Saturday, December 28, 2019

The Hiv / Aids Epidemic - 3453 Words

Globally, there is good news. In 2011 the World Health Organization (WHO) claimed that the HIV/AIDs epidemic was declining in their â€Å"Global HIV/AIDS Response† progress report (Progress Report 2011). Each continent and region, however, showed different changes in their rates of HIV/AIDS (Progress Report 2011). In North America, and specifically in the United States, the incidence of HIV has been constant for the past several years (Progress Report 2011). Despite the stability of this disease, the proportions of who is becoming infected are alarming (Progress Report 2011). Men who have sex with men (MSM) accounted for nearly 57% of the patients who were newly infected with HIV in 2010; and this is the case for MSM around the world†¦show more content†¦Part of why HIV is so deadly is that once an individual contracts the virus, they will have it for life. Another alarming fact about HIV is that the transmission of infected to uninfected individual is typically facilitated through STDs; commonly referred to as co-infections. The main portion of the population that is affected by STDs and thus put at risk of acquiring HIV is the encompassing age group of 15- to 30-year-olds. This is the target group for VDH. Today’s youth are becoming infected with STDs at an even greater rate, which increases their chance of receiving HIV and thus spreading it. The Center for Disease Control (CDC) conducted research and collected 11,631 health risk behaviors questionnaires from students in 124 different schools across the country (Lowry et al.). The purpose was to determine the risk that high school-aged student put themselves at for acquiring STDs and ultimately HIV (Lowry et al.). The students â€Å"were stratified into one of four mutually exclusive groups† depending on their drug use: no drugs and alcohol, only alcohol and/or cigarettes, marijuana, or illicit drugs (Lowry et al.). The respondents were also examined by their sexual risk behaviors: had sex, had sex with four or more partners, and had sex without a condom (Lowry et al.). The findings showed that the â€Å"prevalence of sexual risk behaviors was least among students who reported no substance use† (Lowry et al.). TheShow MoreRelatedThe Epidemic Of Hiv And Aids1535 Words   |  7 Pagespopulation include providing access to health care, HIV testing and syringe services programs. The Office of HIV Planning in Philadelphia focuses on the needs of the population, conducts community outreaches and educational sessions. As previously stated, 32 state Medicaid programs reimburse for routine HIV screening of adults aged 15-65 years, regardless of risk. This policy allows for individuals to more likely participate in this screening process. HIV testing can be done through health care professionalsRead MoreThe Epidemic Of Hiv / Aids1306 Words   |  6 PagesOne of the most known and feared viruses in the world today is HIV/AIDS. To fully understand on why HIV/AIDS is so deadly, we need to first understand and breakdown on what this virus exactly is. HIV is an acronym that stands for Human Immunodeficiency Virus. Human means that only humans can be infected by this virus. Immunodeficiency means that this virus attacks and weakens your immune system to the point where your immune system can no longer protect your body. Virus means that it can onlyRead MoreThe Hiv / Aids Epidemic1650 Words   |  7 PagesThe HIV/AIDS epidemic poses a major concern for global health. There are approximately 36.7 million people living with HIV/AIDS worldwide (WHO, 2017). Due to the increased phenomenon of global migration and movement we see a proportion of individuals who are HIV positive migrating. In Canada alone, over 300,000 new immigrants were welcomed into the country in 2016 (CIC; Globe And Mail, 2016). As a result we can infer that certain proportion out of all immigration applicants into Canada were HIV positiveRead MoreThe Hiv / Aids Epidemic1848 Words   |  8 Pagesreduce its high rates of HIV/AIDS prevalence in the face of low socioeconomic development and declining Gross National Income (GNI) per capita because its existing NGO-based system for HIV/AIDS prevention was scaled up through international technical and financial assistance. The two leading NGOs in this effort, Haitian Gro up for the Study of Kaposi’s Sarcoma and Opportunistic Infections (GHESKIO) and Partners in Health (PIH), were created at the onset of the HIV/AIDS epidemic in the early 1980s, butRead MoreThe Hiv / Aids Epidemic1072 Words   |  5 Pagesagainst HIV/AIDS (Country and Lending Groups, n.d.). They have one of the highest prevalence rates of HIV/AIDS in the world at 19.1%, and the incidence of new cases is increasing steadily (Milan, 2014; CIA, n.d.). To combat this growing problem President Jacob Zuma launched the largest HIV Counseling and Testing campaign in the world in April 2010 (â€Å"Global AIDS†, 2012). In the same year, the country also achieved a significant reduction in the price of antiretroviral