Tuesday, December 24, 2019

Engaging Privacy and Information Technology in a Digital Age

Engaging Privacy and Information Technology in a Digital Age (Free Executive Summary) http://www.nap.edu/catalog/11896.html Free Executive Summary Engaging Privacy and Information Technology in a Digital Age James Waldo, Herbert S. Lin, and Lynette I. Millett, Editors, Committee on Privacy in the Information Age, National Research Council ISBN: 978-0-309-10392-3, 456 pages, 6 x 9, hardback (2007) This free executive summary is provided by the National Academies as part of our mission to educate the world on issues of science, engineering, and health. If you are interested in reading the full book, please visit us online at http://www.nap.edu/catalog/11896.html . You may browse and search the full, authoritative version for free; you†¦show more content†¦Economic approaches to the question have centered around the value, in economic terms, of privacy, both in its role in the information needed for efficient markets and in the value of information as a piece of property. Sociological approaches to the study of privacy have emphasized the ways in which the collection and use of personal information have reflected and reinforced the relationships of power and influence between individuals, groups, and institutions within society.  Copyright  © National Academy of Sciences. All rights reserved. This executive summary plus thousands more available at http://www.nap.edu Engaging Privacy and Information Technology in a Digital Age http://books.nap.edu/catalog/11896.html  ENGAGING PRIV ACY AND INFORMATION TECHNOLOGY IN A DIGITAL AGE Key to any discussion of privacy is a clear specification of what is at stake (what is being kept private) and the parties against which privacy is being invoked (who should not be privy to the information being kept private). For example, one notion of privacy involves confidentiality or secrecy of some specific information, such as preventing disclosure of an individual’s library records to the government or to one’s employer or parents. A second notion of privacy involves anonymity, as reflectedShow MoreRelated Privacy in a Digital World Essay844 Words   |  4 PagesPrivacy in a Digital World The history of privacy in the United States is a storied one. The context of the 4 th Amendment to the Constitution has been debated for years to determine if the â€Å"right to privacy† is a constitutionally guaranteed right. Additionally, many people are technologically ignorant of what behaviors and activities will put them at risk. The â€Å"Carnivore† is a good example of an historic digital technology that generated privacy concerns. The Carnivore was a digital intelligenceRead MoreCyber Bullying : A Vital Concern Of Many Families And Schools Across The World1331 Words   |  6 PagesShanice Duncan November 16, 2014 Computing and information Professor: Dawit Demissie Cyber Bullying In today’s digital age, cyberbullying has become such a vital concern of many families and schools across the world. With its increasing saliency certain states in the United States have developed laws against it and school districts are enforcing polices to combat it. Although similar in concept, cyberbullying and bullying are different. BullyingRead MoreThe Freedom Of Information Act743 Words   |  3 Pagesfederal level, the Freedom of Information Act (FOIA) has been the vital basis for access claims, many of which have been litigated with varying results. Among the nine statutory exemptions to a citizen’s right of access under FOIA, those most likely to precipitate privacy tensions are Exemptions 6 and 7c. The first of these relates to information such as personnel and medical files, the disclosure of which would â€Å"constitute a clearly unwarranted invasion of personal privacy.† Exemption 7c excludes recordsRead MoreIs The Absolute Security On The Internet?1561 Words   |  7 Pagesregarding privacy on technology, such as the Internet. With technology, people can do all sorts of things and socialize with people from different places. However, people shouldn’t trust digital technology so easily when it involves disclosure of private information. With digital technology being so advanced today, people’s privacy is in danger that demonstrates cybersecurity, tracking, and abuse of one’s personal information for negative purpose. People shouldn’t disclose personal information as thereRead MoreA Brief Note On Facebook And Mental Wellness1576 Words   |  7 PagesName Professor WXY 28 November 2014 Facebook and mental wellness Modern technology already took place into our social life. The way we communicate with each other has been reshaped and redefined by some of the developments of science. For example Facebook, Skype, Twitter, Cell phones, Laptops, Tablets, Hangout and many more networking devices and tools replacing traditional ways of socialization. Can you think about living without a cell phone in your pocket or a laptop/tablet in the study room?Read MoreHow An Organization Utilizes The Power Of Digital Media Essay1508 Words   |  7 PagesThe advent of digital media in today’s day and age has widened and ultimately transformed how organizations communicate with prospective and current customers. Web videos, e-books, and social media have each shaped the communication strategies organizations employ to engage customers. Organizations are fundamentally changing the business ecosystem by using digital media tools in unique and creative ways. Synopsis This case study will aim to demonstrate examples of how an organization utilizesRead MoreNegative Effects Of Social Media On Youth1535 Words   |  7 Pagesthat social media is having a multitude of possible effects on teenagers. This literature review will analyze research of the positive and negative effects social media are having on today’s impressionable youth. Much of the research focuses on the age range of 10-16 from well-to-do families and college students. Understanding the online environment that teenagers live in can help parents relate to their children and teach then about the dangers and benefits of being on the Internet. ResearchersRead MoreThe Cell Phone Usage Between Partners1679 Words   |  7 PagesGenerally speaking, if there is an unbalance in cell phone usage between partners someone is bound to feel ignored. Engaging in technology separate to a partner encourages a disconnection rather than a connection. (Bilton, 2014) Also stated by Bilton, disconnection in relationships leads to feelings of dissatisfaction and compromises any sense of safety, attachment and control. Privacy, Trust, and Freedom seem to be essential terms revolving around the topic of relationship satisfaction. â€Å"PartnersRead MoreSocial Networking Sites and Privacy1155 Words   |  5 Pagesa part of everyone’s daily routine. Nonetheless, recently privacy concerns over the social networking sites have taken its peak. Background It all started several decades back, when information technology developments succeeded but had put personal privacy into danger. The data base technology was the first development in information technology which made it possible to â€Å"collect, store and retrieve† great amounts of â€Å"digitized information†. After sometime, many organizations started using electronicRead MoreInstructional Planning For Learner Development Essay1313 Words   |  6 Pagesdiverse cultures, and diverse communities to promote student learning in safe, collaborative, engaging, inclusive, 21st century learning environment† (PLO 2014). Puckett (2013) reported â€Å"technology tools can assist teachers in differentiating by content, process, and product in response to learner characteristics† (sec. 1.6). Students especially those with special needs benefit tremendously when technology, the common core standards, and the 21st century skills are integrated in the teaching and learning

Monday, December 16, 2019

High School Teacher Free Essays

In your own words explain the symptoms of Shame Leisure’s Syndrome and its causes. What do we learn about Seamless sister Pure in this chapter? Who does Shame blame for his syndrome? Question 2: What does Shame feel about the story of how he got his name? What image does Shame use to describe his father and his keenness to tell the story of Seamless naming to unsuspecting Victims’? Why do you think he uses this comparison? Do you think it is effective? Why/why not? Question 3: Who or what does Seamless father dress up as in the hospital the day Shame is born? Why does he do this? Question 4: Who is Herman Melville and why does Shame describe him as the ‘real culprit’ in the curse of Shame Lesser? Question 5: What does Barry Bagley do that makes Shame describe him as a ‘mad dog mauling a shoe? Question 6: What method does Shame use to survive going to the same school as Barry Bagley? How does Shame sum up Year Nine at SST Daniels Boys College? Question 7: Write down a list of words Shame uses to describe his new teacher Miss Tarragon. Why do you think he says she won’t survive the term? Do you think he will be right or wrong? Explain your response. We will write a custom essay sample on High School Teacher or any similar topic only for you Order Now Question 8: What conclusions do you think Miss Tarragon might draw about Shame from his ‘Five Amazing Things about Me’ list? Question 9: What challenge does Miss Tarragon put to the class? Why should Barry Bagley have ‘listened carefully? What did Shame know about Miss Tarragon after just one day? Question 10: What effect does his encounter with Miss Tarragon have on Barry Bagley and his treatment of Shame? Question 1 1: Why does Shame decide not to turn around and go home another way when he sees Barry and the others bullying the primary school boy? How to cite High School Teacher, Papers

