foods Fantastic to develop your risk assessment (3-4 sentences). Findings: Elaborate on the key finding(s) that influenced your overall risk assessment. Discuss the key control strengths and weaknesses you identified within each of the five ITGC areas and its corresponding risk assessment. Provide enough detail to support your assessment. Include specific examples from the information your team collected (interviews, observations, and reviews of corrob- orating documentation). Your arguments need to be consistent with your risk assessment for the five different areas, as well as your overall risk assessment (4-5 paragraphs). Conclusion: Provide a statement of your overall risk assessment. For example, I set FFCs assessed level of ITGC risk as (Low, Medium, or High) because of . Summarize the primary reasons that contributed to your assessment. Keep in mind the relative im- portance of each of the five ITGC areas in controlling FFCs financial reporting (3-4 sentences).

Saturday, July 20, 2019

The History and Role of Accounting in Business Essay -- Accountant, Eco

Accounting can be defined in a number of ways, but I chose the book definition, which is; Accounting is an information system that provides reports to stakeholders about the economic activities and condition of business. The person in charge of accounting is called the accountant. The accountant is typically required to follow a set of rules and regulations. These rules and regulations are called the General Accepted Accounting Principles. Throughout these next few paragraphs, I will be giving you the history and evolution of accounting, and I will be explaining who the stakeholders are and what type of information they require, and I will be explaining the role of accounting in business. There will be many examples and type of business decisions throughout this whole paper. The history of accounting dates all the way back to the fourteenth century. In 1494, Luca Pacioli, first published and printed his accounting book in Venice, Italy. Pacioli’s book included a 27-page step by step guide on bookkeeping. In his book Pacioli, introduced symbols for plus and minus for the first time in a printed book. His accounting book contained the first known published work of double-entry, and it was said that this laid the foundation for double-entry bookkeeping in the world today. Double-entry was defined as any accounting action that required a debit and credit transaction for each transaction. The very first known accounting book to be discovered in the English literature was published and printed in London, England by John Gouge in 1543. Accounting can be broke down into four categories; Financial, management, open-book, and tax accounting. Financial accounting can be defined as a major branch of accounting involving the collection, re... ...n’t be following the rules of bookkeeping which are also known as the (General Accepted Accounting Principles.) That’s why the accounting equation and accounting are so important to everyday life and business. In the future, I see the role of accounting being the same as it is today. I see it being the same because the companies might change, but they will always need accounting in one way or another. No matter what company it is, a company will always like to know what it owns, and a company would always like to know who they owe, Without this how would a company be able to run efficiently and maximize profit. Although all companies don’t aim to maximize profits, majority of the companies in today’s world do. Unlike other jobs, I believe that accountants will always have job, cause as long companies are up and running, they will need somebody to run there books. The History and Role of Accounting in Business Essay -- Accountant, Eco Accounting can be defined in a number of ways, but I chose the book definition, which is; Accounting is an information system that provides reports to stakeholders about the economic activities and condition of business. The person in charge of accounting is called the accountant. The accountant is typically required to follow a set of rules and regulations. These rules and regulations are called the General Accepted Accounting Principles. Throughout these next few paragraphs, I will be giving you the history and evolution of accounting, and I will be explaining who the stakeholders are and what type of information they require, and I will be explaining the role of accounting in business. There will be many examples and type of business decisions throughout this whole paper. The history of accounting dates all the way back to the fourteenth century. In 1494, Luca Pacioli, first published and printed his accounting book in Venice, Italy. Pacioli’s book included a 27-page step by step guide on bookkeeping. In his book Pacioli, introduced symbols for plus and minus for the first time in a printed book. His accounting book contained the first known published work of double-entry, and it was said that this laid the foundation for double-entry bookkeeping in the world today. Double-entry was defined as any accounting action that required a debit and credit transaction for each transaction. The very first known accounting book to be discovered in the English literature was published and printed in London, England by John Gouge in 1543. Accounting can be broke down into four categories; Financial, management, open-book, and tax accounting. Financial accounting can be defined as a major branch of accounting involving the collection, re... ...n’t be following the rules of bookkeeping which are also known as the (General Accepted Accounting Principles.) That’s why the accounting equation and accounting are so important to everyday life and business. In the future, I see the role of accounting being the same as it is today. I see it being the same because the companies might change, but they will always need accounting in one way or another. No matter what company it is, a company will always like to know what it owns, and a company would always like to know who they owe, Without this how would a company be able to run efficiently and maximize profit. Although all companies don’t aim to maximize profits, majority of the companies in today’s world do. Unlike other jobs, I believe that accountants will always have job, cause as long companies are up and running, they will need somebody to run there books.

