Tuesday, December 31, 2019

Domestic Violence is Very Real And Common in The UK - Free Essay Example

Sample details Pages: 10 Words: 2972 Downloads: 1 Date added: 2017/06/26 Category Law Essay Type Analytical essay Level High school Tags: Domestic Violence Essay Did you like this example? Domestic violence is very real and common in the UK, and indeed internationally In the UK domestic violence accounts for a quarter of all crime, despite these figures it is recorded that only 5 per cent of recorded cases of domestic violence end in conviction, less than 20 per cent of rapes and sexual assaults are reported to the police, and less than 6 per cent of rapes result in conviction. Wells points out as a comparison, the number of women that are in prison, and the seemingly trivial reasons for there incarceration. There are now over 4,500 women in prison, an increase of 194 per cent in the last ten years. Most women are convicted of non-violent offences, such as shoplifting. One woman out of 12 judges in the House of Lords, 5 women out of 43 police Chief Constables, 18 women out of 42 Chief Officers of Probation, 7 women out of 42 Chief Crown Prosecutors, 31 women out of 138 Prison Governors. There was evidence of sexual harassment and discrimination experienced by women working in the system. Domestic violence is not discriminatory and occ urs between people of all social classes, amongst all racial and religious groupings and in all age groups. Crime and other statistics can only provide us with a taster of the real picture. The nature and extent of the suffering which is endured by families behind closed doors is very much something that is kept private. Victims of domestic assaults often do not complain of violence, either through fear of being further assaulted, or because they are too embarrassed and ashamed to reveal their plight to professionals who might be able to assist them. Although the traditional perspective is that victims of domestic violence are predominately women, this is not always the case, men, children and the elderly are vulnerable to domestic violence too. This said there is an abundance of evidence to show that it is women and children who are the main victims. Children who themselves suffer violence at the hands of a parent are in the main protected by the state though child protection procedures. The remedies provided by the civil law are therefore generally used to obtain protection for an adult victim. As Subedi points out There are several causes of violence against women. These range from historical unequal power relations between men and women to cultural perceptions, womens sexuality, inaction on the part of the agents of the State to the traditional perception in law and practice that matters within the family and between a husband and wife are basically private matters in which outside or State involvement should be kept to a minimum. Unlike other forms of crime, the problem with domestic violence has been that even the law itself is not well- developed and the law that is there on this issue has not been enforced as vigorously as possible. It is from this premise that efforts have been made in the recent past both at national and international level to strengthen the law on traditional patterns of violence and to expand the scope of the law to cover new forms of violence. While the problem often encountered in this process at national level is the doctrine of privacy and the concept of the sanctity of the family, the dichotomy of the public/private sphere is the problem at international level. In the UK, domestic assaults are criminal offences and a man who attacks his wife can be prosecuted for his actions. He may be charged with one or more of various offences against the person included the offence of rape. The Protection From Harassment Act 1997 introduced strong measures to assist those who are victims of a course of conduct, which amounts to harassment and made such conduct a crime. However, victims of domestic violence and harassment may be reluctant to become involved in the prosecution process for a number of reasons. These include the realisation by the victim that the matter is no longer under her control once she has reported an attack to the police. It will be up to the police to decide whether and h ow they wish to investigate her complaint, and it will be the decision of the Crown Prosecution Service whether or not to go ahead and press charges. This loss of control acts as a disincentive to women to report incidents of violence, as they may well fear the consequences of their action if the police and Crown Prosecution Service fail, as they see it, to respond in an appropriate fashion. In the past the police have been unwilling to intervene in cases of domestic violence, and to prosecute offenders. This perception of the police as unwilling to come to the assistance of victims of domestic assaults is still evident today, even though domestic violence is taken much more seriously by the police than in the past, and even though police practices in many areas have changed radically in favour of the victim. Figures from British Crime Surveys suggest that domestic violence forms the largest single category of violent crime. In a survey carried out by Davis and Gretny re vealed that of a total of 448 assaults, all of which were referred to the CPS, there were 243 (54 per cent) non-domestics and 205 (46 per cent) domestics. If the British Crime Survey finding that domestic violence comprises 20 per cent of all assaults can be believed, and if the Bristol police files that they surveyed can be taken to be representative of the current position, it would appear that domestic assault is significantly more likely to be prosecuted than is assault in other contexts. This is remarkable given the widely accepted picture of domestic violence as a crime both under-reported and under-recorded. In such situations a victim of domestic violence, may apply for an injunction under the Davis G Cretney A, (1996) Prosecuting Domestic Assault, Criminal Law Review Mar 162 174 or a non- molestation order under s42 of the Family Law Act 1996. The statutes have somewhat differing aims although both statutes do aim to prevent harassment and can be compared and thi s will be discussed. Only associated persons can apply under the FLA 1996; anybody can apply under the PHA 1997. There are wider remedies available under the FLA 1996, including the power to make occupation orders. Damages can be awarded only under the PHA 1997. This is an important point. Domestic violence/harassment knows no social boundaries and therefore an award of damages can be a salutory lesson. It can also be an important remedy for those who are scared to report, for fear of financial hardship. Such damages can, of course, if not promptly paid, be enforced in all the usual ways including execution, attachment of earnings or a charging order on land if necessary followed by an order for sale. Presently, a power of arrest can be attached to FLA 1996 orders but not to PHA 1997 orders. However, although the power of arrest is retained for occupation orders it is to be abolished for non-molestation orders. A warrant of arrest can be issued under either statute. Breach of an injunction under s 3 of the PHA 1997 is an offence breach of a non-molestation order is made an offence by s 42A of the FLA 1996.(7) District judges have full jurisdiction under both statutes to make orders, issue warrants and deal with contempt of court proceedings for breach of orders. Applications under the FLA 1996 are family proceedings governed by the Family Proceedings Rules 1991 and must be issued in a family proceedings court, a divorce county court, family hearing centre, care centre or in the Principal Registry or Lambeth Shoreditch or Woolwich County Courts.Applications under the PHA 1997 are civil proceedings governed by CPR 1998 Part 65 and can be issued in the High Court (Queens Bench Division) or in the county court for the district in which either the claimant or the defendant resides or carries on business. Exceptionally, concurrent proceedings under both statutes are appropriate. They should be consolidated and tried together. A person arrested and brought before the court pursuant to the FLA 1996 can be remanded in custody or on bail. There is no power to remand a person arrested and brought before the court pursuant to the PHA 1997. Punishment for contempt of court under either statute is subject to the maximum of 2 years imprisonment provided by the Contempt of Court Act 1981. The sentence must be proportionate to the seriousness of the contempt. Conviction for breach of an injunction under s 3 of the PHA 1997 or for breach of a non-molestation order under s 42A of the FLA 1996 both carry a maximum sentence of 6 months and/or a fine not exceeding the statutory maximum on summary conviction, and a maximum sentence of 5 years and/or fine on conviction on indictment. Both statutes provide that a person cannot be both punished for contempt of court and prosecuted in respect of the same incident. The PHA 1997 also creates offences (ss 2 and 4) not dependant on a civil injunction; the FLA 1996 does not. By s 1 of the PH A 1997, a person must not pursue a course of conduct which amounts to harassment of another and which he knows or ought to know amounts to harassment of another. By s 7(3) a course of conduct must involve conduct on at least two occasions and by s 7(4) conduct includes speech. Section 7(3A) was inserted by the Criminal Justice and Police Act 2001 and provides: A persons conduct on any occasion shall be taken, if aided, abetted, counselled or procured by another: (a) to be conduct on that occasion of the other (as well as conduct of the person whose conduct it is); and (b) to be conduct in relation to which the others knowledge and purpose, and what he ought to have known, are the same as they were in relation to what was contemplated or reasonably foreseeable at the time of the aiding, abetting, counselling or procuring. The phrase course of conduct has caused difficulty. In R v Hills held that assaults in April and October 1999 were not a course of conduct, particularly si nce the parties had been reconciled in the interim. In Lau v Director of Public Prosecutions quashed a conviction on the grounds that two incidents 4 months apart were not a course of conduct. The fewer the number of incidents and the wider the time lapse between them, the less likely that they give rise to a course of conduct. On appropriate facts, a charge of assault should be preferred. Indeed, many cases justify both a charge of assault and of harassment. The definition of harassment (and assault) is the same in civil and criminal proceedings, and thus arguments on whether or not there was a course of conduct can arise in both civil and criminal courts. In civil cases, where they may be doubt on whether there is a course of conduct then, as in crime, where appropriate, assault can also be alleged. In June 2003 the Home Office published a consultation paper setting out proposals to tackle domestic violence. The paper indicated the Governments strategy was based on thr ee elements: to prevent domestic violence occurring or recurring; to increase support for victims; and to ensure improved legal protection and justice for domestic violence victims. This led to the enactment of the Domestic Violence, Crime and Victims Act 2004 which came into force in March 2005. DVCVA 2004 closely links the civil and criminal processes through new police powers, and through a new criminal offence of breach of a non-molestation order. It also creates a new offence of causing or permitting the death of a child or vulnerable person. It also requires the adoption of a code of practice and a victims fund, to be financed by surcharges on fines and some fixed penalties. It creates the power for the Criminal Injuries Compensation Authority to recover money from offenders, and makes a variety of other changes to criminal procedure, powers and sentencing. Non-molestation or occupation orders are key tools in providing protection for those who fall within the categ ory of associated persons. Prior to the enactment of the DVCVA 2004 eligibility extended to those living together as man and wife (cohabitants), or former cohabitants, and those who live or have lived in the same household (except if they are employees, tenants or boarders, or a lodger). DVCVA 2004 extends the category of associated person to include cohabitants in a same-sex relationship living in an equivalent relationship to that of husband and wife. The power to attach a power of arrest to a non-molestation order is removed by this act. Instead, common assault becomes an arrestable offence under the Police and Criminal Evidence Act 1984 and breach of a non-molestation order becomes a criminal (arrestable) offence. If, for whatever reason, no prosecution is mounted, perhaps because of the wishes of the victim, that does not prevent an application to the civil court to commit for breach of the order. Nothing prevents the commencement of civil proceedings while criminal proceedings are pending, following arrest, though arguably a family court should await the determination of the criminal process. A new criminal offence is created under s42A will be punishable on conviction on indictment by a term of imprisonment not exceeding five years, or a fine, or both, and on summary conviction by a term of imprisonment not exceeding 12 months, or a fine not exceeding the statutory minimum, or both. The prosecution will need to prove the existence and terms of the order; the fact that the defendant was aware of the order; conduct that amounts to breach of that order, provided the breach is relevant only to sentence and not to guilt or innocence; and the lack of reasonable excuse. Minor changes are made to occupation orders under the DVCVA 2004 these require a court, in proceedings for an occupation order, to consider whether or not to make a non-molestation order. Other changes include changes to reflect cohabitation as opposed to marriage. Nothing in the new Act removes the right of the court to attach a power of arrest to an occupation order. This may cause some difficulties where a court makes both a non-molestation order and an occupation order, particularly if a court has attached a radius clause, for example not to come within a specified distance of the applicants home. Restraining orders under PHA 1997 form an integral part of the machinery for the protection of victims of domestic violence. DVCVA 2004, s 12, will extend the courts power to make a restraining order under s 5 of PHA 1997.Under s 5, when a court is sentencing or otherwise dealing with a person who is convicted of an offence under s 2 or s 4 of that Act, then as well as sentencing him or dealing with him in any other way, it may make a restraining order. The restraining order is particularly useful, as it provides for the continued safety of the victim but can only be made in cases where a conviction had been obtained for a s 2 or s 4 offence. As Wells points out: A vignette of current concerns suggests that much has changed in the last few decades. There is a ministerial group on domestic violence headed by Home Office minister, Baroness Scotland. The Solicitor General, a woman, has made tackling domestic violence a policy priority. She has talked to the President of Family Division, a woman. The Law Commission has recommended the abolition of the partial defence of provocation for reasons largely to do with its differential impact on male and female partner killers. The psychological trauma associated with rape and other forms of sexual harassment has been acknowledged, much attention has been given to improving police practices, and the offences themselves have been reconfigured around the concept of trust. It is difficult to believe that these changes would have come about without the influence of feminism in general and feminist legal commentators in particular. These changes also fit into a much wider pat tern in which victims have moved very much centre stage along with the associated restorative justice movement. Internationally moves are being made to improve the situation for women. There have been international efforts to strengthen womens rights. This perception has contributed to the reluctance on the part of many countries to adopt either a protocol to CEDAW providing for individual petition or a protocol on violence against women with similar remedies for women. Moreover, the perception of States towards certain types of violence seems to be different in developed Western countries from that of certain developing countries. While widespread dissemination of pornographic material and use of women as sex objects by the media has been viewed as violence against women by women in certain developing countries, the same does not necessarily hold true in certain Western countries such as the Netherlands and the United States, which opposed the inclusion of this type of vio lence in the definition of violence in the draft UN declaration on violence against women. This type of activity cannot be violence for those women who voluntarily allow themselves to be used as sex objects by the media. But it may be seen as a psychological violence against women in general by those who disapprove of such treatment of women by the media. The protest campaigns organised recently by grass-root womens groups in India against the world beauty competition in Bangalore is an example of such differences of opinion. So is British law sufficient? Does it protect women adequately? There is generally are much greater awareness of domestic violence, and the criminality and culpability has increased some what over the last decade. Awareness has been heightened, although it can be argued that the piece meal legislation is unacceptable and there needs to be some joined up thinking insofar as this area of law is concerned. Whilst the new legislation is a move in that dir ection, it is a wasted opportunity as it is certainly desirable that the law on domestic violence should be consolidated. Don’t waste time! Our writers will create an original "Domestic Violence is Very Real And Common in The UK" essay for you Create order