Sunday, December 8, 2019

Employee Security Risk In Organizational Settings †Free Samples

Question: Discuss About The Employee Security Risk In Organizational Settings? Answer: Introducation In current organization and corporation aspect, mobile devices are more consumer-oriented and the devices are susceptible to changes the way of business. The computing power in business entirely casts influence over allowing consumers and employees to replace traditional end-user computing device with laptop (Al Ayubi et al., 2016). The BYOD concept increase security concerns and puts every organization in verge of multiple risks and threats. Organizations in different sectors such as banking, retailing, information technology, financial, and online clientele, have significant level of consideration for incorporating BYOD into business. The organizations need to deal with new level of security considerations and data threats with personal and corporate data. The risk management over personal and business data should consider appropriate level of risk mitigation planning (Faulds et al., 2016). Therefore, the complications in this situation should devise a policy as protection of data, staffs, and customer is critical for any business to grow with its potential to the fullest. Ownership of data is becoming more of an issue within business that operates in regulated market. Several organizations have planned to implement Bring Your Own Device (BYOD) policy so that employees can be allowed to utilize their favorite devices with bringing down costs to accommodate devices. The BYOD policy-based work model is expected to complicate the data control and policies for organizations that can increase importance of having well-developed policy (Laudon Laudon, 2016). Successful implementation of mobile device policy can incorporate BYOD initiative into business. The entire life cycle of project can be covered with BYOD initiatives as well. The project and outcomes can be achieved with utilization of discipline of project management; however, the PMP strategy is not expected to provide guarantee though, the PMP strategy can increase chances of meeting all planned outcomes (Rittinghouse Ransome, 2016). The project management tools are necessary for Altium Limited organization to successfully implement BYOD project inside IT department and development workforce. E very project is ephemeral with pre-defined start and derived end date; the projects do not completely depend over on-going work activities and responsibilities (Steelman, Lacity Sabherwal, 2016). In this Altium Limited organizational aspect, the BYOD project is part of planned deliverables and a defined period. The project deliverables are mentioned as per project initiatives and objectives; the deliverables included all activities in a short overview. First and primary activity for BYOD project should be to prepare Bring Your Own Device (BYOD) policy. The policy should be documented with clear understanding about the policy guidelines, all aspects that should be obeyed from employees and how the policy should work (Kearns, 2016). The project management can follow Plan-Do-Check-Act (PDCA) cycle over the entire lifecycle. Next activity that should be included into the list of deliverable is to declare the BYOD policy and the policy should be clearly described among all employees so that they can easily follow the guidelines and maintain the rules. Furthermore, the project deliverable is to provide necessary training and start a pilot project (Sadgrove, 2016). The aim of the pilot project is to start the policy for some period to assess the employees as in whether they are capable of following the policy guidelines and rules or not. In case, any employee failed to follow the policy guideline; they should be trained for a certain time. Furthermore, the project deliverable should be to activate the BYOD policy into the workflow of Altium Limited organization. The assumptions are considered to conduct the project within the boundary or the entire work process. The major assumptions in the project are mentioned as following: The employees should understand the BYOD policy importance and should attempt to follow the guidelines and rules (Singh, Chan Zulkefli, 2017). The BYOD policy should written with considering all aspects and depicting individual guidelines as well. The policy should be incorporated into existing work process of Altium Limited organization without hampering the overall profitability and stability of workflow (Sebescen Vitak, 2017). However, some risk concerns exist in the project as in data security risks, authentication problems, and putting personal and corporate data at stake by having vulnerabilities in personal devices. Security Posture BYOD project has some major impacts on the implementation process; the Altium Limited organization should follow this section to realize whether the organization can meet business requirements or not. BYOD project influences are included in this section so that significant benefits of BYOD project can be addressed (Martinez, Borycki Courtney, 2017). The review of project impacts are considered and mentioned as following: Saving of Expenditure: Initially, the assumption about BYOD project is that the project have ability to being down expenditure as the employees are using their personal devices in case of using organization provided devices (Peltier, 2016). However, recent statistics from study revealed that 67% of the European IT professionals felt that BYOD could increase cost and to some extent, this conception could be right. It is clear that BYOD policy is major part for starting a business case; though these costs required to be specified and offset costs against other advantages (Tanimoto et al., 2017). Therefore, the question arises how the cost increased; the discussion pinpointed the reasons here. Firstly, there is vocal minority that will require BYOD scheme for several employees who does not want to be involved in these initiatives. The employees over median incomes are not agreed to be involved in the scheme as they are unprepared and they refuse to bear any cost for personal device (Filkins et al., 2016). This represents that in case someone wants to start a company based program then the employer need to provide adequate financial support and incentive for buying personal device. Furthermore, when money is provided to the employees are part of income tax, therefore, privately purchased device cost will be increased with non-reclaimable sales tax (VAT) (Trewin et al., 2016). Hence, the actual cost will be considered exponentially more than the organization has bought; if both costs are compared side-by-side. In similar perspective, the Smartphone Allowance is between AU$30 to AU$50 and this expense can be more rather than corporate negotiations. Secondly, the increased Wi-Fi coverage is another reason for growing BYOD policy scheme and at the same time, the organization needs to provide better Wi-Fi coverage than before due to BYOD initiatives (Russell, 2016; Lobelo et al., 2016). When employees are capable of bringing personal devices such as laptops, phone, and tablet using IP addresses; then the existing network should be upgraded. This issue has tendency to occur in educational institutions where numerous students need Wi-Fi coverage; however, Altium Limited organization needs to consider this issue as well. Finally, due to security risks in BYOD policy, the organization needs to consider Mobile Device Management (MDM) with security solution. The security solution should be able to catalogue the devices, and the security policies should be applied (Shedden et al., 2016). Once, a device is either lost or stolen; the devices should be wiped clean or devices should be locked before the data is visible to unauthorized persons. There are not only negative aspects of the BYOD policy; some positive aspects are visible with BYOD policy as well. The positive aspects are listed as following: The organization can offer top-up values to the employees so that they can buy better devices for helping to improve productivity and work performance (Souppaya Scarfone, 2016). The employee ownership of device may convey that the devices can last longer as employees will take care of their devices. The organization can have better profit in support section, as the support goes down at significant level. For instance, employees can perform the upgrade of iOS device typically and therefore, no intervention from employer is required (Reid Pechenkina, 2016). The employer does not need to be involved in the support work when BYOD scheme is activated; employee forum and discussion works much better and reducing cost as well. Increment in Productivity: Productivity is another important part of BYOD business case that acts as primary driver. Primary reason is that BYOD can bring increment in productivity. In spite of 30 minutes of email interaction that every employee needs to do before starting work and that mails were sent after their previous shift hours (Dorsemaine et al., 2017). Now, in BYOD scheme, the employees can check and view the emails at their home, on the way to office or while sitting at home on following evening. This reason increases work hours inside office at conservative estimate of 10%. Whereas, if this is viewed in another aspect; employees can take advantage of BYOD with having personal devices for Twitter and Facebook during work hours (Gillon, 2017; Dawson, 2016). However, those employees will be easily identified when they will seek for more time in other ways. BYOD can improve daily productivity of workforce by providing technology to people without having access to technology at all. Meeting Employees Satisfaction at work: BYOD is identified as tool for attracting and retaining employees taking younger staffs at work. Recent studies have presented that 20-30 year aged employees conveyed that 50% of them consider BYOD as a right not a privilege (Martinelli Milosevic, 2016). Therefore, as year goes around, if BYOD is not implemented; some bright employees may leave the workforce soon. Understanding Customer needs and requirements: The retail organizations are utilizing consumer devices in stores. The BYOD can provide better situations for presenting marketing materials (Goldes et al., 2017). Retail employees can check about available products and customer can get instant information about inventory. Flexibility in Operation: The operational flexibility may be overlooked however, for some reasons, it is most important part of BYOD scheme. Firstly, employees can be forced to do work from home or can be provided with proper accommodation so that they can work from home at situations of industrial actions, bad or unfavorable weather, and even terrorism (M'manga et al., 2017). BYOD includes the aspect of unplanned home working so that lost time can be used with workforce. Secondly, in any industry, in presence of several mergers and acquisitions, BYOD policy can help the employees by treating new company devices as under BYOD guidelines. The organization can incorporate BYOD standards with mergers as well. Finally, the organization within higher growth of business can speed up new employee outputs with BYOD policy (Vithanwattana, Mapp George, 2017). In similar point of view, employer can have short-term workers over BYOD policy so that time spent can be reduced rather spending time over provisioning new devices. Threats, Vulnerabilities and Consequences Assessment Dove (2016) opined that during project lifecycle, the risks may occur are often identified as allowing project manager for recognize and treat them as risks. The risks can cast influence over project in terms of cost, time, deliverable quality, and morale. The risk management planning included definition as the project definition, monitoring, and controlling risks through the project. Risk assessment and management plan deals with accepting risk into planning, tracking and updating risk plan along with removing risk form the plan (Halford, 2016). The escalation of risk can be made when it is necessary. Maintaining existing risk plan allows project manager to set out expectations for multiple stakeholders and sponsors, allowing team to focus over project work along with providing support when expectation fails. Factors that can affect the risk management and the factors are identified as either internal or external as policies, project objectives, politics, industry trends, historical factors, company direction, economics, social issues and others (Zahadat, 2016; Muzammal et al., 2016). BYOD risk management plan can recognize associated risks along with project and its deliverables. However, it is viewed that not every risk is negative; some risks can be positive and therefore, can increase benefits for the project. Risk Identification Risk identification is an important process where project manager gathers threat and related concern as in what could go wrong in this particular project. In this risk identification process, the project team performs identification based on risk aspects, its consequences, and likely occurrence of risks. Risk assessment provides the working team an opportunity to identify better ways to address project objectives and deliverables (Vorakulpipat et al., 2017). The risk identification can be performed with categorizing them based on risk contexts. Risk categorization can be performed for BYOD project; however, some categories should be omitted from the risk identification process. The ecological or structural risks should be omitted from BYOD project risk identification due to project nature; other areas are significant concern for the project in Altium Limited ("About Altium | Innovative PCB Design, ECAD / MCAD Collaboration EDA Software", 2017). The resulting risks are included in a table for creating risk register along with teamwork for identification and tracking them in the project. Risk Register ID Risk Trigger Event Cause Impact Owner Response plan BYOD1 Time off for primary employees Vacation calendar Employee requires time off Scheduled vacation Medium Project manager Identify additional internal resource to backfill the position BYOD2 Legal counsel as they are not reviewing policies in time Legal obligations or court appearances To gather the legal resources, court appearances or legal obligations are required Higher priority should be provided for legal instances High Project manager Can escalate the situation towards project sponsor BYOD3 Regulations or law change while considering data security on devices Regulators can pass the new or existing additional regulations to pertain data security Regulators pass laws to protect consumers Regulators