Friday, July 19, 2019

Excellence Redefined :: essays research papers

Excellence Redefined   Ã‚  Ã‚  Ã‚  Ã‚  The 1980’s has been called the â€Å"me† generation, the decade of materialism, and was responsible for the greatest number of mergers and takeovers in the history of the US market. People were transformed by the power of money, and tried to take advantage of the opportunities in the stock market. The stock market has never guaranteed a profit, but there were those willing to take the risk. People have lost millions from speculating on what was supposed to be a â€Å"sure thing† in the stock market. People would bet their children’s college fund, and their retirement money on a stock tip, only to find bankruptcy the next day. But the growing desire for power and money caused people to achieve success by any means necessary, regardless of the legality. Ivan Boesky and Michael Milken bet their money, but they always seemed to win, even when others would lose. It turns out that they had many â€Å"sure things,† only with one problem : they were all illegal. Boesky and Milken characterize the rest of the financial world at the time, and Wall Street is the movie that exemplifies the such attitudes of the 1980’s from Oliver Stones accurate point of view.   Ã‚  Ã‚  Ã‚  Ã‚   Boesky and Milken had a great system. They would befriend executives in â€Å"blue chip† companies or merger and acquisition lawyers , hoping they would be given information regarding takeovers and mergers of companies before the common public. When Boesky and Milken received such information, they would strategically buy a massive amount shares in a particular company, and simply wait for the corporate announcement to drive the price of their stock up. In an effort to alleviate the Securities and Exchange Commission, Boesky and Milken spread their purchases over a period of time, and each was funded by different offshore and domestic banks to misrepresent the number of buyers. When a company would makes its corporate announcement about the merger, the public would then begin buying the shares, causing the price to skyrocket. Boesky and Milken had purchased the stock so long ago and at such a low price that their profit expectations were quickly met, so th ey wanted to sell everything they had at the same time everyone wanted to buy. Because they owned such a massive amount of stock, there was no liquidity in the market in the market as Boesky and Milken were willing to sell for much less than the market value, and their profits soon became the loss of the public.

Word Processing, Database and Spreadsheet as Applications of Productivi

Word Processing, Database and Spreadsheet as Applications of Productivity Software Throughout the course of a person’s life, he or she will probably use a computer, which maybe for school, work, or personal reasons. These tasks could become tedious and long. But, there is certain software that has been developed to ease the difficulties of getting these things done. Productivity software can help to make people’s activities more effective as well as efficient. Three widely used applications are word processing, database, and spreadsheet. Word processing is a popular application that is used for creating, editing, and formatting text-based documents. These documents include letters, memos, reports, fax cover sheets, mailing labels, newsletters, and many others. All of the things can be formatted by changing fonts and font size, changing the colors of characters, and organizing text. Many other functions are applied by word processing. Changing margins, adding and deleting text, adding clip art and pictures, finding and replacing text, using headers and f...

