Tuesday, August 25, 2020
Case Study On Drug Induced Anaphylaxis â⬠MyAssignmenthelp.com
Question: Examine about the Drug Induced Anaphylaxis. Answer: Presentation Hypersensitivity is a hazardous response experienced by certain individuals when they are presented to any kind of allergen. At the point when they are presented to something they are hypersensitive to, the safe cells of the body discharges certain synthetics which can offer ascent to anaphylactic responses (Torres Blanca, 2010). Hypersensitivity is perilous and requires a prompt activity. Activating elements for anaphylactic stun incorporates food, creepy crawly stings, prescriptions, sedatives, latex, allergens like dust grains from plants, form spores, tidies, and synthetic concoctions found in beautifying agents. Now and again it very well may be some blood items (Harper et al., 2009). Anaphylactic specialists may enter the body through direct skin contact, ingestion, and inward breath. The antigens recognize the allergens as outside body. Insusceptible cells like the pole cells discharge synthetic compounds that predicament to the IgE neutralizer to offer ascent to a provocative reaction (vultaggio, 2010). Anaphylactic stuns causes vasodilatation and expands the porousness of the vessels prompting poor transfusion of the tissues. Poor tissue perfusion prompts stun (Adkinson et al., 2013). This paper centers around the anaphylactic responses because of the organization of the wide range of anti-toxin Flucloxacillin (Jenkins et al., 2009). Pathophysiology Every single individual responds to drugs in an unexpected way. A medication appropriate for one may not be reasonable for the other individual. An individual may create rashes or grow increasingly genuine unfriendly responses; o the other hand someone else may not show any such unfavorable responses. Insusceptible responses are because of the chain response that begins in the resistant response. The resistant arrangement of the body controls how a body safeguards itself from diseases. The safe arrangement of the body responds to drugs from numerous points of view. For example, in the event that a body is oversensitive to a specific medication, at that point the body recognizes that specific medication as an allergen or an antigen. The safe framework shields the body from infection. The body is so intended to battle with the contaminations and infections. During an extreme touchiness response the safe framework responds with the medications, thinking it as an outside intruder. This resistant reaction prompts irritation causing rashes, disturbed breathing, wheeziness and a lot more manifestations. Excessive touchiness responses because of medications are interceded essentially by the IgE antibodies or T cells. The response component of IgE is very much examined, yet the systems of T-cell-intervened sedate extreme touchiness are not surely known (Lieberman, 2008). Late investigations have depicted 2 ideas: the hapten/prohapten idea and the idea of associations of the anti-infection agents with insusceptible receptors (Adam, Pichler Yerly, 2011). In unfavorably susceptible medication responses, interceded by the T cells, the particularity of the T-cell receptor that has been animated by the anti-microbial might be coordinated to a cross-responsive significant histocompatibility complex-peptide compound. Hence, past contact with the medication isn't compulsory, and a safe system ought to be considered as the significant reason for extreme touchiness (Aun et al.,2014). To be sure, extremely touchy responses to xenobiotics in patients with no earlier presentation to the specialist have been depicted for the neuromuscular blocking operators and radio complexity media. In this way, the allergenic attributes of a medication being worked on ought to be evaluated by identifying its hapten like qualities as well as by distinguishing its capability to offer ascent to an invulnerable response (Dona et al., 2011). Ongoing discoveries have recommended that past contact with the medication isn't constantly required for a medication hypersensitive response, yet the responses can be clarified by the cross reactivity. Cross reactivity interceded tranquilize hypersensitivity may happen in the IgE, IgG and T cell intervened responses. The accompanying contextual investigation depicts about a medication incited anaphylactic responses. The patient was experiencing Cellulitis. On organization of the medication flucloxacillin, the patient experienced touchiness responses (Pichler et al., 2010). This demonstrates the anti-toxin directed to the patient more likely than not acted like an antigen towards the invulnerable cells of the body, and in this way the body may have created an increased insusceptible reaction. The patient has additionally built up the manifestations that are basic in an anaphylactic stun. Medication related hypersensitivity gives manifestations, for example, Retching, Dizziness, Weak or fast heartbeat, fixing of the throat, Unconsciousness, Wheezing, Rashes everywhere throughout the body. The manifestations given in the given contextual analysis is likewise like these general signs brought about by the medication incited hypersensitivity (Liew, Williamson Tang, 2009). The contextual investigation gives data an individual having cellulitis. Cellulitis is a bacterial disease that happens underneath the skin. Cellulitis can happen on any piece of the skin, generally in legs, which prompts expanding and redness. The individual is accounted for to go to the medical clinic where he was regulated with Flucloxacillin, after which he had a hypersensitivity stun. Flucloxacillin is an anti-microbial that is ordinarily managed to treat bacterial diseases like Cellulitis. According to the side effects demonstrated in the given contextual investigation it could be comprehended that the people aviation route has limited causing disturbed breathing and the veins may have enlarged, making the circulatory strain fall. Every one of these side effects line up with the general indications of a medication prompted hypersensitivity. Research facility methodology are consistently not seen as solid in the identification of the anaphylactic responses. A patient experiencing drug incited hypersensitivity ought to have elevatedplasma histamineat least inside one hour of beginning of the symptoms.Serum or plasma tryptaselevels more noteworthy than 15ng/ml, inside 12 hours of beginning is regularly utilized as a corroborative test however typically negative in food-actuated hypersensitivity (Rueff et al., 2009). Plasma tryptasemeasurements are increasingly solid that solitary estimation. Raised degree of IgE in the serum and skin tests for the allergen isn't generally dependable for understanding the medication prompted excessive touchiness reactions.Mast cell tryptaseis the research facility methodology that affirms an anaphylactic response. It is prescribed to evacuate the causative specialist of the response, in spite of the fact that it isn't generally conceivable. The underlying treatment if rewarding hypersensitivity is the organization of epinephrine (Kemp, Lockey Simons, 2008). Epinephrine IV is given in the event of serious responses. If there should be an occurrence of serious stun, the skin and the muscle may not be per melded appropriately in such a case subcutaneous or intramuscular epinephrine won't be appropriately invested in to the dissemination that is the reason type IV is given. Epinephrine has numerous deadly reactions. It can cause extreme palpitations and dyrrhythmias on the off chance that it too quick application is finished. One ought to compute the sub-cutanous or the intramuscular portion and should give just portion IV between 2 to 10 minutes, according to the earnestness of the condition (Soar et al., 2008). Contextual analysis based on ISBAR structure Recognizable proof Name of the patient-Jim Palmer Circumstance Jim Palmer is a rancher of 53 years of age He was conceded in the first part of the day with an instance of extreme cellulitis in his left lower leg. Foundation Jim Palmer is a rancher of 53 years of age He was conceded in the first part of the day with an instance of serious cellulites in his left lower leg. He was brought to the facility where he got one portion of flucloxacillin as a moderate bolus. Ten minutes after the organization of the medication he was discovered short of breath, throat blockage, sentiment of wooziness, and dazedness. On further appraisal it was discovered that the degree of obviousness is step by step expanding. It was discovered that Jim had a two-sided chest development, profundity of his breathing is shallow, and some discernible wheezing can be heard with some focal cyanosis. He is feeling amazingly sleepy and is reacting to voices. Determination Nearness of Urticarial rashes alongside expanding in his lips, fingers and toes demonstrating intense hypersensitivity responses. Past clinical history Past clinical history doesn't show any such unfavorably susceptible responses. Appraisal Indispensable signs-Resps 26 bpm, B.P-99 mm Hg systolic on palpitation, internal heat level 37.4?, SaO2 91% on RA, cool and moist peripherals, Capillary top off planning is more noteworthy than 4 secs, Urticarial red rashes, growing of lips, toes, Blood glucose-5.3 mmols/liters. Current medicine The patient is directed with two portions of Flucloxacillin 1gram IV is given. Suggestions The patient is giving continuous indications of disintegration. His visibilities and reaction to voices are diminishing progressively. So will be better that a prompt move is made. It is prescribed to begin the underlying treatment with a low portion of Epinephrine. It is prescribed to check the Serum or plasma tryptaselevels. A level more prominent than 15ng/ml, inside 12 hours of beginning is regularly utilized as a corroborative test for the hypersensitivity responses. Ends Anaphylactic responses in view of the use of anti-infection agents have expanded in recurrence in light of the boundless utilization of the pharmaceuticals. Hypersensitivity is extremely touchy responses caused because of the arrival of the go betweens of basophils and pole cells by the IgE. Anaphylactic responses vary from patient to tolerant, so affectability of one patient to a specific allergen probably won't coordinate with the other patient. Anaphylactic responses are perilous sometimes. In this way not many things must be kept into brain to evade hypersensitivity. It is very importan to be familiar with the patients clinical history. Care ought to be taken by the attendants and the human services suppliers to give medications like - lactams, non steroidal calming drugs, anasthetics, radio complexity media, latex and some more. Straightforward techniques help in forestalling hypersensitivity, which includes the course through which the medication has been directed, understandin g ID with recently known history of anaph
Saturday, August 22, 2020
A Mother-Daughter Relationship Essay
The distribution had the rarest of possibilities and obviously, a touch of karma, to have the pleasure of perusing from Mrs. Jane Bingley passage at her home close Longbourn. We have come to talk with the previous Ms. Bennet about her mom, who unfortunately spent away five years prior after a time of sick wellbeing. In the wake of being provided by a liberal measure of tea and desserts, Mrs. Jane Bingley was more than pleasing. She had invited us generous into her home and had concurred half a month prior to direct this meeting. Plainly, there were some uncertain issues before their motherââ¬â¢s demise. I asked whether there were some particular issue. Truly, the entire undertaking was a disaster. Men came walking around our garden, some high-society individuals, right old showoffs coincidentally, and obviously my mom, who I daresay was in everything. In reality, it was a significant disaster for the Bennet family. Miss Jane Bennet-Bingley was the oldest of five offspring of the Bennet family. Their mom, as she describes, was exceptionally fixated on achieving her self-sworn obligation to see every one of her little girls to get hitched. She used to send my sisters and me to parties, and such. It was the well known activity in those days and therefore turned into an image of social height. We were simply white collar class, or all the more properly, wanted to wait between in the center with humble social affiliations. This end up being a factor toward their relationships which, by a cases, was incited by a high-class society part: the late Lady Catherine. She was haughty, much the same as any blue-blood in those days. She particularly gave my sister, Lizzy (Elizabeth) a difficult time since her significant other was a nephew of hers. She didn't need a type of low-class society young lady with his very much reproduced nephew. However, at that point, the manner in which things turned out amazed everyone, including me. About my motherââ¬â¢s character (with articulation of fleeting delicate satisfaction), I didn't detest nor disdain my mom. My dad would presumably hate at the idea, however on the other hand, my dad talked close to nothing. He thought about us and for the family without a doubt yet he would simply sit in some cases in his examination and let our mom do all the talking. Mrs. Bennet was a lady of mean seeing, little data, and unsure temper. At the point when she was unhappy, she liked herself apprehensively. An amazing matter was to get her little girls wedded; its comfort was visiting and news (Austen). Mrs. Bennetââ¬â¢s proudest second would be the marriage of her two little girls, Jane and Elizabeth, to both good and persevering men. We had our own marriage. My mom didn't have any piece of it; however I like to imagine that she tried to put forth for every other person that she had a piece of it ââ¬Å"on our marriageâ⬠. She was consistently fastidious, kind to individuals, particularly our spouses. She took a stab at everything to place us in our great name, just to get hitched. Without a doubt, the economic wellbeing during Mrs. Bingleyââ¬â¢s time was fixated on the possibility that ladies had just a single objective in their livesââ¬that is, to get hitched. Very ridiculous really; in evolving times, the status of ladies have raised to an increasingly recognized level. Be that as it may, my mom, on the off chance that she were alive today, would not get that. Mrs. Bingley, as per their portrayal, lived to see her girls wedded with no introduction or thought for their emotions. Her fixation for marriage blinded her genuine nature. She was a decent mother however; she never neglected to maintain her obligation as my fatherââ¬â¢s spouse or our mom. I was in reality shocked that my dad didn't respond so that he was disappointed with my motherââ¬â¢s conduct in those days. In any case, I guess it was extremely simply her inclination to be so. To immediately advance a comment, I didn't care for the manner in which my mom took care of our issues when she was as yet alive. She regularly humiliated us and the family with her pointless endeavors of raising the name of the family despite the fact that it wasnââ¬â¢t required. She was abundantly worried about the manner in which we form ourselves that she had begun to overlook her own conduct. She acted like most moms would do, however in an alternate case. Furthermore, on the off chance that she didn't do what she did, I may at present be single in any case. We adored her we despite everything do. Reference Austen, J. (1995). Pride and Prejudice.