pass new regulations or laws that pertains data security High Project manager Maps new regulations along with existing project controls, incorporate change management if required. BYOD4 There were no technical solutions for meeting the BYOD policy Technology solutions fail to meet compliance demands Technology is less matured Technical solutions cannot meet compliance guidelines and demands as well Medium Project manager Additional resources compensating control can be added BYOD5 Primary employee separation Primary employees should work with over extended commitments Organizations are working for more productivity with lesser people Employee are looking for job making employee not happy about company Medium Project manager The risk owner should try to consider employees and compensate with devices during the project implementation (such as iPad) BYOD6 Completion of work package before the planned date Completed work Employees are working over assignments after the work hours due to having interest of doing work Employee are obsessed with new devices and spend time exploring new applications and technology Low Project manager Project manager should leverage early compensation and perform fast tracking of activities Table 1: Risk Register and Management (Source: Created by author) Qualitative Risk Analysis The qualitative risk analysis should identify the factors that can influence different risks that are considered within project deliverables and probability of occurrence. Qualitative risk analysis sets priority for further analysis, identifying how separate risks are influential about project deliverables (Al Ayubi et al., 2016). The identification and focusing on higher priority risks, the team can emphasize over the identified risks. The outcomes from qualitative risk analysis will be helpful for team to complete qualitative risk analysis. BYOD project recognized some risks that are related with staff commitments and staff not fulfilling project commitments in time. The project will be continued within summer season that is considered for several vacations and popular for the same (Faulds et al., 2016). While task scheduling is considered, the project plan have considered some additional time within tasks accounting primary staffs with vacations. Most critical part risk is identif ied in qualitative risk analysis is scheduling legal documents and reviews (Laudon Laudon, 2016). While the in-house legal review of document is considered as milestone that one team cannot outsource to outside of the firm. Then the team can keep track of work schedules and consider legal commitments with escalating towards the project sponsor. Quantitative Risk Analysis Every risk that is identified should be considered for qualitative risk analysis for putting priority against them. On the other hand, quantitative risk analysis is not part of every project and it cannot be applied for BYOD project (Steelman, Lacity Sabherwal, 2016). The quantitative risk analysis utilizes numerical or quantitative rating associated with developing probabilistic analysis of the risks. The quantitative risk analysis needs to consider quality data, proper project mode and prioritized project risk lists (Kearns, 2016; Sadgrove, 2016). The quantitative risk analysis can lead to realistic costs, schedule, and scoping project targets. Project has faced limited deliverables and scope; this particular analysis would be essential for providing adequate benefits without any required effort. Risk Response Planning The risk responses are planned to identify the actions that should be taken for reducing threats and taking advantages of explored opportunities while risk analysis process is conducted. The risk register and management plan is considered for using inputs from risk responses. Two types of threats can exist such as negative and positive risks (Singh, Chan Zulkefli, 2017). Identified risks in risk register are generally negative and steering committee has agreed to provide combination of acceptance towards dealing with the risks. The project team have identified that only one positive risk can exploit; the main positive risk that is identified as earlier completion of work package before the planned date (Martinez, Borycki Courtney, 2017). The team did not consider this particular risk as negative risk. The considered committee accepted the risks of possible delay in work as legal team could take more time and priorities. Positive risk of finishing work can allow team for crashing do wn the activities if possible. Procurement Planning Procurement planning is another process for identification of products and services that project require for purchasing from outsider vendor. As BYOD is an internal project considering internal resources only, therefore, no specific requirement of purchasing products or service is required (Tanimoto et al., 2017). Project may face or incur some expenses in this duration, the senior executives could consider budget to consider operating expenses. Data Security As potential risks are identified in the Altium Limited organization scenario for consideration in Australian IT Sector. The growing trend in several other organizations and industries; BYOD can be considered to follow data security risks mitigation. The Altium Limited should consider the starting of allowance towards employees to work over their personal devices (Peltier, 2016; Filkins et al., 2016). The organization should choose to consider the data security on first priority, as IT sectors are evitable to work with large amount of data. The data security risks are considered as following: Access Risks: The access risk pertains in organizational profile as per the BYOD scheme. In current organization and corporation aspect, mobile devices are more consumer-oriented and the devices are susceptible to changes the way of business (Trewin et al., 2016). The computing power in business entirely casts influence over allowing consumers and employees to replace traditional end-user computing device with laptop. The BYOD concept increase security concerns and puts every organization in verge of multiple risks and threats (Russell, 2016). Organizations in different sectors such as banking, retailing, information technology, financial, and online clientele, have significant level of consideration for incorporating BYOD into business. Authentication Risks: The authentication risk exists for BYOD policy as per individual devices pose authentication threat. The organizations need to deal with new level of security considerations and data threats with personal and corporate data (Shedden et al., 2016). The risk management over personal and business data should consider appropriate level of risk mitigation planning. Therefore, the complications in this situation should devise a policy as protection of data, staffs, and customer is critical for any business to grow with its potential to the fullest (Reid Pechenkina, 2016). Ownership of data is becoming more of an issue within business that operates in regulated market. Corporate Data Risks: The corporate data risks exist for insider threats in Altium Limited organization. Several organizations have planned to implement Bring Your Own Device (BYOD) policy so that employees can be allowed to utilize their favorite devices with bringing down costs to accommodate devices (Dorsemaine et al., 2017). The BYOD policy-based work model is expected to complicate the data control and policies for organizations that can increase importance of having well-developed policy. Successful implementation of mobile device policy can incorporate BYOD initiative into business. Personal Data Risks: Personal data risks may exist for BYOD scheme, as the employees may not be able to keep personal data secured. The organizations and corporations should incorporate a policy to allow utilization of BYOD devices in order to protect their personal data, employee details and customer information (Gillon, 2017; Dawson, 2016). Here, in this report, Altium Limited organization required to implement BYOD policy in their business in order to improve business growth and gradual increment of profitability. Personal data is considered to be major asset for any individual employee; however, the employees should consider locking personal devices with proper and secure passwords. Conclusion To address all aspects of BYOD solution implementation; the researcher have chosen organization scenario of Altium Limited Australian organization. The mobile device is alike of having using dual-core processor in individual pocket. The businesses are becoming entirely centered towards BYOD policies to manage the individual devices in business activities and process. In the era of dynamic workload and considering all constraints of workforce, the primary consideration of accommodation is defined to be BYOD scheme. However, for faster growing organization as Altium Limited, the scheme is favorable to provide employees to use personal devices into organization premises. BYOD can provide benefits to Altium Limited work culture with prompt operations. Therefore, the chosen organization case scenario is justified along with widespread operations and management in different countries, clients, and several services. References Al Ayubi, S. U., Pelletier, A., Sunthara, G., Gujral, N., Mittal, V., Bourgeois, F. C. (2016). A Mobile App Development Guideline for Hospital Settings: Maximizing the Use of and Minimizing the Security Risks of" Bring Your Own Devices" Policies.JMIR mHealth and uHealth,4(2). About Altium | Innovative PCB Design, ECAD / MCAD Collaboration EDA Software. (2017).Altium.com. Retrieved 18 September 2017, from https://www.altium.com/company/about-altium/about-us Dawson, P. (2016). Five ways to hack and cheat with bring?your?own?device electronic examinations.British Journal of Educational Technology,47(4), 592-600. Dorsemaine, B., Gaulier, J. P., Wary, J. P., Kheir, N., Urien, P. (2017, June). A New Threat Assessment Method for Integrating an IoT Infrastructure in an Information System. InDistributed Computing Systems Workshops (ICDCSW), 2017 IEEE 37th International Conference on(pp. 105-112). IEEE. Dove, J. (2016). Evaluation of the suitability of the mobility common criteria protection profiles for enterprise mobility management. Faulds, M. C., Bauchmuller, K., Miller, D., Rosser, J. H., Shuker, K., Wrench, I., ... Mills, G. H. (2016). The feasibility of using bring your own device(BYOD) technology for electronic data capture in multicentre medical audit and research.Anaesthesia,71(1), 58-66. Filkins, B. L., Kim, J. Y., Roberts, B., Armstrong, W., Miller, M. A., Hultner, M. L., ... Steinhubl, S. R. (2016). Privacy and security in the era of digital health: what should translational researchers know and do about it?.American journal of translational research,8(3), 1560. Gillon, K. (2017). Technology and business risks.The Routledge Companion to Accounting and Risk, 261. Goldes, S., Schneider, R., Schweda, C. M., Zamani, J. (2017, June). Building a Viable Information Security Management System. InCybernetics (CYBCONF), 2017 3rd IEEE International Conference on(pp. 1-6). IEEE. Halford, C. D. (2016).Implementing Safety Management Systems in Aviation. Routledge. Kearns, G. S. (2016). Countering mobile device threats: A mobile device security model.Journal of Forensic Investigative Accounting,8(1). Laudon, K. C., Laudon, J. P. (2016).Management information system. Pearson Education India. Lobelo, F., Kelli, H. M., Tejedor, S. C., Pratt, M., McConnell, M. V., Martin, S. S., Welk, G. J. (2016). The wild wild west: A framework to integrate mhealth software applications and wearables to support physical activity assessment, counseling and interventions for cardiovascular disease risk reduction.Progress in cardiovascular diseases,58(6), 584-594. Martinelli, R. J., Milosevic, D. Z. (2016).Project management toolbox: tools and techniques for the practicing project manager. John Wiley Sons. Martinez, K., Borycki, E., Courtney, K. L. (2017). Bring Your Own Device and Nurse Managers Decision Making.CIN: Computers, Informatics, Nursing,35(2), 69-76. M'manga, A., Faily, S., McAlaney, J., Williams, C. (2017). Folk Risk Analysis: Factors Influencing Security Analysts Interpretation of Risk. Muzammal, S. M., Shah, M. A., Zhang, S. J., Yang, H. J. (2016). Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices.International Journal of Automation and Computing,13(4), 350-363. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Reid, D., Pechenkina, E. (2016). Bring-Your-Own-Device or Prescribed Mobile Technology? Investigating Student Device Preferences for Mobile Learning.Mobile learning futures: Sustaining quality research and practice in mobile learning. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Russell, C. (2016). Assessing the risk of transformative technologies.Computer Fraud Security,2016(7), 15-19. Sadgrove, K. (2016).The complete guide to business risk management. Routledge. Sebescen, N., Vitak, J. (2017). Securing the human: Employee security vulnerability risk in organizational settings.Journal of the Association for Information Science and Technology,68(9), 2237-2247. Shedden, P., Ahmad, A., Smith, W., Tscherning, H., Scheepers, R. (2016). Asset Identification in Information Security Risk Assessment: A Business Practice Approach.CAIS,39, 15. Singh, M. M., Chan, C. W., Zulkefli, Z. (2017). Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm.INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS,8(2), 53-62. Souppaya, M., Scarfone, K. (2016). Guide to Enterprise Telework, Remote Access, and Bring Your Own Device (BYOD) Security.NIST Special Publication,800, 46. Steelman, Z. R., Lacity, M., Sabherwal, R. (2016). Charting Your Organization's Bring-Your-Own-Device Voyage.MIS Quarterly Executive,15(2). Tanimoto, S., Totsuka, S., IwashitMeeting Employees Satisfaction at workConference on Network-Based Information Systems(pp. 737-749). Springer, Cham. Trewin, S., Swart, C., Koved, L., Singh, K. (2016, May). Perceptions of Risk in Mobile Transaction. InSecurity and Privacy Workshops (SPW), 2016 IEEE(pp. 214-223). IEEE. Vithanwattana, N., Mapp, G., George, C. (2017). Developing a comprehensive information security framework for mHealth: a detailed analysis.Journal of Reliable Intelligent Environments, 1-19. Vorakulpipat, C., Sirapaisan, S., Rattanalerdnusorn, E., Savangsuk, V. (2017). A Policy-Based Framework for Preserving Confidentiality in BYOD Environments: A Review of Information Security Perspectives.Security and Communication Networks,2017. Zahadat, N. (2016).Mobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and technology(Doctoral dissertation, The George Washington University).

