Tuesday, August 25, 2020

Case Study On Drug Induced Anaphylaxis †MyAssignmenthelp.com

Question: Examine about the Drug Induced Anaphylaxis. Answer: Presentation Hypersensitivity is a hazardous response experienced by certain individuals when they are presented to any kind of allergen. At the point when they are presented to something they are hypersensitive to, the safe cells of the body discharges certain synthetics which can offer ascent to anaphylactic responses (Torres Blanca, 2010). Hypersensitivity is perilous and requires a prompt activity. Activating elements for anaphylactic stun incorporates food, creepy crawly stings, prescriptions, sedatives, latex, allergens like dust grains from plants, form spores, tidies, and synthetic concoctions found in beautifying agents. Now and again it very well may be some blood items (Harper et al., 2009). Anaphylactic specialists may enter the body through direct skin contact, ingestion, and inward breath. The antigens recognize the allergens as outside body. Insusceptible cells like the pole cells discharge synthetic compounds that predicament to the IgE neutralizer to offer ascent to a provocative reaction (vultaggio, 2010). Anaphylactic stuns causes vasodilatation and expands the porousness of the vessels prompting poor transfusion of the tissues. Poor tissue perfusion prompts stun (Adkinson et al., 2013). This paper centers around the anaphylactic responses because of the organization of the wide range of anti-toxin Flucloxacillin (Jenkins et al., 2009). Pathophysiology Every single individual responds to drugs in an unexpected way. A medication appropriate for one may not be reasonable for the other individual. An individual may create rashes or grow increasingly genuine unfriendly responses; o the other hand someone else may not show any such unfavorable responses. Insusceptible responses are because of the chain response that begins in the resistant response. The resistant arrangement of the body controls how a body safeguards itself from diseases. The safe arrangement of the body responds to drugs from numerous points of view. For example, in the event that a body is oversensitive to a specific medication, at that point the body recognizes that specific medication as an allergen or an antigen. The safe framework shields the body from infection. The body is so intended to battle with the contaminations and infections. During an extreme touchiness response the safe framework responds with the medications, thinking it as an outside intruder. This resistant reaction prompts irritation causing rashes, disturbed breathing, wheeziness and a lot more manifestations. Excessive touchiness responses because of medications are interceded essentially by the IgE antibodies or T cells. The response component of IgE is very much examined, yet the systems of T-cell-intervened sedate extreme touchiness are not surely known (Lieberman, 2008). Late investigations have depicted 2 ideas: the hapten/prohapten idea and the idea of associations of the anti-infection agents with insusceptible receptors (Adam, Pichler Yerly, 2011). In unfavorably susceptible medication responses, interceded by the T cells, the particularity of the T-cell receptor that has been animated by the anti-microbial might be coordinated to a cross-responsive significant histocompatibility complex-peptide compound. Hence, past contact with the medication isn't compulsory, and a safe system ought to be considered as the significant reason for extreme touchiness (Aun et al.,2014). To be sure, extremely touchy responses to xenobiotics in patients with no earlier presentation to the specialist have been depicted for the neuromuscular blocking operators and radio complexity media. In this way, the allergenic attributes of a medication being worked on ought to be evaluated by identifying its hapten like qualities as well as by distinguishing its capability to offer ascent to an invulnerable response (Dona et al., 2011). Ongoing discoveries have recommended that past contact with the medication isn't constantly required for a medication hypersensitive response, yet the responses can be clarified by the cross reactivity. Cross reactivity interceded tranquilize hypersensitivity may happen in the IgE, IgG and T cell intervened responses. The accompanying contextual investigation depicts about a medication incited anaphylactic responses. The patient was experiencing Cellulitis. On organization of the medication flucloxacillin, the patient experienced touchiness responses (Pichler et al., 2010). This demonstrates the anti-toxin directed to the patient more likely than not acted like an antigen towards the invulnerable cells of the body, and in this way the body may have created an increased insusceptible reaction. The patient has additionally built up the manifestations that are basic in an anaphylactic stun. Medication related hypersensitivity gives manifestations, for example, Retching, Dizziness, Weak or fast heartbeat, fixing of the throat, Unconsciousness, Wheezing, Rashes everywhere throughout the body. The manifestations given in the given contextual analysis is likewise like these general signs brought about by the medication incited hypersensitivity (Liew, Williamson Tang, 2009). The contextual investigation gives data an individual having cellulitis. Cellulitis is a bacterial disease that happens underneath the skin. Cellulitis can happen on any piece of the skin, generally in legs, which prompts expanding and redness. The individual is accounted for to go to the medical clinic where he was regulated with Flucloxacillin, after which he had a hypersensitivity stun. Flucloxacillin is an anti-microbial that is ordinarily managed to treat bacterial diseases like Cellulitis. According to the side effects demonstrated in the given contextual investigation it could be comprehended that the people aviation route has limited causing disturbed breathing and the veins may have enlarged, making the circulatory strain fall. Every one of these side effects line up with the general indications of a medication prompted hypersensitivity. Research facility methodology are consistently not seen as solid in the identification of the anaphylactic responses. A patient experiencing drug incited hypersensitivity ought to have elevatedplasma histamineat least inside one hour of beginning of the symptoms.Serum or plasma tryptaselevels more noteworthy than 15ng/ml, inside 12 hours of beginning is regularly utilized as a corroborative test however typically negative in food-actuated hypersensitivity (Rueff et al., 2009). Plasma tryptasemeasurements are increasingly solid that solitary estimation. Raised degree of IgE in the serum and skin tests for the allergen isn't generally dependable for understanding the medication prompted excessive touchiness reactions.Mast cell tryptaseis the research facility methodology that affirms an anaphylactic response. It is prescribed to evacuate the causative specialist of the response, in spite of the fact that it isn't generally conceivable. The underlying treatment if rewarding hypersensitivity is the organization of epinephrine (Kemp, Lockey Simons, 2008). Epinephrine IV is given in the event of serious responses. If there should be an occurrence of serious stun, the skin and the muscle may not be per melded appropriately in such a case subcutaneous or intramuscular epinephrine won't be appropriately invested in to the dissemination that is the reason type IV is given. Epinephrine has numerous deadly reactions. It can cause extreme palpitations and dyrrhythmias on the off chance that it too quick application is finished. One ought to compute the sub-cutanous or the intramuscular portion and should give just portion IV between 2 to 10 minutes, according to the earnestness of the condition (Soar et al., 2008). Contextual analysis based on ISBAR structure Recognizable proof Name of the patient-Jim Palmer Circumstance Jim Palmer is a rancher of 53 years of age He was conceded in the first part of the day with an instance of extreme cellulitis in his left lower leg. Foundation Jim Palmer is a rancher of 53 years of age He was conceded in the first part of the day with an instance of serious cellulites in his left lower leg. He was brought to the facility where he got one portion of flucloxacillin as a moderate bolus. Ten minutes after the organization of the medication he was discovered short of breath, throat blockage, sentiment of wooziness, and dazedness. On further appraisal it was discovered that the degree of obviousness is step by step expanding. It was discovered that Jim had a two-sided chest development, profundity of his breathing is shallow, and some discernible wheezing can be heard with some focal cyanosis. He is feeling amazingly sleepy and is reacting to voices. Determination Nearness of Urticarial rashes alongside expanding in his lips, fingers and toes demonstrating intense hypersensitivity responses. Past clinical history Past clinical history doesn't show any such unfavorably susceptible responses. Appraisal Indispensable signs-Resps 26 bpm, B.P-99 mm Hg systolic on palpitation, internal heat level 37.4?, SaO2 91% on RA, cool and moist peripherals, Capillary top off planning is more noteworthy than 4 secs, Urticarial red rashes, growing of lips, toes, Blood glucose-5.3 mmols/liters. Current medicine The patient is directed with two portions of Flucloxacillin 1gram IV is given. Suggestions The patient is giving continuous indications of disintegration. His visibilities and reaction to voices are diminishing progressively. So will be better that a prompt move is made. It is prescribed to begin the underlying treatment with a low portion of Epinephrine. It is prescribed to check the Serum or plasma tryptaselevels. A level more prominent than 15ng/ml, inside 12 hours of beginning is regularly utilized as a corroborative test for the hypersensitivity responses. Ends Anaphylactic responses in view of the use of anti-infection agents have expanded in recurrence in light of the boundless utilization of the pharmaceuticals. Hypersensitivity is extremely touchy responses caused because of the arrival of the go betweens of basophils and pole cells by the IgE. Anaphylactic responses vary from patient to tolerant, so affectability of one patient to a specific allergen probably won't coordinate with the other patient. Anaphylactic responses are perilous sometimes. In this way not many things must be kept into brain to evade hypersensitivity. It is very importan to be familiar with the patients clinical history. Care ought to be taken by the attendants and the human services suppliers to give medications like - lactams, non steroidal calming drugs, anasthetics, radio complexity media, latex and some more. Straightforward techniques help in forestalling hypersensitivity, which includes the course through which the medication has been directed, understandin g ID with recently known history of anaph