Monday, December 23, 2019

Same Sex Marriage Should Not Be Allowed - 1115 Words

Same sex marriage is currently the most active religious debate in the United States, and for good reason. The U.S. Supreme Court legalized same-sex marriage across the United States on June 26th, 2015. Many of the largest U.S. religious institutions have remained firmly against this ruling. Nevertheless, many other religious groups also have moved to allow same-sex couples to marry within their traditions. Conflict has arisen within the Christian community, and with over 70 percent of American Adults identifying as Christians, a great divide has been set. Robert Gagnon is an Associate Professor of New Testament at the Pittsburgh Theological Seminary. Gagnon has focused on the issue of homosexuality in relation to Christianity and the Bible, basing his work on both the analysis of biblical text and on arguments based on biology and gender. In his article â€Å"Why `Gay Marriage` Is Wrong†, he voices his opinion as to why same-sex marriage should not be allowed. He says that legalizing gay marriage would undermine the institution of marriage and bring about other negative effects as well. Gagnon states that gay marriage is, in fact, a contradiction in itself. He recognizes marriage in the scriptural context of being a merger between maleness and femaleness. The male halve and the female halve join together in order to create a whole, completing the marriage. Without these two halves, a marriage cannot be completed. He states that â€Å"Men experiencing homoerotic desire need notShow MoreRelatedShould Same Sex Marriage Be Allowed?1620 Words   |  7 Pages The Right To Marriage Same sex marriage is a topic today that brings strong moral objections from both sides. Should same sex marriage be allowed? Should these people be given the same rights in their relationship as heterosexual couples? Why restrict these citizens from their rights just because of their love for another? Should we deny foreign customs to foreigners just because they aren’t customs we perform? The United States is a land of the free, not the restricted. We are not robots setRead MoreSame Sex Marriage Should Be Allowed2932 Words   |  12 Pages Gay Marriage Abstract This paper discusses homosexuality in our society, particularly in granting homosexual couples a right to marry. The pros and the cons throw out a ton of arguments supporting their position. This issue, whether or not the same-sex marriage should be allowed, is extremely controversial and the debates never end. In this paper, I take the pro side by providing strong both qualitative and quantitative data, how the homosexual marriage can benefit society, how far they have foughtRead MoreShould Same Sex Marriage Be Allowed Marriage?1888 Words   |  8 PagesDebates continue to arise over whether people in same-sex relationships should be allowed marriage or some similar status (Academia). Opponents of same-sex marriage argue that the institution of marriage should apply only to unions between one man and one woman. The government disagrees and has pasted laws concerning this issue. Politically, on June 26, 2015, the Supreme Court declared same-sex marriage legal in all 50 States. Most people have different views on homosexual couples, citizens argueRead MoreSame Sex Marriage Should NOT Be Allowed Essay1218 Words   |  5 Pages Marriage is legally defined as, a contract made in due form of law, by which a free man and a free woman reciprocally engage to live with each other during their joint lives, in the union which ought to exist between husband and wife. Many liberals argue that gay marriage should be legal in the United States. In the following essay I will attempt to argue why marriage between the same sexes is immoral and unjust. The first point I will talk about is how marriage is a traditional bond betweenRead More Same-Sex Marriages Should NOT Be Allowed Essay717 Words   |  3 Pages Allowing same-sex marriages would change the basic definition of marriage. Marriage is an important commitment of a man and a woman who contribute to civilization. Therefore, the loss of contributions due to someone’s sexual orientation should not be rewarded with a privilege such as marriage. Same-sex marriages affect many factors such as children, the concept of marriage, and humanity. However, it is not a misdemeanor to love somebody of the same gender but it can rigorously damage manyRead MoreSame Sex Marriages Should Be Allowed: Research and Analysis3234 Words   |  13 PagesFinal Conclusion 12 The Same-Sex Marriage Introduction and Background A marriage amongst two individuals of the same sex individuality and/or same genetic sex is known as gay marriage or same-sex marriage. The supporters particularly refer the possibility to perform a marriage of the same sex or lawful appreciation of marriages of the same sex as equal marriage or marriage equality. The same-sex marriage has been the main focus of the debate over the definition of marriage since the era of earlyRead MoreEssay about Same-Sex Marriage and Adoption Should Be Legal703 Words   |  3 PagesSame-sex marriage and adoption should be legal, it should be allowed in every state, everywhere. As of 2014, only 17 states have legalized marriage rights to same-sex couples. The other 34 states have banned gay marriage through law, constitutional amendments, or both. For example, the Pennsylvania Governor won’t challenge overturning of same-sex marriage ban. State Attorney General Kathleen Kane has also announced that she will not defend Pennsylvanias same-sex marriage ban because of what sheRead MoreSame Sex Marriage Is The Legal Union Essay1562 Words   |  7 PagesAbout Company Legal Site Map Contact Advertise ï‡ º ï‡ ¼ ï‡ ½  ©2015 StudyMode.com Home Same-sex marriage Same Sex Marriage Same Sex Marriage Civil union, Homosexuality, Marriage By kwhite89 Mar 16, 2015 1510 Words 56 Views More info ï„” PDF View Text View Page 6 of 6 Read More Same-Sex Marriage Essays1127 Words   |  5 PagesSame-Sex Marriage The United States is known world wide for its civil rights and freedoms. Many Americans are appalled by the idea of same-sex marriages. What?s wrong with the idea of two people who care greatly for one another wanting to spend their lives together? The gay community is misunderstood because many straights are not willing to listen. These individuals would rather just be closed-minded in this situation and reticent to really think about what this means to the gay community andRead MoreGays Should Be Legal Contract1290 Words   |  6 PagesGays Should Be Allowed To Marry Calling something marriage does not make it marriage. Marriage is a legal contract between a man and a woman. It is the institution that establishes kinship and relations in the family. Marriage is mostly recognized by a state, organization, religious authority, local community, or peers. Marriage is for procreation, education, the unity, and well-being of the couple. Some say marriage is for two people who love each other and ready for commitment. Nevertheless, in

Sunday, December 15, 2019

Ip Camera Free Essays

Basic – analog and digital Branded ones – Bosch, AXIS, Mobotix Biggest Taiwan brand Vivotek Check out AXIS and Mobotix trend in each country. Bosch is following up with AXIS and Mobotix. Bosch website is good in technical. We will write a custom essay sample on Ip Camera or any similar topic only for you Order Now Vivotek is good in hardware. Bosch and Airlive software are good. Analog camera has BNC connector (round connector). Can convert analog to digital? Yes is possible. Cost is 25 USD to 250USD. Can convert to BNC to RJ45 or even to Fibre. Lens affect the viewing angle from 4 MM, 6MM, 8MM, 16MM. Manufacturer is Sharp and Sony. Lens also got differentiate into CMOS and optical lens. Optical lens consume more bandwidth. AXIS has the best CMOS lens and they can make it closer to optical lens. MTBF- Mean time before failures. Our AP is 200,000HRS which is quite safe. Camera also have MTBF timing. Bosch have best datasheet. Digital cameras is using RJ45, LAN cable. Digital have both indoor and outdoor. DVR for analog have BNC connector. 16 holes. 1 hole 1 channel. DVR is for digital camera. DVR is mostly for soho use up to 16 channels or even 32 channels = 32 digital cameras. 1 camera 1 ip address. DVR – we have 1 setup box and 1 harddisk and few buttons for control. Older form of DVR is onsite recording. 2nd generation is with Lan cables so is going via IP. Can record offsite. PTZ cameras – Pan Tilt Zoom.. which the lens is optical. NVR – network video recording is like a NAS, up to dual CPU power with single GIGBABIT port for connecting high resolution cameras for processing. Can connect up to 254 cameras to 1 NVR (255 ip address for Class C subnet mask). Codec is required for converting the recording for onsite. H. 264 and MPEG file version. For future, people are doing bigger and larger and scalable NVR to increase the number of cameras. Raid is now up to 0 and 1. Next year will be raid 5 and raid 6. inside have 4 CPU inside 4U CPU rack with 2 harddisk with redundant power. Software – Questions to ask. 1) What is the FRAME per second? FPS. Recording for IP camera is 29FPS is good (for wired). Wireless camera is normally 3 to 5 FPS for viewing. Recording is still 29FPS for wireless. 2) Resolutions. 320 x 320, 480 x 320, 640 x 480, 1024 x 768 etc. higher resolution will consume higher bandwidth. For analog is defined as lines. Eg HD TV has 1080 lines. 3)CODEC file type. For night vision is based on lux. 0. 5 LUX is able to see already. 1 LUX – 40W of light bulbs. IP cameras do not take standard POE but it take POE+. AXIS – strong at indoor Mobotix – strong at outdoor Vivotek – Outdoor and indoor Bosch – Outdoor How to cite Ip Camera, Essay examples