Sunday, August 9, 2020
Career Services Recruiters Guide COLUMBIA UNIVERSITY - SIPA Admissions Blog
Career Services Recruiters Guide COLUMBIA UNIVERSITY - SIPA Admissions Blog When describing SIPA to prospective applicants I will often say that SIPA is not an employment agency, however it is our job as a school to produce graduates that are prized in the policy marketplace. Our curriculum is designed to equip graduates with the tools and skills that are desired by organizations in all sectors public, private, and nonprofit. The Office of Career Services (OCS) plays an important part in the development of our students. OCS is responsible for running our professional development classes and assists students with resume and cover letter writing along with interview training. The OCS mission extends beyond student development and includes extensive outreach to employers. This includes site visits to employers, setting up recruitment opportunities at SIPA, hosting an annual career conference in Washington DC, and posting internships and jobs available to SIPA students and alumni. Newly admitted students will have the opportunity to begin working with OCS during orientation. As a short preview of the outreach that OCS performs, click here to view the OCS Recruiters Guide (PDF document).
Saturday, May 23, 2020
Textual Critical Problems Of The Old Testament - 845 Words
Deuteronomy 32:8 and Genesis 49:10 are two examples of textual critical problems in the Old Testament. The phrase ââ¬Å"sons of Godâ⬠will be examined in Deuteronomy 32:8, and the word ââ¬Å"Shilohâ⬠in Genesis 49:10. These issues have caused much debate as to how one should interpret these verses in light of the textual critical problems. This paper will examine both passages and provide solutions to each of the textual critical issues. Deuteronomy 32:8 Deuteronomy 32:8 has caused controversy because of the phrase à Ãâ¢ÃâÃÅ"à Ãâ¢Ã Ãâ or à Ãâ¢ÃÅ"à Ãâ¢Ã Ãâ ââ¬Å"sons of God.â⬠Some have postulated that this reading renders the Israelite religion to be polytheistic instead of monotheistic. Therefore, translators have changed the Scripture to read ââ¬Å"sons of Israelâ⬠(NIV, NASB), ââ¬Å"children of Israelâ⬠(KJV), or ââ¬Å"people of Israelâ⬠(HCSB). Dr. Heiser has persuasively argued that the translation ââ¬Å"sons of Godâ⬠is the correct reading of the original Hebrew text, and should be translated that way in our English Bibles for a number of reasons. A few examples will be examined to show that ââ¬Å"sons of Godâ⬠is the correct translation of Deuteronomy 32:8. First, manuscript evidence is crucial when interpreting a text that has caused there to be textual criticism. There are more manuscripts that interpret Deuteronomy 32:8 to read ââ¬Å"sons of Israel,â⬠but that does not mean that should be the correct translation. Dr. Heiser makes it clear that one cannot determine the meaning of a text by the number of manuscripts. One must evaluateShow MoreRelatedEssay on The Old Testament Law1260 Words à |à 6 PagesIntroduction The Old Testament law is seen as irrelevant by most modern Christians today. Christians are now under the blood of Jesus Christ, which is said to abrogate the Law. Galatians 6:2 says, ââ¬Å"Bear one anothers burdens, and thereby fulfill the law of Christâ⬠(NASB). The law of Christ is to love God and your neighbor as yourself (Matthew 22:36-40). This does not mean, however, that the Old Testament Law does not apply to Christians today. Author J. Daniel Hays expounds on this topic in hisRead MoreThe Bible Is The Only Truth1574 Words à |à 7 Pagesonly truth, ââ¬Å"The Word of God.â⬠I was encouraged to not put my trust in men, because men will always make mistakes, but trust in God, because he is perfect. I solemnly believed that in order to trust in God, I had to obey the Bible. When I was 18 years old, I became a volunteer translator for a non-denominational American religious organization in Brazil. During that time, I visited hundreds of churches in many Brazilian s tates. American missionaries founded most of the churches in Brazil. During my firstRead MoreThe Question Of Canon As A Good Deal Of Modern Day Biblical Scholarship Essay1199 Words à |à 5 Pagesto the development of the canon. This chapter contends that early Christian beliefs led to an encouraging environment for the development of the New Testament Canon. Most especially early Christians trusted that Jesus Christ brought the fulfillment of a new divine message that was expected to accompany the Messiah as anticipated in the Old Testament. Second, early Christians trusted that Jesus introduced the new covenant and that this brought about an expectation of a written text. Lastly, becauseRead MoreChristian Doctrine And The Doctrine Of A New Testament909 Words à |à 4 PagesPolemicists raised up to defend the faith. Their reaction by concern church fathers against the action of the heretic let to the development of Christian doctrine and the formulation of a New Testament Canon. They fought the heresies that were damaging the church. In refuting error, they used much of the New Testament as the source of the true doctrine. The work of the Polemicists also gave rise to the concept of an orthodox catholic church which was opposed to heresy. While most of the Apologists wereRead MoreEssay on The Historical Critical Method2026 Words à |à 9 PagesThe New Testament is now well over 1900 years old and for nearly the same period of time people have struggled for the right interpretation of that what was written in these 27 books and letters. How should one handle a book that is Gods Word? Before looking at the pro and contra of historical-critical exegesis it is necessary to define this method. One of the many textbooks teaching the historical-critical method Methodenlehre zum Neuen Testament by Wilhelm Egger method gives us this definitionRead MoreGeneral Principles of Hermeneutics and Exegesis1926 Words à |à 8 Pagesdocuments , whether it is an Epistles , from the Gospels , Acts or from Revelation. Each of these literary genres requires addition exegetical consideration. Yet all of the steps do not apply equally to all New Testament passages. Some passages, for example, present no major textual problems; others are seriously problematic.6 Also to be considered along this is the nature of the Sentence if it is simple with one main clause, compound with two main coordinate clauses or complex with main clause withRead MoreEssay about How to Read the Bible for All Its Worth2583 Words à |à 11 Pagesprofessor of New Testament studies at Regent College. He has authored several New Testament commentaries and is the general editor of the New International Commentary series. Fee has also contributed significantly to the field of hermeneutics and NT textual criticism. The author is a well known teacher and conference speaker who has a burden to see the renewal of the church. Stuart is a seminary professor at Gordon-Conwell Theological Seminary where he teaches Old Testament studies. He also hasRead MoreAnalysis Of Dei Verbum, The Second Vatican Council s Dogmatic Constitution On Divine Revelation2186 Words à |à 9 Pagesthe basis of all Christian doctrine. The present constitution touches upon the age-old question of the relationship between Scripture and Tradition. It also clarifies teaching about the authenticity and inerrancy of Holy Scripture, in light of modern developments in exegesis and criticism. Thus DV is a synthesis of enormous significance: the text binds together loyalty to church tradition with the yes to critical science, and there by once again opens the way for faith into the world today â⬠¦Ã¢â¬ ¦. DVRead MoreExegesis of 1samuel 172247 Words à |à 9 Pagesvery much interested on the issue of social. In 1970 they were uses of the social criticism methods from variety of situations, and especial the one of sociology , which stress the life between social behavior of the people during the time of the old testament. Which has emerged is how scholars might have access to the ancient past and the multifaceted social world of ancient Palestine and the Mediterranean. The quest of the social world of the bible Those who were travelling from the east theyRead MoreWhat Are Source, Form, And Redaction Criticism?1940 Words à |à 8 Pagesââ¬Å"demythologizedâ⬠in order to be accepted by modern society. A strength of form criticism that I see is the amount of proven accuracy that the Jewish scribes put in to writing their texts. The Old Testament text and the Dead Sea Scrolls were practically identical even though they were written at different periods of time. The problem that I can point out with source criticism is the theory of many critics the ââ¬Å"Q documentâ⬠. Used to describe similarities within the Gospels of Matthew, Luke and Mark. The theory
Tuesday, May 12, 2020
Impact of Student Loans - 1093 Words
It is no big secret that, in America today, most high-paying jobs require a college degree. Thomas C. Frohlich of USA Today stated that ââ¬Å"graduating from college is a prerequisite for the vast majority of high-paying jobsâ⬠(2013). With the cost of a college degree increasing in unison with demand, few can earn a degree without the help of student loans. The American Student Assistance website reports that of the twenty million students enrolled in college, about sixty percent are attending with the help of student loans (2014). Obviously, student loan debt affects the individuals that obtain them. However, it also has severe effects upon the nationââ¬â¢s economy. Recently, CNBC broadcasted a documentary program entitled ââ¬Å"Price ofâ⬠¦show more contentâ⬠¦As time passed, she was unable to keep up with her college loan payments and got a deferment. Last year, my friend took a higher paying job as a security guard - a job for which she needed no college education. When my friendââ¬â¢s deferment recently ended, she found that she now owed $115,000 due to interest, and that the interest would keep right on accruing until the loan was paid in full. My personal decisions about attending college and how to pay for it were made after a lot of research on my part. I do have student loans, but only in the least amount needed to get my degree. I receive loans in the amount of $3000 per semester and am attending nursing school. Once I obtain my degree and graduate, I will begin seeking a job immediately as a nurse and will earn a minimum of $75,000 per year. I will also be working in a field and for an institution that qualifies for me for a grant that could pay up to 50% of my student loans off. Although I do understand that there is always the risk of not being able to find a job, I think that my research into career options will pay off in the end. All things considered, I think that because of the great demand in field I am planning to work in, and because of help from grants, I will be able to pay back my student loans. I am proud of the decision that I made and think that it will be a beneficial step in my life. I do believeShow MoreRelatedThe Cultural And Global Impact Of College Tuition And Student Loan Debt1442 Words à |à 6 PagesThe Cultural and Global Impact of College Tuition and Student Loan Debt Introduction College debt is quickly rising as more students pursue a postsecondary education. Tuition is growing at a rate higher than inflation, thus forcing many students to make up the gap between income and tuition through loans (Houle). However, cultural factors must be considered before a young adult makes a decision about higher education. The type of postsecondary education one pursues, if any, is determined by manyRead MoreA College Education Is Not Only An Absolute Requirement1253 Words à |à 6 PagesToday, students and graduates face long lasting consequences when it comes to student loan debt, which in recent years has become increasingly problematic and inevitable regardless of the precautions a student takes. No amount of awareness or understanding can change the lasting impacts that taking out student loans has. Pursuing a college education today, is nothing like it once was or once promised to be. Before, getting a degree meant an almost guarantee to find a good paying, stable job. NowRead MoreFinancial Risk Of Higher Education Essay1702 Words à |à 7 PagesAmericans rely on both private and federal student loans to finance college. The issue with this is the liability that comes with student loans. Borrowing money seems to be the American way, from credit cards, to house and car mortgages, to student loans, but is this method a worthwhile investment in oneââ¬â¢s future, or is it a financial disaster? Both ââ¬Å"The Remediation of Higher Education and the Harm of Student Debtâ⬠by Jeffery J. Williams and ââ¬Å"Student Loans: Are We Getting Our Moneyââ¬â¢s Worth?