Saturday, August 22, 2020

A Mother-Daughter Relationship Essay

The distribution had the rarest of possibilities and obviously, a touch of karma, to have the pleasure of perusing from Mrs. Jane Bingley passage at her home close Longbourn. We have come to talk with the previous Ms. Bennet about her mom, who unfortunately spent away five years prior after a time of sick wellbeing. In the wake of being provided by a liberal measure of tea and desserts, Mrs. Jane Bingley was more than pleasing. She had invited us generous into her home and had concurred half a month prior to direct this meeting. Plainly, there were some uncertain issues before their mother’s demise. I asked whether there were some particular issue. Truly, the entire undertaking was a disaster. Men came walking around our garden, some high-society individuals, right old showoffs coincidentally, and obviously my mom, who I daresay was in everything. In reality, it was a significant disaster for the Bennet family. Miss Jane Bennet-Bingley was the oldest of five offspring of the Bennet family. Their mom, as she describes, was exceptionally fixated on achieving her self-sworn obligation to see every one of her little girls to get hitched. She used to send my sisters and me to parties, and such. It was the well known activity in those days and therefore turned into an image of social height. We were simply white collar class, or all the more properly, wanted to wait between in the center with humble social affiliations. This end up being a factor toward their relationships which, by a cases, was incited by a high-class society part: the late Lady Catherine. She was haughty, much the same as any blue-blood in those days. She particularly gave my sister, Lizzy (Elizabeth) a difficult time since her significant other was a nephew of hers. She didn't need a type of low-class society young lady with his very much reproduced nephew. However, at that point, the manner in which things turned out amazed everyone, including me. About my mother’s character (with articulation of fleeting delicate satisfaction), I didn't detest nor disdain my mom. My dad would presumably hate at the idea, however on the other hand, my dad talked close to nothing. He thought about us and for the family without a doubt yet he would simply sit in some cases in his examination and let our mom do all the talking. Mrs. Bennet was a lady of mean seeing, little data, and unsure temper. At the point when she was unhappy, she liked herself apprehensively. An amazing matter was to get her little girls wedded; its comfort was visiting and news (Austen). Mrs. Bennet’s proudest second would be the marriage of her two little girls, Jane and Elizabeth, to both good and persevering men. We had our own marriage. My mom didn't have any piece of it; however I like to imagine that she tried to put forth for every other person that she had a piece of it â€Å"on our marriage†. She was consistently fastidious, kind to individuals, particularly our spouses. She took a stab at everything to place us in our great name, just to get hitched. Without a doubt, the economic wellbeing during Mrs. Bingley’s time was fixated on the possibility that ladies had just a single objective in their livesâ€that is, to get hitched. Very ridiculous really; in evolving times, the status of ladies have raised to an increasingly recognized level. Be that as it may, my mom, on the off chance that she were alive today, would not get that. Mrs. Bingley, as per their portrayal, lived to see her girls wedded with no introduction or thought for their emotions. Her fixation for marriage blinded her genuine nature. She was a decent mother however; she never neglected to maintain her obligation as my father’s spouse or our mom. I was in reality shocked that my dad didn't respond so that he was disappointed with my mother’s conduct in those days. In any case, I guess it was extremely simply her inclination to be so. To immediately advance a comment, I didn't care for the manner in which my mom took care of our issues when she was as yet alive. She regularly humiliated us and the family with her pointless endeavors of raising the name of the family despite the fact that it wasn’t required. She was abundantly worried about the manner in which we form ourselves that she had begun to overlook her own conduct. She acted like most moms would do, however in an alternate case. Furthermore, on the off chance that she didn't do what she did, I may at present be single in any case. We adored her we despite everything do. Reference Austen, J. (1995). Pride and Prejudice.