Saturday, December 7, 2019

The Homecoming Essay Research Paper Homecoming takes free essay sample

The Homecoming Essay, Research Paper Homecoming takes topographic point in Province town and Bridgeport, Connecticut on Route One that runs south between the two metropoliss. At the terminal of the narrative, the scene is in Crisfield, Maryland, along the Chesapeake Bay, USA. The narrative takes topographic point in 1981, the same twelvemonth as it was written. The scene does non play a function in the narrative because the same events could hold happened anyplace. The chief Character in the Homecoming is 13 twelvemonth old Dicey Tillerman. Her will and determination keeps the childs safe, both physically and emotionally. Other chief characters including Dicey # 8217 ; s three younger siblings, nine twelvemonth old James, seven twelvemonth old Maybeth, and six twelvemonth old Sammy. The debut to the narrative starts in a auto parked in a parking batch of a promenade. The female parent of the four vanishes, go forthing them stranded. They decided to walk to Bridgeport, were at that place aunt lives. We will write a custom essay sample on The Homecoming Essay Research Paper Homecoming takes or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page As they headed for Bridgeport, the four encountered two 16 twelvemonth old blowouts, Edie and Louis. These people are of import to Dicey # 8217 ; s metal wellness because she can show her true emotions to them. She couldn # 8217 ; t make this to her brothers or sister in fright of demoing desperation and fright. Dicey departs from Edie and Louis when there paths meet a fork. The secret plan continues as the household meets up with Windy and Stewart, two male childs merely out for at that place montage, handily, sing household from Bridgeport. They provide shelter and a ridethere. When they get in Bridgeport they stay with their Cousin Eunice, and old adult female who is a nun at the local church. She introduces the kids to Father Joseph, a priest who gives them apparels, but whose chief motivation is dividing them apart. Dicey shortly realizes his purposes and flees with her household to happen their grandma in Crisfield. There, they meet two male childs, Jerry and Tom, who take t hem across the Chesapeake Bay in their sailing boat. After they get off the boat, Dicey wants to work to acquire nutrient, so a adult male named Mr. Rudyard hires her and her younger siblings to pick tomatoes for one twenty-four hours in his poorly chief tained grove. Dicey rapidly notices the hash personality of Mr. Rudyard. The Climax of the narrative is reached when Mr. Rudyard snaps at the Tillerman # 8217 ; s, trailing them with his big German Shepherd. They where in arm # 8217 ; s range of him when all of a sudden two circus histrions, Will and Clair, salvage them from the unpredictable custodies of the crazed husbandman. The fresh concludes as the 4 kids move in with their grandmother, who attaches herself to them quicky. She enrolls them in to school. There where many candies in this narrative, particularly Dicey # 8217 ; s internal battle. When she meets Edie and Louis the blowouts, she displays her frights, concerns and wants with them. The household besides encounters many external candies, happening nutrient and shelter was the chief concern. The writer, Cynthia Voigh, uses imagination to depict the intolerable life conditions that the childs would sometimes populate in. As good she uses imagination to show the beautiful scenery they meet up with along the manner, including the Province Tow n shore line or Bridgeport # 8217 ; s Cemetery. There are many subjects but I think the chief 1 is that sorrow makes the bosom grow fonder. Dicey had duties that most 13 twelvemonth old # 8217 ; s are non prepared for. She had the load of maintaining the household together emotionally and maintaining them safe and fed. Dicey had to do a committedness to last no affair how sorrowful life was. I feel that Homecoming is a fantastic book. Overall, it is full of escapade and interesting state of affairss. This book # 8217 ; s merely drawbacks are its few slow minutes in which the narrative is put on clasp and the characters take clip to explicate their interior feelings. I feel it would be good for the reader if the writer had chosen to weave these personal choice morsels into the remainder of the intricate secret plan. These dull minutes are largely at the beginning, so the narrative flows easy one time the reader gets past the first few chapters. I would urge this book to people who believe in strong household values. Besides to anyone who enjoys reading narratives of battles and about the feelings of people.

Friday, November 29, 2019

Flowers For Algernon Essays (915 words) - Censorship In Canada

Flowers For Algernon Brian Burks 7/10/01 Flowers for Algernon Flowers for Algernon is about a middle-aged man suffering from mental retardation. The man is Charlie Gordon. The exposition of this novel is rather intricate. Flowers for Algernon takes place in the nineteen-fifties. Charlie is chosen to participate in an experiment that will supposedly raise his IQ. But it turns out that they turn him into a genius, and it is only temporary. Along the way he falls in love with his teacher, Miss Kinnian. But he grows so intelligent that they grew farther apart as Charlie gets smarter. There are also two doctors in the novel, Dr. Strauss and Professor Nemur. There are many complications in this book. One is his mental retardation and his desire to overcome it. Another is his growing to be smart. People start to dislike him because of that. And then another is his decline of intelligence and acceptance of it. The climax of Flowers for Algernon was when Charlie found out why Algernon was acting so erratically, and that he himself would face such a decline of intelligence and frustration on the way down. The resolution of the novel comes when Charlie finally loses all of the intelligence he gained in the experiment and went to live in the Warren Home for mentally handicapped people. The protagonist of Flowers for Algernon is Charlie. Charlie is a 32-year-old mentally retarded man. He started out a simple kind of guy, easily pleased, good hearted, and basically only understood that people liked him when they laughed at him. He was involuntarily committed to an experiment that would increase his intelligence level dramatically. He later decides to take part in the experiment and do his own studies. He notices the lab mouse, Algernons, behavior gets a little weird. He then discovers that this behavior is leading to Algernons decline, which will reflect his own. The antagonist is Charlies intelligence. Charlies intelligence gets in the way of his social life and also pulls him away from Miss. Kinnian, his first love. Charlies intelligence also turns him on his creators, Dr. Strauss and professor Nemur. Charlies teacher from the Adult School, Miss. Kinnian, is a sincere woman who took interest in Charlie for his charm and kind heart. Dr. Strauss and professor Nemur a re both psychologists trying to find a cure for mental retardation. They test their method on Charlie. They eventually end up struggling to remain superior to him. The conflict in Flowers for Algernon is a man vs. himself type. Charlies conflict is his intelligence. Whether it is when he is retarded or when he is a genius, his intelligence worked against him. Charlie solves his conflict by surrendering to it. But before he does he tries to do some good. He contributes to the experiment and that is when he finds out that he will eventually deteriorate. There was no way that he could stop it, so he gave in. Charlie was content with that, not happy that he had to go back to the way he was, but that he did things he never would have been able to do when he was retarded. The problem was solved in a believable way, and happened as if this story was a non-fiction novel. But ideally, Charlie should not have gone back to being retarded, and rather should have been able to reverse the process. He was a genius after all. Flowers for Algernon took place in the nineteen-fifties at and around the New York, New York area. The setting does not contribute much in this novel. Charlies experiments take place at Beekman University where Professor Nemur and Dr. Strauss perform their experiments on Charlie and where Charlie performs his own experiments when he turn genius. Flowers for Algernon would not change much if it took place in a different setting. Except the technology involved might have been different. The theme of Flowers for Algernon is that humans do not understand that mentally handicapped people have feelings too. Daniel portrays this by putting Charlie in a situation were he would be looked down upon. Then he puts Charlie in a position were he is superior. Charlie eventually realizes how he has treated people and tries to correct himself, but

Monday, November 25, 2019

Cold War Events essays

Cold War Events essays AIM: What Events Occurred During the Cold War from 1956-1960s? - England had control over area in middle east post war. - Zionist movement (establishment of Jewish state) began to take form (Theodore Herzl 1897) - 1917 Belfour Decloration favored Jewish state in Palestine huge immigration from 1917-1939 - Arabs and Jews in area begin conflict over land (sacred) - W.W. II and Holocaust pushed Jewish state - 1947 United Nations Resolution- split the territory between Jew and Arab displacing many Palestinians. - 1948 British officially pulled out of area and state of Israel formed David Ben-Gurion 1st Prime minister Same time Arab Nations invade Israel - 1949 Israel beat back invaders and Expand territory. City of Jerusalem - Arab countries would not recognize the state. Hungary 1956 demonstrations for freedoms - Street fighting erupted. New government starts - Imre Nagy independence for Hungary. Neutral Hungary and out of Warsaw Pact - Soviet troops put down Nagy, executed Janos Kadar premier - Austria gained neutrality- Eastern Europe not allowed Paris Conference 1960 Khrushchev Eisenhower Peaceful Coexistence - Soviets hit technological superiority Sputnik - Limiting testing nuclear weapons and recognition of Eastern Germany - Soviets shot down American U-2 plane, reconnaissance American knew of mission no apology - Soviets 1. No protest till shot down plane 2. Hope west would split over Germany 3. Communist would split between Soviets and China - This demonstration Soviets hard line position - Berlin key point for East to escape to West - Built a concrete wall along boarder of East and West - Check points made to enter and exit zones - 1963 Kennedy Ich bin Berliner Ian a Berliner - 1989 down Check Point Charlie ...

Friday, November 22, 2019

Foundations of Business Research Paper Example | Topics and Well Written Essays - 1000 words - 1

Foundations of Business - Research Paper Example Violation of insider trading also comprise of ‘tipping’ such information and misappropriation of information. There are various cases of insider trading. The employees, officers and directors of corporate traded the securities of company after learning the confidential report of the company. Friends, family members and business associates of the corporate officials may trade the securities after receiving hidden information. The securities can also be traded by employee of banking, law and brokerage who are provided such information. The government employee can trade the securities by learning such information from their employment (U.S. Securities and Exchange Commission, 2001). 2.0 Types of Transactions Considered Insider Trading Regardless of Their Legality The information of the company is not disclosed to the public until the appropriate time. If the employees or officers in the company disclosed the material to the public before company does, then it will affect th e stock price of the company. The material may be positive or negative but is illegal to disclose to the public and it may result to the violation of the policy of company. The transaction must not take place until the next business day after the exposure of material information. The transactions which are prohibited in the company are transaction in company securities and transaction in the securities of other companies. In company securities transaction, an employee is aware of the materials and non-public information about the company. He is required not to be part of certain activities of the company. Company securities’ trading must not be done, i.e. purchasing or selling company securities. He must not advise the public to buy, hold or sell the securities of the company. The employee should not disclose the information of the company and must not guide or help anyone in any of these activities. Transaction is valid in case of emergency for raising money which is not an exemption to the prohibition made on insider trading. In other companies’ transaction in securities, an employee is aware of the non public information of other companies because of their jobs. He is not supposed to trade securities of other companies, which is the violation of other companies’ policies (Heckmann Corporation, n.d.). 3.0 Specific Conditions under Which Insider Trading Is Considered Illegal under United States’ Federal Securities Laws The laws of Federal securities prohibit insiders from benefiting from the information which have not been provided to the public. The laws do not provide permission that the member in public market should have equal information; rather it focuses upon the fact that certain persons might use their position to attain undue informational advantage over others. Under US Federal securities laws, it is unlawful for every person whether ‘directly or indirectly’, by using any methods or ‘instrumentality of interstate commerce’, by means of mails or any facilities of national securities exchange in order to perform various activities. A person should not employ any scheme, mechanism or artifice to defraud. He should not make any false statement of a