medicines (ARVs) (â€Å"Global AIDS†, 2012)Read MoreThe Hiv / Aids Epidemic2082 Words   |  9 Pages The United States has been fixated on its mission to abolish the sex industry since the start of the HIV/AIDS epidemic in the 1980s. George W. Bush and Congr ess created the United States Leadership against HIV/AIDS, Tuberculosis, and Malaria Act of 2003 with the intention of funding beneficial programs furthering the research and accessibility of HIV/AIDS treatment. (Middleberg, 2006). The beneficiaries of this funding must show their opposition towards prostitution and sex trafficking in orderRead MoreThe Epidemic Of Hiv / Aids2413 Words   |  10 Pagesworld issues. In 1980, news papers, highlighted the onset of an epidemic, one that would create fear, isolation, bias and discrimination. The HIV virus took the public by disbelief, one of the main tribulations with HIV disease was that there was no concrete evidence that determined its transmission. Many Semantic variations such as gay mans disease created biases and discrimination toward this population (CITE). The onset of HIV/AIDS virus also created a devastating impact on healthcare professionalsRead MoreHiv / Aids Epidemic : A Huge Epidemic1314 Words   |  6 PagesHIV/Aids Epid emic HIV/AIDs is a huge epidemic still plaguing society today. The lack of knowledge and technical advances has caused an increasing number of cases. It has made its way around the world since the 1940s, causing countries to join together in the fight against AIDs. With all the campaigning that has been done the numbers of cases continue to rise. Countries have separated the disease into three patterns to make it easier to distinguish the effects that AIDs has on different regions ofRead MoreShould The Hiv / Aids Epidemic?918 Words   |  4 PagesShould the HIV/AIDs epidemic in Africa be described as a feminist issue? With higher transmission rates concentrated among African women, and the vast majority of new mother-child transmissions occurring within African countries, HIV seemingly fits into the scope of feminist concerns. As described in Oppong and Kalipeni’s contribution to Kalipeni, et.al.’s HIV AIDS in African: Beyond Epidemiology, the consistent classifying of th e HIV/AIDS epidemic as being the direct result of distinct AfricanRead MoreThe Epidemic Of Hiv / Aids Essay1607 Words   |  7 Pagessyndrome (AIDS). Another two years would pass before scientists were able to isolate the retrovirus that causes AIDS, which in 1984 was termed human immunodeficiency viruses (HIV). Although a successful discovery, in the absence of a proven treatment, HIV and AIDS had free rein in which to leave in its wake a global path of fear, illness, and death. To understand the totality of HIV/AIDS, consider the following. Since the onset of the pandemic more than 70 million people have been infected with HIV, 35

Friday, December 20, 2019

The Role Of State And Local Control Of Education - 850 Words

Highly Qualified The law requires teachers to have a bachelor’s degree, a state teaching certification and to demonstrate content knowledge in the subjects they teach. Proficient and effective teachers, not only know the subject matter in which they teach they have strategies to reach all types of learners in their classroom. These qualified individuals have mastered the skills that they need to be a certification teacher. The law, however, must maintain and establish the governing body that establishes and makes sure that school districts employ only qualified individuals. The importance of state and local control of education is crucial and provides the opportunity for each state to develop their own definition of what qualifications are needed by individuals in order to be considered â€Å"highly qualified†. This definition must be reliable with NCLB as well as with the unique needs of the state. The state law requires public school elementary and secondary teachers to meet their st ate’s definition of highly qualified in the core academic subjects they teach. No Child Left Behind Act The No Child Left Behind Act of 2001, which was established by former President George W. Bush; is a United States Act of Congress that is a reauthorization of the Elementary and Secondary Education Act, which includes Teacher Title I. The nation standards vary upon the NCLB are diverse into Highly Qualified Teacher, Accountability and Standard Testing Regime, common core, failingShow MoreRelatedThe Current Structure Of The America s Educational System954 Words   |  4 Pagesclimate controls our system and treats students as another campaign point. The U.S. educational system needs some aspects of educational control under a standardized, national system while other aspects of education should remain in the hands of local communities to uphold the diverse cultural needs of America’s students. Certain aspects of U.S. educational system need standardization in order to ensure an equitable education for all learners. A proposed shift of all local and state control is notRead MoreThe Levels