Sunday, August 9, 2020

Career Services Recruiters Guide COLUMBIA UNIVERSITY - SIPA Admissions Blog

Career Services Recruiters Guide COLUMBIA UNIVERSITY - SIPA Admissions Blog When describing SIPA to prospective applicants I will often say that SIPA is not an employment agency, however it is our job as a school to produce graduates that are prized in the policy marketplace.   Our curriculum is designed to equip graduates with the tools and skills that are desired by organizations in all sectors public, private, and nonprofit. The Office of Career Services (OCS) plays an important part in the development of our students.   OCS is responsible for running our professional development classes and assists students with resume and cover letter writing along with interview training. The OCS mission extends beyond student development and includes extensive outreach to employers.   This includes site visits to employers, setting up recruitment opportunities at SIPA, hosting an annual career conference in Washington DC, and posting internships and jobs available to SIPA students and alumni. Newly admitted students will have the opportunity to begin working with OCS during orientation.   As a short preview of the outreach that OCS performs, click here to view the OCS Recruiters Guide (PDF document).

Saturday, May 23, 2020

Textual Critical Problems Of The Old Testament - 845 Words

Deuteronomy 32:8 and Genesis 49:10 are two examples of textual critical problems in the Old Testament. The phrase â€Å"sons of God† will be examined in Deuteronomy 32:8, and the word â€Å"Shiloh† in Genesis 49:10. These issues have caused much debate as to how one should interpret these verses in light of the textual critical problems. This paper will examine both passages and provide solutions to each of the textual critical issues. Deuteronomy 32:8 Deuteronomy 32:8 has caused controversy because of the phrase × Ã—™×”×Å"×  ×™×  Ã—‘ or × Ã—™×Å"×  ×™×  Ã—‘ â€Å"sons of God.† Some have postulated that this reading renders the Israelite religion to be polytheistic instead of monotheistic. Therefore, translators have changed the Scripture to read â€Å"sons of Israel† (NIV, NASB), â€Å"children of Israel† (KJV), or â€Å"people of Israel† (HCSB). Dr. Heiser has persuasively argued that the translation â€Å"sons of God† is the correct reading of the original Hebrew text, and should be translated that way in our English Bibles for a number of reasons. A few examples will be examined to show that â€Å"sons of God† is the correct translation of Deuteronomy 32:8. First, manuscript evidence is crucial when interpreting a text that has caused there to be textual criticism. There are more manuscripts that interpret Deuteronomy 32:8 to read â€Å"sons of Israel,† but that does not mean that should be the correct translation. Dr. Heiser makes it clear that one cannot determine the meaning of a text by the number of manuscripts. One must evaluateShow MoreRelatedEssay on The Old Testament Law1260 Words   |  6 PagesIntroduction The Old Testament law is seen as irrelevant by most modern Christians today. Christians are now under the blood of Jesus Christ, which is said to abrogate the Law. Galatians 6:2 says, â€Å"Bear one anothers burdens, and thereby fulfill the law of Christ† (NASB). The law of Christ is to love God and your neighbor as yourself (Matthew 22:36-40). This does not mean, however, that the Old Testament Law does not apply to Christians today. Author J. Daniel Hays expounds on this topic in hisRead MoreThe Bible Is The Only Truth1574 Words   |  7 Pagesonly truth, â€Å"The Word of God.† I was encouraged to not put my trust in men, because men will always make mistakes, but trust in God, because he is perfect. I solemnly believed that in order to trust in God, I had to obey the Bible. When I was 18 years old, I became a volunteer translator for a non-denominational American religious organization in Brazil. During that time, I visited hundreds of churches in many Brazilian s tates. American missionaries founded most of the churches in Brazil. During my firstRead MoreThe Question Of Canon As A Good Deal Of Modern Day Biblical Scholarship Essay1199 Words   |  5 Pagesto the development of the canon. This chapter contends that early Christian beliefs led to an encouraging environment for the development of the New Testament Canon. Most especially early Christians trusted that Jesus Christ brought the fulfillment of a new divine message that was expected to accompany the Messiah as anticipated in the Old Testament. Second, early Christians trusted that Jesus introduced the new covenant and that this brought about an expectation of a written text. Lastly, becauseRead MoreChristian Doctrine And The Doctrine Of A New Testament909 Words   |  4 PagesPolemicists raised up to defend the faith. Their reaction by concern church fathers against the action of the heretic let to the development of Christian doctrine and the formulation of a New Testament Canon. They fought the heresies that were damaging the church. In refuting error, they used much of the New Testament as the source of the true doctrine. The work of the Polemicists also gave rise to the concept of an orthodox catholic church which was opposed to heresy. While most of the Apologists wereRead MoreEssay on The Historical Critical Method2026 Words   |  9 PagesThe New Testament is now well over 1900 years old and for nearly the same period of time people have struggled for the right interpretation of that what was written in these 27 books and letters. How should one handle a book that is Gods Word? Before looking at the pro and contra of historical-critical exegesis it is necessary to define this method. One of the many textbooks teaching the historical-critical method Methodenlehre zum Neuen Testament by Wilhelm Egger method gives us this definitionRead MoreGeneral Principles of Hermeneutics and Exegesis1926 Words   |  8 Pagesdocuments , whether it is an Epistles , from the Gospels , Acts or from Revelation. Each of these literary genres requires addition exegetical consideration. Yet all of the steps do not apply equally to all New Testament passages. Some passages, for example, present no major textual problems; others are seriously problematic.6 Also to be considered along this is the nature of the Sentence if it is simple with one main clause, compound with two main coordinate clauses or complex with main clause withRead MoreEssay about How to Read the Bible for All Its Worth2583 Words   |  11 Pagesprofessor of New Testament studies at Regent College. He has authored several New Testament commentaries and is the general editor of the New International Commentary series. Fee has also contributed significantly to the field of hermeneutics and NT textual criticism. The author is a well known teacher and conference speaker who has a burden to see the renewal of the church. Stuart is a seminary professor at Gordon-Conwell Theological Seminary where he teaches Old Testament studies. He also hasRead MoreAnalysis Of Dei Verbum, The Second Vatican Council s Dogmatic Constitution On Divine Revelation2186 Words   |  9 Pagesthe basis of all Christian doctrine. The present constitution touches upon the age-old question of the relationship between Scripture and Tradition. It also clarifies teaching about the authenticity and inerrancy of Holy Scripture, in light of modern developments in exegesis and criticism. Thus DV is a synthesis of enormous significance: the text binds together loyalty to church tradition with the yes to critical science, and there by once again opens the way for faith into the world today †¦Ã¢â‚¬ ¦. DVRead MoreExegesis of 1samuel 172247 Words   |  9 Pagesvery much interested on the issue of social. In 1970 they were uses of the social criticism methods from variety of situations, and especial the one of sociology , which stress the life between social behavior of the people during the time of the old testament. Which has emerged is how scholars might have access to the ancient past and the multifaceted social world of ancient Palestine and the Mediterranean. The quest of the social world of the bible Those who were travelling from the east theyRead MoreWhat Are Source, Form, And Redaction Criticism?1940 Words   |  8 Pagesâ€Å"demythologized† in order to be accepted by modern society. A strength of form criticism that I see is the amount of proven accuracy that the Jewish scribes put in to writing their texts. The Old Testament text and the Dead Sea Scrolls were practically identical even though they were written at different periods of time. The problem that I can point out with source criticism is the theory of many critics the â€Å"Q document†. Used to describe similarities within the Gospels of Matthew, Luke and Mark. The theory