Sunday, December 1, 2019

Video Games And Children Essays - Violence In Video Games

Video Games And Children Video games were first introduced in the 1970s. By the end of that decade they had become a preferred childhood leisure activity, and adults responded with concern about the possible ill effects of the games on children. Early research on these effects was inconclusive. However, a resurgence in video game sales that began in the late 1980s after the introduction of the Nintendo system has renewed interest in examining the effects of video games. Some research suggests that playing video games may affect some children's physical functioning. Effects range from triggering epileptic seizures to causing heart rate and blood pressure changes. Serious adverse physical effects, however, are transient or limited to a small number of players. Research has also identified benefits associated with creative and pro-social uses of video games, as in physical rehabilitation and oncology (Funk, 1993). Proponents of video games suggest that they may be a friendly way of introducing children to computers, and may increase children's hand-eye co-ordination and attention to detail. VIDEO GAME USE BY CHILDREN Recent studies of television watching by children have included measures of the time children spend playing video games. In 1967, the average sixth-grader watched 2.8 hours of television per day. Data from 1983 indicated that sixth-graders watched 4.7 hours of television per day, and spent some additional time playing video games. A recent study (Funk, 1993) examined video game playing among 357 seventh and eighth grade students. The adolescents were asked to identify their preference among five categories of video games. The two most preferred categories were games that involved fantasy violence, preferred by almost 32% of subjects; and sports games, some of which contained violent sub-themes, which were preferred by more than 29%. Nearly 20% of the students expressed a preference for games with a general entertainment theme, while another 17% favored games that involved human violence. Fewer than 2% of the adolescents preferred games with educational content. The study found that approximately 36% of male students played video games at home for 1 to 2 hours per week; 29% played 3 to 6 hours; and 12 percent did not play at all. Among female students who played video games at home, approximately 42% played 1 to 2 hours and 15% played 3 to 6 hours per week. Nearly 37% of females did not play any video games. The balance of subjects played more than 6 hours per week. Results also indicated that 38% of males and 16% of females played 1 to 2 hours of video games per week in arcades; and that 53% of males and 81% of females did not play video games in arcades. RATING OF VIDEO GAME VIOLENCE Ratings of video game violence have developed as an extension of ratings of television violence. Among those organizations that have attempted to rate television violence, the National Coalition on Television Violence (NCTV) has also developed a system to rate the violent content of video games. The NCTV system contains ratings that range from XUnfit and XV (highly violent) to PG and G ratings. Between summer and Christmas of 1989, NCTV surveyed 176 Nintendo video games. Among the games surveyed, 11.4% received the XUnfit rating. Another 44.3% and 15.3% received the other violent ratings of XV and RV, respectively. A total of 20% of games received a PG or G rating (NCTV, 1990). The Sega company, which manufactures video games, has developed a system for rating its own games as appropriate for general, mature, or adult audiences, which it would like to see adopted by the video game industry as a whole. The Nintendo Company, in rating its games, follows standards modeled on the system used by the Motion Picture Association of America. A problem shared by those who rate violence in television and video games is that the definition of violence is necessarily subjective. Given this subjectivity, raters have attempted to assess antisocial violence more accurately by ranking violent acts according to severity, noting the context in which violent acts occur, and considering the overall message as pro- or anti- violence. However, the factor of context is typically missing in video games. There are no gray areas in the behavior of game characters, and players are rarely required to reflect or make contextual judgements (Provenzo, 1992). EFFECTS OF VIOLENCE IN VIDEO GAMES The NCTV claims that there has been a steady increase in the number of video games with violent themes. Games rated as extremely violent increased from 53% in 1985 to 82% in 1988. A 1988 survey indicated that manufacturers were titling

Tuesday, November 26, 2019

the biosphere essays

the biosphere essays The biosphere is part of the earth in which life exists. It is 20 km thick from the bottom of the ocean to the lower atmosphere. It consists of three layers: the lithosphere, which is the land on the surface of the earth; the hydrosphere, which comprises of the water on the earth as well as water vapor in the air; and the atmosphere, which is made up of the air that surrounds the earth. The living organisms in the biosphere interact and affect each other in many ways. This is called a biotic factor. Similarly, there are nons of abiotic factors are air, temperature, water, soil, light, and minerals. In a biosphere, organisms live in special groupings. For instance, a population consists of all individuals of a species living in a general area. A community is a population located in a certain area living among different species. An ecosystem is yet a larger conglomeration of a population, a community, and abiotic factors. Ecosystems can be aquatic or terrestrial. The earth's aquatic ecosystem makes up about 75% of the earth's surface. This aquatic environment is divided into marine and freshwater environments. The earth's terrestrial ecosystem is mainly made up of forests and deserts, which make up for 25% of the earth's surface. The role or function of an organism in a community is that organism's niche. An organism's niche is an area picked by that organism based on physical factors such as temperature, light, oxygen and carbon dioxide content and biological factors such as food, competition for resources and predators. This niche provides the organism a place to live in. A habitat remains consistent with an organism's niche as well as provides the organism with a place to reproduce. In this case, organisms may have the same habitat, but different niches. ...

Friday, November 22, 2019

How to Observe the Lyrid Meteor Shower

How to Observe the Lyrid Meteor Shower Every April, the Lyrid meteor shower, one of many yearly meteor showers, sends a cloud of dust and tiny rocks the size of a grain of sand hurtling to Earth. Most of these meteors vaporize in the atmosphere before reaching our planet. Key Takeaways The Lyrid Meteor shower, so named because it appears to stream from the constellation Lyra, occurs every April 16 to 26th with the peak taking place on April 22 into April 23Observers may see between 10 to 20 meteors per hour in a normal year, but during the heavy peaks that occur every 60 or so years, dozens or even hundreds of meteors may be visibleComet 1861 G1/Thatcher is the source of dust particles that become Lyrid meteors When to See the Lyrids A wonderful thing about the Lyrids is that they arent just a one-night occurrence.  They begin around April 16 and last until April 26th. The peak of the shower occurs on April 22, and the best time for viewing is after midnight (technically early  morning on the 23rd). Observers can normally expect to see anywhere from 10 to 20 flashes of light per hour, all streaming from the area near the constellation Lyra. At that time of year, Lyra is best visible in the hours after midnight on the 22nd.   Tips for Observing the Lyrids The best advice for watching the Lyrids shower is true for almost any meteor swarm. Observers should try to watch from a dark-sky site. If thats not possible, then its best to at least get out of the glare of nearby lights. Chances of seeing the shower are also much better if theres not bright moonlight. On nights when the Moon is full and bright, the best choice is to go out around midnight and look for meteors before the Moon rises. To see the Lyrids, observers should keep an eye out for meteors that look as though they have originated from the constellation Lyra, the Harp. In reality, the meteors dont actually come from these stars; it merely looks that way because the Earth passes through the stream of dust and particles, which appears to be in the direction of the constellation.  Luckily for meteor watchers, Earth passes through many such streams throughout the year, which is why we see so many meteor showers. Looking at an incoming meteor descend through Earths atmosphere, as seen from the International Space Station. NASA What Causes the Lyrids?   The meteor shower particles that create the Lyrids are actually the debris and dust left behind from the Comet 1861 G1/Thatcher.  The comet orbits the Sun once every 415 years and sheds a great deal of material as it passes through our solar system. Its closest approach to the Sun brings it to about the same distance as Earth, but its most distant point is way out in the Kuiper Belt, 110 times the distance between Earth and the Sun. Along the way, the comets path experiences the gravitational pull of other planets such as Jupiter. That disturbs the dust stream, with the result that approximately every sixty years, Earth encounters a thicker-than-usual part of the comets stream. When that happens, observers might see as many as 90 or 100 meteors per hour. Occasionally a fireball streams through the sky during the shower, indicating a piece of cometary debris thats somewhat larger- perhaps the size of a rock or a ball.   Other well-known meteor showers caused by comets are the Leonids, caused by Comet 55P/Tempel-Tuttle, and Comet P1/Halley, which brings material to Earth in the form of the Orionids. Did You Know? Friction between the gases that make up our atmosphere and small particles (meteors) causes meteors to heat up and glow. Typically, the heat destroys them, but occasionally a larger piece survives and lands on the Earth, at which point the debris is called a meteorite.   The most significant outbursts of Lyrid meteors in recent times were recorded starting in 1803.  Thereafter, they occurred in 1862, 1922, and 1982.  If the trend continues, the next heavy outburst for Lyrid watchers will be in the year 2042.   A Lyrid meteor as seen by an allsky camera studying the sky in April 2013. MSFC Meteoroid Environment Office   The History of the Lyrids People have been seeing meteors from the Lyrid shower for well over two thousand years. The first known mention of them was made in the year 687 BCE, recorded by a Chinese observer. The largest known Lyrid shower sent an amazing 700 meteors per hour through Earths skies. That occurred in 1803 and it lasted for several hours as Earth plowed through a very thick path of dust from the comet.   Watching isnt the only way to experience meteor showers. Today, some amateur radio operators and astronomers track Lyrids and other meteors by capturing radio echoes from meteoroids as they flash through the sky. They tune by tracking a phenomenon known as forward radio scattering, which detects pings from the meteoroids as they strike our atmosphere. Sources â€Å"In Depth | Lyrids – Solar System Exploration: NASA Science.† NASA, NASA, 14 Feb. 2018, solarsystem.nasa.gov/asteroids-comets-and-meteors/meteors-and-meteorites/lyrids/in-depth/.NASA, NASA, science.nasa.gov/science-news/science-at-nasa/1999/ast27apr99_1.SpaceWeather.com News and Information about Meteor Showers, Solar Flares, Auroras, and near-Earth Asteroids, www.spaceweather.com/meteors/lyrids/lyrids.html.