Of The Uk Government Essay1390 Words   |  6 PagesNational/Central Government Regional Government Local Government What is the European Parliament: The European parliament is an elected parliamentary institution of the European union (EU) which was formed on November 1st 1993, they mainly focus on functions like legislation within the 28 member states that form up the European union to help sustain, control and create a political and economic community throughout Europe, the European parliament’s general role is to represent the citizens of the EU communityRead MoreLegal Influences on the State Board of Education1145 Words   |  5 Pagesand authority of the state board of education and local school boards and what responsibilities they have for the administration and operation of schools. The state board of education governs the way that education is directed within the state. They create policies covering a variety of legal issues such as health and safety, minimum requirements for teacher licensure, graduation requirements, rights of students with disabilities, and student disciplinary practices. The state school boards has sixRead MoreThe Local Control Of Education Act Essay1411 Words   |  6 PagesThe Local Control of Education Act was introduced by Sen. Vitter, David [R-LA]  on January 7th, 2015. This act aims to amend the Elementary and Secondary Education Act of 1965 (ESEA), which prohibits the federal government from directly or indirectly mandating, directing, controlling, incentivizing, or conditioning federal support on a state s, local educational agency s (LEA s), or school s adoption of: the Common Core State Standards, any other academic standards common to a number of statesRead MoreChapter Six Of America s Teachers833 Words   |  4 PagesReading chapter six of America’s Teachers: An Introduction to Education (Newman, 2006) reminded me of the Barenaked Ladies song It’s All Been Done (Page, 1998). As I read the conflicting sides of each argument regarding education as far back of the Civil War, I kept thinking how none of this sounded new. It’s all been done before, and we are still debating many of the same issues. Newman (2006) put it another way, â€Å"Despite promoters’ claims to the contrary, few educational wheels are brand newRead MoreEducation Failure Of The Great Depression863 Words   |  4 Pages Education Failure, the Great Depression revived in America After escaping the tyranny of England, and arriving to the America to establish both the Declaration of Independence and the Constitution of the United States, American leaders Thomas Jefferson, John Adams and Benjamin Franklin, acknowledge that the American Dream could not truthfully be established, without education being one of the priority components constituent of it. They wanted everyone the right to have equality and no social statusRead MoreImpact Of Postmodernism Theory On Education937 Words   |  4 PagesPostmodernism theory on education Post modernists believe that it’s important for teachers to teach students their own British values. This is because values are important for an individual’s culture and are important at school to demonstrate to the Ofsted how well they are doing at stimulating the children’s physical and intellectual development of pupils at school. The values that the teachers at school must teach the children include teaching about the rule of law and teaching them respect andRead MoreThe Evolving Role of Government Education Essay1185 Words   |  5 PagesThe Evolving Role of Government in Education What are the roles of federal and state government when it comes to American education? The roles of education have evolved from historic liabilities to current liabilities. There are many laws and cases that have had an impact on American education that still has a strong influence on education today such as the debate between church and state, racial desegregation, and education finances. Other impacts as relevant are testing standards and specialRead MoreThe Elementary And Secondary Education Act1526 Words   |  7 PagesThe The Elementary and Secondary Education Act (ESEA), was revamped in 2001 as the No Child Left Behind Act (NCLB). Due to the time period of the inception and now, there is a pressing need for reform. Even when the law expired four years ago, Congress continued to update the out of date NCLB Act was never seriously considered by the House Committee on Education and the Workforce until now. Since the Republicans assumed control of the House of Representatives, they have created and passed a seriesRead MorePolice Agencies and Law Enforcements812 Words   |  3 Pagesinto local, state, and federal agencies that all address varying elements of law enforcement, and often in collaboration with each other. The current structure of law enforcement in this country is very complex. There are various types of police agencies broken up based on differing jurisdiction (Grant Te My 12). Today, there are over 18,000 police agencies working within the context of the United States (Walker Katz 59). These agencies enforce our legal structure through social control and