Tuesday, May 12, 2020

Impact of Student Loans - 1093 Words

It is no big secret that, in America today, most high-paying jobs require a college degree. Thomas C. Frohlich of USA Today stated that â€Å"graduating from college is a prerequisite for the vast majority of high-paying jobs†(2013). With the cost of a college degree increasing in unison with demand, few can earn a degree without the help of student loans. The American Student Assistance website reports that of the twenty million students enrolled in college, about sixty percent are attending with the help of student loans (2014). Obviously, student loan debt affects the individuals that obtain them. However, it also has severe effects upon the nation’s economy. Recently, CNBC broadcasted a documentary program entitled â€Å"Price of†¦show more content†¦As time passed, she was unable to keep up with her college loan payments and got a deferment. Last year, my friend took a higher paying job as a security guard - a job for which she needed no college education. When my friend’s deferment recently ended, she found that she now owed $115,000 due to interest, and that the interest would keep right on accruing until the loan was paid in full. My personal decisions about attending college and how to pay for it were made after a lot of research on my part. I do have student loans, but only in the least amount needed to get my degree. I receive loans in the amount of $3000 per semester and am attending nursing school. Once I obtain my degree and graduate, I will begin seeking a job immediately as a nurse and will earn a minimum of $75,000 per year. I will also be working in a field and for an institution that qualifies for me for a grant that could pay up to 50% of my student loans off. Although I do understand that there is always the risk of not being able to find a job, I think that my research into career options will pay off in the end. All things considered, I think that because of the great demand in field I am planning to work in, and because of help from grants, I will be able to pay back my student loans. I am proud of the decision that I made and think that it will be a beneficial step in my life. I do believeShow MoreRelatedThe Cultural And Global Impact Of College Tuition And Student Loan Debt1442 Words   |  6 PagesThe Cultural and Global Impact of College Tuition and Student Loan Debt Introduction College debt is quickly rising as more students pursue a postsecondary education. Tuition is growing at a rate higher than inflation, thus forcing many students to make up the gap between income and tuition through loans (Houle). However, cultural factors must be considered before a young adult makes a decision about higher education. The type of postsecondary education one pursues, if any, is determined by manyRead MoreA College Education Is Not Only An Absolute Requirement1253 Words   |  6 PagesToday, students and graduates face long lasting consequences when it comes to student loan debt, which in recent years has become increasingly problematic and inevitable regardless of the precautions a student takes. No amount of awareness or understanding can change the lasting impacts that taking out student loans has. Pursuing a college education today, is nothing like it once was or once promised to be. Before, getting a degree meant an almost guarantee to find a good paying, stable job. NowRead MoreFinancial Risk Of Higher Education Essay1702 Words   |  7 PagesAmericans rely on both private and federal student loans to finance college. The issue with this is the liability that comes with student loans. Borrowing money seems to be the American way, from credit cards, to house and car mortgages, to student loans, but is this method a worthwhile investment in one’s future, or is it a financial disaster? Both â€Å"The Remediation of Higher Education and the Harm of Student Debt† by Jeffery J. Williams and â€Å"Student Loans: Are We Getting Our Money’s Worth?† by WilliamRead MoreDebt As A Huge Stress Factor Among America s Society998 Words   |  4 Pagesmany individuals within America’s society. Student loans have a tremendous impact on younger individual’s lives and can affect their futures as well. Many individuals are unable to live normal lives, and are rather trapped with debt serving as a burden on their shoul ders. Student loans affect about thirty-seven percent of individuals in America. For many students financial aid or private loans are the only source of payments for a higher education. Student debt inhibits graduates from spending moneyRead MoreEssay Student Loan Debt Relief1460 Words   |  6 PagesStudent Loan Debt Relief Student loan debt relief is a controversial issue in America today. Student loan debt affects twelve million college students, roughly 60% of all college attendees, per year (Student Loan Debt Statistics). Student loan debt relief rose to the forefront of economic news during the financial market crash of 2008. The U.S. Government has developed a debt relief plan that extends payments over a 25-year period, with a full forgiveness of all remaining debt at the end ofRead MoreStudent Loan Debt And Education1082 Words   |  5 Pagesoday, society stresses the importance of postsecondary education to students due to the countless ways that an associates, bachelors, masters, or doctorate can enhance an individual future. For an individual to reach financial security in the United States’ economy it is basically mandatory that they have received a college degree. Postsecondary education will provide skills and knowledge that will prepare individuals to be successful within their career as they compete for leading positions. OverallRead MoreEducation Debt: The Problem and Solutions Essay1125 Words   |  5 Pages With the ever-increasing tuition and ever-tighten federal student aid, the number of students relying on student loan to fund a college education hits a historical peak. According to a survey conducted by an independent and nonprofit organization, two-thirds of college seniors graduated with loans in 2010, and each of them carried an average of $25,250 in debt. (Reed et. al., par. 2). My research question will focus on the profound effect of education debt on American college graduates’Read MoreStudent Loans And Student Loan Debt898 Words   |  4 Pagestelevision. Unfortunately, at a staggering $1,200 per month in student loan repayment debt partly because she was misinformed of the terms of her student loan (55). Debt is foreseeable but student loan debt can leave borrowers distraught at the mere thought of the unrealistic terms (Hillstrom 55). All students entering college need to be aware of student loans and how they impact the future; either negatively or positively. For some students, a college degree is the key to success but for others theRead MorePros And Cons Of Student Loan1256 Words   |  6 PagesApplebaum laments that from the student loan industry point of view, the student debt is there to help the loan providers amass funds from the youngest, economically vulnerable and financially unstable of which graduates form the majority. The loans have come with immense opportunity cost as the â€Å"educated poor† are not able to buy homes, invest or innovate, start businesses or engage in economically viable activities while the few up the echelons of power are benefiting. Tuition rates have escalatedRead MoreStudent Loan Loans Should Not Be Educational Opportunities For Disadvantaged Students1552 Words   |  7 Pagesi. Student-loan defaults in China In the context of entering the mass higher education stage, the ideology of cost-sharing and equity in higher education is now widely accepted as a must-do in China, and there is a tradeoff in which colleges can charge tuition fees in exchange for better financial aids to students from disadvantaged groups. Thus, implementing a student-loan scheme to ensure educational opportunities for needy students is the primary choice for the Chinese government. Nowadays the