Thursday, July 18, 2019

Land Rights Essay

The land rights debate in the 1970’s was a tough and hard-fought journey for the Aboriginal people. In the 1967 Referendum, Australians showed their support for the Aboriginals, by voting to change the Constitution to include the indigenous in the Census and giving overriding authority to the Commonwealth government regarding Aboriginal affairs. Ralph Hunt, of the National Coalition Party and Federal Minister in 1971 stated ‘To just set aside land because Aboriginal groups and tribes believe they have a special right to it tends to only perpetuate the tribal system’, explaining that Indigenous people did not have the power nor authority to regain land that they believed belonged to them. However, by this stage, Aboriginal people were ‘less inclined to have white politicians deciding upon their best interests’. The quotation particularly reflected the ‘Assimilation’ policy in reference to the Indigenous people. In 1970, the Aborigines Adva ncement League had sent a petition to the United Nations, requesting that the union use its powers to uphold Aboriginal rights to the land. This strategy also failed. On Australia Day 1972, Prime Minister McMahon also supported Hunt’s views in publicly stating that Aboriginals did not have a right to any land or compensation, while also declaring that mining was permitted on Aboriginal reserves. On that same day, an Aboriginal ‘Tent Embassy’ was established on the front lawn of the Parliament house, protesting to secure land rights. The embassy became the focal point for protests against denial of rights for Aboriginal people. Regaining control of the traditional land was crucial to the Aboriginal people, as all means of their identity, spirituality, and the Dreaming shared an inextricable link with the land. The government was surprised by the amount of public support for the Aboriginal cause. A significant point in the lands right debate eventuated following the Labour Party’s Gough Whitlam’s reign as Prime Minister. Whitlam supported the land rights of Aboriginals and believed people should ‘contemplate what a British government would do’. Within Whitlam’s years as Prime Minister, he produced ‘one successful land claim’: by legally ‘handing back’ the deeds to Vincent Lingiari of the traditional Gurindji lands at Wattie Creek, NT in 1975. This however only provided the people with ‘leasehold of their tribal land’. Most of the actions regarding Aboriginal Land Rights in the 1970’s were symbolic, however no real ownership was  achieved. Question 2: The introduction of the ‘Mabo Judgement’ and the ‘Wik Decision’ were pivotal in the development of the Land Rights movement. The Mabo Judgement, named after Eddie Mabo, recognised the native title of the Merriam people to their original land, the Murray Islands. Up until the Mabo Judgement in particular, the government had decided Australia was not occupied prior to European settlement for legal reasons, or what has become known as Terra Nullius, meaning land belonging to no one. The High Court’s Mabo decision of 1992 acknowledging Native Title was based on the recognition of the spiritual links between the people and the land, and may continue to exist provided Indigenous groups continue to observe their traditional laws and customs. The Mabo decision also made clear that native title had been extinguished over freehold land. This meant that there was no risk of suburban homes affected from land claims, as most private land in urban Australia is freehold. The Mabo judgement was the initial step in recognising the Aboriginal’s link to their traditional lands, and became the first positive push for the Land Rights movement. The ‘Wik Decision’ of 1996, developed after the Wik people had sought Native Title over traditional lands which were under pastoral lands leases in north Queensland. The Wik decision meant that Aboriginals and native title may coexist with pastoral leases. However, if conflict arose, pastoral leases would prevail over native title. As approximately 42% of Australia was covered by pastoral leases, the decision gave many Aboriginal citizens the right of access to traditional lands, provided they did not interfere with the landowners. The Wik decision was a significant phase in the Land Rights movement, which, for the first time, provided Aboriginals with a legal positio n to claim their traditional land. In 1997, the Liberal Howard government reacted to white Australian protest, referred to as ‘white paranoia’, by introducing the 10 Point Plan, which would greatly restrict the rights of Aboriginals. This Plan made it much harder for Aboriginals to register a claim for native title, due to the tougher registration test. The 10 Point Plan developed into the inauguration of The Native Title Amendment Act of 1998. In reference to Frank Brennan, the act ‘allowed at least the rights to hunt, fish, camp and have ceremony’, which reflects the view that  Aboriginal rights had been minimalised. The amendment act, initiated by the Howard Government expelled the right of Indigenous people to negotiate on pastoral leases, giving leaseholders the ability to carry out a range of activities, under the category of ‘primary production’, on the land without consultation with the Aboriginals. After all the progress of both the Mabo and Wik judgements, this was a significant setback in the development and growth of the Aboriginal Land Rights movement.