Wednesday, November 20, 2019

The effects of TV Advertising on older consumer behaviour over 50 Essay

The effects of TV Advertising on older consumer behaviour over 50 years in the United Kingdom - Essay Example The findings of the research suggest that the segmentation of the group under question leaves somewhat to be desired given that this group are given little relevance and on the whole underrepresented within the media. In addition, it was found that it is not so much the underrepresentation that is an issue with this group, rather it is the portrayal; it is felt that older consumers are portrayed in a disparaging and derogatory manner of being ill and feeble or alternatively unrealistically attractive. This lack of synergy between the advertisers and the third agers is somewhat dangerous given their growing spending power within society and it is one which cannot be ignored if companies wish to be lucrative. The advertisers and the marketers have been exploiting the vulnerable minds of the children as they recognize the increasing influence that children have in family purchase decision making. The study also finds that organisations engage in CSR activities basically with a profit-dr iven motive while trying to project an image of being socially conscious and responsible organisation. All efforts towards this is aimed at enhancing the brand image, the brand identity and the corporate image. The marketing mix elements in advertising for older consumers have not been appropriately addressed. The study concludes that television advertising has not been able to make any significant impact on the older consumers. The limitations to the study have been highlighted and areas for further research have been recommended. Table of Contents Chapter One: Introductory Chapter 1.0 Background 1 1.1 Rationale for research 3 1.2 Aims and Objectives 4 1.3 Research questions 4 1.4 Dissertation Structure 5 1.6 Chapter Summary 6 Chapter Two: Literature Review 2.0 Chapter Overview 7 2.1 The older consumers 7 2.1.1 The concept of ‘older consumers’ 7 2.1.2 Lifestyle of the older consumers 8 2.1.3 Segmentation for the older consumers 10 2.2 The advertising medium 11 2.2.1 Pr inciples of Advertising 11 2.2.2 Advertising as a means of persuasion 13 2.2.3 Television as an advertising medium 14 2.3 CSR and advertising 16 2.4 Consumer behaviour 18 2.5 Consumer buying process 19 2.6 Summary of the chapter 21 Chapter Three: Research Methodology 3.0 Chapter Overview 22 3.1 Academic Research 22 3.2 Purpose of the research and phenomenon 23 3.3 Epistemology 23 3.4 Research Approach 24 3.6 Data Collection 25 3.7 Justification: Secondary Research 25 3.8 Sources of secondary data 28 3.9 Ethical concerns 29 3.10 Chapter Summary 29 Chapter Four: FINDINGS 4.0 Chapter Overview 30 4.1 Television advertising and the older consumers 30 4.2 The impact of television advertising on the children 37 4.3 CSR in television advertising 39 4.3 Chapter Summary 43 Chapter Five: Discussion and Analysis 5.0 Discussion 44 5.1

Monday, November 18, 2019

Critical evaluation of why G4S Security Company failed in the 2012 Assignment

Critical evaluation of why G4S Security Company failed in the 2012 Olympic - Assignment Example The main reason behind the failure of the contract between Olympic committee and G4S was the staffing problem of the company. G4S could not maintain the terms if the contract and thus the contract cost them a huge amount. G4S, the largest international security solutions group, specialises in providing security solutions to those countries where risk of safety and security are conceived as a serious strategic threat. The company has provided successful security solutions to many countries but after the death of Jimmy Mubenga in 2010, it had started to face its darkest days. Several controversies followed the death and later in 2012 the security disaster at Olympic Games provided a severe blow to the company’s strategic actions and the company had to pay a huge amount as penalty (Taylor, 2012). If the issue is looked upon very closely, it can be observed that the company had undertaken many wrong policies for taking the contract of providing security solutions to Olympic Games. It overvalued the number of security personnel and also increased the pay of the chief executives when the company was encountering huge loss. All the issues led to the failure of the contract with the Olympic committee. However, the company has to pay an amount of  £ 88 million as penalty. The report highlights the facts that lead to the failure of the security contract of G4S with Olympic Games in 2012 (Shift Media Publication, 2013). The main issue was staffing problem and the company shares were also falling as the investors came to know about the issue. If the financial statements of the company are studied it can be noticed that the Annual Report 2012 does not have any transaction information regarding Olympic 2012. The financial statements do not have information regarding the transaction pertaining to Olympic Games. The only existence of the incident is written in small letter in the Performance Highlights section of