â⬠by WilliamRead MoreDebt As A Huge Stress Factor Among America s Society998 Words à |à 4 Pagesmany individuals within Americaââ¬â¢s society. Student loans have a tremendous impact on younger individualââ¬â¢s lives and can affect their futures as well. Many individuals are unable to live normal lives, and are rather trapped with debt serving as a burden on their shoul ders. Student loans affect about thirty-seven percent of individuals in America. For many students financial aid or private loans are the only source of payments for a higher education. Student debt inhibits graduates from spending moneyRead MoreEssay Student Loan Debt Relief1460 Words à |à 6 PagesStudent Loan Debt Relief Student loan debt relief is a controversial issue in America today. Student loan debt affects twelve million college students, roughly 60% of all college attendees, per year (Student Loan Debt Statistics). Student loan debt relief rose to the forefront of economic news during the financial market crash of 2008. The U.S. Government has developed a debt relief plan that extends payments over a 25-year period, with a full forgiveness of all remaining debt at the end ofRead MoreStudent Loan Debt And Education1082 Words à |à 5 Pagesoday, society stresses the importance of postsecondary education to students due to the countless ways that an associates, bachelors, masters, or doctorate can enhance an individual future. For an individual to reach financial security in the United Statesââ¬â¢ economy it is basically mandatory that they have received a college degree. Postsecondary education will provide skills and knowledge that will prepare individuals to be successful within their career as they compete for leading positions. OverallRead MoreEducation Debt: The Problem and Solutions Essay1125 Words à |à 5 Pages With the ever-increasing tuition and ever-tighten federal student aid, the number of students relying on student loan to fund a college education hits a historical peak. According to a survey conducted by an independent and nonprofit organization, two-thirds of college seniors graduated with loans in 2010, and each of them carried an average of $25,250 in debt. (Reed et. al., par. 2). My research question will focus on the profound effect of education debt on American college graduatesââ¬â¢Read MoreStudent Loans And Student Loan Debt898 Words à |à 4 Pagestelevision. Unfortunately, at a staggering $1,200 per month in student loan repayment debt partly because she was misinformed of the terms of her student loan (55). Debt is foreseeable but student loan debt can leave borrowers distraught at the mere thought of the unrealistic terms (Hillstrom 55). All students entering college need to be aware of student loans and how they impact the future; either negatively or positively. For some students, a college degree is the key to success but for others theRead MorePros And Cons Of Student Loan1256 Words à |à 6 PagesApplebaum laments that from the student loan industry point of view, the student debt is there to help the loan providers amass funds from the youngest, economically vulnerable and financially unstable of which graduates form the majority. The loans have come with immense opportunity cost as the ââ¬Å"educated poorâ⬠are not able to buy homes, invest or innovate, start businesses or engage in economically viable activities while the few up the echelons of power are benefiting. Tuition rates have escalatedRead MoreStudent Loan Loans Should Not Be Educational Opportunities For Disadvantaged Students1552 Words à |à 7 Pagesi. Student-loan defaults in China In the context of entering the mass higher education stage, the ideology of cost-sharing and equity in higher education is now widely accepted as a must-do in China, and there is a tradeoff in which colleges can charge tuition fees in exchange for better financial aids to students from disadvantaged groups. Thus, implementing a student-loan scheme to ensure educational opportunities for needy students is the primary choice for the Chinese government. Nowadays the
Wednesday, May 6, 2020
Jean Watson Free Essays
Jean Watsonââ¬â¢s Theory of Human Caring Heidijo Elyea Olivet Nazarene University Theoretical and Professional Foundations of Nursing MSN SP2013 NRSG-653-54 Theresa Williams March 19, 2013 Certification of Authorship: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledged and disclosed in the paper. I have also cited any sources from which I used data, ideas, or words, either quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for the purpose of this assignment. We will write a custom essay sample on Jean Watson or any similar topic only for you Order Now Your Signature: _____Heidijo Elyea____________________________ Jean Watsonââ¬â¢s Theory of Human Caring Jean Watsonââ¬â¢s Theory of Human Caring focuses on holistic care of the patient and understanding the power of a meaningful therapeutic relationship. The theory is a middle-range theory and is based on the role of care and the influence of caring on healing. Caring is a moral ideal of nursing that involves mind, body, and soul engagement with another, which can be expressed through nursing interventions (Chinn Kramer, 2011). Many nurses have adopted Jean Watsonââ¬â¢s Caring Theory in their own practice. Nursing has a commitment to protect, enhance, and preserve their clientââ¬â¢s humanity by helping them restore harmony. Caring moments should transform both the patient and nurse, as they are linked together. Educational History Jean Watson earned her BSN, MS, and PhD degrees all at University of Colorado. She was also the former dean in the College of Nursing and founded the Center for Human Caring (Parker Smith, 2010). Watsonââ¬â¢s undergraduate and graduate degrees are in nursing and mental health nursing. Her PhD is in educational psychology and counseling. Jean Watson also serves as director of the Watson Caring Science Institute, which is a nonprofit company she founded and is dedicated to promoting the work of caring, science, and heart-centered nursing (Parker Smith, 2010). Overview of Theory of Human Caring Major Elements There are four major elements in Jean Watsonââ¬â¢s Theory of Human Caring. The four elements are the ten carative factors/clinical caritas processes, transpersonal caring relationships, caring moment/occasion, and caring-healing modalities. Carative factors are a guide and process in which a person cares for another and does all they can to protect, support, enhance, and maintain his or her quality of life. Transpersonal caring is a time when the nurse and patient come together and has an influence on each other. Caring should not be done as a chore as an assignment as it is an ethical deliberate action. Caring moments occur when two people come together with one person being the care recipient. Watson also developed the concept of clinical caritas that evolved from carative factors. Caritas means to cherish and expands on the relationship between caring and healing for self and others (Parker Smith, 2010). Original Carative Factors Dr. Watson started her theory with ten carative factors, which she later evolved into clinical caritas processes. The ten factors are: 1. Formation of a humanistic- altruistic system of values. 2. Instillation of faith-hope. 3. Cultivation of sensitivity to oneââ¬â¢s self and to others. 4. Establishing a helping-trusting relationship, human caring relationship. 5. Promotion and acceptance of the expression of feelings, both positive and negative 6. The systematic use of a creative problem-solving caring process. 7. Promotion of system and subjective life world of self and one being cared for. 6. Systematic use of a creative problem-solving caring process becomes transpersonal teaching-learning. 8. Provision for a supportive, protective and /or corrective mental, physical, societal, and spiritual environment. 9. Assistance with the gratification of human needs. 10. Allowance for existential-phenomenological-spiritual forces. Parker Smith, 2010) Clinical Caritas Processes Watsonââ¬â¢s evolved carative factors became clinical caritas processes evokes a way for nurses to be more open and adds a spiritual touch to the relationship. The clinical caritas processes are: 1. Formation of humanistic-altruistic system of values becomes the practice of loving kindness and equanimity within the context of caring consciousness. 2. Instillation of faith-h ope becomes being authentically present, and enabling and deep belief system and subjective life world of self and one being cared for. 3. Cultivation of sensitivity to oneââ¬â¢s self and to others becomes cultivation of oneââ¬â¢s own spiritual practices and transpersonal self, going beyond ego self, opening to others with sensitivity and compassion. 4. Development of a helping-trusting, human caring relationship becomes developing and sustaining a helping-trusting, authentic caring relationship. 5. Promotion and acceptance of the expression of positive and negative feelings, becomes being present to, and supportive of the expression of positive and negative feelings as a connection with deeper spirit of self and the one being cared for. 6. Systematic use of a creative problem-solving caring process becomes creative use of self and all ways of knowing as part of the caring process; to engage in artistry of caring- healing practices. 7. Promotion of transpersonal teaching-learning becomes engaging in genuine learning experience that attends to unity of being and meaning, attempting to stay within otherââ¬â¢s frame of reference. 8. Provision for a supportive, protective, and/or corrective mental, physical, societal, and spiritual environment becomes creating healing environment at all levels (a physical and nonphysical, subtle environment of energy and consciousness, whereby holeness, beauty, comfort, dignity, and peace are potentiated). 9. Assistance with gratification of human needs becomes assisting with basic needs, with an intentional caring consciousness, administering ââ¬Å"human care essentialsâ⬠, which potentiate alignment of mind-body-spirit, wholeness, and unity of being in all aspects of care, tending to both embodied spirit and evolving spiritual emergence. 10. Allowance for existential-phenomenological-spiritual forces becomes opening and attending to spiritual-mysterious, and existential dimensions of oneââ¬â¢s own life-death; soul care for self and the one-being-care-for. Parker Smith, 2010). The first three carative factors form the ââ¬Å"philosophical foundationâ⬠for the science ofà caring. The remaining seven carative factors spring from the foundation laid by these first three (Parker Smith, 2010). Implications of the Caring Theory Jean Watson feels her theory can be considered a ââ¬Å"philosophical and moral/ethical foundation for professional nursing and part of the central focus for nursing at the disciplinary levelâ⬠(Parker Smith, 2010). The theory offers a framework that encompasses the arts, sciences, humanities, spirituality, and evolving dimensions of holistic medicine and nursing. The model is an invitation to work together and experiment with the ideas and the philosophy. Watson offers up several questions to assess where we are as nurses within the framework of the Caring Science. â⬠¢ Is there congruence between the values and major concepts and beliefs in the model and the given nurse, group, system, organization, curriculum, population needs, clinical administrative setting, or other entity that is considering interacting with the caring model to transform and/or improve practice? What is oneââ¬â¢s view of human? And what it means to be human, caring, healing, becoming, growing, transforming, etc. Such thinking in regard to this philosophical question can guide oneââ¬â¢s worldview and help to clarify where one may locate self within the caring framework. â⬠¢ Are those interacting and engaging in the model interested in their own personal evolution? Are they committed to seeking authentic connections and caring-healing relationships with self and others? Are those involved ââ¬Å"consciousâ⬠of their caring caritas or noncaring consciousness and intentionally in a given moment and at an individual and system level? Are they interested and committed to expanding their caring consciousness and actions to self, other, environment, nature and wider universe? â⬠¢ Are those working within the model interested in shifting their focus from a modern medical science-technocure orientation to a true caring-healing-loving model (Parker Smith, 2010)? Strengths and Limitations Jean Watsonââ¬â¢s theory has many strengths, as it is logical, generalizable, and relatively simple. The theory is based on phenomenological studies that ask questions rather than state hypotheses and can be used to guide and improve practice. Supported by the theoretical work of numerous humanists, philosophers, developmentalists and psychologists. This theory places the client in the context of the family, the community and the culture and places the client as the focus on practice rather than the technology. Limitations of Dr. Watsonââ¬â¢s theory are few, but the main limitation is that the carative factors primarily address the psychosocial needs. The physical and biological needs appear secondary. Conclusion Watsonââ¬â¢s theory provides many useful concepts for nursing practice. She also ties together other theories used in nursing education. The ten carative factors and caritas processes provide guidance to nurses wishing to improve their nursing practice. References Chinn, P. L. , Kramer, M. K. (2011). Integrated knowledge development in nursing (8th ed. ). St. Louis: Mosby. Parker, M. , Smith, M. (2010). Nursing theories nursing practice 3rd ed. ). Philadelphia: F. A. Davis Company. How to cite Jean Watson, Papers
Saturday, May 2, 2020
Management Information Systems Business Operations