Wednesday, July 17, 2019

Chapter Three Doc

CHAPTER triad METHODOLOGY 3. 0 INTRODUTION This chapter deals with seek order. The research methodology applied for the purposes of this record cover argonas like research material body, tribe of watch, try technique, information collection method, selective information synopsis method and limitations. 3. 1 RESEARCH frame query design is therefore a plan for a research work, which aims at providing guidelines, which the research work is being conducted. The study employed a descriptive glance research design.A survey research design seeks to obtain information that describes existing phenomenon by asking individuals nigh their perceptions, attitudes and values (Mugenda and Mugenda, 2003). descriptive survey research design is the self-opinionated collection of data in govern form from an identifiable world or representative (Oso and Onen, 2009). This design was adopted for this study because it intensively described and analyzed the fibre of employee welf are servi ces on productivity of the employees of the case company. The method of questionnaire and interview are employ in data collection.Data are presented in tables and a descriptive method is adopted in analysis. 3. 2 world OF THE STUDY According to Mugenda and Mugenda (2003), target population is the members of a real or supposed set of people, events or objects the researcher wishes to popularise the results of the research. The study targeted a population of about 400 comprising of clerical staff, officers, senior officers, middle-level managers, and top level managers that constitute the men of Leadway Assurance Limited. 3. 3 SAMPLING proficiency AND SAMPLING SIZEThe method of sampling used is proportional stratified random sampling. first off the whole population of employees is divided into incisions, and a specific number of employees from each department were selected for the survey. The sample size of 100 employees was fasten on from the population. Mugenda and Mugenda (2003) observe that 30% of the target population is a good representation of the study. 4. 4 DATA COLLECTION METHOD The data for this study will be quiet through the administration of structured questionnaires to a sample of employees selected from the head office.One hundred copies of the questionnaires were administered haphazardly to on the sampled employees. Eighty five (85) copies of the questionnaires were duly completed and returned which formed the basis of the analysis, piece 15 of the questionnaires were considered as non-returns. The questions were tailored along a four point likert scale. The responses were coded and mapped into numeral values the following mapping exists strongly agree = 4 point, Agree = 3 points, Disagreed = 2 points, Strongly disagree =1 point (Azika,1991). 3. 5 DATA summary METHOD The study adopted descriptive statistics in its analysis.Descriptive statistics according to Mugenda and Mugenda (2003) includes the statistical procedures that plea d indices that summarize data and describes the sample. Presentation of data was done by the use of charts and tables. The data collected was analysed using pie charts, tables and percentages. Due to the intensity of the data involved Statistical Packages for mixer Sciences (SPSS) was used employed to perform the statistical analysis. REFERENCES Madumere S. C (2012) A Guide to Research Methodology Vitaman publishers Lagos Mugenda, O. M. & Mugenda, A. G. (2003), Research Methods Quantitative and soft Approaches.Nairobi Acts Press. Oyaide, W. G. , 1977. The Role of Direct Foreign enthronement A case study of Nigeria, 1963-1973. unify Press of America, Washington D. C. Root, F. R. , 1984. International take and Investment. 5th Edn. South Western outcome Company, Cincinnati, Ohio. Serven, L. and A. Salimano, 1992. Private investment and macro scotch change A Survey. World Bankobserver, 7(1). Tadaro, M. P. , 1999. Economic Development. seventh Edn. , Addison Webley Longman Inc. R eading Massachusetts. Voivodas, C. S. , 1973. Exports, foreign capital and economic growth. J. Int. Econ. , 3(1).

Tuesday, July 16, 2019

Retail food protection

Retail food protection

Necessity items like milk and white bread are observed at the back of the shop to how improve the beginning of circulation.The main purpose of the national food public safety program proposed by FDA is to reduce the cases of percent foodborne diseases. These are the diseases caused by pathogenic bacteria how that occur in the food when it is stored improperly or when the expiry date is past. Though rarely dangerous, food poisoning weakens how our body and can provoke other conditions as dysbacteriosis.FDA protects us from the pathogens that may be manuscript found in food but it does logical not ban GMO or any synthetic substances in food.There is A home kitchennt an approved facility.Your data will stay so that every calendar year, you wont great need to re-enter it stored, and you may significant change it as frequently as you would like.

Additional financial resources are found on supermarkets and the grocery large stores and retail places web pages.With the rise of the good food processing industry and the beginning of industrialization, a wider vast array of food can be sold and distributed in distant places.From christ our standpoint, it is tough to label second one solution since the POS software solution for every retailer.For clarification, each individual store ought to have a poetic license using a ID that is unique.

Traditionally, general many shops have provided credit to their clients, a scientific method of payment is successful on trust in place of charge cards.Update apply Your Contact Information As a part of IFSA, its physical vital for your company to get available data and all of the institutions communications.Huge companies and other businesses in emerging markets are more inclined to create corporate social responsibility a concern.If youre interested in advancing and building your long career we welcome you to finish an wireless internet program now.

It is given a specific first time to correct the violation.A plant known as the Potato poor Tom is offered in New Zealand.In the long run, prices are anticipated to stabilize.Diabetes rates in america have quadrupled over the previous 3 decades.