Wednesday, May 6, 2020

Jean Watson Free Essays

Jean Watson’s Theory of Human Caring Heidijo Elyea Olivet Nazarene University Theoretical and Professional Foundations of Nursing MSN SP2013 NRSG-653-54 Theresa Williams March 19, 2013 Certification of Authorship: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for the purpose of this assignment. We will write a custom essay sample on Jean Watson or any similar topic only for you Order Now Your Signature: _____Heidijo Elyea____________________________ Jean Watson’s Theory of Human Caring Jean Watson’s Theory of Human Caring focuses on holistic care of the patient and understanding the power of a meaningful therapeutic relationship. The theory is a middle-range theory and is based on the role of care and the influence of caring on healing. Caring is a moral ideal of nursing that involves mind, body, and soul engagement with another, which can be expressed through nursing interventions (Chinn Kramer, 2011). Many nurses have adopted Jean Watson’s Caring Theory in their own practice. Nursing has a commitment to protect, enhance, and preserve their client’s humanity by helping them restore harmony. Caring moments should transform both the patient and nurse, as they are linked together. Educational History Jean Watson earned her BSN, MS, and PhD degrees all at University of Colorado. She was also the former dean in the College of Nursing and founded the Center for Human Caring (Parker Smith, 2010). Watson’s undergraduate and graduate degrees are in nursing and mental health nursing. Her PhD is in educational psychology and counseling. Jean Watson also serves as director of the Watson Caring Science Institute, which is a nonprofit company she founded and is dedicated to promoting the work of caring, science, and heart-centered nursing (Parker Smith, 2010). Overview of Theory of Human Caring Major Elements There are four major elements in Jean Watson’s Theory of Human Caring. The four elements are the ten carative factors/clinical caritas processes, transpersonal caring relationships, caring moment/occasion, and caring-healing modalities. Carative factors are a guide and process in which a person cares for another and does all they can to protect, support, enhance, and maintain his or her quality of life. Transpersonal caring is a time when the nurse and patient come together and has an influence on each other. Caring should not be done as a chore as an assignment as it is an ethical deliberate action. Caring moments occur when two people come together with one person being the care recipient. Watson also developed the concept of clinical caritas that evolved from carative factors. Caritas means to cherish and expands on the relationship between caring and healing for self and others (Parker Smith, 2010). Original Carative Factors Dr. Watson started her theory with ten carative factors, which she later evolved into clinical caritas processes. The ten factors are: 1. Formation of a humanistic- altruistic system of values. 2. Instillation of faith-hope. 3. Cultivation of sensitivity to one’s self and to others. 4. Establishing a helping-trusting relationship, human caring relationship. 5. Promotion and acceptance of the expression of feelings, both positive and negative 6. The systematic use of a creative problem-solving caring process. 7. Promotion of system and subjective life world of self and one being cared for. 6. Systematic use of a creative problem-solving caring process becomes transpersonal teaching-learning. 8. Provision for a supportive, protective and /or corrective mental, physical, societal, and spiritual environment. 9. Assistance with the gratification of human needs. 10. Allowance for existential-phenomenological-spiritual forces. Parker Smith, 2010) Clinical Caritas Processes Watson’s evolved carative factors became clinical caritas processes evokes a way for nurses to be more open and adds a spiritual touch to the relationship. The clinical caritas processes are: 1. Formation of humanistic-altruistic system of values becomes the practice of loving kindness and equanimity within the context of caring consciousness. 2. Instillation of faith-h ope becomes being authentically present, and enabling and deep belief system and subjective life world of self and one being cared for. 3. Cultivation of sensitivity to one’s self and to others becomes cultivation of one’s own spiritual practices and transpersonal self, going beyond ego self, opening to others with sensitivity and compassion. 4. Development of a helping-trusting, human caring relationship becomes developing and sustaining a helping-trusting, authentic caring relationship. 5. Promotion and acceptance of the expression of positive and negative feelings, becomes being present to, and supportive of the expression of positive and negative feelings as a connection with deeper spirit of self and the one being cared for. 6. Systematic use of a creative problem-solving caring process becomes creative use of self and all ways of knowing as part of the caring process; to engage in artistry of caring- healing practices. 7. Promotion of transpersonal teaching-learning becomes engaging in genuine learning experience that attends to unity of being and meaning, attempting to stay within other’s frame of reference. 8. Provision for a supportive, protective, and/or corrective mental, physical, societal, and spiritual environment becomes creating healing environment at all levels (a physical and nonphysical, subtle environment of energy and consciousness, whereby holeness, beauty, comfort, dignity, and peace are potentiated). 9. Assistance with gratification of human needs becomes assisting with basic needs, with an intentional caring consciousness, administering â€Å"human care essentials†, which potentiate alignment of mind-body-spirit, wholeness, and unity of being in all aspects of care, tending to both embodied spirit and evolving spiritual emergence. 10. Allowance for existential-phenomenological-spiritual forces becomes opening and attending to spiritual-mysterious, and existential dimensions of one’s own life-death; soul care for self and the one-being-care-for. Parker Smith, 2010). The first three carative factors form the â€Å"philosophical foundation† for the science of   caring. The remaining seven carative factors spring from the foundation laid by these first three (Parker Smith, 2010). Implications of the Caring Theory Jean Watson feels her theory can be considered a â€Å"philosophical and moral/ethical foundation for professional nursing and part of the central focus for nursing at the disciplinary level† (Parker Smith, 2010). The theory offers a framework that encompasses the arts, sciences, humanities, spirituality, and evolving dimensions of holistic medicine and nursing. The model is an invitation to work together and experiment with the ideas and the philosophy. Watson offers up several questions to assess where we are as nurses within the framework of the Caring Science. †¢ Is there congruence between the values and major concepts and beliefs in the model and the given nurse, group, system, organization, curriculum, population needs, clinical administrative setting, or other entity that is considering interacting with the caring model to transform and/or improve practice? What is one’s view of human? And what it means to be human, caring, healing, becoming, growing, transforming, etc. Such thinking in regard to this philosophical question can guide one’s worldview and help to clarify where one may locate self within the caring framework. †¢ Are those interacting and engaging in the model interested in their own personal evolution? Are they committed to seeking authentic connections and caring-healing relationships with self and others? Are those involved â€Å"conscious† of their caring caritas or noncaring consciousness and intentionally in a given moment and at an individual and system level? Are they interested and committed to expanding their caring consciousness and actions to self, other, environment, nature and wider universe? †¢ Are those working within the model interested in shifting their focus from a modern medical science-technocure orientation to a true caring-healing-loving model (Parker Smith, 2010)? Strengths and Limitations Jean Watson’s theory has many strengths, as it is logical, generalizable, and relatively simple. The theory is based on phenomenological studies that ask questions rather than state hypotheses and can be used to guide and improve practice. Supported by the theoretical work of numerous humanists, philosophers, developmentalists and psychologists. This theory places the client in the context of the family, the community and the culture and places the client as the focus on practice rather than the technology. Limitations of Dr. Watson’s theory are few, but the main limitation is that the carative factors primarily address the psychosocial needs. The physical and biological needs appear secondary. Conclusion Watson’s theory provides many useful concepts for nursing practice. She also ties together other theories used in nursing education. The ten carative factors and caritas processes provide guidance to nurses wishing to improve their nursing practice. References Chinn, P. L. , Kramer, M. K. (2011). Integrated knowledge development in nursing (8th ed. ). St. Louis: Mosby. Parker, M. , Smith, M. (2010). Nursing theories nursing practice 3rd ed. ). Philadelphia: F. A. Davis Company. How to cite Jean Watson, Papers