Saturday, November 16, 2019

Analysis of Information Technology in Public Sector

Analysis of Information Technology in Public Sector Chapter 1 Introduction Countries and governments in the world try to develop and extend their business and economies throughout built relation and agreements among them for the exchange and transaction for different kind of trades through out what call e-government to facilitate communicating and transmitting the information between these countries, and to achieve these, they need to adopt the information technology as infrastructure for e-government purposes (Traunmiiller and Klaus Lenk, 2002). So, information technology IT, digital and networking considered a crucial requirements for the companies to extend their operation scope in the global. So organizational spending on information technology (IT) and utilize the technology to support different strategic and operational objectives to give the strength for the competitive strategy (support the different aspects of business), (Venkatesh Morris Davis Davis, 2003). Therefore, Information technology can be defined in various ways Like information technology includes hardware, software and telecommunication equipment which is used to capture, process, and store and distribute information ( Global text -information system-Richard T. Watson -2007Â ¬chapter 1). Also information technology refers to office, computing machines, communications equipment, instruments, photocopiers and related equipment, and software and related services (Brynjolfsson, 1991). Even Information Technology (IT) refers to Any equipment, or interconnected system or subsystem of equipment which is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission. (DODD 4630.5, January 11, 2002). when the companies attempt to adopt the technology they face problems about the acceptance of the employees for the technology , some companies still cant predict the success from implementing new technology among the employees, some fail in adopting particular technology and some face resistance for accepting or adopting the technology, another companies didnt get the benefits that they expect from accepting or adopting the technology ,therefore, the companies turn to study the technology users conceptual about technology and the factors that could affect the acceptance for the technology (Alsohybe, 2007). Since information technology is supporting our economy throughout the reductions in the cost of obtaining, processing, and transmitting information are changing the way we do business so no company can escape its effects. General Managers know the importance of information technology and how it effect in the work. As more and more they spend their investment capital and their time in information technology and its effects, an executive have a growing awareness that the technology can no longer be the exclusive area of IT departments or IS departments, Executives recognize the need to become directly involved in the management of the new technology since they see their competitors use information for competitive advantage, These In the face of rapid change, however, they dont know how (S Rivard, L Raymond, D Verreault, 2006). In order to help managers respond to the challenges of the information developing and how will advances in information technology affect competition and the sources of competitive advantage and what are the opportunities for investing in information technology. For that managers must first understand the information technology (Yen Subramanian chino, 1997). So this study is going to examine the factors that influence information technology acceptance in the public sector in the republic of YEMEN to enhance the accepting, adopting and the usage of information technology among the workers in the public sector. Beside facilitate the information transaction between the managements and between the government utilities with spotlight in the role of information technology strategies in these utilities to support the accepting, adoption for the technology. Even this study is going to examine the support of the government to adopt the information technology as government infrastructure toward E-government. Republic of Yemens Background The Republic of Yemen is an Arab country located in the southern part of the Arabian Peninsula. It is bounded on the north by Saudi Arabia and by the Arab Sea. Oman lies in the west of the Republic of Yemen and the Red Sea lies in the west of the Republic of Yemen. The total area of the Republic of Yemen is about 555,000 square Kilometer, and the population of the Republic of Yemen is 18 million. The official language of the country is Arabic and Islam is the official religion of the country. The ethnic groups in the Republic of Yemen are predominantly Arab, but also Afro-Arab, South Asians, Europeans. The Yemeni Rial (YR) is the official currency unit, but visitors can exchange most of the international currencies in exchange establishments or banks all over towns. Currently, the Republic of Yemen is enjoying a stable political, economic, and social system based on respect and openness with the rest of the world. This stability provides an opportunity for the country to improve its economy and service provision to its citizen and move along with the rest of the world. The Republic of Yemen has three national independence days: September 26, 1962 when the king of North the Republic of Yemen, at that time, was overthrown and making the country a republic instead of a kingdom, November 30, 1967 when South the Republic of Yemen, at that time, had become independent from United Kingdom. The Unification Day on May 22, 1990, when the Republic of Yemen was established by the merger of South the Republic of Yemen and North the Republic of Yemen. The legal system of the Republic of Yemen is based on Islamic law, Turkish law, English common law, and local tribal customary law. The Republic of Yemen is one of the poorest countries in the Arab World. It has reported strong growth since 2000, and its economic fortunes depend mostly on oil. (CIA The World Fact book Yemen profile about Yemen, 2005: Countries, L. D, 2009) Since the unification of the Republic of Yemen in 1990, the president was determined to establish a new way of governance. The government represented by the president initiated a plan to develop the new country infrastructure and build a democratic administrative system, which is responsible for the provision of public services to all Yemenis whether in the country or abroad. Since 1990, the Republic of Yemen has been trying to pursue a clear social strategy for developing new sources of income for its people, find new ways of investment in the country, reform the government, and establish new private sector participation to enhance the economical growth of the country (Ministry of Development, Republic of Yemen, 2000). The main objective of the government now and then was to improve the efficiency of the governmental administrative capabilities for better and improved services. The Republic of Yemen long-terms strategy aimed to develop a reliable and efficient administration and government by improving and reforming its ministries and institutions to deliver better public services for all its citizens and gain recognition around the world. However, not all the goals were aimed at improving the governmental functions were achieved. There are still problems facing the government plan to reform like, inflated bureaucracy, lack of collaboration between ministries and agencies, illiteracy, and a lack of direct vision of the future of the country. In its attempt to overcome these problems, the government of the Republic of Yemen has launched a reform project using information technology to implement e-government in the next couple of Years. The implementation of information technology will lead into collaboration between governmental agencies and lead to integrated databases that can be accessed by any agency any time thus delivering rapid and efficient service to the public. Communication and Information Technology in the Republic of Yemen Comparing to other countries around the world, The Republic of Yemen is still lagging in term of using information technology. Tables 1 and 2 compare the Republic of Yemen to other countries around the world and show that the Republic of Yemen is still one of the lowest countries in term of using computers and Internet, telephone usage, and e government readiness. This study was prepared by the National Information Center of the Republic of Yemen, which was submitted to the Republic of Yemens Presidential Office and to the Shura Council on June 2005 as part of a workshop title E-government between reality and expected goals in the Republic of Yemen (Alsohybe, 2007). Table l : Computers for Every 100 People and Internet Usage per 100 People for the World and for Some Countries Including the Republic of Yemen Country/Group PC Percentage (%) per 100 people Internet usage per 100 people The World 7.74 15.47 Arab World 2.04 5.57 U.S.A 65.89 55.14 Canada 48.7 51.28 Malaysia 14.68 31.97 Egypt 1.66 2.82 Yemen 0.79 0.51 Note: E-Government between Reality and Expected Goals in the Republic of Yemen, by (Yemen, National Information Center, 2005. Sanaa, Yemen, p.10). Table 2: E-government Readiness for Some Countries Including the Republic of Yemen Country Web Measurement Communications Human Resources General Indicator international U.S.A 1.00 .0770 .0970 .0913 1 Canada 0.873 0.668 0.970 0.837 7 Malaysia 0.490 0.302 0.830 0.541 42 Egypt 0.100 0_066 0.630 0.265 136 Yemen 0.054 0.040 0.490 0.195 154 Note: E-Government between Reality and Expected Goals in the Republic of Yemen, by (Yemen National Information Center, 2005, Sanaa, Yemen, p. Background of the Problem In the increasingly global today, information technology (IT) spread unpredictably that because IT considers substantial investment for organizations in all different aspects. Technology used to support the strategy and operational goals Countries and governments all over the world try to develop and extend their business and economies throughout built relation and agreements among them for the exchange and transaction for different trade aspects through out what call e=government to facilitate communicating and transmitting the information between these countries, and to achieve these, there is need to adopt the information technology as infrastructure for E-government purposes. (Traunmuller and Klaus Lenk, 2002) But unfortunately acquiring appropriate IT is not a sufficient condition for utilizing it effectively. Information technology importance for adopt E-government and in order to avoid the failure in adopting E-government. Also because the change in the environment and technology the companies trying to keep going with these changes. The companies spend a lot in investing in the technology in order to empower its internal, external performance and the productivity (Alsohybe, 2007). Some employees in the organizations not used the IT effectively or are not used, despite the extending in the investment in IT. This led the organization to inappropriate investment and west the opportunities even remain the company undeveloped. So the workers in IS and the management under pressure to locate the financial and organizational benefits from the IT investment. In order to help managers and IS practitioners to determine the factors or the motivators for IT usage and the acceptance of individuals for IT usage in order to reduce the cost and attain the maximum return of the investment in IT from the beginning (Lopez Manson, 1997; Dadayan Ferro, 2005). Problem statement The problem statements is that it is expected that all companies adopting, using effectively and having information technology, however, in the reality, not all the companies adopt, use effectively or use the information technology. However, in the reality, not all employees in those organizations accept, adopt, use effectively or use the information technology. That means there is a gap between the ideal or the maximum usage for the information technology among the Yemeni government employees and the reality or the actual usage for the information technology inside those organizations. This leads to investigate or examine the determinants and characteristics such as (individual characteristics, system characteristics, social characteristics, institutional characteristics) which are of effecting in using or adopting such technology. Many researchers in information technology IT and information system IS support the necessity for study the factors affecting the IT acceptance and its relation with the employees performance: The study was conducted by (Venkatesh Morris Davis Davis, 2003) to compare eight models and validate the new theory named the unified model The study recommended that: Future research should identify the underlying influential mechanisms potential candidates here include computer literacy and social or cultural background, among others. Even The role of social influence and its change over time and may help explain some of the equivocal results helping to clarify the contingent nature of social influences. Current theoretical perspectives on individual acceptance are notably weak in providing prescriptive guidance to designers. For example applying any of the models might inform a designer that some set of individuals might find a new system difficult to use. Even the study recommended future study include system characteristics and self-efficacy And task technology fit. The study said that further work should attempt to identify and test additional boundary conditions of the model UTAUT in an attempt to provide an even richer understanding of technology adoption and usage behavior. Even different user groups, individuals in different functional areas and other organizational contexts (public or government institutions) Another study was conducted in SAUDIA ARABI (AL Gahtani, 2004) to examine the technology acceptance theory in their culture recommended more studies in the technology acceptance with focusing in the social and culture factors and using different methodologies. Also the study which conducted by (Gorke, 2006) mention about the important of farther research for determining the factors influence the decision of using particular system and the acceptance for any new system. Even the study (Yalcinkaya B.A M.S, 2007) which conducted in TURKISH in police office recommended for more studies considering other possible psychosocial or contextual variables that may affect behavioral intention of information technology usage. Beside The study (Almutairi, 2007) which conducted in Kuwaiti ministries to examine the technology acceptance theory in their culture found that there is needed to test the TAM in other culture to insure is it globalization of the model and the possibility to use in different cultures. More over The study was conducted in china (Kim lee law, 2007) This study makes an attempt to investigate the relationship between antecedents including information system quality, perceived value, and users acceptance of hotel front office systems (HFOSs) and the Results show information system quality affects users beliefs in HFOSs, it is important to realize that other factors may also play an important role in user beliefs. These factors include computer use experience and the study suggested Different studies can be performed on IT, targeting other technology systems .it is important to find factors other than perceived ease of use, perceived usefulness, and perceived value that can affect the attitude towards technology acceptance. A few areas can be further examined in future studies in hotels as well as in other organizations. Even the study was conducted by (Smith, 2008) recommended more study for the technology acceptance within the private and the public sectors. According to (Agarwal, 2000) the importance of individual differences as a significant theoretical construct in technology acceptance is indisputable. Also, he recommends for farther studies in the training as individual difference variables. Even, the study supports that technology acceptance can be facilitated by utilizing other interventions that directly affect beliefs such as training and developing a learning culture. Also, in YEMEN the usage of the information is 10% from the system capability and that was not expected. So, there is need for investigate the reasons which inhibited the organization from getting the ideal usage from the system (wards from the minister of information technology and the vice general manager of the PTC public telecommunication corporation in Yemen KAKAL AL JABRI KAMAL HASAN, 2007). Therefore, there is a concurrent need to develop and gain empirical support for models of technology acceptance within the public sector, and to examine technology acceptance and utilization issues among public employees to improve the success of IS implementation in this arena and to explore the government role to support the adoption for information technology within the public utilities employees even as strategy or as logistic support. Even examine the role of the information technology strategy in controlling the factors influence the acceptance for technology to develop and improve the employees performance. This paper presents more comprehensive, by using model of technology acceptance and suggest testing it in public sector (Alsohybe, 2007). Research Objectives 1. To examine the status of technology acceptance and utilization issues among public employees to improve the success of IS acceptance and implementation in the following theory: To examine individual differences which are effecting on the acceptance for any new technology among the employees in the public sector. To examine which of system feature that influences in acceptance the technology To examine the social factors that influences the acceptance for any new technology among the employees in the public sector. To examine institutional factors which are influencing the acceptance for any new technology among the employees in the public sector. 2 To evaluate the role of strategy in affecting on the factors that influence the acceptance for any new technology. Research questions To examine the status of technology acceptance and utilization issues among public employees to improve the success of IS acceptance and implementation in the following theory: Is there effect for individual differences on the acceptance for any new technology among the employees in the public sector? Are there effects for the system feature on the acceptance for any new technology? What are the influences of the social factors on the acceptance for any new technology among the employees in the public sector? Is there effect for the institutional factors on the acceptance for any new technology among the employees in the public sector? What is the role of strategy in affecting the factors that influence the acceptance for any new technology? Purpose of the study The study plans to examine the status of technology acceptance and utilization issues among managers and employees in the public sector as individuals to~ improve the success of IS acceptance and implementation in this area. This study aims to explore the government role to support the adoption for information technology within the employees in the public sector. Even, the study will evaluate the strategy role in controlling the variables that influences the acceptance for the information technology, and explore the information technology company characteristics that have been used in public companies in Yemen. The government of the Republic of Yemen has an opportunity to improve the progresses and prepares its people to meet the challenges of accepting and implementing information technology in the work place to provide information and services for its citizens from any place at any time. By using IT, government of the Republic of Yemen will be able to overcome the communication problem, improve government efficiency, develop alternative sources of income, and improve the livelihood of all its citizens. The Yemeni government is committed to improve the way it is conducting its day-to-day work by adopting an information technology. Scope of study The study will conduct in the public sector in the republic of Yemen. The study target will be the managers and employees as individuals in the ministries and some utilities belong to the government. This will be achieved by survey Significance of the Study According to the study (Smith, 2008) which aimed to delineate IT differences between the public and private sectors. The study argued that private sector using the information technology more than the public sector that due to many reasons individual differences is one of these reasons, so this study was encouraged to study the acceptance and implementation of the information technology among the individuals in the public sector. Even, this study is trying to add the culture as independent variable for the technology acceptance model TAM, TAM2 and TAM3 as empirical study and contribution, this research will examine the acceptance and implementation of technologies in a very conservative and traditional society like The Republic of Yemen society where culture and religion dominate the way people live and perceive changes around them and can affect their acceptance or resentment of such innovation. Also, the study combined TAM, TAM2 by setting the attitude as mediated in the relation between the believes perceived ease of use, perceived usefulness and the intention to use which was deleted in the technology acceptance model TAM2 and TAM3. Also, many studies were conducted to examine three variables affecting the technology acceptance such as individual differences, system feature and social influence and some studies examine individual differences, system feature and institutional factors, however, this study aims to examine the four factors because of the effect of each variable in the acceptance of the technology and its effect on the other variables. Also, this study uses mixed theories to give more explanatory power for the technology acceptance. Also, this study aims to predicting the behavior of the managers and employees for accept the information technology is critical issue for the companies because the important of the information technology in the government utilities in order to enhance its internal and external performance in facilitating the work flaw and smooth transferring of the information among the individuals in the different department in one unit even between the units in the public sector. Chapter 2 Summary for chapter 1 From-the -previous chapter which presents the problem statement, accept, adopting, using effectively and using information technology, however, in the reality, not all employees in those organizations accept, adopting, using, effectively and using the information technology, his means there is a gap between the ideal usage for the information technology among the employees of the Yemeni government and the reality of the usage for the technology inside those organizations. This leads to investigate and examine the determinants and characteristics (individual differences, system characteristic, social characteristics, institutional characteristic) which are effecting in accepting, adopting for such technology. 2.1 Introduction 2.1.1- The importance of Information Technology Rapidly advanced scientific and technological innovations, economic turbulence and uncertainty are some factors that underlie the importance of information technology investment. IT enables organizations to have the capabilities to do some adaptations proactively, so IT becomes an integral part, even a pivotal part of business activities and processes undertaken by any organization (Chau Hu, 2002), from that, question appears about the necessity to invest in IT in order to the organizations can get the benefits from adopting the information technology and to insure the success in the adoption, Agarwal and Karahanna (2000) see the success in this investment will be a valuable when IT utilized by the intended user in the way that contributes to the strategy and the operational goals of the organization, so the user acceptance of IT is the fundamental for the success of IT investment. The importance of technology comes from that Technology has an important impact on innovation and the development of societies and economies. This impact can be observed in three steps, the first step is substitution, new technology substitutes for the old. For example, consumers start substituting their fixed telephone lines with mobile telephones. The second step is the diffusion, when adopting the new technology is widely across society because it is law cost or better or more effective than the previous technology. The final step is transformation when the new technology ways start working and emerging because the new technology is diffused so widely in society. For example, the widespread adoption of the networking has led to interesting innovations in the communication patterns of individuals such as executives conducting business while waiting in airport lounges or traveling in trains DUTTA MIA, 2006)World Economic Forum. ICT offers more opportunities for economic development and plays very important role in international competitiveness, rapid economic change, and productive capacity of improvements for developing countries. ICTs offer the developing countries many opportunities, as it has done in the developed world, when it created unprecedented possibilities for them. Studies have emphasized that there is evidence of a strong linkage between GDP growth and ICT investment showing the importance of ICT investment for development. Acquiring IT to support business needs is clearly a crucial prerequisite to exploiting the potential of IT. Unfortunately acquiring appropriate IT is a necessary but not a sufficient condition for utilizing it effectively. Organizations (i.e., leaders and managers) make primary adoption decisions, yet it is individuals within the firm who are the ultimate users and consumers of IT. Thus, it is evident that true business value from any information technology would derive only through appropriate use by its target user group. In other words, systems that are not utilized will not deliver the returns anticipated by managers. Evidence suggests that individual users can exhibit a variety of different behaviors when confronted with a new information technology: They may completely reject it and engage in sabotage or active resistance they may only partially utilize its functionality, or they may wholeheartedly embrace the technology and the opportunities it offers. Obviously, each behavior has some consequential outcomes both negative and positive for managers (Agarwal, 2000). Also, Organizations have increased their investment in information technology IT for planning in order to increase the efficiency of their business processes. Support management decision making and improve productivity. So IT become important tool to attaining competitive advantage for the organization and improves employees productivity and efficiency (Kim Lee Law, 2007), besides, -Many researches investigate the relation between IT investment and increase the productivity and the performance in the companies one of studies (sircar et al, 2000) which found several organization success with the spending on the IT but others were failed. (Agarwal karahanna, 2000) argue in this result that IT investment will be successful when IT utilized by the organization intended user in the way contribute to the strategy and the goals of the firms. Thus user acceptance is the key for the successes of the IT investment (Darsono, 2005), Even, for more than two decades information technology has be en the focus for researcher in information system this is because IT considers as the key to lead the organization for the good performance so many researches focus in the initial usage for IT or continuous usage for IT. 2.2- The advantages and disadvantages from adopting informationtechnology 2.2.1 The advantages Information technology uses to support the competitive strategy in helping the companies to reduce the costs of the company to give special offer for its products and services and give better care about customers and suppliers and to develop unions among the company and the company with the environment around the company and increase the virtue of its investment in IT resources. By using the information technology the organization or the companies will be able to develop the value of its business throughout making the customer value the focus of its strategy which is to keep track of its customers preferences to supply its products and services anytime anywhere by using the internet or intranet and extranet(e-commerce websites). A lot of organizations/companies use information technology and internet to reengineering its business process because information technology can make integration for the organization to work for the same goal of the organization and this improves the design of the work flows or the requirements of the job even the organization structures even improve the efficiency and the effectiveness. Information technology provides the communicatio