Monday, July 15, 2019

Generation gap Essay

When we confabulation much(prenominal) than or less mobilizeing, and on that pointfore in right aways prompt changing scenario, the junior extension baffle to a greater extent unimaginative, much wild, more bumptious and driven then the grayer multiplication. presently days, supremacy suffer a go enunciate in amidst the jr. genesis and young contemporaries is assay to grasp this countersign at either cost. Now, the challenge is arises that What is the study(ip) origin tush this ambiguous un dealness? slews of conclusions be standardisedwise on that point simply I think e very(prenominal)where ambition, edacity of capital, mesmerise human being drawing card is the major reasons female genitalia this going. overdue to these reasons, we halt to strikingness hemorrhoid of problems like self-destruction judge deem asleep(p) up, which is a number of concern. The disgust fuck out is likewise firing on and it is make by amidst 16 to 22 days old junior childrens, which is non pricyness at all. In virtually of the abhorrences we institute that closely of the students or children withdraw through with(p) crime in the scratch line clip of their feeling. This is not good password at all. The turn up throat controversy encour maturates our young peoples to dumbfound the saucyfangled strategies to sell second gear decisions, and patch up their deliver future day deputation as they want. there is no soul of enjoyment and merriment in young extension. Now, if we be talking more or less sr. multiplication then in earlier, the fame, money and gratification was come with their matureness post and with their years to a fault. onetime(a) contemporaries save more practical experience. notable Today, forget tomorrow is the primary(prenominal) aim of nows generation. I think, this head is an fadeless outcome and a very dour root word which retort a circle of con clusion. We empenn get on witht pass up the age cistron and the age difference to a fault simply there atomic number 18 slightly factors that ar responsible like nows uncomplicated do feeling make younger generation life so easy. They (young people) buns good issue what is the incumbent affair, who is online, what ar new purpose and umpteen more. I meet that former(prenominal) the younger generation becomes more over control panel alone it is also primal for them to venerate their senior(a) generation thoughts. So, I flock safely state that younger generation is faraway ahead(predicate) than their earlier generation isnt.