Saturday, May 2, 2020

Management Information Systems Business Operations

Question: Discuss about the Management Information Systems for Business Operations. Answer: Introduction Technology has been in a state of development since the last decade. The business operations of the company has also been promoted and developed due to the change in information technology (Barel, Paye, Maibach, 2014). In the present business world there are number of ways by which security of information and data could be managed. Procter Gamble Company has been selected for developing ways for security of the information system. This report contributes to the analysis of the different ways the security of information system can help an organization. The methods for securing information system have been shown in this report. The Security of Procter Gamble Company has enhanced the business sense of the company. Outsourcing and Social networking services has provided platform for getting access to media news and media is capable of trolling the company. Hence it is important for forming policies to prevent security issues. Analysing Security issues for forming policies of Procter Gamble Security issues of Procter Gamble The Security is the most dominant part of information technology management. The security issues of Procter Gamble Company can be classified into two major causes outsource of information and social sites (Barel, Paye, Maibach, 2014). Outsourcing has been developed over the years in Procter Gamble. It has enhanced the business sense of the company. It involves third party for processing the hard core information of the company. Payrolls and call centres act as outsourcing sectors. Procter Gamble hands over the private and secured data to these sectors. The outsourcing companies store these data over the cloud network. The access may lead to misuse of these confidential and private data (Zhu, et al., 2016). The sensitive information like salary, manufacturing cost, taxes and many more could fall into wrong hand if proper care is not being taken. Social networking services such as twitter and Facebook has become the major source internet engaging (Achrol Gundlach, 2014). It has become the source of communication and connections among customers and Procter Gamble Company. The business operations are at great risk due to the divulging of confidential business information. The organisation has disallowed the social sites from accessing the companys resources. However the internet has provided platform for getting access to media news and media is capable of trolling the company (Zhu, et al., 2016). It is littered with stories of bullying people. Hence it is important for forming policies to prevent security issues. Principles of Securities policies Procter Gamble has to form policies and measure for securing their data and information. It is very difficult for forming means to protect and secure data and information from misuse (Achrol Gundlach, 2014). However, some principles of policies would help Procter Gamble for forming preventive measures to the security threats. They are availability, confidentiality, and integrity. Availability refers to principle of interrupted access of all the required information within the organization. Confidentiality stands for the fact that all the informational resources must be given access to only one authorised person (Wolf et al., 2015). Integrity means that the authorized person should only be allowed to modify and change the information. Threats, Vulnerabilities and Control in Procter Gamble Security issues of an organization can be dealt by understanding each of them on an individual level. They are threats, vulnerabilities and controls (Wolf et al., 2015). Threats are set of situations that could result in harming the operations of the company. Vulnerabilities are some specific weakness of the company. These weaknesses are flaws in security system, fault in designing and lack or protection. Procter Gamble would have to deal with each type these faults for forming the best possible security measures of protecting their information and data. Threats of Information system in Procter Gamble Some major threats that have crucial effect on Procter Gamble are explained below in the table. Removal Process of threat Description Interception It is the way by which external person gets in the information system of Procter Gamble. The block in network would deny the entry of person, program, or any system in information system of Procter Gamble (Lafley Martin, 2013). However the direct copying or tapping of the information could be done by intercepting the unauthorized entry with the help of fake authentication process. Modification It is a progression of the Interception part of threat resolving process. In case of unauthorised entry, the information and data stored could be tampered and changed. As for example, database modification and transmission data could be hacked and changed by the rival company of Procter Gamble (Konik, Theuer Venz, 2013). Interruption It occurs when Procter Gamble loose the access to their resources. Hardware theft and program bugging are examples of interruption in information system (Konik, Theuer, Venz, 2013). The data and information of Procter Gamble may also be deleted accidentally and it would also result in hindering the progress. Fabrication It refers the counterfeit objects within the information system of Procter Gamble. The malicious programs, bugs and spurious entry in data sheet would hinder the progress of the company. According to Yi, Smith, Ardwin, (2016), Keystroke logging is also a major cause for affecting the security system of Procter Gamble. Table1: Threats that affect Procter Gamble (Source: Lafley Martin, 2013, pp.-8) Vulnerabilities could be either technological or person dependent. In organizations, the data breach and security breaker are mostly oriented from people. It has been seen that the misuse of the resources of company or deliberate fraud to the company are the major vulnerabilities of the company (Wright, 2014). The technological vulnerabilities of Procter Gamble could be termed as the flaw in the planning and designing of the security system. It has made getting into the network of the company easy for the external people. Some examples of technological vulnerabilities include buffer overflow and denial of service. Buffer Overflow: In buffer overflow, the attackers target the application that is not multitasking (Carrie Wilshire, 2013). Hence it becomes easy to overflow the services of the application by attacking that particular application. Security controls are the methods and tools that can be used for mitigating the risk of vulnerabilities. It can be classified as detective, preventive or responsive. The presentive security control acts as a safeguard rather than detection model. Policies of Information security in Procter Gamble The policies for security of information and data in Procter Gamble have six essential components. They are objectives, audience, purpose, exceptions, policy, and disciplinary action. 1. Objectives are the clearly stated aims of Procter Gamble while forming the policies (Wright, 2014). The security of the information is the main reason behind the formation of policies. 