Thursday, November 21, 2019

Sympathetic and Parasympathetic Nervous Systems Essay

Sympathetic and Parasympathetic Nervous Systems - Essay Example The nerve fibers of the  parasympathetic nervous system  are the  cranial nerves, primarily the  vagus nerve, and the lumbar spinal nerves. When stimulated, these nerves increase digestive secretions and reduce the heartbeat. The sympathetic nervous system activates what is often termed the fight or flight response. Like other parts of the nervous system, the sympathetic nervous system operates through a series of interconnected neurons. Sympathetic neurons are frequently considered part of the peripheral nervous system (PNS), although there are many that lie within the central nervous system (CNS). Sympathetic neurons of the spinal cord (which is part of the CNS) communicate with peripheral sympathetic neurons via a series of sympathetic ganglia. Within the ganglia, spinal cord sympathetic neurons join peripheral sympathetic neurons through chemical synapses. Spinal cord sympathetic neurons are therefore called presynaptic (or preganglionic) neurons, while peripheral sympathetic neurons are called postsynaptic (or postganglionic) neurons. At synapses within the sympathetic ganglia, preganglionic sympathetic neurons release acetylcholine, a chemical messenger that binds and activates nicotinic acetylchol ine receptors on postganglionic neurons. In response to this stimulus, postganglionic neurons principally release noradrenalin (norepinephrine). Prolonged activation can elicit the release of adrenaline from the adrenal medulla. Once released, noradrenalin and adrenaline bind adrenergic receptors on peripheral tissues. Binding to adrenergic receptors causes the effects seen during the fight-or-flight response. These include pupil dilation, increased sweating, increased heart rate, and increased blood pressure. Sympathetic nerves originate inside the vertebral column, toward the middle of the spinal cord in the

Tuesday, November 19, 2019

Pop Culture Advertisement for Lynx Shower Gel Essay

Pop Culture Advertisement for Lynx Shower Gel - Essay Example The product featured is in a small blue bottle with a black lid and its name inscribed in white against black is placed on the bottom in the right side. The caption reads: â€Å"LYNX Shower Gel. Get Dirty.† The setting implies a bathroom and has overtones of kinky sex which is used as an excuse for the Shower Gel product, which is supposed to serve as a sex appeal embellishment. The impact of the advertisement is based solely on its ostensibly clever message through the striking image that begs a second look. However, a deeper analysis will reveal the fallacies on which it depends and tries to communicate. It does not make any attempt to feature the functional advantages the product has over similar products in the market. It takes for granted the new-age notions of advertising for the youth that no information regarding the product’s chemical composition or explanation on why it would be a perfect choice is needed as long as the brand name imposes its power over the customers. Moreover, the advertisement seems to be based on the false assumption that attention from women bothers its prospective customers – men in this case – of all age groups and personal sexual choices. Though it could be assumed that the product aims at the youth as its customers, the advertisement restricts its appeal as it addresses only the heterosexual youth. It a lso assumes that the representation of the female body in an exotic setting catches the eye of all its customers. It could be argued that the popular advertisement culture has, in fact, made the female body a marketing tool, and this advertisement just follows the status quo. But a logical analysis will reveal that it fails to establish a pertinent relationship between the product and the image presented. The intended pun in the caption â€Å"Get Dirty† reiterates the sexual overtone which is already obvious through the image. But the implication is quite ambiguous.  Ã‚  

Saturday, November 16, 2019

Concept of Sustainble Development Essay Example for Free

Concept of Sustainble Development Essay The tradition concept of development has for a considerable period of time been driven by economic considerations. Exploitation of natural resources which leads to environmental degradation motivated by targets of maximum profits has been the norm and little regard has been granted to the side effects of development initiatives. Gradual escalation of awareness and realisation of the range as well as the magnitude of environmental effects of development initiatives led to worldwide discussions on the way forward. Consequently, the concept sustainable development was conceived. However, this concept is perceived to be oxymoron by environmentalists, in other terms it is viewed as a combination of two contradicting terminologies. In view of the above, this essay endeavours to explain with relevant specific examples the reason why environmentalists consider the concept sustainable development as an oxymoron. In order to establish a good argument, two literature definitions of sustainable development shall be given. This will be followed by an explanation why sustainable development is considered to be oxymoron and this shall be supported by examples. And only after then shall a conclusion be stressed. According to the Ministry of Tourism, Environment and Natural Resources (2007: V) sustainable development is defined as, â€Å"development that meets the needs and aspirations of the present generation without causing deterioration and without compromising the ability to meet the needs of future generations†. On the other hand Todaro and Smith (2003) asserted that sustainable development entails both intra-generational and inter-generational equity. These concepts project a requirement of the present generation to meet their needs and aspirations without destroying the ability of the future generations to come and meet their needs and aspirations. As earlier alluded to, the concept s ustainable development is a mixture of two words with distinct opposing interpretations. According to Arend and Eureta (2002) sustainability entails the maintenance of the extraordinary diversity of plants, animals and insects that exist on earth. The other term development is known as a multidimensional phenomenon which has several aspects namely; economic, social, political, cultural and environmental. It is imperative to acknowledge the fact that true development involves a record of progress in all the dimensions of the development process. Furthermore, it is also necessary to be cognisant of the point that the environment and global systems which includes development are a series of dynamic and interconnected processes changing and interacting overtime, (Todaro and smith, 2003). From the definitions provided above, it is apparent that the two expressions sustainability and development contradict each other. This is due to the point that sustainability emphasizes on maintaining diversity and productivity of natural resources overtime. On the contrary, natural resources fuel the process of development; therefore, development cannot be a reality without consuming natural resources. The global community is hungry for development as a result people are constantly improving their livelihoods and welfare so as to attain higher standards of living through many innovations such as technology which in turn negatively impact on the environment. The question which maybe asked here is â€Å"what forms the basis of livelihoods?† (ECZ, 2008). According to ECZ (2000), the environment is the cornerstone of our livelihoods because biological resources are the primary sources of economic development thus development is all about consuming natural resources. Besides development, population dynamics also exert pressure on natural resources. With a clear reflection that development is all about the utilisation of natural resources, how then can sustainability be transformed into actuality? This is the question asked by many environmental practioners. It is evident through many global development initiatives how planetary natural resources are being utilized in order to achieve desired development targets. The two terminologies sustainability and development can be compared to a saying that says â€Å"two cobras cannot stay in the same mountain one has to die or eventually leave the mountain†. Therefore, sustainability and development are two cobras staying in the same mountain. The implication according to environmentalists is that, if we are to achieve ultimate sustainability then development should be out of the picture, (Energy Regulation Board, 2007). In Zambia, development programmes are using environmental resources at an increasing rate. With a fast growing population, the drive to meet goals set out in national development strategies and in international conventions, most recently defined in the Millennium Development Goals (MDGs), has likewise accelerat ed. As an example to illustrate the contradiction between sustainability and development, urbanisation in Chipata district can be utilized. As by definition, urbanisation may also mean development of land into residential, commercial and industrial properties. Urbanisation in Chipata has resulted in a number of negative environmental impacts which have adversely affected the diversity of biological resources. Consequential environmental effects include deforestation which has provoked excessive vegetative removal of tree cover along streams and on hills around Chipata town. Furthermore, land degradation due to urbanization is also prevalent in Chipata and this has led to soil erosion, sand and earth mining and degradation of catchment areas of Lunkhwakwa and Lutembwe rivers, (ECZ, 2008). Chipata district has over 56,000 hectors of land under protection and most areas are threatened by encroachment and deforestation due to urbanisation. Urbanisation in Chipata can be considered as progress from a developmental perspective because more houses, shops and industries have been erected and this has advanced people’s liv elihoods in terms of increased housing facilities and employment opportunities. However, this contradicts with sustainability because there has been excessive destruction of forests on the hills of Chipata which has resulted in extreme soil erosion down the slope, (ECZ, 2008). With reference to the economic dimension of the development process, the construction and expansion of mining as well as manufacturing industries can be perceived as progress. This is due to the fact that the existence of operational industries attracts various benefits to the local people. Firstly, job opportunities are created for the local and this helps them sustain their lives by acquiring wages at the end of each month. Salaries obtained by people from employment give them the ability to command their basic needs such as food, shelter and clothes, (MoFNP, 2006). The mining industry has played a pivotal role in the development of the country. However, the availability of exposed, accessible and near surface mineral deposits are increasingly becoming scarce requiring more expensive equipment to locate deeper buried ore deposits. This has led to gigantic environmental degradation due to the use of heavy sophisticated earth moving machines. For instance, when Konkola copper Mines (KCM) took over from Zambia Consolidated Copper Mines (ZCCM) on the copperbelt, Chingola and Chililabombwe in particular. After a while later, the production scale was upgraded and this created employment opportunities for over three thousand individuals who were unemployed, (MoFNP, 2006). Other benefits included improved infrastructure such as roads and schools as well as better health services. According to economists and development planners this was considered as national development because the lives of people were improved. However, the view of economists and development planners contradict with that of environmentalists because an elevation in the production scale of any industry is problematic as far as environmental sustainability is concerned because of unsustainable production strategies that hamper a good quality of life, (ECZ, 2011). According to ECZ (2008) mining activities especially large-scale open pit mining has negatively affected the environment resulting into environmental degradation. Among the prominent open pit mines are Nchanga, Kansanshi and Maamba collieries. Despite development enhanced by these mines, industrial operations of these sites have caused the contamination of terrestrial ecosystems mostly ascribed to dust fall-out and this has been a draw back as far as the maintenance of biological resources diversity and productivity are concerned. Kafue River on the copperbelt was polluted by Konkola copper Mines Plc due to toxic substances which were discharged into the water body. This occurrence negatively affected marine ecosystems which resulted in a depletion of certain species. Water resources have been affected by climate change and other factors such as increase in population growth, industry and agriculture which are induced by development. Unfortunately, there has been no corresponding expansion of sewerage infrastructure and solid waste disposal facilities and most of them are in a poor state, despite the increasing rate of development and this actually curbs sustainability. However, it must be realized that only after the last tree has been cut, only after the last river has been poisoned, only after the last fish has been caught only then will it be discovered that money cannot be eaten, (ECZ, 2008). Human sustainability has also been affected due to the side effects of development which have made the environment unsafe to support a good quality of life. The rate at which development is happening has put so much pressure on the environment and this has resulted into various environmental issues such as air pollution, water pollution, land pollution and ozone layer depletion among others. Environmentalists have identified that increasing industrial operations in Zambia have negatively influenced life expectancy and infant mortality rate. For example, adult survivorship levels have been declining in the last twenty years following rapid development trends. Life expectancy for females dropped from 46 years in 1980 to 44 years and 29 years in 2000. In the same category for males it was 44 years in 1980, 42 years in 1990 and 23 years in 2000. Diseases associated with environmental degradation include malaria, tuberculosis, asthma, bronchitis and dysentery among others and these so far have claimed quite a considerable number of lives, (MoFNP, 2006). In conclusion, it can be said that development and sustainability are two ends of the same continuum. Whichever example of development one might think of such as industrialization and housing, they are unsustainable, unless that development is related to green technologies or meant to counter the adverse effectives of development. In the end, the solution is a compromise because people need sustainability but cannot progress without development, hence, sustainable development. We can have development as long as we put measures in place to minimise environment damage. These measures include environmental impact assessments, environmental audits and strategic environmental assessments among others, hereafter ensuring sustainability. REFERENCES Arend. H and Eureta. J (2002). Environmental Encyclopaedia: South Africa: Eco-Logic Publication. ECZ (2000). The State of the Environment in Zambia. Lusaka: Environmental Council of Zambia. ECZ (2008). Zambia Environment Outlook Report 3. Lusaka: Environmental Council of Zambia. ECZ (2011). The Enviroline; ECZ Magazine Issue No. 33, January-April 2011. Lusaka: Environmental Council of Zambia. Energy Regulation Board, (2007). Energy Regulations Board: Energy Sector Report-2006. Ministry of Tourism, Environment and Natural Resources (2007). National Policy On The Environment. Lusaka: MTENR. Ministry of Finance and National Planning (2006). Economic Report. Lusaka: Zambia. Todaro M.P and Smith S.C (2003). Economic development.8th edition.New Delhi, Pearson Publication.