Sunday, July 14, 2019

Educational Needs Assessment Essay

proceed statement plays an classic enjoyment in the ripening of c be for master copys in each health armorial bearing insane asylum (Waddell, 1991). However, several(predicate) asylums cave in contrastive sine qua non to steer with respect to their nurses nonrecreational competencies (Gould et. al. , 2004). jibe to Billings & Rowles (2001), the autochthonic movement that insertions abide to break up is what e specific(a) raisingal involve their nurses hand that atomic number 18 more than or less pertinent to the operative surroundings.This root word seeks to settle and prioritise the involve of the medical examination-Surgical/ trick bug come forward warmness commute Oncology nurse whole of Sutter medical exam relate, capital of California by means of the judicature of a inspect questionnaire to a type of vii (7) registered nurses and a soft compendium of the results. terra firma Sutter medical Center is a non-profit infirmar y that specializes in providing knifelike and in advance(p) deal out to diligents live in capital of California and the skirt bea.Its mission is to bring stand the bacon line uping primordial and third maintenance on with a continuum of serve to decease the health grapple demand of the con kind passim northern California. During the fore discharge year, the hospital has been fitted to impart 58,274 affected role eld disseminate across 7 (7) hospital social building blocks with 20% of which entryway from the nurse whole of pursual to the pick up. The social unit has 14 registered nurses with vari fit aims of advance and interpret.Results on that point were vii disc both oer questions inquired from the s purge near registered nurses that name 50% of the arrive unit population. base on the analytic thinking of the results, the feature atomic number 18as w here that the nurses intuitive feeling should be the centralize of few(prenominal) raisingal architectural planme of the brass admit chem oppositewise(a)apy forbearing heraldic bearing, superior essay c be, cardiac pinch protocols, transmission system control, and telemetry.These were the punt such(prenominal) menti whizd pinnacleics byout the questionnaire and thusly pay back on to be the most chief(prenominal) concerns fit in to the nurses surveyed. From the nurses responses, it is presum equal to(p) that umpteen of the nurses field of operation these subjects as nether violateed in their pro take in and as such, they be truly escaped to chthoniangoing bring forward breeding in rules of site to be damp equip in the go away tongue to beas. roughly of the nurses prioritised special topics on long-suffering c atomic number 18 repay fitted to the queen-size tote up of perseverings submit toing chem early(a)apy. Others demand apprehendedness prudish filtrate direction as a precession and demeanour that turn they atomic number 18 furnish with the intimacy to carry on efficaciously for patients, they very much realize themselves upset out in the act and just about commented to eventu anyy macrocosm in call for of care themselves beca utilization up of the demands of the prepare environment which they count that bay window travelling bag more forceively with catch discipline.With visualize to how this new-made pedagogyal course of study should let out be carried out, the nurses surveyed had varying evokeions barely what was customary among them is the mouthful of nontraditional cultureal course of instructions over constituted programs such as very going foul to an existence and enrolling in a course that whiz has to be sensiblely look to see to it. The nurses in general preferable unrivaled of cardinal options which are both to short-change under the expertness of see mentors at consort or to get enrolled to onli ne familiarity classes at home.These preferences punctuate the underline that the nurses are al exacty experiencing at scarper which leaves them with no free energy go forth to real heed but studies by change of location to an institution and cosmos physically reconcile to attend class. Hence, approximately of the surveyed nurses preferable to blend survive at and study by undergoing quick finishment under mentors who are experts at exceptional fields.The other half(prenominal) of the nurses surveyed preferable to acquiesce through online courses that they coffin nail s scum bag at the comforts of their home and accomplish at their declare pace. customary strengths character referenced by the nurses surveyed implicate the ensure gained as nurses in the institution along with their blind drunk attainment with the use of menstruum technology. The nurses justifiably take up that their movie to sundry(a) mail servings have honed their abilities in relations with the equivalent situations.However, they withal conjure that this is non the outstrip elbow fashion to learn as it places patients at any(prenominal) adventure when they are discussion a situation with the patient for the premiere quantify. Nurses conceptualize that their expertise in utilizing meshwork resources would kick them to have better get at to proceed reading since on that point are many vary treat courses visible(prenominal) online. furthermore even without enrolling in online courses, the profit adds knowledge sources that the nurses base access for free.Still, some commented on the level of reliability that these sources have. On the other hand, plot the surveyed nurses assert that their experience has alter their competency, they alike de nonation the demanding responsibilities condition to them at work for their softness to watch other trainingal courses in their profession. any(prenominal) opposeed that the c onviction that they cast amongst work and their families often bring about up all the m that they have, and cite this feature as one of the major(ip) weaknesses in undergoing an educational program.In analyzing the experiments assessment of hospital charges sensibility to their hold for more specialised education, on that point is a world(a) dissatisfaction perceive found primarily in the softness of focus to respond to the staffing require of the unit. The nurses di mental strained that tour in that respect are some educational programs being offered by the institution, these programs only when crumbnot be availed of by many of the nurses because of the physical and kind hugs brought about by their workload. whizz restraint to education that was extremely customary with the examine is the insufficiency of cartridge clip callable to the 51 nurse-to-patient ratios that the hospital has not been able to purify over the ancient years. Nurses pauperism to prioritize their patients over other master key responsibilities and so proceed education takes a backseat. several(prenominal) of the nurses also suggest that the hospital should give incentives to nurses who are unstrained to undergo additive nurture and education in order to trip nurses to ensure oneself the clipping for the task. closethither is understandably a contract to effect efficient educational programs for the Medical-Surgical/ tog out marrow squash transport Oncology nursing building block of Sutter Medical Center. The nurses surveyed all agree that an efficacious program get out be able to depict them with much mandatory professed(prenominal) study that they piece of tail use to reform the general tone of voice of service that they provide for their patients. However, the prohibition of a extremely toxic work caused by understaffing motif to be turn to graduation ahead any program can be apply that can becharm the wager of the un it nurses.Thus, the top priority posit of the unit involves the founding of a stress management program that would be able to serve up the nurses coping with their demanding responsibilities superpower be rough-and-ready in fetching out some of the pressure and allowing room for the nurses to control professional training programs and schoolman work. A alternative need would be to manner of speaking cognitive content that the nurses feel are deficient in their professional competence such as specialized subjects in chemotherapy patient care among others mentioned in the survey.It is pass judgment that base on the presidential terms thrust, they forget be opened to the results of this study and conduct efforts to stand by their nurses find the time to develop professionally.ReferencesBillings DM, Rowles CJ. (2001). schooling of chronic nursing education offerings for the foundation long Web. J Contin Educ Nurs. 32(3)107-13. Gould D, Kelly D, face cloth I, Chid gey J. (2004). training demand analysis. A literary productions recapitulation and reappraisal. Int J Nurs Stud. 41(5)471-86. contact here to read Waddell DL. (1991). The make of continuing education on nursing hold a meta-analysis. J Contin Educ Nurs. (3)113-8.