2. Audience is used for defining the underlying scope of Procter Gamble and the audience affected by the policies. 3. Purpose has been used for noting and pointing out the reasons for the existence of policy in Procter Gamble. 4. Exceptions clearly state the terms and condition when the formed policies would cease to work. In some extreme cases these policies would not be valid for application in Procter Gamble. 5. Policy defines the actual policy that has been made up to deal with the security issues in Procter Gamble (Payaud, 2014). 6. Disciplinary actions are the set of action and consequences that one has to face if any of the policies made in Procter Gamble would be broken. Analysing ways for improving security measures in Procter Gamble Understanding the security lax: it is very important for understanding the weakness of the information system (Fang et al., 2014). If the designer does not know the errors of the design, he or she would not be able to protect their system from external hack. Hence understanding the flaws of the security system is very crucial in Procter Gamble. Prototypes of the information system design should be checked for gathering intelligence on the flaws of the design. Confidentiality of information: The information system of Procter Gamble should maintain its confidentiality for operations from external users. The computer system of Procter Gamble should maintain the protocol of authentication for allowing anyone through the security wall. The authentication process can be divided into two stages identification and authentication (Fang et al., 2014). Identification is the process by which the information system verifies that legitimate user. If anyone else would try to get into the network, the system would not allow the access to information and data. It can be done by deploying password protection and question and answer options. Business continuity assessment policy: Procter Gamble can form the business continuity assessment policy for 1. Understanding the impact of interruptions in the company 2. Calculating the tolerance of system down, on system by system basis 3. Priorities of the business at those situations 4. Resource requirements for restoring critical business process (Payaud, 2014) Sample risk assessment policy of Procter Gamble for information security Section P [Procter Gamble] Information security Effective date: Sub head Risk assessment of Information security Change controlling factor #: Policy Authentication and Password protection Approved by: Objective To control the security of information, Procter Gamble would form the authentication and password protection in the company. Purpose This policy would ensure that the information system of Procter Gamble would be limited to authorised use (Union, 2014). The risk of data breach and information infiltration could be minimized. Audience It is applicable to all the employees, customers, managers, and stakeholders of Procter Gamble. Policy The information technology team would form designs for increasing the security of the information of Procter Gamble (Li, 2014). Threats to the information system would be analysed and their probability of occurrence would be reduced. Disaster preparation would anticipate the methods for sorting the problems caused by the data leak and information misuse. Contingency planning would be helpful in forming a surrogate planning when the first plan for implementation fails to procure the desired result (Sittig, Gonzalez Singh, 2014). Exceptions None Disciplinary actions Violation of the policy would be dealt with stern and strict actions. Legal prosecution would be taken by Procter Gamble against such actions under civil and criminal laws (Li, 2014). The employees would be terminated and interns and volunteers would be dismissed from the service. Table 2: Risk assessment policy of Procter Gamble (Source: (Sittig, Gonzalez Singh, 2014, pp.- 803) Ethics, law and morality of information system in Procter Gamble It is important for maintaining the operations of the business without affecting the moral values of the company. Procter Gamble would have to maintain their information system Figure 1: Comparison of Moral and Legal activities (Source: Hubin, 2014, pp.- 89) Normative framework of business ethics in Procter Gamble The ethics refer to the science of society. It helps people for socializing and surviving among the people. It promotes the survival of culture, society, individuals, civilizations, and business (Hubin, 2014). The ethics of business consist of interactions among the firms, industries, society, individuals, and state. The ethical theory is helpful in sorting out the ethical issues of Procter Gamble that may be seen in their operations. The ethical issues of a business organization can be dealt by understanding PAPA acronym (Michael Byner, 2013). PAPA stands for privacy, accuracy, property, and accessibility. Privacy concerns with the ability for protecting their information from external. Accuracy is the concept of providing and achieving correct values and information in business operations. Property is the data and information collected by an individual. That individual would be the owner of it (Michael Byner, 2013). However in case of corporations, the company who has paid for the information could counter claim the property. Accessibility is process of making data available for all the potential users. Code of Ethics and Corporate social responsibility in Procter Gamble The recent awareness among people for the ethical issues in information system has caused growth of code of ethics or conduct or practice in them. The complete ethical treatment is used for understanding the applications of information system (Union, 2014). The society allows the existence of separate entities for the owners of Procter Gamble. The economy of the company is huge and it has caused people for expecting large from the company. CSR helps in initiating two fold aspects of strengthening the business and contributing to the society (Brief et al., 2016). Procter Gamble pursues CSR for reflecting the personal interests of senior executives. In the supply chain model, CSR participates for forming partnership with community groups. The three pronged approach of CSR are Consolidation of CSR efforts- the time of operations is limited and it is very hard to save them Understanding the benefit- Spending the time for strategising the approach Finding the partners- Selecting partners for mutual benefits Sustainability in Procter Gamble- Sustainability is very important for Procter Gamble from operational point of view (Brief et al., 2016). It involves ensuring the resources of the company. Information System governance in Procter Gamble The Chief information officer plays a crucial role for providing leadership in technology implementation and business operations in Procter Gamble. The management structure of Procter Gamble can be understood by analysing the four major Information system management structures. Figure 2: Four major Information system management structures (Source: Eddy, Gooi Chen, 2015, pp.