Thursday, December 12, 2019

Environmental and Economic Performance of Firms

Question: Discuss about the Environmental and Economic Performance of Firms. Answer: Introduction Apple Inc is one of the consumer electronics organizations in America. The company concentrates in conception and fabrication of electronics and software products. The start of the company took place in 1976 in Cupertino, California involving the sales and support of a variety of personal computers, software and hardware accessories, mobile phones, and music players. The company operates some online shops and stores that help in the selling of its products. Apple Inc product portfolio comprises Macintosh for personal computers, iPods, iPads, and iPhones. In this industry, there is a clear distinction between mature and emerging markets. This is based relatively on the strength of Apples distribution channels (Masi, 2009). At the same time, it is an important factor for Apple Inc to consider incorporating factors influencing sales of their products within the American market before full consideration of the entire global market. In this case, since market positioning is critical in th e determination of higher margins, it is necessary for Apple to invest massively in product brands that appeal mostly to the young people (Budikova, 2014). According to Kotler et al., (2014), Marketing refers to the art and science of creating value for goods and services delivered to consumers for the reasons of satisfying needs at an expected profit. In this study, marketing concepts or marketing management philosophies give guidelines to the business on the application of marketing efforts. These theories are applicable in the process of identifying and fulfilling consumer needs while also benefiting the company. Some of the marketing management philosophies include production concept, product concept, marketing concept, selling concept, and social marketing concept (Kotler et al., 2014). On production concept, consumers of electronic products always desire to buy at affordable prices. The products should also be widely available to customers. In this case, Apple, for instance, ensures that the demand for their iPads is more than the supply according to the impression through their website. In the year at the launch of its iPads, they successfully used this concept to make significant sales. In this case, it was easy for the company to moderate their prices to suit the consumer demand. The concept also works for Apple since their market is spread all over the world (Kotler et al., 2014). The product concept focuses on quality of the product despite its high price. This philosophy assumes that customers would still purchase a high-quality product irrespective of price and availability. Apple products are of high technological quality in the market and, therefore, sell at higher prices, in fact, their objective is never to sell low-cost goods (Kotler et al., 2014). The selling philosophy focuses on the actual sale of company products. This concept disregards the quality aspect, and consumer need rather focuses on making money. However, Apple does not use this concept so much since the company takes the issue of building relationships with customers seriously. The marketing concept focuses on providing products to consumers that fulfill their needs (Datamonitor, 2006). This enables the building of strong relationships between company and customers hence generating profits in the long-run. There is also the societal marketing philosophy that focuses on fulfilling customer needs without affecting the entire environment or rather maintaining societys well-being. It is important for large companies such as Apple to involve corporate social responsibility as crucial part of their marketing concept (Kotler et al., 2014). The strength of Apple is in its ability and focus on user-friendly customer experience. In this case, Apple ensures that their products appear delightful and friendly to consumers. This concept is easily provided through innovative features such as gesture touch-screen and personal assistant SIRI. Users prove that the design of Apple devices is customer compatible in both digital and entertainment hub. This ensures that Apple has a passionate brand community of followers that take company brand values as their identity. In this case, Apple is implementing relationship and social marketing concepts to propagate their sales and market dominance (Lantos, 2015). External Environment PEST analysis is a valuable strategic tool that enables easy identification of business status, position and growth within a defined market environment. The device is also applicable in the analysis and classification of market development and decline (Kotler and Armstrong, 2013). Considering the markets primary characteristics, Apple Inc is one of the leading asset management company as well as Smartphone producer in the global market. Apple