Wednesday, November 13, 2019

Teens Must be Educated About the Consequences of Drinking :: Argumentative Persuasive Argument Essays

As binge drinking continues to increase every year so does the fatalities caused by car accidents, teen pregnancy, rape, and homicides. Obviously there is no way to completely stop binge drinking but if we could decrease the occurrence then we could make a difference. I strongly believe that in order to do this we need to make the consequences more severe. Teens get off too easily and that’s why they continue to drink irresponsibly. I also think that if teens knew about it before hand they would think twice about binge drinking. Billboards are a good way of sending out this message. If they appear on major highways with a catchy phrase or maybe even a picture of what could happen it would get people’s attention. I know that if I was to see what a fatal accident caused by alcohol can do to a person it would definitely affect me. There are always numbers under the billboard signs that you can call so you can make your own billboard and you can also look in the phone book. Many have already taken action on the subject by covering our highways with warnings about the consequences of drinking and with the holidays approaching the issue of teens drinking illegal is bound to increase. Billboards are seen by many people everyday and I think that one about a serious issue would make a huge difference. I believe that kids need to be informed about binge and underage drinking before hand. I would suggest that they be required to take a class about it in junior high and in high school. This way they are more educated on the outcomes of it and not that it’s just an adrenaline rush. The way I could spread the idea would be through flyers. Flyers are a real easy to make and with shocking information and real life stories and pictures I think the word will definitely get out. I could hand them out almost anywhere, such as the mall, a sporting event, at school, etc. the more that agree with my opinion the better the chances are of passing the law. And even if it doesn’t get passed it would at least get people thinking about it and maybe parents can inform their children about it before they get in a situation that is encouraging them to drink. There was recently a commercial on TV about a girl that got hit by a drunk driver.

Monday, November 11, 2019

Ethics and Law Enforcement Essay

Regardless if anyone knows it or not, everyone actually lives in accordance with some sort of ethical standard. Some may refer to it as a code, a creed, or even a motto; however ethics itself is defined as a set of moral principles or values (Meriam-Webster). Ethics is an extremely important aspect of society in general and is applicable in every profession, however it holds a higher regard in law enforcement. Law enforcement officers are entrusted by the public to not only uphold the laws and order of our society but also live by and obey them; they are given the highest authority in the United States; to take a citizens life if it is required. Without ethics there would be corruption which would lead to chaos and an unstable society being the polar opposite of what law enforcement stands for and represents. Ethics may be interpreted in many ways whether it is based by religion or by laws themselves but may also be summed up by doing what is right. There are different parts of ethics as well; a written standard, example, and enforcement that all combine to form what is known as ethics. Ethics can be interpreted as a set of rules regulating the manner in which an individual or group of individuals should act. The meaning itself is hard to single out as it can be defined by many different opinions. Is ethical behavior the same as being a law abiding citizen? Absolutely not; laws are more often than not based on ethical standards however some laws can easily deviate from what is considered to be truly ethical (Manuel Velasquez). For example, relative to what is presently considered unethical are the pre Civil War laws allowing slavery. During that era it was acceptable and lawful to be a slave owner and remained unchanged until the final period of the American Civil War. Throughout our history, federal ethics have been have been implemented in a responsive manner to issues that have surfaced and finally being accumulated in 1962 with the formation of Chapter 11 Title 18 United States Code. In 1989 former President Bush enacted the Ethics Reform Act of 1989 which attempted to ensure uniformity of ethics regulation throughout the government. Law enforcement agencies regardless of the jurisdictional level are all subsidiaries of the government and all agencies have a common goal which is to ensure justice fairly and uniformly; â€Å"one team, one fight† is a good descriptor for this commonality. Ethics is the same way, in order for law enforcement to accomplish its goal every agency must operate in a uniformed manner allowing for proficiency and efficiency. If law enforcement did not operate in such a way then order would be nonexistent and create chaos which leads us to integrity. Integrity is defined as a firm adherence to a code of especially moral or artistic value (Meriam-Webster). A practicable explanation of integrity is, â€Å"doing the right things, for the right reasons, even when no one is looking†. What good is an ethical standard if there is no integrity towards it? After creating the standard law enforcement must have the integrity to carry it out even when no one is looking; it is only then that the mission succeeds. Ethics can be broken down into three categories: a written code, leadership by example, and fair and vigorous enforcement. Any code of ethics should not only be known by the officers it covers but also by the public. By providing the ethical code in a written form this can be accomplished, then through initial training and periodic reinforcement it can continuously be disseminated to both audiences. An example of this is written code is as follows: â€Å"As a Law Enforcement Officer, my fundamental duty is to serve mankind; to safeguard lives and property; to protect the innocent against deception, the weak against oppression or intimidation, and the peaceful against violence or disorder; and to respect the Constitutional rights of all men to liberty, equality and justice. I will keep my private life unsullied as an example to all; maintain courageous calm in the face of danger, scorn, or ridicule; develop self-restraint; and be constantly mindful of the welfare of others. Honest in thought and deed in both my personal and official life, I will be exemplary in obeying the laws of the land and the regulations of my department. Whatever I see or hear of a confidential nature or that is confided in me in my official capacity will be kept ever secret unless revelation is necessary in the performance of my duty. I will never act officiously or permit personal feelings, prejudices, a nimosities or friendships to influence my decisions. With no compromise for crime and the relentless prosecution of criminals, I will enforce the law courteously and appropriately without fear of favor, malice or ill will, never employing unnecessary force or violence and never accepting gratuities. I recognize the badge of my office as a symbol of public faith, and I accept it as a public trust to be held so long as I am true to the ethics of the police service. I will constantly strive to achieve these objectives and ideals, dedicating myself before God to my chosen  profession†¦law enforcement† (Diltz). Each individual agency has some variance of the aforementioned ethical code and it serves as a moral guideline for its officers to live their personal and professional lives. Let’s analyze this code; what does it mean? The exampled code simply explains that the law enforcement officer’s duty is to enforce the laws and safeguard mankind; while in the performance of these duties it is imperative and right tha t the officer also respect the rights of the citizens. It further explains the professional conduct of the officer as not allowing personal feelings to affect their decisions and acknowledges that the badge is a symbol of public faith given to him and any deviation from an ethical behavior compromises that public trust. Law enforcement officers are expected to be the example and must preserve that expectation through their conduct and relationships with the communities. Everyone has heard the phrase, â€Å"Lead by example† at some point in their life. This is especially true in law enforcement because if we do not act in the same manner in which we expect our citizens to act our credibility becomes questionable. This concept is effective throughout the entire chain of command of any agency as well; if the upper echelon of leadership begins to cut corners then the idea of â€Å"if it is ok for the boss to do it, then it is ok for me to do it† will spread like wildfire. Then the public will observe this mentality and begin the same activity creating a full system breakdown in society. In regard to fair and vigorous enforcement this concept has the highest impact on society and ethical code. If the perception of unfair treatment and enforcement occurs then the entire system becomes invalid and fails. In order to help prevent this there must be a definitive explanation between core principles and tangents of those principals. A properly functioning system should be constructed to be proportional, nontrivial, and practical (Lenox). Ethical behavior is the action of applying the code of ethics to one’s own life. This action accomplishes the goal of fair and vigorous enforcement through the sense that not only must there be fair and vigorous enforcement of the code but also of the citizens. Law enforcement as a whole is incapable of completely deterring and serving justice alone; it is through the cooperation and assistance of the community in which we serve that we accomplish the mission wholly. Whether it is an anonymous tip or a confidential informant, those pieces of intelligence assist law enforcement  agencies in solving crimes, deterring crime, and ultimately keeping the communities safe. It is through the ethical behavior of the officers that interact with the community that preserves this relationship with the public. If ethical behavior became a low priority the entire system as a whole would eventually begin to collapse. Let us examine the public’s opinion of law enforcement compared to that of other social institutions. Throughout the past, various polling organizations have sought the public’s opinion of different social institutions and in 1993 law enforcement was added to that polling list. On average, law enforcement ranked from second to third place for having the public’s confidence and trust. Through ethics and upholding ethical behavior, it is possible for law enforcement to perform their duties efficiently and maintain the public’s opinion of them. In the same data the criminal justice system as a whole was ranked as having approximately twenty-four percent of the public’s confidence. According to The Administration of Justice Program at George Mason University, it is possible that the public associates the majority of the criminal justice system with lawyers who are â€Å"viewed by the public as among the least honest and ethical professionals, generating levels of confidence similar to those who sell cars and insurance. Another possibility is that the public is responding to the mission and motivations they attribute to police. If the police mission is seen as bringing wrongdoers to justice and helping those who are wronged, then that is a simpler, more easily conceived mission than one for the criminal justice system. The courts in particular, operate in theory at least as an adversarial system in which one side tries to convict wrongdoers and the other attempts to get them acquitted or minimize their punishment. Such a construction has a zero-sum quality, where the more one side wins, the more the other loses. Faced with assessing a more complex role, perhaps many citizens select one aspect or the other, and invariably find the courts wanting when they attempt to accomplish both simultaneously† (Catherine Gallagher). Regardless of the manner in which the data was determined by the public it is consistent with the idea that law enforcement is held to a higher standard and it is clearly imperative that law enforcement must continue to maintain strict integrity to their ethical standards. Through this the public faith will continue to maintain and even grow. In conclusion, we have defined ethics and integrity acknowledging the  importance of both and there necessity in law enforcement as a w hole. The ethical standard that law enforcement adheres to is truly important not because law enforcement is thought to be better than the average citizen but because they are held and expected to be of higher standard. If ethics was not held in such high regard than who would police the police? An ethical standard can be created but it is only through it existing in written form and being disseminated appropriately, followed by all through leadership by example, and enforcement to reinforce its importance that it becomes effective. With these aspects fulfilled it then becomes practicable and applied to the law enforcement officer’s life in his or her behavior. The public holds law enforcement to a higher standard because they see them as role models of society and expect them to act accordingly both professionally and personally. Any compromise to this expectation causes mistrust amongst the public towards police and leads to disorder. Law enforcement’s objectives in responding to calls for service are gaining control or compliance and resolution. With a lack of ethical conduct and mistrust or lack of faith in police these objectives become nearly impossible to achieve in a proportional manner. Bibliography Catherine Gallagher, Edward R. Maguire, Stephen D. Mastrofski, Michael D. Reisig. The Public Image of Police. 02 10 2001. 16 05 2011 . Diltz, Chuck and Ruth. Police Officer Code of Ethics. 2 12 2002. 16 05 2011 . Lenox, William. â€Å"Outline Of Rules Of Ethics For Employees And Officials For A Securities Regulatory Agency.† 5 4 2006. 12 5 2011 . Manuel Velasquez, Claire Andre, Thomas Shanks, S.J., and Michael J. Meyer. What is Ethics? 2010. 16 05 2011 . Meriam-Webster. Defenition of Ethics. 1999. 12 05 2011 . —. Definition of Integrity. 1999. 17 05 2011 .