- 33) SWOT Analysis of Procter Gamble and relating it to Security issues Figure 3: SWOT analysis of Procter Gamble (Source: Lutkenhaus de Freitas, 2016) Strength- The strengths of Procter Gamble have been greatly influenced by the Management Information system (Bull et al., 2016). The use of e-commerce and latest information system has helped them in achieving market position and brand image. However, the security flaws in their information system might cause Procter Gamble loss of a considerable amount of market name. Weakness- The information system has helped Procter Gamble in expanding their scale of operations. It has resulted in slower operations in Procter Gamble (Bull et al., 2016). Due to the use of latest information system, Procter Gamble might see data and information theft in their operations. It would cost them large amount of operational costing loss. Opportunities- The information system used by Procter Gamble have made it possible for them to grow on a global scale (Gorener, Toker Ulucay, 2012). They have acquired many opportunities for acquisitive growth in other markets. However, the diversification of their business market using information system could be hindered due to flaws in their security plans. Threats- Growth of strong competitors and retailers is the main threat to Procter Gamble (Gorener, Toker Ulucay, 2012). The retailers have started using information system for opposing the market capture of Procter Gamble. Pestle analysis of Procter Gamble Figure 5: Pestle Analysis Framework (Source: Srdjevic, Bajcetic Srdjevic, 2012, pp.-3392) Political- The political environment of Australia largely affects Procter Gamble and its business operations (McGuigan, 2015). The government provides the necessary growth and development opportunities to Procter Gamble. However, the involvement of government for deciding the prices of its commodities can affect the profit margin of Procter Gamble. Economic- Higher unemployment and recession have considerable affects Procter Gamble. The financial position of Procter Gamble can decline due to the adverse effect of economic factors such as financial crisis. Social- Social factors like needs of targeted market and development of employee welfare has considerable effect on Procter Gamble for sustaining profit (McGuigan, 2015). Procter Gamble have to take care of their customers delights and demand for achieving success in their operations. Technological- The latest technological equipment have been used by Procter Gamble in their business operations. It has helped them in increasing the functionality of their operations and getting faster results. Legal and Environmental- Procter Gamble have to abide by the laws, rules and regulations set by Australian government. The company has started recycling of their products for supporting to the environment and dealing with their problems and issues. Conclusion Hence, it can be concluded from the report that security of Information System plays a vital role for resolving the ethical, moral and law issues of an organization. Procter Gamble has implemented Business continuation risk assessment policy for dealing with the protecting their information and data. The risk management analysis, SWOT analysis and PESTLE analysis of Procter Gamble in relation to security issues had shown that security of the strategic management and information system should be followed in an organization. Therefore, the technological development has a crucial role in business development and security operations. The security of Information System has provided different types of facilities in the organization. Hence, for all the operations in any organization, information system plays an important and crucial role for meeting the needs of customer. References Achrol, R. S., Gundlach, G. T. (2014). Network organization and systems competition: A marketing analysis.The Antitrust Bulletin,59(4), 743-768. Barel, A. O., Paye, M., Maibach, H. I. (Eds.). (2014).Handbook of cosmetic science and technology. CRC Press. Brief, A., o f Conduct, C., Policy, C. S. R., Bribery, A., Policy, C., Mix, P., ... Policy, P. A. (2016). Corporate Social Responsibility.Issues. Bull, J. W., Jobstvogt, N., Bhnke-Henrichs, A., Mascarenhas, A., Sitas, N., Baulcomb, C., ... Carter-Silk, E. (2016). Strengths, weaknesses, opportunities and threats: A SWOT analysis of the ecosystem services framework.Ecosystem Services,17, 99-111. Carrie, M., Wilshire, J. C. (2013).U.S. Patent No. 8,612,650. Washington, DC: U.S. Patent and Trademark Office. Eddy, Y. F., Gooi, H. B., Chen, S. X. (2015). Multi-agent system for distributed management of microgrids.IEEE Transactions on Power Systems,30(1), 24-34. Fang, F., Parameswaran, M., Zhao, X., Whinston, A. B. (2014). An economic mechanism to manage operational security risks for inter-organizational information systems.Information Systems Frontiers,16(3), 399-416. Gorener, A., Toker, K., Uluay, K. (2012). Application of combined SWOT and AHP: a case study for a manufacturing firm.Procedia-Social and Behavioral Sciences,58, 1525-1534. Hubin, D. C. (2014). Fractured fatherhood: An analytic philosophy perspective on moral and legal paternity.Journal of Family Theory Review,6(1), 76-90. Konik, R. P., Theuer, M. W., Venz, M. A. (2013).U.S. Patent No. 8,396,846. Washington, DC: U.S. Patent and Trademark Office. Lafley, A. G., Martin, R. (2013). Instituting a company-wide strategic conversation at Procter Gamble.Strategy Leadership,41(4), 4-9. Li, W. (2014).Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Lutkenhaus, D., de Freitas, M. N. (2016). Strategic management applied to the Six-Sigma suitability appraisal for RD in FMCG companies.Revista iPecege,2(1). McGuigan, L. (2015). Procter Gamble, mass media, and the making of American life.Media, Culture Society,37(6), 887-903. Michael, K., Byner, L. (2013). QBE's Insurance Scheme on GPS Tracking: Accuracy, Privacy, Property Accessibility. Payaud, M. A. (2014). Marketing strategies at the bottom of the pyramid: Examples from Nestl, danone, and procter gamble.Global Business and Organizational Excellence,33(2), 51-63. Sittig, D. F., Gonzalez, D., Singh, H. (2014). Contingency planning for electronic health record-based care continuity: a survey of recommended practices.International journal of medical informatics,83(11), 797-804. Srdjevic, Z., Bajcetic, R., Srdjevic, B. (2012). Identifying the criteria set for multicriteria decision making based on SWOT/PESTLE analysis: A case study of reconstructing a water intake structure.Water resources management,26(12), 3379-3393. Union, N. S. T. (2014). Code of ethics.private copy supplied by Bruce Kelloway, assistant executive director, NSTU. Ward, J., Peppard, J. (2016).The Strategic Management of Information Systems: Building a Digital Strategy. John Wiley Sons. Wolf, L. E., Patel, M. J., Williams Tarver, B. A., Austin, J. L., Dame, L. A., Beskow, L. M. (2015). Certificates of confidentiality: Protecting human subject research data in law and practice.The Journal of Law, Medicine Ethics,43(3), 594-609. Wright, K. (2014). Procter and Gamble and the Open Innovation Model. Yi, G., Smith, W. C., Ardwin, C. M. (2016).U.S. Patent No. 20,160,117,510. Washington, DC: U.S. Patent and Trademark Office. Zhu, X., Song, B., Ni, Y., Ren, Y., Li, R. (2016). Outsourcing and CrowdsourcingFrom Building All-Round Capabilities to Outsourcing and Crowdsourcing. InBusiness Trends in the Digital Era(pp. 105-121). Springer Singapore.