Inc distinct itself as one of the businesses that produce and runs together hard-wares and soft-wares. Notably, the Company allows its consumers to share contents through Apple devices by availing an exclusive platform within the media referred to as iTunes (Digital Marketing, 2011). Apple boasts of some of the unique innovations such as that of iPad that attracts significant sales, an attribute that can only be delivered by Apple (Burns, 2012). The sales of some of the products such as iPad, Mac, and iPhones have increased by a significant perc entage over the years. The PEST analysis is a necessary tool that is crucial in this case for the reasons of gaining an understanding of the Apples business potential. The tool is also vital since it helps the company identify the direction of its operations including the knowledge of the future market environment. There are major problems that companies are unable to control that involves political instabilities, global health issues and other uncertainties that eventually affects the sale of Apple products within the global market (Anon, n.d). Apple Inc reduces operating costs by outsourcing their productions in different countries in Scandinavia region, China, and Korea. In the case of any political instability within these countries, there is a delay in manufacturing processes that eventually affect Apples appealing nature in the face of consumers and various dealers (Burns, 2012). On the economic front, the purchasing power of any region depends on its financial abilities. The increase in the rate of unemployment within the global platform has negatively affected the sale of Apple products (DeWitt, 2012). Moreover, the increase in world oil prices resulted in inflation of the worlds economy that eventually affected sales of Apple products in different regions owing to its perceived high prices. This reduced the purchasing power of the consumers, therefore, negatively impacting sales. However, the recent times have shown immense recovery to the worlds economy, therefore, making Apple purchase foreign currencies making Apple increase its revenue within the global market (Apple Inc, 2012). Social Environment On the Social front, Apple Inc has always utilized two factors to affirm the quality of their products; this is the design and quality. The majority prefers to purchase luxury products since they can afford. In this case, the iPhones and iPads experience a significant increase in purchase across different market segments globally. The growth in the music industry has improved and this accounts for the biggest social influence on Apple since the major essential music store used by the majority is iTunes. The use of iTunes and other Apple products defines the modern lifestyle, therefore, making the company benefit from the social aspect (McGrath, 2012). Concerning the technological factors, Apple is renowned for its innovative abilities and high-grade technology products. The company invests heavily in research and development making it be at the top of new innovative productions. The aspect of their products that makes them user-friendly is admirable across consumer networks. Apple Inc is one of the big brand names in the Consumer Electronics Industry globally. The industry has fierce competition from key players such as Google, RIM, Nokia, Hewlett-Packard, and Samsung. The nature of competition within this industry can best be analyzed through Porters five competitive forces. There is intense competition within the industry from potential companies such as Samsung and Google (Reisinger, 2012). However, Apple Inc focuses significantly on building technical support and creation of loyalty amongst customers including the production of quality products. This aspect has given Apple an upper hand, therefore, making its products not to go on sale. Their productivity levels have been maintained without marking down products while generating superiority through Android phones, tablets as well as e-Readers at affordable prices (Loma, 2012). The aspect of the bargaining power of vendors has the potential of downing the profits of the company through high supply prices. Apple Inc is still growing, therefore, requires new suppliers of their raw materials. They utilize their online website to register new suppliers, hence, reduces the bargaining power of vendors by making the registration open. In this case, a large number of suppliers are attracted, which reduces their bargaining power through competition amongst the large number of vendors (Apple, 2010). In pursuit of a significant market share, there is a need for Apple to meet the expectations of customers. This is achievable by focusing on different segments divided based on educational level, age as well as income. The aspect on differential makes buyers switch quickly to other products driven by price sensitivity. Google provides high competition on smartphone and tablet markets due to the fall of Blackberry that was once a leader in Smartphone production within American