Question: Discuss about the Management Information Systems for Business Operations. Answer: Introduction Technology has been in a state of development since the last decade. The business operations of the company has also been promoted and developed due to the change in information technology (Barel, Paye, Maibach, 2014). In the present business world there are number of ways by which security of information and data could be managed. Procter Gamble Company has been selected for developing ways for security of the information system. This report contributes to the analysis of the different ways the security of information system can help an organization. The methods for securing information system have been shown in this report. The Security of Procter Gamble Company has enhanced the business sense of the company. Outsourcing and Social networking services has provided platform for getting access to media news and media is capable of trolling the company. Hence it is important for forming policies to prevent security issues. Analysing Security issues for forming policies of Procter Gamble Security issues of Procter Gamble The Security is the most dominant part of information technology management. The security issues of Procter Gamble Company can be classified into two major causes outsource of information and social sites (Barel, Paye, Maibach, 2014). Outsourcing has been developed over the years in Procter Gamble. It has enhanced the business sense of the company. It involves third party for processing the hard core information of the company. Payrolls and call centres act as outsourcing sectors. Procter Gamble hands over the private and secured data to these sectors. The outsourcing companies store these data over the cloud network. The access may lead to misuse of these confidential and private data (Zhu, et al., 2016). The sensitive information like salary, manufacturing cost, taxes and many more could fall into wrong hand if proper care is not being taken. Social networking services such as twitter and Facebook has become the major source internet engaging (Achrol Gundlach, 2014). It has become the source of communication and connections among customers and Procter Gamble Company. The business operations are at great risk due to the divulging of confidential business information. The organisation has disallowed the social sites from accessing the companys resources. However the internet has provided platform for getting access to media news and media is capable of trolling the company (Zhu, et al., 2016). It is littered with stories of bullying people. Hence it is important for forming policies to prevent security issues. Principles of Securities policies Procter Gamble has to form policies and measure for securing their data and information. It is very difficult for forming means to protect and secure data and information from misuse (Achrol Gundlach, 2014). However, some principles of policies would help Procter Gamble for forming preventive measures to the security threats. They are availability, confidentiality, and integrity. Availability refers to principle of interrupted access of all the required information within the organization. Confidentiality stands for the fact that all the informational resources must be given access to only one authorised person (Wolf et al., 2015). Integrity means that the authorized person should only be allowed to modify and change the information. Threats, Vulnerabilities and Control in Procter Gamble Security issues of an organization can be dealt by understanding each of them on an individual level. They are threats, vulnerabilities and controls (Wolf et al., 2015). Threats are set of situations that could result in harming the operations of the company. Vulnerabilities are some specific weakness of the company. These weaknesses are flaws in security system, fault in designing and lack or protection. Procter Gamble would have to deal with each type these faults for forming the best possible security measures of protecting their information and data. Threats of Information system in Procter Gamble Some major threats that have crucial effect on Procter Gamble are explained below in the table. Removal Process of threat Description Interception It is the way by which external person gets in the information system of Procter Gamble. The block in network would deny the entry of person, program, or any system in information system of Procter Gamble (Lafley Martin, 2013). However the direct copying or tapping of the information could be done by intercepting the unauthorized entry with the help of fake authentication process. Modification It is a progression of the Interception part of threat resolving process. In case of unauthorised entry, the information and data stored could be tampered and changed. As for example, database modification and transmission data could be hacked and changed by the rival company of Procter Gamble (Konik, Theuer Venz, 2013). Interruption It occurs when Procter Gamble loose the access to their resources. Hardware theft and program bugging are examples of interruption in information system (Konik, Theuer, Venz, 2013). The data and information of Procter Gamble may also be deleted accidentally and it would also result in hindering the progress. Fabrication It refers the counterfeit objects within the information system of Procter Gamble. The malicious programs, bugs and spurious entry in data sheet would hinder the progress of the company. According to Yi, Smith, Ardwin, (2016), Keystroke logging is also a major cause for affecting the security system of Procter Gamble. Table1: Threats that affect Procter Gamble (Source: Lafley Martin, 2013, pp.-8) Vulnerabilities could be either technological or person dependent. In organizations, the data breach and security breaker are mostly oriented from people. It has been seen that the misuse of the resources of company or deliberate fraud to the company are the major vulnerabilities of the company (Wright, 2014). The technological vulnerabilities of Procter Gamble could be termed as the flaw in the planning and designing of the security system. It has made getting into the network of the company easy for the external people. Some examples of technological vulnerabilities include buffer overflow and denial of service. Buffer Overflow: In buffer overflow, the attackers target the application that is not multitasking (Carrie Wilshire, 2013). Hence it becomes easy to overflow the services of the application by attacking that particular application. Security controls are the methods and tools that can be used for mitigating the risk of vulnerabilities. It can be classified as detective, preventive or responsive. The presentive security control acts as a safeguard rather than detection model. Policies of Information security in Procter Gamble The policies for security of information and data in Procter Gamble have six essential components. They are objectives, audience, purpose, exceptions, policy, and disciplinary action. 1. Objectives are the clearly stated aims of Procter Gamble while forming the policies (Wright, 2014). The security of the information is the main reason behind the formation of policies. 2. Audience is used for defining the underlying scope of Procter Gamble and the audience affected by the policies. 3. Purpose has been used for noting and pointing out the reasons for the existence of policy in Procter Gamble. 4. Exceptions clearly state the terms and condition when the formed policies would cease to work. In some extreme cases these policies would not be valid for application in Procter Gamble. 5. Policy defines the actual policy that has been made up to deal with the security issues in Procter Gamble (Payaud, 2014). 6. Disciplinary actions are the set of action and consequences that one has to face if any of the policies made in Procter Gamble would be broken. Analysing ways for improving security measures in Procter Gamble Understanding the security lax: it is very important for understanding the weakness of the information system (Fang et al., 2014). If the designer does not know the errors of the design, he or she would not be able to protect their system from external hack. Hence understanding the flaws of the security system is very crucial in Procter Gamble. Prototypes of the information system design should be checked for gathering intelligence on the flaws of the design. Confidentiality of information: The information system of Procter Gamble should maintain its confidentiality for operations from external users. The computer system of Procter Gamble should maintain the protocol of authentication for allowing anyone through the security wall. The authentication process can be divided into two stages identification and authentication (Fang et al., 2014). Identification is the process by which the information system verifies that legitimate user. If anyone else would try to get into the network, the system would not allow the access to information and data. It can be done by deploying password protection and question and answer options. Business continuity assessment policy: Procter Gamble can form the business continuity assessment policy for 1. Understanding the impact of interruptions in the company 2. Calculating the tolerance of system down, on system by system basis 3. Priorities of the business at those situations 4. Resource requirements for restoring critical business process (Payaud, 2014) Sample risk assessment policy of Procter Gamble for information security Section P [Procter Gamble] Information security Effective date: Sub head Risk assessment of Information security Change controlling factor #: Policy Authentication and Password protection Approved by: Objective To control the security of information, Procter Gamble would form the authentication and password protection in the company. Purpose This policy would ensure that the information system of Procter Gamble would be limited to authorised use (Union, 2014). The risk of data breach and information infiltration could be minimized. Audience It is applicable to all the employees, customers, managers, and stakeholders of Procter Gamble. Policy The information technology team would form designs for increasing the security of the information of Procter Gamble (Li, 2014). Threats to the information system would be analysed and their probability of occurrence would be reduced. Disaster preparation would anticipate the methods for sorting the problems caused by the data leak and information misuse. Contingency planning would be helpful in forming a surrogate planning when the first plan for implementation fails to procure the desired result (Sittig, Gonzalez Singh, 2014). Exceptions None Disciplinary actions Violation of the policy would be dealt with stern and strict actions. Legal prosecution would be taken by Procter Gamble against such actions under civil and criminal laws (Li, 2014). The employees would be terminated and interns and volunteers would be dismissed from the service. Table 2: Risk assessment policy of Procter Gamble (Source: (Sittig, Gonzalez Singh, 2014, pp.- 803) Ethics, law and morality of information system in Procter Gamble It is important for maintaining the operations of the business without affecting the moral values of the company. Procter Gamble would have to maintain their information system Figure 1: Comparison of Moral and Legal activities (Source: Hubin, 2014, pp.- 89) Normative framework of business ethics in Procter Gamble The ethics refer to the science of society. It helps people for socializing and surviving among the people. It promotes the survival of culture, society, individuals, civilizations, and business (Hubin, 2014). The ethics of business consist of interactions among the firms, industries, society, individuals, and state. The ethical theory is helpful in sorting out the ethical issues of Procter Gamble that may be seen in their operations. The ethical issues of a business organization can be dealt by understanding PAPA acronym (Michael Byner, 2013). PAPA stands for privacy, accuracy, property, and accessibility. Privacy concerns with the ability for protecting their information from external. Accuracy is the concept of providing and achieving correct values and information in business operations. Property is the data and information collected by an individual. That individual would be the owner of it (Michael Byner, 2013). However in case of corporations, the company who has paid for the information could counter claim the property. Accessibility is process of making data available for all the potential users. Code of Ethics and Corporate social responsibility in Procter Gamble The recent awareness among people for the ethical issues in information system has caused growth of code of ethics or conduct or practice in them. The complete ethical treatment is used for understanding the applications of information system (Union, 2014). The society allows the existence of separate entities for the owners of Procter Gamble. The economy of the company is huge and it has caused people for expecting large from the company. CSR helps in initiating two fold aspects of strengthening the business and contributing to the society (Brief et al., 2016). Procter Gamble pursues CSR for reflecting the personal interests of senior executives. In the supply chain model, CSR participates for forming partnership with community groups. The three pronged approach of CSR are Consolidation of CSR efforts- the time of operations is limited and it is very hard to save them Understanding the benefit- Spending the time for strategising the approach Finding the partners- Selecting partners for mutual benefits Sustainability in Procter Gamble- Sustainability is very important for Procter Gamble from operational point of view (Brief et al., 2016). It involves ensuring the resources of the company. Information System governance in Procter Gamble The Chief information officer plays a crucial role for providing leadership in technology implementation and business operations in Procter Gamble. The management structure of Procter Gamble can be understood by analysing the four major Information system management structures. Figure 2: Four major Information system management structures (Source: Eddy, Gooi Chen, 2015, pp.- 33) SWOT Analysis of Procter Gamble and relating it to Security issues Figure 3: SWOT analysis of Procter Gamble (Source: Lutkenhaus de Freitas, 2016) Strength- The strengths of Procter Gamble have been greatly influenced by the Management Information system (Bull et al., 2016). The use of e-commerce and latest information system has helped them in achieving market position and brand image. However, the security flaws in their information system might cause Procter Gamble loss of a considerable amount of market name. Weakness- The information system has helped Procter Gamble in expanding their scale of operations. It has resulted in slower operations in Procter Gamble (Bull et al., 2016). Due to the use of latest information system, Procter Gamble might see data and information theft in their operations. It would cost them large amount of operational costing loss. Opportunities- The information system used by Procter Gamble have made it possible for them to grow on a global scale (Gorener, Toker Ulucay, 2012). They have acquired many opportunities for acquisitive growth in other markets. However, the diversification of their business market using information system could be hindered due to flaws in their security plans. Threats- Growth of strong competitors and retailers is the main threat to Procter Gamble (Gorener, Toker Ulucay, 2012). The retailers have started using information system for opposing the market capture of Procter Gamble. Pestle analysis of Procter Gamble Figure 5: Pestle Analysis Framework (Source: Srdjevic, Bajcetic Srdjevic, 2012, pp.