Thursday, November 14, 2019

Little Women by Louisa May Alcott :: essays research papers

Little Women by Louisa Alcott would definitely appeal to women of all types and ages. Little Women appeals to a broad audience, its full of the values and beliefs, and it paints a very real picture of most American’s lives at the time. The reason for this book appealing to such a broad audience lies in all the characters’ personalities. Mrs. March is a strong, independent woman who never falters, therefore she relates to all independent women; but she is also a mother who plants strong values in her girls and is the rock foundation of the family, with that she relates to all mothers. Margaret’s desire for luxury is a desire that we all can relate to and her properness is a trait most girls can relate to. Jo’s mischievous demeanor and talent for writing is something that if one cannot relate, admire to have. Beth is the insecure, sweet, homebody in all of us. Amy represents the beauty and talent, and sometimes moral code, which all women have. Laurie represents all the men that wish to be loved any uncommon-but-beautiful woman. This book is full of the values and beliefs of its time. The March family, that were once-upon-a-time a rich family, were still connected to the â€Å"higher† society. As a result, they were sometimes willingly and sometimes forced to commune with people who looked down on them for being poor. The book taking place during and after the period of the civil war there was a lot of tension concerning Blacks. Some of the values Mrs. March teaches her girls is the importance of never trying to be something there not; the unimportance of material possessions versus mental possessions; and that regardless of what the world told them, they are equal to men and therefore deserve equal rights. The book does a good job of directly and indirectly showing realness of all Americans lives. The whole book feels very real, probably because it’s an autobiography. One very real aspect of the book was the death of Beth. Many loved ones were lost to scarlet fever back then. That particular part of the book, along with being the most real, was the most touching. Despite her being a homebody and living a short life, she had a huge effect on everybody she knew. Another very real feature was the financial struggle of a family of five women and a father away at war at a time when women had no rights.

Monday, November 11, 2019

Hawkins V Clayton Case Summary

Hawkins v Clayton [1988] HCA 15; (1988) 164 CLR 539 (8 April 1988) High Court of Australia Case Title: HAWKINS v. CLAYTON [1988] HCA 15; (1988) 164 CLR 539 F. C. 88/012 Medium Neutral Citation:[1988] HCA 15 Hearing Date(s): 1987, May 13 1988, April 8 Decision Date:20 June 2011 Jurisdiction: High Court of Australia Before:C. J Mason J. Wilson J. Brennan J. Deane J. Gaudron Catchwords: Negligence – Duty of care – Solicitor – Will held by solicitor – Failure to inform executor of death of testator and of contents – Whether duty to do so – Loss to estate caused by executor's ignorance of death – Measure of damages.Limitation of Actions – Tort – Accrual of cause of action – Running of time – Commencement – Breach by solicitor of duty of care to inform executor of testator's death – Loss to estate caused by executor's ignorance of death – Limitation Act 1969 (N. S. W. ), s. 14(1). Legislation Cited: Limitation Act 1969 (N. S. W. ), s. 14(1) Wills, Probate and Administration Act 1898 (N. S. W. ), s. 150 s. 32 of the Wills, Probate and Administration Act s. 61 of the Wills, Probate and Administration Act Cases Cited: Central Trust Co. v. Rafuse (1986) 31 DLR (4th) 481, at p 521Bowen v. Paramount Builders (1977) 1 NZLR 394, per Richmond P. , at p 407 Central Trust Co. v. Rafuse (1986) 31 DLR (4th) 481, at p 521 Bowen v. Paramount Builders (1977) 1 NZLR 394, per Richmond P. , at p 407 Voli v. Inglewood Shire Council [1963] HCA 15; (1963) 110 CLR 74, at p 85 Midland Bank v. Hett, Stubbs and Kemp (1979) Ch 384, at pp 402-403 Hedley Byrne & Co. Ltd. v. Heller & Partners Ltd. [1963] UKHL 4; AC 465 Marshall v. Broadhurst (1831) 1 C & J 403 [1831] EngR 151; (148 ER 1480) Balch v. Symes [1823] EngR 362; (1823) Turn & R 87, at p 92Aebly's Will (1941) 29 NYS 2d 929, at pp 931-932; affirmed (1941) 31 NYS 2d 664 Georges v. Georges [1811] EngR 446; (1811) 18 VesJun 294 (34 ER 328) Lord v. Wormleighton [1822] EngR 477; (1822) Jac 580, at p 581 [1822] EngR 477; (37 ER 969) Estate of Harvey (1907) P 239 Goods of Shepherd (1891) P 323, at p 326 Hollis v. Smith (1808) 10 East 293, at p 295 (103 ER 786, at p 787) Meyappa Chetty v. Supramanian Chetty (1916) 1 AC 603, at pp 608-609 Ryan v. Davies Bros. Ltd. [1921] HCA 53; (1921) 29 CLR 527, at p 536) Pinchon's Case [1572] EngR 289; (1611) 9 CoRep 86b, at p 88b [1572] EngR 289; (77 ER 859, at p 863)Texts Cited: Sir James Stephen, A History of the Criminal Law of England (1883) Parties: Representation – Counsel: File number(s): DECISION The case of Hawkins V Clayton was the result of a breach of duty by the solicitors of the testator, Mrs Brasier, and to the executor of the estate, Mr Hawkins. The solicitors were in custody of Mrs Brasier’s will and seemingly were not aware of the testators death for some time as they had written letters to her regarding her will in September 1978 and August 1979 with no respo nse.After the commencement of the action taken up by Mr Hawkins, he had passed and his widow and executor continued the action as she had become Mrs Brasier’s executor by devolution. Mr Hawkins and his family had lived with Mrs Brasier as a â€Å"tenant† in her home at Blakehurst, sometime during August 1973 Mr Hawkins and Mrs Brasier had had a disagreement and the Hawkins family had left the Blakehurst house. It was determined that Mrs Brasier had spoken with Mr Hawkins about his appointment as executor but had not confirmed it once the will was written.After August 1973 Mrs Brasier had contact the solicitors to make a new will but had not carried out the changes and the solicitors had not had any instructions from her since. After the death of Mrs Braiser, her nephew, Ronald Lamb had taken up residence in her house and had not paid any rent or maintained the property. Mr Lamb had contacted the solicitors and had represented to them that Mr Hawkins had disappeared and requested payment out of the estate for funeral expenses.Some years later, Mr Hardwick who had been handling the matter had retired and upon the retention of new solicitors from the Executor, had rendered an account for services provided to the estate. This case was heard in the High Court of Australia on appeal from the judgment handed down from the Supreme Court of New South Wales. In the judgment from the Supreme Court, it was found that the Statute of Limitations had barred the solicitors from being found guilty of a breach of duty of care.The High Court Judges had not reached a unanimous decision regarding the duty of care owed to the executor. Mason C. J and Wilson J found that there was no duty of care owed to Mr Hawkins and suggested the appeal be dismissed, on the other hand; Brennan, Deane, Gaudron JJ had found that there had been a breach of the duty owed to Mr Hawkins, and that the Limitations Act would not affect any claim of such a breach as the breach did not occur a t the time of the death of Mrs Braiser but from when the Solicitors found out of her death.There was argument that the resultant damages incurred by Mr Hawkins was caused by his ignorance of the will and his failure to administer the estate it was however found that the damages were indeed caused by the lack of the solicitors to promptly notify Mr Hawkins of his interest in the estate and his role as executor. Brennan, Deane, Gaudron JJ ordered that damages be paid by the respondents though as the damages had not been quantified, they all agreed that the parties should discuss and agree to the amount of damages payable, if the parties could not agree to an amount, the Supreme Court of NSW would determine the costs owed.The final orders as found in the judgment are as follows: 1. the appeal to that Court be allowed with costs; 2. the judgment of Yeldham J. be set aside; 3. in lieu thereof judgment be entered for the plaintiff for damages to be assessed; 4. the action be remitted for determination by a judge of the Supreme Court; and 5. the defendants to pay the plaintiff's costs to be taxed.