market (Travlon, 2012). However, Apple Inc still holds a significant market share that amounts close to 75% of industrys profit. This narrows the chances of Apples customers to switch brands since their loyalty to Apple brand is very strong. Threat of Substitute product In this industry, the need of consumers is almost the same making the aspect on substitution difficult. This makes the threat of substitute to operate on price and performance that influences consumers to switch products. Apple reduces the threat of substitute through its large base of loyal customers. The company has created an ecosystem that enables users to buy iPhones for standard as well as other products based on stability and ease to upgrade. Such attributes grant the customer the ability to transfer knowledge as well as apps amongst devices (Segan, 2012). Whenever an industry experiences entrance of more companies in the market, the possibility is that the existing companies experience decreasing market share. However, Apple maintains the market share through differentiation of its product brands and ensuring the existence of valuable marketing strategies (Kurtz et al., 2007). The high brand image of Apple makes it overcome any form of competition; this also includes its innovativeness and excellent customer services. Apple Inc uses differentiation strategy to distinct its products from other competitors within the market. The design of its products seem outstanding and of high quality whereby Apple Inc considers easiness of use from beginners to prominent users within the market (Masi, 2009). The company invests in value creation by focus as well as cost leadership whereby it outsources its production to reduce costs. Apple ensures such outsourcing to third parties is through massive economies of scale. The companies from whom Apple Inc outsource acts like the Original Equipment Manufacturer (OEM) with Apple focusing on user interface and industrial design. This ensures that they maintain highly innovative and user-friendly devices that are stylish. These highly personalized and people friendly devices ensures that Apple remains distinctive even in their product prices in the market (Laudon and Traver, 2016). Apple Inc proves to be the master of teaser campaign mechanism whereby they cultivate and drag the suspense on their product development processes. Before the release of any product, the company advertises over social media creating a cliffhanger as consumers speculate on the outcome. Such marketing principle generates massive consumer interest for free, which they eventually convert into sales volume. The essence is that Apple ensures that they build relationships with the leading influencers in the industry; the media and bloggers (Webber, 2013). From the perspective of relationship marketing, the best way for a company to promote its products is to involve others and allow them to propagate the rest on behalf of the Company. The use of such third-party experts ensures the success of teaser campaigns that eventually results into a full-blown marketing campaign that builds interest and momentum over time (Apple, 2010). The other aspect that Apple Inc uses involves the creation of an illusion of scarcity on their products for the ultimate purpose of increasing demand. The point on poverty ensures that the Apple products remain more desirable and in demand within the market. In this case, the aspect on scarcity propels the trendy consumers besides the value of the product and all the procrastinators to anxiously buy the products (Tontini et al., 2014). For instance, on the launch of iPhone 5 in September 2012, the Apple website reported that they had massive demand that necessitated a delay in delivery of the product. Such illusion on scarcity created an impression amongst the consumers that they could only pre-order the phone for delivery to take place. This made the iPhone 5 to set record sales on day one, due to the impression on prolonged difficulty of owning one (Brondoni, 2014). In their quest to deliver value, Apple Inc also focuses on providing friendly customer experiences. In this case, their products are portrayed as having different, friendly, and delightful designs (Morschett et al., 2015). In this case, the core driver of Apple products involves ease of use experiences with innovative features such as a touchscreen that senses gestures for zooming and scrolling as well as personal assistants. Design and packaging also add value to their products, Apple Inc is known to package their products brilliantly. This acts as an important technological product differentiator. All Apple products convey the companys brand personality especially the unified visual identity alongside distinctive appearance (Apple, 2016). Moreover, Apple Inc has evolved a brand culture that is friendly and upmarket, which have attracted massive passionate following identifying themselves with brand innovativeness. It is important for such companies to define the meaning behind their brands before