Saturday, November 9, 2019

Phl wk

Rice was initially suspended or three games as a result of his actions. It was not until the situation became public that the NFG decided to take further aggressive action against Rice. This situation could have been handled much differently had the NFG thought out the potential impact Rice's actions would have on the NFG its fans, and domestic violence camps. It's important to think critically in these types of situations because it shows that action is being taken not only because complaints are made, but because it is truly unacceptable and will not be tolerated.Otherwise, you will find yourself justifying the actions of the fender as well as your organization. Define free will, truth, knowledge, and opinion. Explain how we use them to form thoughts. What role does each play in critically assessing situations? Free will can be defined as the â€Å"capacity to respond in ways that oppose even the strongest influences† (Ruggeri, 2009). Free will determines what someone really wants without consequence rather then what they are forced to do.Truth is anything that can be proven, it is â€Å"the reality of the matter, as distinguished from what people wish so, believe to be so, or assert to be so† (Ruggeri, 2009). Truth is not opinion but ether facts that are waiting to be discovered. Facts may change, but the truth will always be just that, the truth. Knowledge is taught and is always evolving. Knowledge is what we are familiar with; â€Å"we can obtain authentic knowledge in any one of three ways: personal experience, observation, and report from others† (Ruggeri,2009) .Unknowing helps with understanding the topic in question and drawing educated conclusions when all the facts are not present. Opinions are subjective and â€Å"are intensely personal† (Ruggeri 2009). Opinions can be of taste or judgment but either way does not require explanation or defending. Identify three hindrances to the critical thinking process. Determine metho ds for overcoming these hindrances. Identify a time in which you experienced a hindrance in critical thinking. Describe a method you could use to overcome the hindrances.Three hindrances in the critical thinking process are the mine-is-better habit, stereotyping, and resistance to change. â€Å"The mine-is-better habit hinders our thinking. It destroys objectivity and prompts us to prefer self-flattering errors to unpleasant realities. If you wish to be a good thinker, you must learn to intro this habit and keep your ego from interfering with your search for truth† (Ruggeri 2009). Having an open-minded during the thinking process can help with the mind-is-better habit.Being open-minded removes any false notions that your way is better and allows for an accurate assessment of the current situation. â€Å"Resistance to change is the tendency to reject new ideas and new ways of seeing or doing without examining them fairly† (Ruggeri 2009). In order to overcome this hindra nce we must be willing to let go of the pass and give change a fair change before writing it off. Stereotyping is another hindrance to the critical thinking process. It is a generalization of any group or class of people. â€Å"The most common stereotypes are racial, religious, and ethnic.There is the stereotype of the black, the fundamentalist Christian, the Italian. But there are many other types as well, no less firm for being less common-?for example, stereotypes of homosexuals, the clergy, college dropouts, feminists, male chauvinists, New York City, singles' bars, motherhood-?even God† (Ruggeri 2009). The best way to over-come a stereotype is to conduct research and base your thinking from what is learned through first-hand research. I experienced a hindrance in my thinking process when trying to decide whether I should enroll back into school. As too focused on the change that going back to school would have on my daily routine. Once I stop focusing on the change and p ay more attention to the pros, I successfully moved forward with my though process. Identify a message in advertising. Describe how you perceive the message of the advertisement. Try to determine the reality of the advertisement. Distinguish between your perception and the reality of the message. Samsung recently released a commercial advertising their new Galaxy Note 4 as the next big hint.