-3392) Political- The political environment of Australia largely affects Procter Gamble and its business operations (McGuigan, 2015). The government provides the necessary growth and development opportunities to Procter Gamble. However, the involvement of government for deciding the prices of its commodities can affect the profit margin of Procter Gamble. Economic- Higher unemployment and recession have considerable affects Procter Gamble. The financial position of Procter Gamble can decline due to the adverse effect of economic factors such as financial crisis. Social- Social factors like needs of targeted market and development of employee welfare has considerable effect on Procter Gamble for sustaining profit (McGuigan, 2015). Procter Gamble have to take care of their customers delights and demand for achieving success in their operations. Technological- The latest technological equipment have been used by Procter Gamble in their business operations. It has helped them in increasing the functionality of their operations and getting faster results. Legal and Environmental- Procter Gamble have to abide by the laws, rules and regulations set by Australian government. The company has started recycling of their products for supporting to the environment and dealing with their problems and issues. Conclusion Hence, it can be concluded from the report that security of Information System plays a vital role for resolving the ethical, moral and law issues of an organization. Procter Gamble has implemented Business continuation risk assessment policy for dealing with the protecting their information and data. The risk management analysis, SWOT analysis and PESTLE analysis of Procter Gamble in relation to security issues had shown that security of the strategic management and information system should be followed in an organization. Therefore, the technological development has a crucial role in business development and security operations. The security of Information System has provided different types of facilities in the organization. Hence, for all the operations in any organization, information system plays an important and crucial role for meeting the needs of customer. References Achrol, R. S., Gundlach, G. T. (2014). Network organization and systems competition: A marketing analysis.The Antitrust Bulletin,59(4), 743-768. Barel, A. O., Paye, M., Maibach, H. I. (Eds.). (2014).Handbook of cosmetic science and technology. CRC Press. Brief, A., o f Conduct, C., Policy, C. S. R., Bribery, A., Policy, C., Mix, P., ... Policy, P. A. (2016). Corporate Social Responsibility.Issues. Bull, J. W., Jobstvogt, N., Bhnke-Henrichs, A., Mascarenhas, A., Sitas, N., Baulcomb, C., ... Carter-Silk, E. (2016). Strengths, weaknesses, opportunities and threats: A SWOT analysis of the ecosystem services framework.Ecosystem Services,17, 99-111. Carrie, M., Wilshire, J. C. (2013).U.S. Patent No. 8,612,650. Washington, DC: U.S. Patent and Trademark Office. Eddy, Y. F., Gooi, H. B., Chen, S. X. (2015). Multi-agent system for distributed management of microgrids.IEEE Transactions on Power Systems,30(1), 24-34. Fang, F., Parameswaran, M., Zhao, X., Whinston, A. B. (2014). An economic mechanism to manage operational security risks for inter-organizational information systems.Information Systems Frontiers,16(3), 399-416. Gorener, A., Toker, K., Uluay, K. (2012). Application of combined SWOT and AHP: a case study for a manufacturing firm.Procedia-Social and Behavioral Sciences,58, 1525-1534. Hubin, D. C. (2014). Fractured fatherhood: An analytic philosophy perspective on moral and legal paternity.Journal of Family Theory Review,6(1), 76-90. Konik, R. P., Theuer, M. W., Venz, M. A. (2013).U.S. Patent No. 8,396,846. Washington, DC: U.S. Patent and Trademark Office. Lafley, A. G., Martin, R. (2013). Instituting a company-wide strategic conversation at Procter Gamble.Strategy Leadership,41(4), 4-9. Li, W. (2014).Risk assessment of power systems: models, methods, and applications. John Wiley Sons. Lutkenhaus, D., de Freitas, M. N. (2016). Strategic management applied to the Six-Sigma suitability appraisal for RD in FMCG companies.Revista iPecege,2(1). McGuigan, L. (2015). Procter Gamble, mass media, and the making of American life.Media, Culture Society,37(6), 887-903. Michael, K., Byner, L. (2013). QBE's Insurance Scheme on GPS Tracking: Accuracy, Privacy, Property Accessibility. Payaud, M. A. (2014). Marketing strategies at the bottom of the pyramid: Examples from Nestl, danone, and procter gamble.Global Business and Organizational Excellence,33(2), 51-63. Sittig, D. F., Gonzalez, D., Singh, H. (2014). Contingency planning for electronic health record-based care continuity: a survey of recommended practices.International journal of medical informatics,83(11), 797-804. Srdjevic, Z., Bajcetic, R., Srdjevic, B. (2012). Identifying the criteria set for multicriteria decision making based on SWOT/PESTLE analysis: A case study of reconstructing a water intake structure.Water resources management,26(12), 3379-3393. Union, N. S. T. (2014). Code of ethics.private copy supplied by Bruce Kelloway, assistant executive director, NSTU. Ward, J., Peppard, J. (2016).The Strategic Management of Information Systems: Building a Digital Strategy. John Wiley Sons. Wolf, L. E., Patel, M. J., Williams Tarver, B. A., Austin, J. L., Dame, L. A., Beskow, L. M. (2015). Certificates of confidentiality: Protecting human subject research data in law and practice.The Journal of Law, Medicine Ethics,43(3), 594-609. Wright, K. (2014). Procter and Gamble and the Open Innovation Model. Yi, G., Smith, W. C., Ardwin, C. M. (2016).U.S. Patent No. 20,160,117,510. Washington, DC: U.S. Patent and Trademark Office. Zhu, X., Song, B., Ni, Y., Ren, Y., Li, R. (2016). Outsourcing and CrowdsourcingFrom Building All-Round Capabilities to Outsourcing and Crowdsourcing. InBusiness Trends in the Digital Era(pp. 105-121). Springer Singapore.
Monday, March 23, 2020
Rape Trauma Syndrome Essays - Rape, Behavior, Violence, Aggression
Rape Trauma Syndrome Dictionaries most commonly define rape as a sexual act committed by force especially on a woman. (The American Heritage College Dictionary. 1997 pg. 740) Until a few years ago it was limited to penial penetration of the vagina. Penal Code 261 defines rape as "an act of sexual intercourse accomplished with a person not the spouse of the perpetrator without the lawful consent."(Roberson, 1998, p. 188) Penal Code 263 goes on to say that "the fundamental wrong at which the law of rape is aimed is . . . the violation of a woman's will and sexuality." (Roberson, 1998, p. 190) All other sexual assaults are classified under varied names, yet the aftermath is usually the same. Rape is one of the cruelest forms of criminal violence. The victim suffers a profound injury. Rendered powerless by physical force, threats, or fear, after which being forced to submit to sexual acts, including vaginal penetration, oral copulation, sodomy, and penetration opening with a foreign object, the victim is left virtually alone. Rape is an intrusion into the most private and intimate parts of the body, as well as an assault on the core of the self. Despite whether the victim suffers any physical trauma, the psychological impact of a sexual assault is severe. Moreover, the painful, post-trauma symptoms that result from rape are long-lasting. Even those victims who appear to have recovered months or years later often find that an overwhelming sense of powerlessness and vulnerability remains close to the surface and can easily, and unexpectedly, be reexperienced. A critical factor in the long-term impact of rape is that the assault radically changes the victim's view of the world. Basic beliefs about the environment, other people, and the self are shattered. These are devastating losses. Thus, many survivors report that the rapist irrevocably alters their lives. The rapist takes away something that the victims can never wholly regain. We can examine the impact of rape in various ways. One perspective takes into consideration the underlying meaning the assault has for the victim. The grave threats and profound losses the victim suffers change their life dramatically, sometimes forever. Another manifestation of the impact of rape is the anguish of the victims. The psychological and behavioral symptoms of distress are poignant symbols of the destructiveness of the rapist's acts. Yet another way to understand the impact of rape is to compare it with other forms of trauma. Rape is an extreme form of human cruelty that in some ways resembles other overwhelming traumatic events. Rape trauma syndrome is the acute phase and long-term reorganization process that occur because of forcible rape or attempted forcible rape. (Bergess & Holmstrom, 1974) Researchers have identified stages that the victim goes through while suffering the effects of victimization. (Abarbanel & Richman, 1990) The initial impact of rape is a feeling of numbness, the victim is in a state of shock and disbelief and may still feel terrorized. (B&H, 1974) The victim's appearance can be misleading, appearing jolted or astonished, sedate and stifled. (A&R, 1990) The controlled behavior masks the serious psychological wound that they have endured.(A&R, 1990) Expressions of disbelief are most likely a reflection of the hidden inner chaos. (A&R, 1990) Usually following the initial stage of numbness follows the stage of denial. Victims have already experienced the worse of lost control. Therefore, any thoughts of this experience may risk another loss of control. Denial can vary from a direct denial; refusing to talk about it but recognizing that there was an incident, to not even recognizing that she knows anything has happened. Women will sometimes express this stage through their behavior, bathing or douching more than usual hoping to wash the rape away. (A&R, 1990) The DSM-IV places in its diagnostic criteria many reactions in this stage such as conversation and thought avoidance. The dangerous side to this stage is avoiding reporting the incident to the police, or not seeking medical treatment. (A&R, 1990) Sometimes serious infections will grow because of this, and the perpetrator is allowed to continue living his "normal" life when the victim cannot. After sometime, most victims enter the next stage of acute stress; acute means it usually lasts less than three months. (A&R, 1990) (DSM-IV) This is a major stage containing most of the diagnostic criteria according to the DSM-IV; including sleeping disorders, anxiety, and mostly a large preoccupation with the event. Fear is also a major feeling during this stage, victims can become hypersensitive to their surroundings and may begin to repeat safety rituals, such as checking door locks, and window
Friday, March 6, 2020
Should You Get a STEM Degree
Should You Get a STEM Degree SAT / ACT Prep Online Guides and Tips A STEM degree can encompass many different fields of study. In this article, weââ¬â¢ll break down what STEM means, whether a STEM program is right for you, and a complete STEM majors list. What Is a STEM degree? STEM stands for Science, Technology, Engineering, and Mathematics. STEM encompasses every sub-discipline inside the fields above. For instance, biology is a sub-discipline of science. Electrical engineering is a sub-discipline of engineering. STEM degrees often offer students a hands-on educational approach to these fields. Students who earn a STEM degree gain, in addition to their degree itself, experience in analysis, research, critical thinking, and problem-solving. Students who graduate with STEM degrees go on to be engineers, researchers, computer scientists, analysts and more. STEM Fields: Examined Like I mentioned before, STEM stands for Science, Technology, Engineering, and Mathematics. Letââ¬â¢s take a deeper look at each of those fields. Science The ââ¬Å"Sâ⬠in STEM stands for ââ¬Å"science.â⬠In this acronym, science generally refers to the natural sciences, which include fields like astronomy, biology, and physics. There are two other types of science: formal science and social science. Formal science is the study of mathematics, logic, and statistics, which is represented by the ââ¬Å"Mâ⬠in STEM. Social science includes the fields of psychology and sociology and is typically considered part of the humanities. Technology The ââ¬Å"Tâ⬠in STEM stands for technology. Students who study technology learn about the roles of technology in modern life. Technology majors can pursue careers in computer science, web/app development, video game design, and more. Engineering The ââ¬Å"Eâ⬠in STEM stands for engineering. Sub-fields of engineering include aerospace engineering, biomedical engineering, civil engineering, electrical engineering, and more. Mathematics The ââ¬Å"Mâ⬠in STEM stands for mathematics. Students who study mathematics learn about calculus, logic, algebra, statistics, and more. Differences Between Undergraduate and Graduate STEM Programs You can pursue a STEM degree as an undergraduate or graduate student. There are Bachelorââ¬â¢s, Masterââ¬â¢s and PhD STEM degree options. So what should you choose? Should you plan to go to graduate school if you want to work in STEM? Letââ¬â¢s explore. Research Opportunities One of the biggest differences between undergraduate and graduate STEM programs is the amount of research youââ¬â¢ll do. As a general rule, undergraduate programs are more focused on classroom learning versus hands-on research. Some undergraduate programs will offer research opportunities, but itââ¬â¢s not a given. Graduate programs, on the other hand, will be heavily research focused. Most students will participate in larger research projects with professors at their university. They may even direct their own projects. Job Outlook Typically, students who earn an advanced degree will have more career opportunities and start at a higher rate of pay. Depending on the company you want to work for and the position youââ¬â¢re seeking, you may need an advanced degree to even apply in the first place. Top 15 STEM Majors There is a wide range of options for STEM programs. In this STEM majors list, weââ¬â¢ll take a look at a few of the most popular majors in each STEM discipline. Science Astronomy: Astronomy (and astrophysics) is the study of planets, stars, galaxies, and the universe. Youââ¬â¢ll learn about space, as well as the history and future of the universe. Biological sciences: Biological sciences majors study ecology, plant, human and animal development, cell dynamics, molecular medicine and more. This major is great for people looking to go to medical school. Earth sciences: Students who study the earth sciences take classes in biology, mineralogy, geochemistry, physical geology, and more. Theyââ¬â¢ll learn about minerals, rocks, soil chemistry, and natural disasters like earthquakes and volcanoes. Physics: Physics students study scientific matter and energy. Theyââ¬â¢ll learn about electricity, magnetism, relativity, and more. Technology IT management: IT management majors learn how to use computer software and systems to manage information. IT management majors search for technology-based solutions to problems. Software engineering: Software engineers learn how to design, develop, maintain, test and evaluate computer software. Video game programming: If you love video games, video game programming might be the major for you. Video game programmers work with larger teams to create and develop new video games. Computer programming: Students in this major learn the fundamentals of computer programming. This is a solid major choice for students aspiring to be programmers. Engineering Aerospace engineering: Aerospace engineering majors learn how to build planes and spacecraft. This major is great if you hope to one day work with a company or organization like Boeing, NASA, or SpaceX. Biomedical engineering: Biomedical engineering is a cross-disciplinary field, where students learn about how engineering principles can impact human health. Civil engineering: Civil engineering deals with the design and construction of things like bridges, dams, airports, pipelines and more. Electrical engineering: Electrical engineering majors learn about the design and application of equipment related to electricity, electronics, and electromagnetism. Math Mathematics: Math majors study a number of different topics, including calculus, algebra, trigonometry, geometry, computational mathematics, number theory, and more. Many math majors choose to concentrate in one specific area of math. Statistics: Statistics is a math field that relies heavily on computers, with students learning analytical and logical reasoning, information management, and quantitative reasoning. Logic and Computation: Students who study logic and computation gain skills in logic, analytic philosophy, mathematics, computer science, and more. They will go on to work in fields like computer science or philosophy. Best Schools for Stem Degrees There are numerous options for STEM degrees, both graduate and undergraduate. Here are ten of the best STEM schools in the United States. Harvey Mudd College: Claremont, California Harvey Mudd College is a private science and engineering college, part of the consortium of Claremont Colleges that share adjoining campus ground in California. Harvey Mudd is one of the best engineering schools in the world. Princeton University: Princeton, New Jersey Princeton University has topnotch engineering and mathematics departments. Located in New Jersey, Princeton offers many opportunities for research. Massachusetts Institute of Technology (MIT): Cambridge, Massachusetts One of the best (if not the best) STEM universities in the world, MIT is located in Cambridge, Massachusetts. MIT boasts an impressive list of alumni, including 58 National Medal of Science recipients, 45 Rhodes Scholars, 41 astronauts, and 16 Chief Scientists of the US Air Force. University of California, Berkeley: Berkeley, California Located close to Silicon Valley, UC Berkeley has produced some of the finest professionals in STEM fields. UC Berkeley is the home of a world-renowned engineering program. Johns Hopkins University (Hopkins): Baltimore, Maryland Johns Hopkins University was the first research university sited in the United States. If youââ¬â¢re interested in medicine, Johns Hopkins has one of the best medical programs in the world. Stanford University: Stanford, California Snapchat, Google, Netflix. What do these tech giants have in common? They were all founded by graduates of Stanford. Boasting one of the best technology programs in the world, Stanford also has rigorous offerings in science, engineering, and mathematics. Georgia Institute of Technology (Georgia Tech): Atlanta, Georgia Georgia Tech is a research university and institute of technology in Georgia, with satellite campuses around the world. Georgia Tech has 31 majors with a focus on STEM fields. Carnegie Mellon University: Pittsburgh, PA With its headquarters near downtown Pittsburgh and satellite campuses on six continents, Carnegie Mellon is one of the best research universities in the world. Carnegie Mellonââ¬â¢s computer science program is ranked first by US News and World Report. California Institute of Technology (Caltech): Pasadena, California Consistently ranked as one of the top ten universities in the world, Caltech has strong natural science and engineering programs. More than 90% of students at Caltech participate in hands-on research. Harvard University: Cambridge, Massachusetts This list wouldnââ¬â¢t be complete without Harvard University. Their Chemistry and Chemical Biology department alone has birthed five Nobel laureates. With numerous opportunities for research and work, Harvard is a top-notch place for any wannabe STEM major. STEM Degree: Final Thoughts A STEM degree is an excellent opportunity for students looking to break into the fields of science, technology, engineering, or mathematics. If youââ¬â¢re looking to major in a STEM discipline, take a look at the ten schools headlined in this article. What's Next? If you're hoping to attend college but are unsure howto begin the search process, check out this step by step guide for doing college research. Need help applying to grad school? Read our expert guide on grad school deadlines andget tips on the best time to apply tograd school! Want your GRE scores to stand out on your grad school applications?Check out our in-depth guide onmaximizing your GRE scoreand learnhow to make a foolproof GRE study plantoday!
Tuesday, February 18, 2020
Marketing trend (Internet and online marketing)7 Assignment
Marketing trend (Internet and online marketing)7 - Assignment Example al conflict, risk taking ability, participation and authority, and individual factors like age, cultural and social background of the members of the buying team. The Internet has increased the speed and broadened connectivity among businesses, which are fundamental aspects of communication (Charlesworth, 2009). Most key companies now have a Web site. The Web sites give them an instant international presence. Internet marketing simplifies the search for the least price for products, making it quick and cheap. This also shortens the purchase process for businesses. Significant delays in decision making occur when companies restrict the flow of information. The increased speed of information exchange fostered by the Internet provides a solution to this problem (Charlesworth, 2009). This increases the probability of sourcing the right product at the correct time, price, and quality and be delivered punctually. On personal selling, Internet trading exchanges have made it easier to link sellers to buyers and facilitate the sale and distribution of products smaller orders. An example is the selling of online books and music CDs. Research has shown that selling music and books online costs between 9 to 15 percent lower than in conventional vendor stores (Clay, Krishan, & Wolff, 2001). In conclusion, internet marketing speeds up the process of sourcing for products and favorable prices by businesses. The personal seller can market his products from home or office without the use of billboards or employing marketing
Monday, February 3, 2020
Development of Political Parties Research Paper
Development of Political Parties - Research Paper Example 78-79). This paper is an attempt to present a bird eyeââ¬â¢s view of the history of the political parties in the United States of America. Discussion Surprisingly, the constitution of United States, unlike other constitutions of the nations does not present any guidelines about the political parties of the country. In fact, the First President of United States and the Father of the Nation, George Washington was strongly against political parities because he viewed political party system as something, which would bring conflicts, inefficiency, and stagnation to the system (Eldersveld & Walton, pp. 123-125). However, as soon as United States gained independence, disagreements and discrepancies surfaced out in the views of the founding fathers of America (Cohen, Fleisher & Kantor, pp. 513-516). The First Part System came into being when differences between the Treasury of the State Alexander Hamilton and Thomas Jefferson regarding the role and strength of the federal government (Nivo la & Brady, pp. 78-79). Hamilton and its supporters wanted a strong central government to control ad look after the matters; however, Jefferson and his disciples feared that a strong central government like that of Britain would invite the states to stand up against the Federation someday. This was the era of 1792-1824 (Maisel, pp. 98-99). This tug of war between the Federalist Party of Hamilton and Jeffersonââ¬â¢s Democratic Republican Party went on to include various foreign policy issues as well (Eldersveld & Walton, pp. 123-125). Towards the end of the 1820ââ¬â¢s the era of good feelings started and these personal and policy differences were settled. However, important here is to note is that Democratic Republic Party was the clear winner and survivor (Sabato & Ernst, pp. 269-278). However, it was not until the Second Party System that foundation of the modern American Political Party system came into existence. During this era of 1828 to 1854, the Democratic Party led by Andrew Jackson and the Whig Party in the leadership of Henry clay were facing each other (Eldersveld & Walton, pp. 123-125; Ritchie, pp. 367-373). Towards the end of this era, many of the democratic leaders accepted Whiggish ideas; however, many other economic and social issues were forcing the Democratic Party itself to divide into two thus giving birth to the third political party system in the United States (Wilson & DiIulio, pp. 193-197). This was during the third political party system when the Republican and Democratic Parities emerged which continue to be the dominant force in American politics (Stonecash, pp. 59-67). Many experts believe that the newly born Republican Party emerged as a national party, which was bold enough to take strong economic and social decisions such as creation of banks, rail roods, abolishment of slavery and others (Bibby & Schaffner, pp. 112-113; Maisel, pp. 98-99). In fact, slavery was the major issue during this period. The Democratic Party, which had a strong alliance with the farmers of the South and the West were unable to continue this alliance due to the issue of slavery. Furthermore, the Democratic Party finally was divided into two fractions with for and against slavery (Maisel, pp. 26-28). On the other hand, Republicans believed on the concept of free soil and thus wanted the abolishment of slavery (Cohen, Fleisher & Kantor, pp. 513-516). As mentioned earlier that Republicans remained in the spotlight during this era and after the civil war, they were able to exercise their control over
Sunday, January 26, 2020
Impacts Of Global Fuel Price Fluctuations Tourism Essay
Impacts Of Global Fuel Price Fluctuations Tourism Essay The fuel prices are determined by the crude oil prices. In order to produce fuel and other petroleum products, the main raw material used is crude oil. (Chevron Corp, N/A) The prices of crude oil are determined by the market force of demand and supply. If there are grows in demand or disruptions in supply of crude oil, then the market will adjust by increasing the price of crude oil, subjected to the changes in demand or supply. One of the most recognisable causes of fluctuation in fuel prices is disruptions in the supply of crude oil in the market. Political instability is one of the factors. Majority of oil producer countries are in the emerging regions, where disruptions in supply of crude oil always happened and affecting the price. (Chevron Corp, N/A) Besides, shortages of supply can be resulted from a sudden refinery outage or maintenance and pipeline problems. On the other hand, the rise in the price of crude oil is caused by the increase in international energy demand driven by strong long term economic growth especially in non-OECD countries. According to the U.S. Energy Information Administration, make a projection that in between 2006 to 2030, there will be a dramatic increase of 44% in the total world consumption of energy. (Caltex, N/A) Adding together political instability, disruptions in the supply and growing demand for crude oil cause the price of fuel to be volatile. (237w) To manage airlines companies, the management will try to minimise any cost associates with the company. According to Air Transport Association, 25.4% of airlines operating expenses were contributed by fuel. As the fuel price becoming increasingly volatile, airlines industries will face risk in rising fuel price and one of the ways to get rid of the risk is by hedging the fuel price. Hedging is a risk management tool that allows airlines to lock in a price for fuel and protect them from the risk of soaring fuel price in future. Neeraj Kapoor, Go Air spokesperson commented that aviation fuel pricing in certain region like India does not favour hedging, but recent hike in fuel price make them reconsider on hedging their fuel. (Kabtta, K, 2008) On the other hand, South West Airlines, which hedged about 70% of its fuel, got to consume it at a lower price of $51 a barrel, compared to the market price of $135 per barrel. (Kabtta, J, 2008) Besides hedging, airlines usually will increase the price of its fuel surcharge. Fuel levy or fuel surcharge is the additional cost to the fare, imposed on per ticket basis in order to retrieve the rising price of the fuel. (Koch, R, 2010) As for example, Virgin Blue had decided to follow Qantas action of increasing fuel surcharges due to the spike in global fuel prices. (Oà ¢Ã¢â ¬Ã¢â ¢ Sullivan, M, 2011) In short, an airlines company could avoid the surge of global fuel prices by either hedge the fuel price with any hedging instrument such as options or increase the fuel surcharge on the passenger. (268 w) Now let us examined what are the possible impact that fuel price volatility may bring to the airlines industry and suggestion for the airlines company in dealing with this crisis. As we had discussed above, a surge in fuel prices will directly hit the airlines industry as the rising in cost of fuel will result in increase on the cost of operation. Besides, fuel prices are determined to have a relationship with economic recessions. Soaring fuel prices will trigger higher inflation which later be cooled off by monetary policy. As a result, demand for air travel will decline. Despite facing such challenge, there are airlines that determined enough to go against the tide by trying to reduce costs as well as implementing new strategies to be more competitive. Most of the airlines resorted in drastic action by firing some of their employee in order to cut cost since labour cost contributed almost 24.7% out of total operational cost. (Air Transport Association, N/A) As for example, due to s udden hike in fuel prices, Qantas determined to cut down the number of its employees. (Hannan, E, 2011) While other airlines company trying their best in finding new strategies in order to stay competitive with other airlines. For example United Airlines strategy is to use software developed for flight planning to choose the best route and speed of flight. (Wilen, J.2008) Another good example is Cathay Pacific where they decided to opt towards more fuel efficient aircraft such as Boeing 747-8F and Boeing 777-300ER other than issuing fuel surcharge on tickets to cover for soaring fuel prices. (Cathay Pacific Airways Limited 2010)In brief, increase in fuel prices may impact the airlines industry directly or indirectly and there are several ways to face this issue.(291) In summary, airline industry has been badly affected by the rising fuel prices. The industry is losing both customers and revenues. Some airlines are trying to go against the tide by reforming themselves, but to a limited success. These airlines are working hard to reduce cost and implement new strategies to win back customers. While the world is still in recession, those efforts have started to show some good results. As such, it is possible to see airlines will bounce back and recover from bad financial conditions sooner.(88)
Saturday, January 18, 2020
Music Appreciation Lab Questions Essay
This is the second lab assignment for the Fine Art Survey class. The link in blue has a set of questions beneath it. Open the link and watch the video. **Note that the link opens up a new browser window. Please answer the questions on this document and submit the work as one file attachment. This means you complete all work in one word processing document (e.g., Microsoft Word) and attach the file using the dropbox tool. The answers to the lab questions are worth 80 points. 80-74=A73-68=B67-60=C59-54=D53 or less = F Lab Questions Visit Divas and Superstars and watch the showââ¬â¢s video. (If you have trouble with the link, put this website into the address bar: http://video.pbs.org/video/1300186085/ ) 1. Who sang at the Grammyââ¬â¢s in Spanish in the late 1990s? What was the reaction? Ricky Martin sang in Spanish at the Grammys. the crowd and people watching at home loved it. It was widely supported and accepted. 2. When did Latin music burst back on the scene? What song brought it back to the mainstream? What effect did it have? Latin music bursted back on the scene in 1984. ââ¬Å"Congaâ⬠by Gloria Estefan & the Miami Sound Machine brought back Latin music back to the mainstream. It defined Latin pop music by mixing a Latin beat with English words. 3. How did the sounds of salsa change? The sounds of salsa changed because it was starting to be fused with pop, R&B, etc., so that more people could understand it. 4. What was the influence of CBSââ¬â¢ Latin division on the explosion of Latin music in the US? CBS Latin division supported and sponsored Latin music and helped it in its growth across America. 5. Who were some of the artists who brought together Latin influenced music with mainstream pop music? Jenifer Lopez, Marc Anthony, Ricky Martin, and Gloria Stefan & the Miami Sound Machine were some of the artists that brought together Latin influenced music with the mainstream pop music. 6. Why did the Latin music influence decrease? The Latin music influence decreased people started becoming more modernized and less people could understand the music. 7. What was Reggaeton? Reggaeton was a mixture of the Jamacian ââ¬Å"Dem Bowâ⬠beat mixed with Puerto Rican and Latin beats. 8. What other types of music are being influenced by ââ¬Å"Latinâ⬠music? Hip-Hop, rap, pop, and rock are all types of music being influenced by ââ¬Å"Latinâ⬠music.
Friday, January 10, 2020
Finance Management Essay
In a world without FIs the users of corporate funds in the economy would have to approach directly the household savers of funds in order to satisfy their borrowing needs. This process would be extremely costly because of the up-front information costs faced by potential lenders. Cost inefficiencies would arise with the identification of potential borrowers, the pooling of small savings into loans of sufficient size to finance corporate activities, and the assessment of risk and investment opportunities. Moreover, lenders would have to monitor the activities of borrowers over each loanââ¬â¢s life span. The net result would be an imperfect allocation of resources in an economy. 3. Identify and explain three economic disincentives that probably would dampen the flow of funds between household savers of funds and corporate users of funds in an economic world without financial intermediaries. Investors generally are averse to purchasing securities directly because of (a) monitoring costs, (b) liquidity costs, and (c) price risk. Monitoring the activities of borrowers requires extensive time, expense, and expertise. As a result, households would prefer to leave this activity to others, and by definition, the resulting lack of monitoring would increase the riskiness of investing in corporate debt and equity markets. The long-term nature of corporate equity and debt would likely eliminate at least a portion of those households willing to lend money, as the preference of many for near-cash liquidity would dominate the extra returns which may be available. Third, the price risk of transactions on the secondary markets would increase without the information flows and services generated by high volume. 4. Identify and explain the two functions in which FIs may specialize that enable the smooth flow of funds from household savers to corporate users. FIs serve as conduits between users and savers of funds by providing a brokerage function and by engaging in the asset transformation function. The brokerage function can benefit both savers and users of funds and can vary according to the firm. FIs may provide only transaction services, such as discount brokerages, or they also may offer advisory services which help reduce information costs, such as full-line firms like Merrill Lynch. The asset transformation function is accomplished by issuing their own securities, such as deposits and insurance policies that are more attractive to household savers, and using the proceeds to purchase the primary securities of corporations. Thus, FIs take on the costs associated with the purchase of securities. 5. In what sense are the financial claims of FIs considered secondary securities, while the financial claims of commercial corporations are considered primary securities? How does the transformation process, or intermediation, reduce the risk, or economic disincentives, to the savers? The funds raised by the financial claims issued by commercial corporations are used to invest in real assets. These financial claims, which are considered primary securities, are purchased by FIs whose financial claims therefore are considered secondary securities. Savers who invest in the financial claims of FIs are indirectly investing in the primary securities of commercial corporations. However, the information gathering and evaluation expenses, monitoring expenses, liquidity costs, and price risk of placing the investments directly with the commercial corporation are reduced because of the efficiencies of the FI. 6. Explain how financial institutions act as delegated monitors. What secondary benefits often accrue to the entire financial system because of this monitoring process? By putting excess funds into financial institutions, individual investors give to the FIs the responsibility of deciding who should receive the money and of ensuring that the money is utilized properly by the borrower. In this sense the depositors have delegated the FI to act as a monitor on their behalf. The FI can collect information more efficiently than individual investors. Further, the FI can utilize this information to create new products, such as commercial loans, that continually update the information pool. This more frequent monitoring process sends important informational signals to other participants in the market, a process that reduces information imperfection and asymmetry between the ultimate sources and users of funds in the economy. 7. What are five general areas of FI specialness that are caused by providing various services to sectors of the economy? First, FIs collect and process information more efficiently than individual savers. Second, FIs provide secondary claims to household savers which often have better liquidity characteristics than primary securities such as quities and bonds. Third, by diversifying the asset base FIs provide secondary securities with lower price-risk conditions than primary securities. Fourth, FIs provide economies of scale in transaction costs because assets are purchased in larger amounts. Finally, FIs provide maturity intermediation to the economy which allows the introduction of additional types of investment contracts, such as mortgage loans, that are financed with short-term deposits. 8. How do FIs solve the information and related agency costs when household savers invest directly in securities issued by corporations? What are agency costs? Agency costs occur when owners or managers take actions that are not in the best interests of the equity investor or lender. These costs typically result from the failure to adequately monitor the activities of the borrower. If no other lender performs these tasks, the lender is subject to agency costs as the firm may not satisfy the covenants in the lending agreement. Because the FI invests the funds of many small savers, the FI has a greater incentive to collect information and monitor the activities of the borrower. 9. What often is the benefit to the lenders, borrowers, and financial markets in general of the solution to the information problem provided by the large financial institutions? One benefit to the solution process is the development of new secondary securities that allow even further improvements in the monitoring process. An example is the bank loan that is renewed more quickly than long-term debt. The renewal process updates the financial and operating information of the firm more frequently, thereby reducing the need for restrictive bond covenants that may be difficult and costly to implement. 10. How do FIs alleviate the problem of liquidity risk faced by investors who wish to invest in the securities of corporations? Liquidity risk occurs when savers are not able to sell their securities on demand. Commercial banks, for example, offer deposits that can be withdrawn at any time. Yet the banks make long-term loans or invest in illiquid assets because they are able to diversify their portfolios and better monitor the performance of firms that have borrowed or issued securities. Thus individual investors are able to realize the benefits of investing in primary assets without accepting the liquidity risk of direct investment. 1. How do financial institutions help individual savers diversify their portfolio risks? Which type of financial institution is best able to achieve this goal? Money placed in any financial institution will result in a claim on a more diversified portfolio. Banks lend money to many different types of corporate, consumer, and government customers, and insuran ce companies have investments in many different types of assets. Investment in a mutual fund may generate the greatest diversification benefit because of the fundââ¬â¢s investment in a wide array of stocks and fixed income securities. 2. How can financial institutions invest in high-risk assets with funding provided by low-risk liabilities from savers? Diversification of risk occurs with investments in assets that are not perfectly positively correlated. One result of extensive diversification is that the average risk of the asset base of an FI will be less than the average risk of the individual assets in which it has invested. Thus individual investors realize some of the returns of high-risk assets without accepting the corresponding risk characteristics. 13. How can individual savers use financial institutions to reduce the transaction costs of investing in financial assets? By pooling the assets of many small investors, FIs can gain economies of scale in transaction costs. This benefit occurs whether the FI is lending to a corporate or retail customer, or purchasing assets in the money and capital markets. In either case, operating activities that are designed to deal in large volumes typically are more efficient than those activities designed for small volumes. 14. What is maturity intermediation? What are some of the ways in which the risks of maturity intermediation are managed by financial intermediaries? If net borrowers and net lenders have different optimal time horizons, FIs can service both sectors by matching their asset and liability maturities through on- and off-balance sheet hedging activities and flexible access to the financial markets. For example, the FI can offer the relatively short-term liabilities desired by households and also satisfy the demand for long-term loans such as home mortgages. By investing in a portfolio of long-and short-term assets that have variable- and fixed-rate components, the FI can reduce maturity risk exposure by utilizing liabilities that have similar variable- and fixed-rate characteristics, or by using futures, options, swaps, and other derivative products. 15. What are five areas of institution-specific FI specialness, and which types of institutions are most likely to be the service providers? First, commercial banks and other depository institutions are key players for the transmission of monetary policy from the central bank to the rest of the economy. Second, specific FIs often are identified as the major source of finance for certain sectors of the economy. For example, S;Ls and savings banks traditionally serve the credit needs of the residential real estate market. Third, life insurance and pension funds commonly are encouraged to provide mechanisms to transfer wealth across generations. Fourth, depository institutions efficiently provide payment services to benefit the economy. Finally, mutual funds provide denomination intermediation by allowing small investors to purchase pieces of assets with large minimum sizes such as negotiable CDs and commercial paper issues. 6. How do depository institutions such as commercial banks assist in the implementation and transmission of monetary policy? The Federal Reserve Board can involve directly the commercial banks in the implementation of monetary policy through changes in the reserve requirements and the discount rate. The open market sale and purchase of Treasury securities by the Fe d involves the banks in the implementation of monetary policy in a less direct manner. 17. What is meant by credit allocation regulation? What social benefit is this type of regulation intended to provide? Credit allocation regulation refers to the requirement faced by FIs to lend to certain sectors of the economy, which are considered to be socially important. These may include housing and farming. Presumably the provision of credit to make houses more affordable or farms more viable leads to a more stable and productive society. 18. Which intermediaries best fulfill the intergenerational wealth transfer function? What is this wealth transfer process? Life insurance and pension funds often receive special taxation relief and other subsidies to assist in the transfer of wealth from one generation to another. In effect, the wealth transfer process allows the accumulation of wealth by one generation to be transferred directly to one or more younger generations by establishing life insurance policies and trust provisions in pension plans. Often this wealth transfer process avoids the full marginal tax treatment that a direct payment would incur. 19. What are two of the most important payment services provided by financial institutions? To what extent do these services efficiently provide benefits to the economy? The two most important payment services are check clearing and wire transfer services. Any breakdown in these systems would produce gridlock in the payment system with resulting harmful effects to the economy at both the domestic and potentially the international level. 20. What is denomination intermediation? How do FIs assist in this process? Denomination intermediation is the process whereby small investors are able to purchase pieces of assets that normally are sold only in large denominations. Individual savers often invest small amounts in mutual funds. The mutual funds pool these small amounts and purchase negotiable CDs which can only be sold in minimum increments of $100,000, but which often are sold in million dollar packages. Similarly, commercial paper often is sold only in minimum amounts of $250,000. Therefore small investors can benefit in the returns and low risk which these assets typically offer. 21. What is negative externality? In what ways do the existence of negative externalities justify the extra regulatory attention received by financial institutions? A negative externality refers to the action by one party that has an adverse affect on some third party who is not part of the original transaction. For example, in an industrial setting, smoke from a factory that lowers surrounding property values may be viewed as a negative externality. For financial institutions, one concern is the contagion effect that can arise when the failure of one FI can cast doubt on the solvency of other institutions in that industry. 22. If financial markets operated perfectly and costlessly, would there be a need for financial intermediaries? To a certain extent, financial intermediation exists because of financial market imperfections. If information is available costlessly to all participants, savers would not need intermediaries to act as either their brokers or their delegated monitors. However, if there are social benefits to intermediation, such as the transmission of monetary policy or credit allocation, then FIs would exist even in the absence of financial market imperfections. 23. What is mortgage redlining? Mortgage redlining occurs when a lender specifically defines a geographic area in which it refuses to make any loans. The term arose because of the area often was outlined on a map with a red pencil. 24. Why are FIs among the most regulated sectors in the world? When is net regulatory burden positive? FIs are required to enhance the efficient operation of the economy. Successful financial intermediaries provide sources of financing that fund economic growth opportunity that ultimately raises the overall level of economic activity. Moreover, successful financial intermediaries provide transaction services to the economy that facilitate trade and wealth accumulation. Conversely, distressed FIs create negative externalities for the entire economy. That is, the adverse impact of an FI failure is greater than just the loss to shareholders and other private claimants on the FIââ¬â¢s assets. For example, the local market suffers if an FI fails and other FIs also may be thrown into financial distress by a contagion effect. Therefore, since some of the costs of the failure of an FI are generally borne by society at large, the government intervenes in the management of these institutions to protect societyââ¬â¢s interests. This intervention takes the form of regulation. However, the need for regulation to minimize social costs may impose private costs to the firms that would not exist without regulation. This additional private cost is defined as a net regulatory burden. Examples include the cost of holding excess capital and/or excess reserves and the extra costs of providing information. Although they may be socially beneficial, these costs add to private operating costs. To the extent that these additional costs help to avoid negative externalities and to ensure the smooth and efficient operation of the economy, the net regulatory burden is positive. 5. What forms of protection and regulation do regulators of FIs impose to ensure their safety and soundness? Regulators have issued several guidelines to insure the safety and soundness of FIs: a. FIs are required to diversify their assets. For example, banks cannot lend more than 10 percent of their equity to a single borrower. b. FIs are required to maintain minimum amounts of capital to cushion an y unexpected losses. In the case of banks, the Basle standards require a minimum core and supplementary capital of 8 percent of their risk-adjusted assets. c. Regulators have set up guaranty funds such as BIF for commercial banks, SIPC for securities firms, and state guaranty funds for insurance firms to protect individual investors. d. Regulators also engage in periodic monitoring and surveillance, such as on-site examinations, and request periodic information from the FIs. 26. In the transmission of monetary policy, what is the difference between inside money and outside money? How does the Federal Reserve Board try to control the amount of inside money? How can this regulatory position create a cost for the depository financial institutions? Outside money is that part of the money supply directly produced and controlled by the Fed, for example, coins and currency. Inside money refers to bank deposits not directly controlled by the Fed. The Fed can influence this amount of money by reserve requirement and discount rate policies. In cases where the level of required reserves exceeds the level considered optimal by the FI, the inability to use the excess reserves to generate revenue may be considered a tax or cost of providing intermediation. 27. What are some examples of credit allocation regulation? How can this attempt to create social benefits create costs to the private institution? The qualified thrift lender test (QTL) requires thrifts to hold 65 percent of their assets in residential mortgage-related assets to retain the thrift charter. Some states have enacted usury laws that place maximum restrictions on the interest rates that can be charged on mortgages and/or consumer loans. These types of restrictions often create additional operating costs to the FI and almost certainly reduce the amount of profit that could be realized without such regulation. 8. What is the purpose of the Home Mortgage Disclosure Act? What are the social benefits desired from the legislation? How does the implementation of this legislation create a net regulatory burden on financial institutions? The HMDA was passed by Congress to prevent discrimination in mortgage lending. The social benefit is to ensure that everyone who qualifies financially is provided the opportunity to purchase a house shoul d they so desire. The regulatory burden has been to require a written statement indicating the reasons why credit was or was not granted. Since 1990, the federal regulators have examined millions of mortgage transactions from more than 7,700 institutions each calendar quarter. 29. What legislation has been passed specifically to protect investors who use investment banks directly or indirectly to purchase securities? Give some examples of the types of abuses for which protection is provided. The Securities Acts of 1933 and 1934 and the Investment Company Act of 1940 were passed by Congress to protect investors against possible abuses such as insider trading, lack of disclosure, outright malfeasance, and breach of fiduciary responsibilities. 30. How do regulations regarding barriers to entry and the scope of permitted activities affect the charter value of financial institutions? The profitability of existing firms will be increased as the direct and indirect costs of establishing competition increase. Direct costs include the actual physical and financial costs of establishing a business. In the case of FIs, the financial costs include raising the necessary minimum capital to receive a charter. Indirect costs include permission from regulatory authorities to receive a charter. Again in the case of FIs this cost involves acceptable leadership to the regulators. As these barriers to entry are stronger, the charter value for existing firms will be higher. 31. What reasons have been given for the growth of investment companies at the expense of ââ¬Å"traditionalâ⬠banks and insurance companies? The recent growth of investment companies can be attributed to two major factors: a. Investors have demanded increased access to direct securities markets. Investment companies and pension funds allow investors to take positions in direct securities markets while still obtaining the risk diversification, monitoring, and transactional efficiency benefits of financial intermediation. Some experts would argue that this growth is the result of increased sophistication on the part of investors; others would argue that the ability to use these markets has caused the increased investor awareness. The growth in these assets is inarguable. b. Recent episodes of financial distress in both the banking and insurance industries have led to an increase in regulation and governmental oversight, thereby increasing the net regulatory burden of ââ¬Å"traditionalâ⬠companies. As such, the costs of intermediation have increased, which increases the cost of providing services to customers. 2. What are some of the methods which banking organizations have employed to reduce the net regulatory burden? What has been the effect on profitability? Through regulatory changes, FIs have begun changing the mix of business products offered to individual users and providers of funds. For example, banks have acquired mutual funds, have expanded their asset and pension fund management busin esses, and have increased the security underwriting activities. In addition, legislation that allows banks to establish branches anywhere in the United States has caused a wave of mergers. As the size of banks has grown, an expansion of possible product offerings has created the potential for lower service costs. Finally, the emphasis in recent years has been on products that generate increases in fee income, and the entire banking industry has benefited from increased profitability in recent years. 33. What characteristics of financial products are necessary for financial markets to become efficient alternatives to financial intermediaries? Can you give some examples of the commoditization of products which were previously the sole property of financial institutions? Financial markets can replace FIs in the delivery of products that (1) have standardized terms, (2) serve a large number of customers, and (3) are sufficiently understood for investors to be comfortable in assessing their prices. When these three characteristics are met, the products often can be treated as commodities. One example of this process is the migration of over-the-counter options to the publicly traded option markets as trading volume grows and trading terms become standardized. 34. In what way has Regulation 144A of the Securities and Exchange Commission provided an incentive to the process of financial disintermediation?
Subscribe to:
Comments (Atom)