zeroing in on the types of consumers that share the same values. This value enables Apple Inc in the creation of digital communities for easy connection between fans and the company and amongst the fans themselves (Stone and Woodcock, 2014). The issue concerning rivalry amongst firms is best countered through brand positioning; this calls for the need of focusing on the quality of the designed products. The case on branding Apple Inc through globally recognized names makes the identity appealing amongst the consumers (Cornelissen, 2014). The other unique process adopted by Apple is the idea of presenting company branded products in easy to read, understandable, and friendly language. Apple utilizes the art of brand positioning to solve problems that surround marketability in some regions. Such marketing strategy is appropriate in cases where consumers demand unique characteristics on the product such as easiness to use. Moreover, for the reasons of penetrating some emerging market segments, it is advisable that the company acquire a local-based strong brand. Reinforcing the brand image requires the inclusion of meaningful ideas through naming, color as well as a symbol (Hopwood, 2005). SWOT Analysis The major strength of Apple is in its market position and consumer trustworthiness that increases its competitive advantage. The company boasts of variety of software and apps that are interlinked to maintain each other. Further, the company has a large capital base and operates on profits, not debts which are an advantage over its competitors. They provide customers with high-quality experiences in their retail stores and also invest heavily on brand awareness (Strategic Management Insight, 2013). Apple Inc has weaknesses on its great pricing mechanism, whereby most of its products are highly priced as compared to competitors. In such a case, consumers can easily obtain similar products of the same function at a lower price from the competitors (Strategic Management Insight, 2013). The other aspect concerns the rows within the management team, especially after the death of Steve Jobs (Kahn, 2012). Concerning opportunities, Apple products such as iPad and iPad mini have the opportunity of increasing market share due to the high demand from consumers. At the same time, the launch of the iTV increases the sales margin including the experienced growth in the smart-phone and tablet markets. The increasing trend in mobile advertising presents an opportunity for Apple since it allows advertisements on iPads and iPhones through its Ad advertising platform (Strategic Management Insight, 2013). From the perspective of Doole and Lowe (2008), the overall structure of the industry provides abundant opportunities for innovativeness. However, the desirable structural attributes within Apples areas of operation gives the company the needed capability that is necessary to capture a significant market share. The rapid changes in technology present one of the biggest threats to Apple and its competitors. This is since the current lifestyle is more technology loving, therefore, demands innovations within the shortest time possible (Chen et al., 2016). In this case, there is a lot of pressure facing companies due to the high nature of competition from rivalry firms. At the same time, regional economic wave affects the growth of the enterprise such as an increase in tax in the United States of America. Apple Inc has Samsung as the sole provider of application processors; therefore, chances are high of them to charge high prices on Apple Inc due to the absence of feasible substitute company that can supply application processors (Jung, 2012). Further, Apple faces stiff competition from Android OS which serves as the main competitor for its iOS and can quickly overtake them in the market. Conclusion The strength of Apple Inc is in its product portfolio that includes many electronic products such as cell phones, personal computers, iTunes alongside other related services and also networking solutions. Apples market position is measurable through its operating performance that impresses investors and stakeholders. However, the companys profitability can be affected by fierce competition from rivals in the same market (Data monitor, 2006). The demand on the market is dynamic and crucial since they focus on quality that satisfies curiosity. For instance, in the process of unveiling innovations, the consumers should be assured on the advancement of new qualities capable of addressing important individual desires. This is since consumers can at times be wrongly enticed through false assurances that eventually lead to disappointments and consequently loss of trust with the consumers. In this case, the management should take time ostensibly in managing organizational sustainability through the management of performance in financial assets, the health of employees and intellectual property. At the same time, the management should presume their compliance with international ethical standards and