Saturday, November 9, 2019

Female characters from Of Mice and Men by John Steinbeck and from The Withered Arm by Thomas Hardy Essay

Compare the presentation of two female characters, one from Of Mice and Men by John Steinbeck, and one from The Withered Arm by Thomas Hardy, Pay close attention to their roles as outsiders. In these works of prose fiction, both authors write about women confronted by circumstances that make their lives very difficult. The women are, or become, outsiders of one sort or another. You will need to: show your knowledge of both texts Use quotations to support the points that you make Show a knowledge of the life and times that each author was writing in Show what you understand the term outsider to mean. I am writing an essay comparing ‘Curly`s wife’ from the novel Of Mice and Men and ‘Rhoda Brook’ from The Withered Arm. John Steinbeck was born in 1902 and lived until 1968 was an American who lived in California this is where he wrote his novels. He always had jobs on farms during his highschool-years, or, as he was very much interested in science, helped out in local laboratories. After school John went to college at Stanford University but John dropped out of school without a degree to enter journalism in New York. He then returned to California to write novel writer. Of Mice and Men was the first novel that was recognised, Of Mice and Men was first published in 1937. In 1962 John Steinbeck got the Nobel-prize for literature. Steinbeck wrote Of Mice and Men. Of Mice and Men was a story about two men who move from Ranch to Ranch earning just enough money to last them the week. John Steinbeck wrote this story from experience he also travelled from ranch to ranch so knew what it was like to not have a life and have life plane just dreams to look forward to which were just distance dreams. Steinbeck expresses his feelings on life living on a ranch through Georges character, in the book George was always repeating his story on men living on the ranch and describes them as nobodies. John Steinbeck wrote Of Men and Mice during depression and wrote about two men George and Lenny as the loneliest guys in the world which were like him not going to stay alone they are different and they will achieve there dream and this is what John Steinbeck achieved. Guy swho lived on ranches were usually very lonely but John Steinbeck was not going to be lonely and when too old be useless he wanted to overcome his dream. â€Å"Guys like us, that work on ranches, are the loneliest guys in the world. They got no family. They don’t belong no place. They come to a ranch an’ work up a stake and then they go inta town and blow their stake, and the first thing you know they’re poundin’ their tale on some other ranch. They ait got nothing to look ahead to.† John Steinbeck then lived in California and wrote Grapes of Wrath a story about people who earned nothing and would work non stop for a slice of bread. Both Steinbecks novels are to do with money and people working so hard to become there dream like Lenny and George their dream was to have their dream house but it was out of their reach and they could not overcome it. Thomas Hardy was born in 1840 and lived until 1928. He lived in Dorset so knew a lot about the place he wrote the withered arm which was set in Dorset during 1825 although Hardy knew a lot about Dorset he set the novel before he was even born. Because the story was set so before his time he had to adapt his knowledge of Dorset to how it was in the 1820s his words had to be old fashioned and include long intense sentences to suit the play in the time it was set. Unlike John Steinbeck, Hardy wrote long sentences with old fashioned words. Thomas Hardy was educated locally and at 16 he worked for an architect. At 22 he went to London to train as architect, he then returned home, he then returned home in 1867 persue his chosen career to write novels. He had even started writing his first novel The Poor Man and the Lady, which was never published. Thomas Hardy wrote about fate and pentimizium, most of his novels were tragedies, and he appeared to grow more pessimistic in later life. He then stopped writing novels and returned to writing poetry. Thomas Hardy wrote the withered arm of which is his best known novel The withered arm DESCRIPTION OF STORY. Both the authors write about women confronted by circumstances that make their lives very difficult. The women are outsiders and are not loved and want a better life. Of Mice and Men written by john Steinbeck has a woman in, in the story her name is never spoken of she is referred to as Curlys wife as though she is his woman. She is the only woman on the ranch so is an outsider, she has no one to relate to. Curlys wife is presented in the Story Of Mice and Men as a tart or a flirt her clothing and her body language create a flirty atmosphere. Her clothing is very tarty she wears red clothing and red makeup and red was the colour usually worn by prostitutes so she is wearing these tarty clothes for attention. â€Å"Quote Curlys wife description† She wants to be looked at, her husband Curly is not giving her the attention she needs and she is feeling lonely and apart from the world, on her own and wants a friend or to be loved. Her husband Curly also lives on the Ranch and treats his wife as an outsider, curly doesn’t love his wife he just treats her as a sex object. The withered arm written by Thomas Hardy also has a woman in Rhoda Brook is made to feel as an outsider. Rhoda isn’t married and doesn’t have a partner, in those days to be a single mum was very unlikely so the people in her town thought she was a witch so she didn’t have many friends. Rhoda lives with her twelve year old son in father lodges cottage, Rhoda is very in love with Farmer Lodge but he has a very beautiful wife which Rhoda is extremly jealous of. â€Å"The thin woman who had not spoken was joined by a boy of twelve or thereabout.† Rhoda Brook is not very attractive she is pale, tall and thin. Unlike Curlys wife she isn’t beautiful so cannot use her beauty to attract men and get peoples attention. Rhoda is very jealous of beautiful woman so unlike Curlys wife, Rhoda is around other woman so isnt an outsider in that prospective she is an outsider because of men, she is neglected by men and is unlucky in love. Rhodas loneliness and emotional feelings only aid to the boys like Curlys wife she wants to be loved and cared about. Rhoda works on a farm as a ‘milking woman’. Curlys wife doesn’t work she is just a housewife for Curly. Curlys wife was very much like George and Lennie they all had a dream but none of them came true. Curlys wife’s dream was to be a movie star but she could not live her dream because she met Curly, they fell in love and he took her away from the natural world and placed her in a lonely neglected environment on the ranch. On the Ranch she is never spoken to because the men on the ranch don’t want curly thinking there is something going on with her wife and another man because he would kick them off the ranch. Curly and Rhoda are very different in appearance but very similar in personality and would be feeling very alike. Rhoda is very modest and lifeless unlike Curlys wife who seems to be very outgoing and flirtatious.