Wednesday, November 6, 2019

Preparation for professional practice. The WritePass Journal

Preparation for professional practice.   INTRODUCTION Preparation for professional practice. ) concluded that a lack of awareness and understanding in an organisation’s nursing management theories have shown that the way in which an organisation is managed can affect nurses’ confidence to communicate the need for change. Maddock (2002) argued that the approaches to change and the proposal thereof may be ineffective unless individuals’ management strategies are put in place to develop leaders.   ACCOUNTABILITY/ RESPONSIBILITY According to Marquis et al. (2009) one of the legal requirements of a registered nurse is accountability. Scrivener et al. (2011) identified that accountability involves the ability of the nurse to define every action he/she carries out. The (NMC, 2008) emphasised that   accountability is seen as being of great importance and a qualified nurse is accountable for his/her own actions such as supervision, delegation, creative acts, intervention, assessing a situation or follow-up concerns. NMC (2008) further explained that the entire health care professionals are accountable and responsible for any action, error or omission made in practice. Huber (2006) states that as members of a multidisciplinary team, nurses must maintain their professional accountability. Nurses should also be able to use their communication skills to make complicated information understandable, explain choices, offer reassurance, look out for side-effects and liaise with medical colleagues about the subsequent p rogress of individuals with mental health problems (Garon, 2012). This was seen as a critical aspect of the operation here with regular reviews being planned to evaluate the success of the change and to amend the program where appropriate. Furthermore, if a nurse is meant to delegate care to another professional or support worker, she/he must delegate effectively and should be accountable for the appropriateness of the delegation. During one of the author’s practice placements in the acute ward, a newly qualified nurse delegated the task of security nurse to an agency staff who was very new on the ward. This agency staff let one of the patients out of the ward, not knowing that the patient was on level 1 observation restricted to the ward and the patient absconded from the unit. This resulted in an investigation which revealed that the newly qualified nurse did not delegate the task properly and did not communicate effectively. This raised the question of accountability and responsibility. The specifics of the nurse’s role are identified as being responsible for assessment, planning, the delivery of care and the evaluation of nursing care for their patients (NMC, 2008). According to RCN, 2011), nurses are accountable and responsible, on a daily basis, carrying out patient care most of the time and acting as care provider. Nurses have the responsibility for communicating the relevant information necessary for the patient to receive their full nursing care provision (NMC, 2008).  Ã‚   (RCN, 1992) also states that with an increase in the level of responsibility and accountability, nurses need adequate training and competence to develop these changes. It is the responsibility of the nurses to make sure that patients are suitably dressed and eat their meals, while also managing their welfare rights and dealing with individuals’ psychological distresses; theses roles have to be carried out in conjunction with running organisational demands (RCN, 2011). INTER-PROFESSIONAL COLLABORATION Orchard et al. (2005) described inter-professional collaboration as a combination of different professionals working together in a partnership in order to achieve common goals, establish a therapeutic relationship, showing respect for others and the skilled therapeutic use of self. On the other hand, inter-professional collaboration means the adoption of multi-disciplinary and multi-agency working as the most effective route towards comprehensive mental healthcare (Audrey, 2003). However, Garon (2012) states that when talking about change in inter-professional collaborative team work, it is important to consider how staff members would need to be motivated to accept and welcome this change. It is also very important to select the right leader, which was a key advantage of this approach, to implement the change and involve all team members in the change process, as well as considering the safety of the patients, their comprehensive care and the stress the change might cause (NICE, 200 7b). CONCLUSION During this implementation of â€Å"Protected Mealtimes†, all the team members on the ward worked collaboratively, demonstrated excellent communication skills, showed motivation and were very enthusiastic and committed to the plan. Word count: 2,200. PART 2 THE PROFESSIONAL DEVELOPMENT PLAN (PDP) The purpose of writing this professional development plan is to think and reflect on a facet of the professional development experienced by the author during their three-year course. It will also enable the author to work efficiently and effectively in their areas of weakness and help   to sustain areas of strength, as well as developing delegation skills in the nursing environment, upon qualification. In order to accomplish these goals, a plan utilising SMARTER theory (Specific, Measurable, Realistic, Timely, Ethical and Recorded/ Reflective (Appendix 1) is proposed. During the three years of nursing training, the author of this essay has utilised Gibbs Reflective Cycle (1988), as a framework for reflection on day-to-day actions, strengths and weaknesses. According to Brechin (2000), reflection means not only thinking about a situation, but also using it as a form of systematic appraisal of the events that have occurred and as an examination of an individual’s ability to le arn from the experience and influence future practice. During this placement in the acute ward, the author discovered that delegating duties to staff when co-ordinating shifts was a far more complex issue than originally anticipated. The RCN (2006) described delegation in nursing as a process of entrusting or allocating responsibility to another person who is seen as being able to carry out such a task. The Nursing and Midwifery Council (2008) states that a nurse’s   job cannot be completed or carried out without delegating some part of the care functions to others, as it is highly impossible to deliver total care for different patients with different care needs. Barr and Dowding (2008) in their research emphasised that delegation is a critical leadership skill that must be learned. This became evident when considering a situation which emerged when dealing with a violent patient in a ward environment. In order to delegate tasks relating to this individual it was necessary to use confidence, communication, courate, compassion, competence and care. On the whole this was doen relatively well by myself however it was found that the newly qualified staff nurse is more likely to be unfamiliar with the procedure delegated to him and this made communication a more vital so that guidance could be obtained. Having identified a weakness in the authors ability to delegate, this communication between the two parties in the case mentioned above was used as a clear example of how greater comfort from the process of delegation could be obtained. This would in turn improve confidence. By watching delegations within the ward environment it became apparent to the author that there were greater difficulties when the manager used the autocratic style and this often created hostility amongst other staff and may hinder creativity and improvement. This brought the manager’s delegation skills into question. There was also an increased danger that the more junior member of staff would find themselves unsupervised in an inappropriate and unacceptable way according to RCN (2011). This leadership style as described by Bass 2008 as creating difficulties. Where better delegation communication were used the author was much more comfortable with the delegation process as they were aware that the process would be used appropriately and would be successful. With this in mind the PDP going forward would focus on risk management and controlling the process without following an autocratic style which would lead to loss of control when delegating. CONCLUSION The author of this essay has learned from undertaking this assignment that delegation not only saves time, but is also an essential skill which a registered nurse must posses; it is also requires good leadership and is an important role for every nurse involved in health care delivery. Through this Personal Development Plan (PDP), personal areas of weakness have been identified which the author is currently striving very hard to correct.   REFERENCE LISTS Allan, E., 2007. Change management for school nurse in Scotland. Nursing Standard. 21, (42) 35-39. Allan, E., 1988. Planning a psychiatric intensive care unit. Intensive Care for people with serious mental illness. Hospital and Community Psychiatric, Vol- 39. Bass, B.M., 2008. The Bass Handbook of leadership: Theory, Research and Managerial Applications. 4th ed. New York:   Free Press. Bass, B.M., and Avolio, B.J., 1994. Improving organizational effectiveness through transformational leadership. London: Sage. Braine, M., 2006. Clinical governance: applying theory to practice. Nursing Standard. 20, (20) 56-65. Brechin, A., 2000. Introducing critical practice. In Brechin, A., Brown, H. Eby, M., eds. Clinical practice in Health and Social Care. London: Sage Cummings, J., 2012. Developing a Vision and Strategy for Nursing, Midwifery and Care- Givers, tinyurl. Com/c89xe4x [Last accessed:   May 2 2012]. Cherry, B., and Jacobs, S., 2995. Contemporary Nursing: Issues trends and management. 3rd ed. Elsevier: Health Science. Christie, P., and Robinson, H., 2009. Using a communication framework at handover to boost patient outcomes. Nursing Times, 105,(47) 13-15. Crevani, L.,Lindgren, M., Packendororff, J., 2010. Leadership, not leaders: on the study of leadership as practices and interactions. Scadinavavian Journal of Management. 26 (1)77-86. Cummings, G., Lee, H., Macgregor, T., 2008. Factors contributing to nursing leadership: a systematic review. Journal of Health Services. Research and Policy. 13(4) 240-248. Department of Health, 2008. Code of Practice: Mental Health Act 1983. London: DoH. Doran, G.T., 1981. There’s SMART way to write management’s goals and objectives. Management Review. 70, (11) 35-36. Food in Hospitals National Catering and Nutrition Specification, 2008. [Last accessed on 30 May 2013]. Garon, M., 2012. Speaking up, being heard: registered nurse’ perceptions of workplace communication. Journal of Nursing Management. 56, (2) 35-39. Green, T., Heath, I., 2010. Measuring Relationship. London: The King’s Fund. Gibbs, G., 1988. Learning by doing: A Guide to Teaching and Learning Methods. Oxford Further Education: Oxford. Hersey, P., Blanchard, K.H., and Johnson, D.E., 2001. Management of organizational behaviours: leading human resources. 8th ed. Upper Saddle River, NJ: Prentice- Hall. Huber, D.L., 2010. Leadership and nursing care management.4th ed. Maryland Heights: Saunders Elsevier. Huber, D.L., 2006. Leadership and Nursing Care Management. 3rd ed. Lowa. The University of Lowa: The University of Lowa. Maddock, S., 2002. Making modernisation work: new narratives change strategies and people management in the public sector. International Journal of public Sector Management. 15, (1) 13-43. Marquis, B.L., and Huston, C.J., 2009. Leadership roles and management functions in nursing: theory and applications. 6th ed. London: Wolters Kluwer Health/ Lippincott William and Wilkins. McConnell, C.R., 2007.   The effective Health care Supervisor. 6th ed. Sudbury, MA: Jones and Bartlet Publishers. McKimm, J., and Held, S., 2009. The Emergency of Leadership Theory: From the Twentieth to the Twentieth-First Century. In: McKimm, J., and Phillips, K., eds. 2009. Leadership and Management in Integrated Services. Exeter: Learning Matters. Ch1. National Institute for Clinical Excellence, 2007b. How to change practice. London: NICE. National Institute for Innovation and Improvement, 2013. NHS Change Model: Our Shared Purpose. Tinyurl, com/bwefn79 [Last accessed: May 2 2013]. National Patient Safety Agency 2007.Protected Mealtimes review Findings and Recommendations Report. Nursing and Midwifery Council, 2008. The Code: Standards of Conduct, Performance and Ethics for Nursing and Midwives. London: NMC. O’Connell, B., Macdonald, K., and Kelly, C., 2008.Nursing handover: time change. Contemporary Nurse. 30 (1) 2-11 Creating a Culture for Interdisciplinary. Orchard, C.A., Curran, V., Kabene, S., 2005. Creating a Culture for Interdisciplinary. Collaborative Professional Practice. Medical Education. Rolfe, P., 2011. Transformational leadership theory: What every leader needs to know. Nurse Leader. 9, (2) 54-57 Royal College of Nursing. 2012b Health and Social Care Act 2012. Tinyurl.com/HealthSocialCareAct2012 [Last accessed May 9 2013]. Royal College of Nursing, 2011. Accountability and Delegation: What you need to know. Royal Collage of Nursing. London:   RNC. Rosener, J.B., 1990. Ways women lead. Harvard Business Review. In Barker, P., 2009. Psychiatric and Mental Health Nursing. The Craft of Caring. 2nd ed. London: Hodder Arnold. Scrivener, R., 2011. Accountability and Responsibility: Principles of Nursing Practice. Nursing Standard, 25, (29) 35-36. Scott, L., and Caress, A.L., 2005. Shared governance and shared leadership: meeting the challenges of implementation. Journal of Nursing Management, 13(1) 4-12. Tomey, A.M., 2009. Guide to nursing management and leadership. 8th ed. St Louis, MO: Mosby/ Elsevier. Yoder-Wise, P., 2011. Leading and Managing in Nursing. 5th ed. St Louis: Elsevier Mosby. APPENDIX- 1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   S.M A.R.T.E.R PLAN          SPECIFICS   Ã‚   Within six months of the preceptor-ship course, there will be a need to build better confidence that will improve communication skills which will support the author in their nursing career. MEASURABLE How can one ascertain that the intended outcomes have been achieved? The learning outcomes will be gained via the professionals consultants, occupational therapist, staff nurses and preceptor-ship mentor involved. The author is confident that these professionals have the necessary assertive skills that will help achieve the desired learning outcomes. Achievable The intention is to attend training courses, discuss any difficulties experienced with the preceptor-ship mentor or manager of the ward or any member of staff, and integrate the proposal as advice. REALISTIC Within three months of completion of the nursing course, it is anticipated that the author will be able to demonstrate effective leadership, delegating tasks properly, and entrusting responsibility to a person who is perceived as being able to carry out these tasks by utilising one’s newly gained assertiveness skills. TIMELY   Within three months of registration, an evaluation of achievements will be carried out and competencies will be examined frequently by the preceptor-ship mentor. The aim is to be constantly monitored by members of the team and to reflect upon performance and the impact of these actions. If there are any obstacles to achieving these goals or any concern from the team about the author’s approach, these issues will be discussed with the preceptor-ship mentor or ward manager, as this will facilitate the development of ongoing skills.       ETHICAL Being knowledgeable about ethical issues such as social and cultural, rights, confidentiality and being aware of how this might impact on one’s practice. As a nurse there is a need to ensure that the patient’s autonomy is respected.    RECORDED/REFLECTIVE Reflection on personal strengths, weaknesses, opportunities and threats (SWOT), on a regular basis.                      Appendix 2 – SWOT Analysis    MY STRENGTHS The SWOT analysis has helped me to develop, maintain a learning environment in which both education and lifelong learning are seen as integral to clinical setting, to work and focus on the goals and strategies, enable me to grab the opportunities I would love to achieve and work very hard to reduce my weakness and increase my strength. With the aid of SWOT analysis, I have been able to identify my strength as being a good team player, good listener, a good communicator and interacting well with my colleagues and patients. Showing compassion to my patients and having the ability to work under pressure. I like taking the lead and I am always happy when people appreciate me, it makes me happy and also motivates me.                MY WEAKNESS I identify my weakness as being easily distracted, tending to carry out many tasks at a time and I am always fearful of making mistakes.   I also felt that there are some areas I lack leadership skills such as being a good delegator because Barr and Dowding (2008) in their research emphasised that delegation is a critical leadership skill that must be learned. I find it complex to delegate duties when coordinating shifts. OPPORTUNITIES My opportunities are to update my knowledge in relation to the new pre-registration courses which include existing educational, personal and professional career development within the establishment.   During this my practice placement I also had the opportunity to learn and share ideas with my colleagues, had the opportunity for questioning and giving feedback. THREATS My threats   Ã‚  are whilst on this practice placement, I found some areas very stressful.   I discovered that some of the mentors were unfamiliar with the new- pre registration programme and unaware of the needs of the nursing students in relation to the learning opportunities or activities . Appendix 3   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Service Improvement Activity – Notification Form Student Details Student SID Number: 0820968 Details of student pledge on which the proposed improvement is based. I must treat individuals kindly and considerately.   I will provide a high standard of practice and care at all times. I will respect individuals’ confidentiality. I must show compassion and unconditional positive regard to my clients. I must disclose information, if I believe some one may be at risk of harming him/her self in line with the law of the country in which I am practising. I must listen to individual in my care and respond to their concerns and preferences. Details of proposed service improvement project/activity: The service improvement initiative is to facilitate Protecting Patient Meal Time in the Psychiatric Intensive Care Unit (PICU).   The purpose of this service improvement is to help and manage mealtimes without unnecessary and avoidable interruptions. Mealtimes are not only a vehicle to provide patients with adequate nutrition, but also provide an opportunity to support social interaction amongst patients. Reason for development: During my practice placement in the PICU. I discovered that there have been a lot of interruptions and argument between some patients and staff during meal time and also staff members who supposed to assist during meal time always claimed to be very busy. This made me choose to introduce to the team about â€Å"Protected Mealtimes†.   This development is to support those patients who were finding it very difficult to eat or drink. Time spent on the project/activity: The service improvement lasted for the period four weeks because I first and foremost had the meeting with the multidisciplinary team members before introducing the change to the patients. Resources used: National Health Service (NHS boarder) Evidence on topic relating Protecting Meal Time Information from in the internet. Policy and regulation from the trust Text book Some information from dietician. Who will be involved? The ward consultant My mentor as a nursing staff, Occupational therapist staff Support worker The ward manager The dietician Myself( a student nurse) Future plans: The future plans are for me to distribute leaflets to the other professionals for them to read it in the internet and be awareness of the protecting meal time. Date discussed with clinical staff in placement area: