Saturday, December 28, 2019

Vanessa Johnson A Middle Age Adult - 861 Words

Vanessa Johnson was born on August 11, 1957 in New Orlands, Lousiana. She will soon turn 60 years old and will become part of the older adult group. Vanessa is an African American and she is daughter of Eula and Charles Nucholson. Vanessa got married two times with the same person. She married Mr. X for 2 years, got divorced and stayed alone for three years finally she got married again with him and still is. Vanessa has been married for 14 years with Mr. X and are currently living together. She has three daughters and two step sons. As I ask Vanessa about her understanding of her status as a middle-aged adult she states the following: â€Å"The bible tells us that the older women are to teach the younger women and because of that I am to seek for the advice of an older women than me.† As a middle-age adult, Vanessa has experience advice from older women than her and she has tried to help younger women by giving them her own advice. Vanessa believes that at her age she has experienced many things and if she shares her experience with younger women, they will be able to learn from her. Some benchmarks that she shares with other individuals like her is that she has lived a really active life and during this time of life they begin to get grandchildren. Something that she has experienced at this age, but that is non-normative is that she had 6 to 8 major moves within the last 14 years. However, she states that this is because â€Å"the Lord wanted me in different places.† VanessaShow MoreRelatedResearch Proposal5106 Words   |  21 PagesON MALE AND FEMALE CHILDREN AGES 4-11 What Are the Effects of Domestic Violence on Male and Female Children ages 4-11? Candace Williams University of South Carolina Counseling Education Graduate Program Introduction Purpose The purpose of this research proposal is to identify the specific differences in the effects of domestic violence in male and female children ages 4-11. Justification of Proposed Research Child exposure to adult domestic violence and its effectsRead MoreHolistic Approach14986 Words   |  60 Pagesclasses, you presently offer clients countless opportunities to improve physical health. That being said, you may want to consider offering additional services, such as post rehabilitation programs and regular screenings. For example, the Robert Wood Johnson Hamilton Center for Health amp; Wellness, located in Mercerville, New Jersey, offers rehabilitation services, a staff of nurse educators, a health library with computer access and a healthy-cooking kitchen . Screenings are also essential in the preventionRead MoreLeadership Development42674 Words   |  171 Pagesprivate and not-for-profit sectors, organisations of very different sizes, different industrial sectors. It is known that management and leadership is, or could be, carried out by many different kinds of people in terms of diversity categories like age, ethnicity and gender. It is also known that people are involved in management and leadership at different career stages and come to it from differing occupational and educational backgrounds. An extension of the how question 6 concerns the formsRead MoreSadie Hawkins Day and Valentine Grams18321 Words   |  74 Pagescom. According to the CDC, the Salmonella infection is â€Å"usually diagnosed by [a] culture of a stool sample.† The sickness ranges from four to seven days. Salmonella can cause serious and sometimes fatal infections in young children and weak or older adults. If affected, symptoms range from fever, diarrhea, vomiting and abdominal pain. If not treated the disease can also spread from â€Å"the intestines to the bloodstream and then to other body sites and cause death.† Sophomore Keith Baloran announces theRead MoreHuman Resources Management150900 Words   |  604 Pagesworkers and the legal issues associated with their use. Demographics and Diversity The U.S. workforce has been changing dramatically. It is more diverse racially, women are in the labor force in much greater numbers than ever before, and the average age of the workforce is now considerably older than before. As a result of these demographic shifts, HR management in organizations has had to adapt to a more varied labor force both externally and internally. The three most prominent dimensions of the

Friday, December 20, 2019

Surrogacy And The Adoption Of The Surrogate - 1648 Words

Q1) As a doctor how would you deconstruct the concept of surrogacy for our readers who may want to go in for the option? Please elucidate with two different types of surrogacy etc A1) Surrogacy is a process in which a woman carries and delivers a baby for someone else because of some problems involving the intended parents. The women who delivers is the gestational surrogate or carrier. The parents are called as â€Å"intended parents†. They are fully involved in the pregnancy, present at birth and become the child s parents after its birth. There are two types of surrogacy 1. Gestational surrogacy- The baby here is not genetically related to the surrogate. Eggs come from intended mother and sperm from intended father. Sometimes donor eggs,†¦show more content†¦When would you suggest a couple to opt for surrogacy? A2.) Surrogacy is an arrangement when a woman agrees to carry a pregnancy for another couple who will become the newborn’s parents after birth of the baby. The couple is asked to opt for surrogacy if the patient does not have a uterus, she has problems in uterus, she is unable to carry pregnancy safely, pregnancy is medically impossible, serious medical condition that could be exacerbated by pregnancy or cause significant risk to fetus, biological inability to conceive( homosexual couple). It is also an option if the couple has had multiple failures in IVF. If the surrogate receives monetary compensation, it is called commercial surrogacy. If no payment is done except for medical reimbursement and basic pregnancy expenses, it is called as altruistic surrogacy. Q3) What kind of medical, emotional and legal/paperwork preparations that a couple requires to undergo before opting for surrogacy? A3) Decision to use surrogacy is very complicated and psychosocial education and counselling by a qualified mental health professional should be given to all intended parents. Genetic parents should undergo genetic evaluation, complete medical and physical evaluation. Before acceptance and within six months of creating the embryos to be transferred, genetic parents undergo the following tests and if found positive, the geneticShow MoreRelatedThe Role Of Traditional And Gestational Surrogacy1212 Words   |  5 PagesSurrogates are defined as a â€Å"women who gestates a fetus for others, usually for a couple or another woman.†(Vaughn, 398) Surrogates have a few types of surrogacy, which are traditional and gestational surrogacy. Traditional surrogacy is defined as the â€Å"sperm from either the couple’s male partner or a donor is used to artificially inseminate the surrogate (the â€Å"surrogate mother†). (Vaughn, 398) Then there is Gestational surrogacy, which is defined as â€Å"the surrogate receives a transferred embryo createdRead MoreSurrogate Mothers : The Topic Of Many Controversies1075 Words   |  5 PagesGonzalez Mr.Kegley Health Science- 6th period September 23rd, 2015 Surrogate Mothers Surrogate mothers have been the topic of many controversies, regarding how ethical it is. As many know surrogate mothers are women who bear a child for another woman (Surrogacy: the experiences of surrogate mothers, 2196-2204). There has been many sides to this argument, deciding whether it was ethical or unethical. Some people have chosenRead MoreModern Surrogacy: Choosing between Traditional or Gestational1193 Words   |  5 Pagesand Sarah have a child by Sarah’s maidservant Hagar (NIV Genesis 16:1-4). So surrogacy in its most basic form—a woman birthing a child for another person of couple—is not a new concept. However, it is prohibited or void and unenforceable in five states. What is it about modern surrogacy that do people not like? What even is modern surrogacy? There are two types of surrogacy: traditional and gestational. Traditional surrogacy is a contractual situation in which a woman becomes impregnated, by artificialRead MoreEssay Reproduc tive Techniques: In Vitro Fertilization1197 Words   |  5 Pagesand gestational surrogacy have sparked new interests to women who do not have the ability to reproduce on their own. Legal, moral and ethical issues have been raised about these advanced methods of reprodution used to substitute natural conception and birth. These advanced techniques raise issues concerning the rights and parenthood. What does occur in the process of sperm donation? What happens when a surrogate mother refuses to give the child? What are the motives of the surrogate mother and whyRead MoreSurrogate Motherhood940 Words   |  4 PagesIn the past adoption was the only alternative for infertile women who wished to have children. Advances in technology however have created new options for women who have a defective uterus or defective ovaries. Two alternatives that are gaining popularity are straight surrogacy and host surrogacy. In straight surrogacy, or traditional surrogacy, the surrogate mother is impregnated with the sperm of the intended father by way of artificial insemination. In these cases, the surrogate mother notRead More Surrogate Motherhood Essay851 Words   |  4 Pages Surrogate Motherhood: Good or Bad? nbsp;nbsp;nbsp;nbsp;nbsp;There are many controversies surrounding the idea of surrogate motherhood, by its definition, it is a course of action that goes outside natural reproduction. Although surrogacy was first brought up in the bible it is only until recently that it has actually become an issue for criticism and debate. Factors such as the growth of infertility in modern society, coupled with the declining number of children available for adoption, andRead MoreThe Legal Responsibilities Of Surrogacy868 Words   |  4 PagesWhat is surrogacy? The definition of surrogacy is: The process of giving birth as a surrogate mother or of arranging for another women to carry and give birth to a baby for you/ a couple who want to have a child. There is a contract that should be drawn up stating the legal responsibilities of the surrogate and the specifics as to when the child is born if the surrogate will have any visitation rights or if they will relinquish all legal parental rights over the child. Issue Surrogacy is becomingRead MoreShould Surrogacy Be Legal?1712 Words   |  7 Pages through medical intervention, surrogacy has become a viable alternative. The Merriam-Webster Dictionary defines Surrogacy as the practice by which a woman (referred to as a surrogate mother) becomes pregnant and gives birth to a baby in order to give it to someone who cannot have children (Merriam 1). This lucrative option can be a great tool for family building, but not every part of the world views surrogacy as a lawful practice. In countries where surrogacy is not legal, people often lookRead More surrogate mothers Essay1148 Words   |  5 Pages A Surrogate Mother is defined as â€Å"an adult woman who enters into an agreement to bear a child conceived through assisted conception for intended parents.† The couple is usually referred to as intended parents who enter into an agreement providing that they will be the parents of a child born to a surrogate through assisted conception, using an egg or sperm of at least one parent. 1 RIGHT - Surrogate motherhood is a right entitled to those who are ready and able to take on the responsibility ofRead MoreLife Can Bring On Wild Challenges Day After Day886 Words   |  4 Pagesto get pregnant. Because of this I may have to settle on two options, adoption or surrogacy. This paper will look at the pros and cons for both, maybe helping me figure out what may be the best path in the future. â€Å"There are 423,773 children in the U.S. foster care system; 114,556 of these children are available for adoption† (Thomas). Growing up, being in high school, I never thought about adoption. Now that I am older adoption is definitely an option in my eyes. There are so many loving children

Thursday, December 12, 2019

Internet Technology and Internet Security

Question: Describe about the Internet Technology and Internet Security ? Answer: Report Layout Chapter 1: Introduction 1.1 Outline of the thesis As the internet technology is rising in a very fast way and with this speed of rising of internet the internet devices is also get affected through viruses, worms, Trojan, etc on a rapid way so the internet security is now a days become very important. Internet Security (Kirkby, 2001) is one of the parts of the very vast issue of computer security which is related to the internet. It in most of the cases contains the browser security which is applied to protect the computer systems and data while browsing from the viruses which attacks online and also involves the network security which provides the unauthorized access of data from network . ('Internet Safety', 2009) Through internet security we can protect the devices from the unauthorized access, hacking (Lee, 2014) and most importantly from viruses and for this we take some major steps as like as antivirus, firewalls, limited uses of JavaScript, etc. This report will be analyzing all about that internet security which includes how it causes the ill-effect and also what to take the major steps to reduce these attacks and to keep it safe for the users(Westra, 2002). 1.2 Problem Statement With this increase of the internet usage, various problems are arising regarding the security and the protection. In this report, it will be discussed about why and how of the problem and also what the necessity steps to take to control this kind of attacks on the daily basis. 1.3 Research Questions Why having the internet security is important? How the internet can be secured and what are the best possible ways? What are the main reasons for which we have to maintain the security of internet? 1.4 Structure of the report 1st Chapter: Introduction: In this part the introduction of the internet security and the problems regarding with this and the measure of the protection which should be taken are discussed in a brief structure so that it can give the brief overview of the whole study which will be done later on. 2nd Chapter: Literature Review: This chapter is discussed about the theories and the concepts which are used to understand the topic in a detailed manner and the critical issues are also described in an elaborate way. This also includes the advantages and the disadvantages of the topic which are discussed and also the requirement of the internet security and the necessity steps which are required to follow are also described. 3nd Chapter: Research Methodology: In this chapter, the collection of data, research approach which will be used, design, philosophy which helped in the analysis of the topic is discussed in a procedural way and also gives the brief description of these methods which will be used to carry the analysis of the study (Velasco, Herrero Prieto, 2014). 4th Chapter: Results and Findings: This chapter deals with the results and the findings of the data which are collected and analyzed on the previous chapter and which will help to understand the topic in a better manner according the more practical users response. 5th Chapter: Discussion and Analysis: The collected data and the findings which we get from the previous chapter are discussed and analyzed through the various techniques and charts so that it will help in a better way to gain the sufficient quantitative knowledge regarding the topic (Gionis, 2013). 6th Chapter: Conclusion: Now days internet security becomes the most essential part and this chapter tells about the summary of those chapters which are already discussed earlier in which the topic is tried to be researched. In this part we also get to know the ultimate outcome which I get form the above discuss (Merkow Breithaupt, 2000). Chapter 2: Literature Review 2.1 Introduction About 10 years ago, the internet was only the topic about which it was only talked about. It was a vast source which gives the information but the accessing users were less in number. But in todays life the internet becomes the vital part of our lives through which we can remain connect throughout whole world in a very easy way ('Firewall for always on connections', 2000). Through internet we can also do most of the work just of as access our bank account, paying of bills and taxes and to send mail to others. But as we all know that everything which has well sides and also has the bad sides. As the good side is discussed above and in bad sides it allows the harmful threats to attack our computers. So the internet security is become a very important issues ('Internet Safety', 2009). This part will deals with the types of internet threats, security, protection etc through which we can secure the internet (Householder, Houle Dougherty, 2002) . 2.2 Internet Security and Internet Safety Internet security (Merkow Breithaupt, 2000)and internet safety ('Internet Safety', 2009) is mostly two related terms which discuss and tells about the same thing in a different manner in more detailed manner. Internet safety deals with the ideas how to increase the safety of the users personal data. Some common threats regarding internet safety includes spam, phishing, cyber stalking, malware ('Internet Safety', 2009) etc. As argued by Stephenson (2004), internet security is the big issues in these days of modern technologies. There are majority of people who passed most of time in internet in order to access illegal information from the computer user. Cyber crime is one of the most popular name and hacking methodology in internet security area. In order to make safe in internet technology are, implementation of anti-virus software, firewall activation in computer system, etc. On the other sides, internet security deals with both the network security and the browser security. So to avoid the attacks of the threats and the redundancy of data loss both the internet security and internet safety is needed to be maintained (Kirkby, 2001). 2.3 Types of Internet attacks Virus attack Viruses is actually a malware program which is coded in such a way that it can automatically install mainly through the internet and also increased by a number through the every access of the file. It replicates in such a way and in such a rapid manner that in short span of time it acquires most of the spaces of the hard disk which results to the crash of the hard disk and sometimes also results in the deletion of the important documents from the hard disk. Virus is actually a man-made program which is made by coding a computer program and then distributed it to the internet by attaching to the other files. Viruses attack can be of two types- parasitic and boot. In parasitic attack the virus replicates in number and acquire the hard disk space on the other hand in boot attack the virus directly affects the booting system of the computer. Some of the examples of the virus are concept virus, Melissa virus, etc (Stephenson, 2004). In order to protect virus attack in comput er system, user has to install antivirus software with up to date version. Worm attack Worm is a self-sufficient malware program which also of viruses automatically without the host files and spread through the internet. It attacks the computer in such a way that it copies the computer important file without the notice of the user through the internet which results the failure in case of security. They mainly attack the bandwidth of the network more than the corruption of the file. It has the capability to penetrate the firewall and most of the internet security and then crash the windows Operating System fully which results to failure of the full system. Some of the examples of the strong computer worm which affects the systems are Jerusalem which is also known as black box, Michelangelo, storm worm etc (Stephenson, 2004). Trojan attack Trojan are also malicious in nature which claims to be useful in nature and acquires the users permission to access but actually the virus which deletes, copies, blocks, modify the data itself and also change the format of the data in its own manner as it gets the full control of the computer. Trojan cannot replicate by their own but behave in such a way that users itself give the permission to access and they cannot understand also what type destruction it already causes to the computers system. Some of the notable Trojan horses are Zero Access, Beast, and Zesus etc (Boyle, 2001) . Spyware attack and Adware attack Spyware is also one type viruses which allow the hackers to consume the users personal information such as password and other important information without the users knowledge. This type of viruses are linked with the download sites and when the user open this sites to download something this virus automatically installed to the users computer and acquire the information. Some of the examples of the computer spyware are try media, nuvens and live PC care, etc (Householder, Houle Dougherty, 2002) . On other hand, adware is also the application program which runs through the advertisement package when some of the program is running (Householder, Houle Dougherty, 2002). This type of viruses is also known as freeware. One of the perfect examples of the adware is Desk Ad. 2.4 Requirement of Internet Security Internet security in now days is one of the most important requirement of the computer users and have the security of the internet from the threats. The technology and the internet advancement are growing now days in such a rapid way that also the attacks of the threats are also increasing in a competitive manner of the advancement of the internet (Kirkby, 2001). So to develop the protection of the viruses of the computers, laptops, mobile phones from the malware, threats, viruses, Trojan horse etc we have to secure the internet first. To avoid the redundancy and the leakage of the data from the computer the internet security is essential. If there is no security there is the high chance of the corruption of the software, hard disk and also the misuse of the data through the internet by hacking (Basu, 2010). The safest method to provide the internet security is to install good powerful security software which immediately removes the virus from the computer and identify the damaged fi les and software so that it can immediately be scanned and remove from the computer and also tell if any intruders are trying to harm and changes to the computer (Kirkby, 2001). 2.5 Ways of Internet Security As the internet attacks are increasing in a rapid manner so to neutralize the attack of the internet threat the advancement of the internet security are also increasing which are discussed below- Usage of the Email security- Email security is known as electronic privacy which prevents the email form the unauthorized access and also the automatic download of the attachment of the email which sometimes may also be the viruses and also protect from the spam download, the email data leakage and also saves the bandwidth costs and also limit the usage of the JavaScript in the web browser. Email security (Sunner, 2005) also helps to avoid the junk folder and also provide the authenticity of the recipients and the senders and also scan the attachments prior to the downloading (Sunner, 2005) . Encryption Encryption is actually the encoding of the data and information in such a manner that only the users who are authorized to do that can decode or read the messages. This type is also one of the process through which we can prevent the users computer from the internet attack. The encrypted text is known as cipher text (Sree Vivek, 2012) . In encryption there are two types where one is asymmetric encryption which is also known as public-key encryption and another is symmetric encryption ('Simple Steps to Data Encryption', 2013) . Firewalls Firewall ('Firewall for always on connections', 2000) is the other method to secure the internet from the attacks of the threats. It actually detects and prevents the unauthorized access from the network. It is also a computer software program which is actually acts as wall between the internet world and the computer. In it some of the basic rules are set which are follows to all the incoming and the outgoing data to and from the computer ('Firewall protects home PCs', 2000) . Secured web browsing The tendency of browsing of the internet user is the most common thing and through browsing many of the viruses attacks the users computer without the users acknowledge (Fourie Bothma, 2007). So to prevent the computer from this attack we can enable the browser security from the settings of the browser and also deactivate the tracking of the IP addresses of the sites so that the virus and the worm attack are reduced through which we can do the safer internet surfing ('Web security under threat', 2011) . 2.6 Summary In the above section the different types of the internet attacks and the different ways how to protect the computer from these attacks are introduced and explained and also how to secure the internet. In short, the necessity of the internet security is described and also tells about the better knowledge of the internet security and how to improve and up to date the internet security(Kirkby, 2001). Chapter 3: Research Methodology 3.1 Introduction Research methodology is the way by which we can draw the effective business decision from the collected information and data (Velasco, Herrero Prieto, 2014) . In research methodology the surveys, interviews and many other techniques which will be helpful for doing the research are introduced. It also helps in better understanding and undertaking the methods which will be helpful for completing the project in a better way (anon, 2012) . 3.2 Research Design In one word research design is also known as the blue print of the study. Research design is of three types as- exploratory, descriptive and explanatory. In this study the researcher select the descriptive type of research designing. In descriptive research design, the whole phenomenon is being analyzed and the results are discussed on the basis statistical measure. The observation, survey and also many other types of analyze are included in this descriptive type of design (anon, 2012) . 3.3 Data collection Methods Actually data are mainly of two types. First is primary data which is collected through surveys, observations, questionnaire and the direct contact with the respondent etc. this type of data are actually needed for the descriptive analysis of data and there are another types of data which is secondary data which is already some other reports where the collected data are also been analyzed and the source of this types of data are generally the reports, journals and magazines, etc(McGee, 2007). 3.4 Hypothesis To carry this research in a successful manner some of the 140 internet users are considered and their security problems are studied in a elaborate way. Among them 60 of the users responded which helps the researcher to carry out the study and to reach in an effective conclusion. 3.5 Summary In this chapter we discussed whole above the research design, collection of data methods and the hypothesis through which we can elaborate the collected data and discuss with the help of the step by step approach of research methodology which will be useful to the researcher and also tell in short about the research methodology (anon, 2012). Chapter4: Results and Findings 4.1 Introduction Through this chapter we deal with the collected data and also analyze the data which will help in the better understanding of the topic internet security. The collected data will be used and analyzed in an elaborate way to get the better understanding of the research work. 4.2 Quantitative Analysis (For Users) 1. For how long do you use internet? Options No of respondents Total respondents Response % 1-2 years 6 60 15% 3-5 years 20 60 50% 6-10 years 10 60 25% 11-15 years 14 60 35% More than 15 years 10 60 25% Table 1: Users usage of internet Figure 1: Users usage of internet This is seen that 15% of the users use the internet for 1-2 years, 50% of the users uses for 3-5 years, 25% for 6-10 years, 35% for 11-15 years, and for more than 15 years only 25% of the users use it. 2. What are the devices you use for internet? Options No of respondents Total respondents Response% Computers 20 60 50% Laptops 15 60 37.5% Tablets 10 60 25% Phones 15 60 37.5% Table 2: Devices where internet are used Figure 2: Devices where internet are used 50% of the total users use the internet from the computers, 37.5% are uses from the laptops, 25% of total uses from the tablets and through phones 37.5% are using internet. 3. How much you are concerned about the internet security? Options No of respondents Total respondents Response % Most likely 20 60 50 Likely 15 60 37.5 Neutral 10 60 25 Less 7 60 17.5 Very less 8 60 20 Table 3: Concern about the internet security Figure 3: Concern about internet security From whole 50% and 37.5% of the users are most likely and likely concerned about the internet security, 25% of them are neutral and at the end 17.5% and 20% less and very much less about the internet. Chapter 5: Discussion 1. It is noticed that more numbers of the users using the internet about 6-10 years and now days the usage of internet increased in rapid rate and also get very much popular because now everything is getting possible through the internet connection. 2. Most of the users are accessing the internet from their phones and laptops since these two devices are very much comfortable among the users and they can access the internet from anywhere as it is easy to accommodate in every situation. 3. As the hacking, virus attacks are increasing in rapid rate in todays date, the internet users are also getting concerned about the security of the internet usage and they are also taking the important steps to avoid the internet attack and to keep safe. Chapter 6: Conclusion All through this research, it is become cleared that internet security is one of the rising concern for the internet users. It is needed to protect the data and information of the users so that the leakage and the corruption of the users personal information are avoided. So the rate of protection from the internet threats is also increasing to maintain the speed of the increasing number of the internet attack. Reflective Report According to my study, the internet security is one of the most important issues of concern of todays world. As now every things are becoming computerized through the internet so generally the usage of the internet is also increasing in a rapid pace. With this increase of internet usage the threats attacks are also increased and to safe the computer system from this type of threat attack the internet security is introduced. As I go through the different types of journals and magazines it shows how hackers use the different types of internet hacking through which they can access the users personal information and also corrupt the hard disk of the computers and also introduced the dangerous malicious viruses. This type of internet hacking and the breaking down of the security of the internet is done with the help of the viruses, Trojan horse, malware, adware etc through web browsing, email, CDs, DVDs or external hard disks. I also noticed that the viruses also attacks the computer in w hich it replicates in number and destroy the space of the computers memory, also tracks the IP address or the Email address of the users through which they can also leak the important mail of the users. Since, with the advancement of the internet technology and the internet usage, the issues of the security of the computer systems are also increased in a considerable rate. After this whole study I have learned that the internet security is not be so easy and also cannot be reduced in a full manner. But then also we take some of the measure so that we can reduce the rate of the attack of the viruses by using firewalls, encryption of data, securing web browsing and secure emailing. Through the encryption and the decryption method of data, only users who are sending the data and to whom they are sending are only can accessed which decrease the redundancy, misuse or loss of the data. Through the firewall we can also check all the data which are going from the computer and also the data which are coming to computer. And through secured email process and secured web browsing method, the rate of getting effected of the computer system will be reduced in some extent. For getting the successful outcomes from this research work, I prepared a questionnaire for all the internet user about their experience of the internet. I distributed this questionnaire among the 150 users among them 60 of the users are responded. Through this, I concluded that that maximum of the users are comfortable with the internet usage and also very much concerned about the internet security. I also noticed that the users are also take the suitable steps to control the data redundancy which helps in data security and also maintain the data integration. Reference List anon,. (2012). Research-on-Research: Research-on-Research Reports.Research-Technology Management,55(6). doi:10.5437/08956308x5506906 Basu, C. (2010). Internet Safety.Journal Of Information Privacy And Security,6(3), 74-75. doi:10.1080/15536548.2010.10855895 Boyle, M. (2001). The computer as a Trojan Horse.Journal Of Computer Assisted Learning,17(3), 251-262. doi:10.1046/j.0266-4909.2001.00179.x Firewall for always on connections. (2000).Computer Fraud Security,2000(12), 5. doi:10.1016/s1361-3723(00)12018-4 Firewall protects home PCs. (2000).Computer Fraud Security,2000(8), 5. doi:10.1016/s1361-3723(00)08015-5 Fourie, I., Bothma, T. (2007). Information seeking: an overview of web tracking and the criteria for tracking software.AP,59(3), 264-284. doi:10.1108/00012530710752052 Gionis, A. (2013). Data Analysis.Data Science Journal,12(0), GRDI13-GRDI18. doi:10.2481/dsj.grdi-003 Householder, A., Houle, K., Dougherty, C. (2002). Computer attack trends challenge Internet security.Computer,35(4), sulp5-sulp7. doi:10.1109/mc.2002.1012422 Internet Safety. (2009).Archives Of Pediatrics Adolescent Medicine,163(10), 968. doi:10.1001/archpediatrics.2009.174 Kirkby, A. (2001). Internet Trust And Security.Network Security,2001(9), 6. doi:10.1016/s1353-4858(01)00913-8 Lee, M. (2014). History of Hacking.Engineering Technology Reference. doi:10.1049/etr.2014.0011 McGee, P. (2007). Ethical Issues in Data Collection.Research Ethics,3(2), 53-53. doi:10.1177/174701610700300206 McGee, P. (2007). Ethical Issues in Data Collection.Research Ethics,3(2), 53-53. doi:10.1177/174701610700300206 Merkow, M., Breithaupt, J. (2000).The complete guide to Internet security. New York: AMACOM. New secure email protocol promised. (2013).Computer Fraud Security,2013(11), 3. doi:10.1016/s1361-3723(13)70098-8 Simple Steps to Data Encryption. (2013).Network Security,2013(9), 4. doi:10.1016/s1353-4858(13)70100-4 Sree Vivek, S. (2012). Efficient Conditional Proxy Re-Encryption With Chosen Cipher Text Security.International Journal Of Network Security Its Applications,4(2), 179-199. doi:10.5121/ijnsa.2012.4214 Stephenson, P. (2004). Modeling a virus or worm attack.Computer Fraud Security,2004(9), 15-19. doi:10.1016/s1361-3723(04)00112-5 Sunner, M. (2005). Email security best practice.Network Security,2005(12), 4-7. doi:10.1016/s1353-4858(05)70311-1 Velasco, J., Herrero, T., Prieto, J. (2014). Methedology for designing, observing and computing external geodetic networks of long lengths tunnels.Inf. Constr.,66(533), e010. doi:10.3989/ic.13.007 Web security under threat. (2011).Network Security,2011(10), 1-20. doi:10.1016/s1353-4858(11)70100-3 Westra, B. (2002). HealthLinks: A ColdFusion Web Application.Internet Reference Services Quarterly,7(1-2), 63-88. doi:10.1300/j136v07n01_05

Wednesday, December 4, 2019

Quanitative Resaerch Analysis Quantitative Study

Question: Discuss about theQuanitative Resaerch Analysisfor Quantitative Study. Answer: Introduction: In the view point of Ang, Rockstuhl and Ng, (2014), the purpose of a research is to explain the variation in the world. Variables are the names given to the variance that a researcher wishes to explain in the study. In any kind of experiment, there remain two variables, the dependent one and the independent one. The variables are the forces or the parameters that causes a change in another variable. This particular journal is aimed at identifying the different variables used by Zhang and Oczkowski, (2016) in their study Exploring the potential effects of expatriate adjustment direction. A detailed analysis of the variables used in the quantitative study shall be carried on. The research is based on the cross-cultural adjustment of the assigned expatriates across the different cultural and national boundaries as a result of globalization. In addition to the investigation of the variables, the journal shall focus on the motivation including the variables in the conceptual framework and the scope of including other variables in the study. Variables of the Research: The major variables that have been recognized in this particular study are cross-cultural adjustment, cultural intelligence and the cultural adjustment. Apart from these variables, there are other variables like age, gender, profession and workplace experience as well that have been recognized as other variables of the study (Zhang Oczkowski, 2016). These variables can be explained below: Dependent Variables: Dependent variables are the ones that are affected at the time of conducting a research. Cross-cultural adjustment (CCA) is the dependent variable of the study (Zhang Oczkowski, 2016). Cross cultural adjustment has been defined as the major psychological factor, commonly known as psychological shocks that are the characteristics of certain symptoms of an individual to act according to the situation. As pointed out by Crowne, (2013), culturally adjusted expatriates tend to be more open to the host culture. They are able to add new behaviors and norms according to the host countries. The complete research paper is based on this depended variable. Independent Variable: Independent variables are the ones that are manipulated at the time of conducting the research. The independent variable that has been identified in this study is cultural intelligence (Zhang Oczkowski, 2016). According to Malek and Budhwar, (2013), cultural intelligence is the capability of a person to relate and work effectively in a cross cultural environment. The cultural intelligence of a person depends on the factors like attitude, cognitive power and the belief of a person. Cultural intelligence or cultural asymmetry has the moderate impact on adjusting the changes and the challenges in the environment. Intervening Variable: The intervening or the intermediary variable is the one that is used to get a link between the two variables used in the research study. The intervening variable used by Zhang and Oczkowski, (2016) is adjustment direction. It is the capability of a person to cope up with the situation where they belong to in case if there is a difference in the culture of the people present in a particular place. This variable has been useful in understanding the relationship between the variable and independent variable. Motivation for Including the Variables in the Conceptual Framework of the Research: The aim of including these variables in the theoretical framework of the study is to incorporate the crucial elements that manipulate the ability of a person to cope up with the situation with culturally different people (?ahin, Gurbuz Kksal, 2014). In order to uncover the important empirical relationship between the two variables, it is important to create a two-way flow expatriation and this motivates the authors to incorporate the two variables in the conceptual framework of the study (Zhang Oczkowski, 2016). In addition to this, the ability of a person to adjust with the situation and the outcome of the adjustment is equally important. These are the reasons for incorporating the variables in the conceptual framework. Means of Measuring the Variables: The authors have used the sampling size of 200 respondents in deriving at a particular conclusion. The Australian expatriate in China and the Chinese expatriates in Australia were the major focus group of the study. The under graduated students were the major focus groups who were taken into consideration for the particular research study. The dependent variable cross-cultural adjustment has been represented by two sub-constructs SCA and PCA. In order to evaluate this, SCA was measured using the Black and Stephenss 14-item scale formula (Zhang Oczkowski, 2016). On the other hand, PCA the 12-item general health scale has been applied to monitor the different levels of well-being of the employees in organizational contexts (Zhang Oczkowski, 2016). The relationship between the cognitive behavioral cultural intelligence has been measured by the means of these formulae. Scope of Including Other Important Variables: If the establishment of the variables that have already been used in the study is considered, it has to be said that there remain the scope of including a number of other variables as well. The most important variables that have better scope of including in the study are age, gender, cognitive behavior, experience of the person with other different cultures. Of these mentioned variables, profession and the experience of dealing with people from other culture can be considered as the most important variables that would shape the research study in the right direction. Conclusion: An analysis of the different variables used by the author in the study has been done in this journal. The empirical study undertaken by the author has a number of variables that have been nicely assimilated to get the prospected outcome. The conceptual framework used by the authors helped to create a better understanding of the entire study in a glimpse. In addition to this, a number of variables that could be included in the study has also been proposed. It can be easily assumed that age, gender, experience and profession of a person are important factors that link cultural intelligence with cross cultural adjustment. References: Ang, S., Rockstuhl, T., Ng, K. Y. (2014). Performance-based cultural intelligence (CQ): Development and validation of an intercultural situational judgment test (iSJT).Center for Leadership and Cultural Intelligence. Crowne, K. A. (2013). Cultural exposure, emotional intelligence, and cultural intelligence: An exploratory study.International Journal of Cross Cultural Management,13(1), 5-22. Malek, M. A., Budhwar, P. (2013). Cultural intelligence as a predictor of expatriate adjustment and performance in Malaysia.Journal of world business,48(2), 222-231. ?ahin, F., Gurbuz, S., Kksal, O. (2014). Cultural intelligence (CQ) in action: The effects of personality and international assignment on the development of CQ.International Journal of Intercultural Relations,39, 152-163. Zhang, Y., Oczkowski, E. (2016). Exploring the potential effects of expatriate adjustment direction.Cross Cultural Strategic Management,23(1), 158-183.

Thursday, November 28, 2019

Coke Vs Pepsi Fighting For Foreign Markets Essays (3462 words)

Coke vs Pepsi Fighting for Foreign Markets Introduction The soft-drink battleground has now turned toward new overseas markets. While once the United States, Australia, Japan, and Western Europe were the dominant soft-drink markets, the growth has slowed down dramatically, but they are still important markets for Coca-Cola and Pepsi. However, Eastern Europe, Mexico, China, Saudi Arabia, and India have become the new "hot spots." Both Coca-Cola and Pepsi are forming joint bottling ventures in these nations and in other areas where they see growth potential. As we have seen, international marketing can be very complex. Many issues have to be resolved before a company can even consider entering uncharted foreign waters. This becomes very evident as one begins to study the international cola wars. The domestic cola war between Coca-Cola and Pepsi is still raging. However, the two soft-drink giants also recognize that opportunities for growth in many of the mature markets have slowed. Both Coca-Cola, which sold 10 billion cases of soft-drinks in 1992, and Pepsi now find themselves asking, "Where will sales of the next 10 billion cases come from?" The answer lies in the developing world, where income levels and appetites for Western products are at an all time high. Often, the company that gets into a foreign market first usually dominates that country's market. Coke patriarch Robert Woodruff realized this 50 years ago and unleashed a brilliant ploy to make Coke the early bird in many of the major foreign markets. At the height of World War II, Woodruff proclaimed that Awherever American boys were fighting, they'd be able to get a [emailprotected] By the time Pepsi tried to make its first international pitch in the 50s, Coke had already established its brand name and a powerful distribution network. In the intervening 40 years, many new markets have emerged. In order to profit from these markets, both Coke and Pepsi need to find ways to cut through all of the red tape that initially prevents them from conducting business in these markets. This paper seeks to examine these markets and the opportunities and roadblocks that lie within each. Coke and Pepsi in Russia: In 1972, Pepsi signed an agreement with the Soviet Union which made it the first Western product to be sold to consumers in Russia. This was a landmark agreement and gave Pepsi the first-mover advantage. Presently, Pepsi has 23 plants in the former Soviet Union and is the leader in the soft-drink industry in Russia. Pepsi outsells Coca-Cola by 6 to 1 and is seen as a local brand. Also, Pepsi must counter trade its concentrate with Russia's Stolichnaya vodka since rubles are not tradable on the world market. However, Pepsi has also had some problems. There has not been an increase in brand loyalty for Pepsi since its advertising blitz in Russia, even though it has produced commercials tailored to the Russian market and has sponsored television concerts. On the positive side, Pepsi may be leading Coca-Cola due to the big difference in price between the two colas. While Pepsi sells for Rb250 (25 cents), Coca-Cola sells for Rb450. For the economy size, Pepsi sells 2 liters for Rb1,300, b ut Coca-Cola sells 1.5 liters for Rb1,800. Coca-Cola, on the other hand, only moved into Russia 2 years ago and is manufactured locally in Moscow and St. Petersburg under a license. Despite investing $85 million in these two bottling plants, they do not perceive Coca-Cola as a premium brand in the Russian market. Moreover, they see it as a "foreign" brand in Russia. Lastly, while Coca-Cola's bottle and label give it a high-class image, it is unable to capture market share. Coke and Pepsi in Romania: Romania is the second largest central European market after Poland, and this makes it a hot battleground for Coca-Cola and Pepsi. When Pepsi established a bottling plant in Romania in 1965, it became the first U.S. product produced and sold in the region. Pepsi began producing locally during the communist period and has recently decided to reorganize and retrain its local staff. Pepsi entered into a joint venture with a local firm, Flora and Quadrant, for its Bucharest plant, and has 5 other factories in Romania. Quadrant leases Pepsi the equipment and handles

Sunday, November 24, 2019

Panic Disorder Essays - Psychiatric Diagnosis, Anxiety Disorders

Panic Disorder Essays - Psychiatric Diagnosis, Anxiety Disorders Panic Disorder The purpose of this paper is to understand Panic Disorder and symptoms, types of the disorder, treatment, and relation to other disorders and how it affects people in general. Included, is a case study of Sarah who suffered with a panic disorder. Panic Disorder is when someone experiences unexpected panic attacks followed by at least one month of persistent concern about having another panic attack, worrying about the possible consequences of the panic attacks, or a behavioral change related to the attacks (Millon, 1996, p.559). Panic Disorder is not a disease. It may be assessed, but not definitively diagnosed. This disorder is distressing and disabling, physically, psychologically, and socially (Harvard, 2000, p.1). One symptom of Panic Disorder is unexpected panic attacks. At least two panic attacks are required for diagnosis. Attacks may last from several seconds to several minutes. Doctors believe that every attack has a situational trigger and an essential feature (Morrison, 1995, p.402). Another symptom of the disorder is constant concern and worry. The most common trait found in all Panic Disorder patients is a fear of being embarrassed. When a person takes an attack once they are paranoid for up to three months about going into public for fear of taking another attack. People diagnosed with panic disorder experience great anticipation and are very anxious when they look forward. They often worry and think of the worst possible outcomes, and at night, nightmares often occur. Panic disorder patients often assume that they have an undiagnosed disease or think they are going crazy (Harvard, 2000, p.8). Sarah, also experienced severe anxiety in social situations. She had a terrible fear of having another attack, fear of losing consciousness, and a fear of embarrassment in social situations. Sarah had suffered in her sleep as well. Constant nightmares persisted, causing lack of sufficient sleep. Sarah felt she was going crazy, because of the fact that she didnt know what was wrong with her. One symptom of this disorder is behavioral change. Depression is a very common trait in people who suffer with panic disorder. The rate of attempted suicide is twenty times higher among individuals with panic disorder than the general population (Morrison, 1995, p.403). Many people with panic disorder also suffer from alcoholism. People with panic disorder often have great anticipation. Physical conditions are another one of the symptoms of panic disorder. Panic disorder effects physical features of a persons body such as high blood pressure, loss of bladder control, chemical change in ones body, prolapsed and thyroid disease. During the attack a person can experience excessive sweating, chills, chocking, shortness of breath, hot flashes, nausea and pains in their chest. Dizziness, shaking and pounding of the heart are also physical features of this disorder (Laliberte, 1998, p.117). During Sarahs attacks, she experienced many of these physical symptoms. She had shortness of breath, hot flashes, pains in the chest, dizziness (causing her to pass out at times), and shaking and pounding of the heart. She felt as though the attack overpowered her thoughts or feelings, overwhelming her. In this paper we are going to look at four different types of Anxiety Disorders. The first type is Anxiety Disorder due to a general medical condition. Anxiety Disorder due to a general medical condition is diagnosed whenever a panic attack is thought to be a direct physiological consequences. Tests done on physical and mental health, help to determine what the role of the general medical condition is. The second type of Anxiety Disorder is Substance-Induced Anxiety Disorder. It is nearly the same as the first type mention, only instead of being a consequence of a medical disorder; it is a consequence of a substance. The substance could be a number of different things including a drug or medication. Nervous system depressants and stimulants can also trigger a panic attack (Morrison, 1995, p.401). The third type of anxiety disorder is Obsessive-Compulsive Disorder. There are many people who suffer with this type. Whenever someone has an obsession and views an object that triggers their obsession it could lead straight into a panic attack. An example is someone who is obsessed with cleanliness; the item that triggered the attack could possibly be dirt. The last type

Thursday, November 21, 2019

Increased Empowerment Of The American Non-Commissioned Officer Essay

Increased Empowerment Of The American Non-Commissioned Officer - Essay Example This paper shall focus on the increased empowerment of the American Non-commissioned officer over time. The paper shall, also discuss the fundamental causes and consequences of the shift in responsibilities of the NCOs down the chain of command. Moreover, the paper shall discuss how well the US military is prepared or not prepared for the ever increasing burdens of responsibility. Finally, I shall give my opinion of whether or not this trend shall continue. For one to understand the ever increasing empowerment of the American Non-commissioned officer, it is essential to review the history behind it. The history of the NCO in the United States can be traced back in 1775 with the dawn of the Continental army. This officer did not copy Britain, but just like the American army, he blended French, Prussian, and British army traditions into a unique American institution (Bland, 2009). The development of change in the organization and action of the military offers an insight into the transfer of ultimate power and responsibilities down the succession of command. As much as the empowerment of the NCO is ever increasing, it is arguable that there is more room for further advancement for the military. There are several factors that have contribute to the increased empowerment of the non-commissioned officer in America, however, this paper shall focus on the three most important; advanced training opportunities, fighting strategies, and military d octrine (Bland, 2009). Advanced training opportunities It has constantly been argued that knowledge is power. This holds true considering the ever increasing empowerment of the American NCO. It is true that technical skills and leadership training are essential for a successful and affective NCO. Before the publicized training manuals for NCO, the only available training was on-the-job training (Fisher, 1994). Professional education was unknown for NCOs except the constant instructions received from company commanders. All leadership skills were practically learned during operations. Today, however, skills in leadership are taught continuously providing proper decision-making for trainees. The training required to make use and maintain complex battle equipment during the First World War initiated the technically advanced field training that paved way for a leadership role. Advanced training was essential for medical services, artillery, as well as other military operation areas. Wit h time, technology grew as wars became more sophisticated. As a result, leadership demands for NCO also grew. General John Pershing recommended that NCO receive a formal training, a suggestion that sparked the NCO academy system in the 1950s (Fisher, 1994). Later, a Non-commissioned officer Candidate Course was created that trained NCOs in combat arms. The NCO’s Educational System put a formal training system that educated both men and women. Fighting strategies Battle history evidences that the constant changes in fighting led to the evolution of the NCO as a leader in the military. In the early days of