Thursday, November 7, 2019

Comparison of the Etiology, Diagnosis, and Treatment of DID and PTSD

Comparison of the Etiology, Diagnosis, and Treatment of DID and PTSD Introduction Psychology is the academic discipline dealing with the study of human behaviour and mental functions (Burton, 2010). As such, psychologists are described as social or cognitive scientists. The scientists and professionals explore human characters, such as perception, emotions, and personality. The aim of such exploration is to assess and treat psychological disorders.Advertising We will write a custom essay sample on Comparison of the Etiology, Diagnosis, and Treatment of DID and PTSD specifically for you for only $16.05 $11/page Learn More Numerous studies have been conducted in the past to try and explain why people act and behave the way they do. Information gathered from such analyses is taken into consideration when making decisions in many contemporary organisations (Barlow Durand, 2011). Organisations that use such information in their operations include the government and private companies and corporations. The information is especially important when hiring personnel. Individuals psychological information helps other people in making informed decisions when dealing with the individual. The information can also be used in assigning work to the individual. Dissociative Identity Disorder (herein referred to as DID) and Post Traumatic Stress Disorder (herein referred to as PTSD) are classified as mental disorders. The two have formed the basis of research for many psychologists. The psychologists have made efforts to identify the root causes, treatment, and diagnostic procedures associated with the conditions. According to Dr. Brad Wright (and as cited in Farrell, 2011), the two conditions are significantly different from each other. Post traumatic stress disorder develops when an individual is exposed to any form of psychological trauma. Dissociative identity disorder is known by several other names. One of them is â€Å"Multiple Personality Disorder†. The condition is associated with individuals who exhibit two distinct personalities. It is characterised by forgetfulness or amnesia (Shettleworth, 2010). In this essay, the author will analyse the two conditions, comparing and contrasting their various aspects. The author will focus on the similarities and differences between the conditions’ etiology, diagnosis, and treatment. The Etiology of DID and PTSD: A Comparison Etiology of DID Etiology is the study of the origin and cause of a given phenomenon (Overskeid, 2007). It is commonly used in medicine to determine why and how things take place. The concept aims at providing a mythical explanation for a certain condition or phenomenon.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Over the years, many researchers and philosophers have come up with various possible causes of dissociative identity disorder. However, most are in agreement that the disorder is brought about by maladjusted r eactions to trauma. Such trauma is in most cases linked to childhood physical and sexual abuse (Hergenhahn, 2005). Most individuals suffering from this disorder had a traumatic experience in their childhood. Neglect and lack of parental care are largely associated with the disorder. Individuals exposed to extreme physical abuse in the past tend to be violent and brutal in later life. Psychologists associate this phenomenon with attempts by individuals to forget their past miseries. The failure to forget leads to frustration, which is expressed through acts of violence and brutality. Individuals who were exposed to acts of violence in the past are likely to try and expose others to similar conditions. The attempt explains the rising cases of violence in the society. Research has shown that criminals suffering from dissociative identity disorder expose their victims to ordeals that are similar to those they were exposed to in the past. Such developments give rise to a cycle of crime a nd violence, which turns victims into offenders. Self destructive behaviours have also been identified as possible causes of the disorder (Pinel, 2010). Individuals exhibiting such traits tend to be violent towards themselves and towards others. Etiology of PTSD Post traumatic stress disorder develops after an individual is exposed to an event associated with intense fear, horror, and a sense of helplessness (Reisner, 2005). However, psychologists have identified other possible causes of post traumatic stress disorder. They include past life experiences and inherited traits, such as individual personality. Individuals who had traumatic experiences in their past make the bulk of patients diagnosed with this disorder. Personality aspects that may influence the individual’s susceptibility to the disorder include, among others, temperament and ability to deal with stress. Regulation of hormones and such other chemicals as adrenaline by the brain is also associated with the condit ion. Exposure to risk factors is another possible cause of post traumatic stress disorder. Such exposure explains why many soldiers and people living in war torn areas are more likely to suffer from post traumatic stress disorder compared to other individuals.Advertising We will write a custom essay sample on Comparison of the Etiology, Diagnosis, and Treatment of DID and PTSD specifically for you for only $16.05 $11/page Learn More There are several similarities between the etiologies of the two psychological disorders. For example, both conditions are associated with past traumatic experiences. Individuals suffering from either of the two conditions are likely to have witnessed traumatic events in their life (Carver Scheier, 2004). Individuals react variously to such traumatic events. As a result of this, some of the individuals exposed to the traumatic events may fail to develop the condition. For example, those suffering from dissociative identity diso rder are violent towards other people. On the other hand, those suffering from post traumatic stress disorder live in perpetual fear of being abused or experiencing the traumatic events again. Diagnosing DID and PTSD: A Comparison Overview In most cases, individuals suffering from these disorders are unaware of their condition. It is also hard for family members and the society at large to diagnose the disorders. The inability to diagnose is attributed to the fact that the effects of these disorders are mainly psychological. As such, it is not easy to point out the characteristics. The case is different for other disorders, whose effects are expressed physically (Gelder Geddes, 2005). In most cases, the individual is not aware of their condition when they seek medical assistance. Diagnosing DID To diagnose dissociative identity disorder, the psychologist needs to conduct a thorough psychological examination of the patient. A medical examination is necessary to determine whether the patient has any physical disorders that may explain their symptoms (Glaser Strauss, 2005). Examinations are carried out through oral interviews or questionnaires prepared in advance. Hypnosis or drugs are also used to make it easy for the patient to reveal personal information to the doctor (Barlow Durand, 2011). In most cases, patients complain of amnesia. The individual is unable to remember events that took place within a particular period of time. They also suffer from memory loss. In extreme cases, the patient may forget about close friends and family members. The individuals are depressed and may exhibit suicidal tendencies in extreme cases (Ron, 2008). In addition, some patients diagnosed with dissociative identity disorder complain of either audio or visual hallucinations.Advertising Looking for essay on psychology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Diagnosing PTSD To diagnose post traumatic stress disorder, the professional needs to take into consideration the signs and symptoms exhibited by the individual. Patients are asked to explain their signs and symptoms. They try to explain what the signs are, the time they occur, and their intensity (Reinders, 2008). Individuals are also required to narrate the events preceding the symptoms. A patient has to meet a set of pre-defined criteria before the professional comes to a conclusion. Diagnosing post traumatic stress disorder and dissociative personality disorder calls for a series of psychological and medical assessments. Assessments are carried out orally or through the use of a questionnaire. Examinations to check for other medical problems are carried out to ensure that the correct diagnosis is made (Boysen, 2011). Treating DID and PTSD: A Comparison Treating DID calls for the combination of various states of personality (Stern, 2012). Interaction between the different persona lities helps the person to function normally. Drug therapy is used to relieve such symptoms as fear, anxiety, and depression. Psychotherapy is considered as emotionally painful. Individuals undergoing therapy experience emotional crises especially when recalling traumatic memories during therapy sessions. Hypnosis is also applied in therapy. Therapy sessions take place over a long period of time, usually over 3 to 6 years. Individuals are treated for other serious health problems that are exhibited, such as drug and substance abuse. Treating PTSD aims at helping individuals gain control over their own life. Individuals suffering from the disorder are advised to accept their condition. They are also empowered to cope with stress and such other phenomena. Unlike dissociative personality disorder, treating post traumatic stress disorder requires a combination of drug therapy and psychotherapy. There are various forms of drugs administered to those suffering from the disorder. They incl ude antipsychotics, antidepressants, and prazosin (Spiegel, 2006). Each of these drugs has a particular function. In psychotherapy, various interventions are used. The interventions include cognitive therapy, which involves empowering the individual to perceive things accurately to reduce trauma. Cognitive therapy is used together with other interventions, such as exposure therapy. The latter encourages the patient to face or confront the situations that scare them the most (Ross, 2009). Other interventions, such as eye movement desensitisation and reprocessing therapy, help the individuals in processing traumatic memories. There are obvious similarities between the treatment procedures for the two disorders. In both cases, the doctor attending to the patient aims at reducing the effects of the trauma (Farrell, 2011). In addition, treating the two conditions involves psychotherapy. A close relationship between the patient and the doctor in-charge must be maintained. The aim here is to increase the efficiency of the therapy sessions. Conclusion Psychology is a field of study dealing with human behaviour and brain functions. The discipline involves the assessment of such human characteristics as perceptions and emotions in efforts to explain individual actions (Singh Chakrabarti, 2008). Psychology has helped in diagnosing and treating various mental disorders, among them post traumatic stress disorder and dissociative identity disorder. Many people suggest that DID and PTSD are the same. However, significant disparities exist between the two with regard to etiology, diagnosis, and treatment. But there are also similarities between the two conditions. For example, the two disorders are associated with past traumatic experiences. References Barlow, D. H., Durand, V. M. (2011). Abnormal psychology: An integrative approach (6th ed.). Belmont, CA: Wadsworth Cengage Learning. Boysen, G. (2011). The scientific status of childhood dissociative identity disorder: A rev iew of published research. Psychotherapy and Psychosomatics, 80(6), 329-34. Burton, L. (2010). An interactive approach to writing essays and research reports in psychology. Queensland, Australia: John Wiley and Sons. Carver, C., Scheier, M. (2004). Perspectives on personality. Boston, USA: Pearson. Farrell, H. (2011). Dissociative identity disorder: Medicolegal challenges. The Journal of the American Academy of Psychiatry and the Law, 39(3), 402–406. Gelder, M., Geddes, A. (2005). Psychiatry. New York, USA: Oxford University Press. Glaser, B., Strauss, A. (2005). The discovery of grounded theory: Strategies for qualitative research. Chicago, USA: Aldine. Hergenhahn, B. (2005). An introduction to the history of psychology. Belmont, USA: Thomson Wadsworth. Overskeid, G. (2007). Looking for Skinner and finding Freud. American Psychologist, 62(6), 590–595. Pinel, J. (2010). Biopsychology. New York, USA: Prentice Hall. Reinders, A. (2008). Cross-examining dissociative id entity disorder: Neuroimaging and etiology on trial. Neurocase, 14(1), 44–53. Reisner, A. (2005). The common factors, empirically validated treatments, and recovery models of therapeutic change. The Psychological Record, 55(3), 377–400. Ron, S. (2008). The Cambridge handbook of computational psychology. New York, USA: Cambridge University Press. Ross, C. (2009). Errors of logic and scholarship concerning dissociative identity disorder. Journal of Child Sexual Abuse, 18(2), 221–231. Shettleworth, S. (2010). Cognition, evolution and behaviour. New York, USA: Oxford University Press. Singh, S., Chakrabarti, S. (2008). A study in dualism: The strange case of Dr. Jekyll and Mr. Hyde. Indian Journal of Psychiatry, 50(3), 221–223. Spiegel, D. (2006). Recognizing traumatic dissociation. American Journal of Psychiatry, 163(4), 566–568. Stern, D. (2012). Witnessing across time: Accessing the present from the past and the past from the present. The Psychoana lytic Quarterly, 80(1), 53–81.

Tuesday, November 5, 2019

Energy Flow in Ecosystems

Energy Flow in Ecosystems If there is only one thing you learn about ecosystems, it should be that all of the living residents of an ecosystem are dependent upon one another for their survival. But what does that dependence look like?   Each organism living in an ecosystem plays an important role in the flow of energy within the food web. The role of a bird is very different from that of a flower. But both are equally necessary to the overall survival of the ecosystem, and all of the other living creatures within it. Ecologists have defined three ways that living creatures use energy and interact with one another. Organisms are defined as producers, consumers, or decomposers. Here is a look at each of these roles and their place within an ecosystem. Producers The main role of producers is to capture the energy from the sun and convert it into food. Plants, algae, and some bacteria are producers. Using a process called photosynthesis, producers use the suns energy to turn water and carbon dioxide into food energy. They earn their name, because- unlike the other organisms in an ecosystem- they can actually produce their own food. Produces are the original source of all food within an ecosystem. In most ecosystems, the sun is the source of energy that producers use to create energy. But in a few rare cases- such as ecosystems found in rocks deep beneath the ground- bacterial producers can use the energy found in a gas called hydrogen sulfide, that is found within the environment, to create food even in the absence of sunlight! Consumers Most organisms in an ecosystem cannot make their own food. They depend upon other organisms to meet their food needs. They are called consumers- because that is what they do- consume. Consumers can be broken down into three classifications: herbivores, carnivores, and omnivores. Herbivores are consumers that only eat plants. Deer and caterpillars are herbivores found commonly in a number of environments.Carnivores are consumers that only eat other animals. Lions and spiders are examples of carnivores. There is a special category of carnivore called scavengers. Scavengers are animals that eat only dead animals. Catfish and vultures are examples of scavengers.Omnivores are consumers that eat both plants and animals depending upon the season and availability of food. Bears, most birds, and humans are omnivores. Decomposers Consumers and producers can live together nicely, but after some time, even the vultures and catfish would not be able to keep up with all of the dead bodies that would pile up of the years. Thats where decomposers come in. Decomposers are organisms that break down and feed off of the waste and dead organisms within an ecosystem. Decomposers are natures built-in recycling system. By breaking down materials- from dead trees to the waste from other animals, decomposers return nutrients to the soil and create another food source for herbivores and omnivores within the ecosystem. Mushrooms and bacteria are common decomposers. Every living creature in an ecosystem has a role to play. Without producers, consumers and decomposers would not survive because they would have no food to eat. Without consumers, the populations of producers and decomposers would grow out of control. And without decomposers, producers and consumers would soon become buried in their own waste. Classifying organisms by their role within an ecosystem helps ecologists understand how food and energy ebb and flows in the environment. This movement of energy is usually diagrammed using food chains or food webs. While a food chain shows one path along which energy can move through an ecosystem, food webs show all of the overlapping ways that organisms live with and depend upon one another. Energy Pyramids Energy pyramids are another tool that ecologists use to understand the role of organisms within an ecosystem and how much energy is available at each stage of a food web. Most of the energy in an ecosystem is available at the producer level. As you move up on the pyramid, the amount of available energy decreases significantly. In general, only about 10 percent of the available energy from one level of the energy pyramid transfers to the next level. the remaining 90 percent of energy is either utilized by the organisms within that level or lost to the environment as heat.   The energy pyramid shows how ecosystems naturally limit the number of each type of organism it can sustain. Organisms that occupy the top level of the pyramid- tertiary consumers- have the least amount of available energy. Therefore their numbers are limited by the number of producers within an ecosystem.