laws. Recommendations Apple should be careful concerning the legal and political areas within its areas of operation. This is mainly because Apple Inc outsources its services to different countries to reduce operating costs. The company has to identify an alternative supplier of processors to reduce risk since it purchases application processors from Samsung which is a direct threat to its operations. Consequently, Apple Inc should reinforce its presence in the emerging markets within regions like middle-East and Africa. This is since the existing economic trends in the wider European market are changing progressively. Such trends largely influence business activities, therefore, encouraging the formation of alliances as well as partnerships between related companies (Raza-Ullah et al., 2014). However, joining such alliances will demand that Apple and its accomplice supplies products that are capable of attaining competitive advantage in relation to the standards within the target market. In this case, Apple Inc will have to restructure various marketing strategies and activities that involve supply concepts as well as practices that have the capability of addressing complexities within the market. However, the company will also have to strategize on how to overcome the issue on integration across supply chains within specified markets. Regarding the distribution channels, Apple s hould try to add to the number of stores currently existing and also such joint venture with identified organizations will help the company to expand its business venture. Also one of the best remedies that can easily deal with rivalry in competition involves purchasing of highly rated brands within specified regions. This presents a probable solution to markets such as the Scandinavian and Asia. The initial step of maintaining balance and stability within the management structure provides the advantage on strategic moves. In this case, the Apple Inc should profoundly influence the use of aggressive promotional techniques contrary to that of their competitors. A good example is a of creating awareness on the companys product portfolio through their website and social media (Wagner et al., 2001). The company should also invent different promotional techniques that ensure the creation of influence and stability. On technical fronts, Apple should make sure that every touch point between the business products and consumers conveys a strong brand personality with a unified visual identity that sets the company apart from other competitors. This strategy requires that Apple also involves the use of in-person meet-ups that easily connects to business fans. There is also need for creating more digital communities through applications such as WhatsApp. There is also the aspect of identifying and making a detailed analysis of the impact of other companies within different target markets. This involves analysis of the most preferable and applicable product promotion techniques for electronic consumers, especially in home markets. References Anon, n.d. Internal and External business environment of Apple. Available at https://www.ukessays.com/ Apple Insider. 2013. Apples iPhone grew to 25.1% global market share in 2012. Available at https://appleinsider.com/articles/ Apple Inc. 2016. Company Profile. Available at https://www.apple.com/ Brondoni, S.M., 2014. Innovation and Imitation for Global Competitive Strategies. The Corporation Development Models of US, Japan, Korea, and Taiwan. Symphonya. Emerging Issues in Management, (1), pp.12-27. Budikova, J., 2014. Discussion: how digital trends are changing the marketing landscape. Central European Business Review, 2, pp.57-58. Burns, M.., 2012. Apple Q2 2012: 35.1M iPhones, 11.8M iPads, 4M Macs, and 7.7MiPods. [online] Available at: https://techcrunch.com/2012/04/24/apple-q2-2012-35-1m-iphones-11-8m-ipads-4m-macs-and-7-7m-ipods/ Chen, C.M. and Ann, B.Y., 2016. Efficiencies vs. importance-performance analysis for the leading smartphone brands of Apple, Samsung and HTC. Total Quality Management Business Excellence, 27(3-4), pp.227-249. Cornelissen, J., 2014. Corporate communication: A guide to theory and practice. Sage. Datamonitor .2006. Apple Computer, Inc. [online] Available at: https://www.alacra.com/acm/2009_sample.pdf [Accessed 30 April 2013] DeWitt, P.E. 2012. Whats eating Apple? The analysts weigh in. [online] Available at: https://tech.fortune.cnn.com/2012/11/14/apple-shares-fallen-wall-street-analysts/ Doole, I. Lowe, R. 2008. International marketing strategy. Available online: https://estore.bized.co.uk/ Driscoll, M.2009. Public Relations and advertising. Available online: https://aboutpublicrelations.net/ Hopwood, B. 2005. Sustainable development: mapping different approaches. Sustainable Development, (13), 3852. Jung, S. 2012. A little less Samsung in Apple sourcing. [online] Available at: https://blogs.ft.com/beyond-brics/2012/09/10/a-little-less-samsung-in-apple-sourcing/#axzz2THpqrqbe Kahn, J.2012. IDC: Samsung takes top smartphone marketshare in Q1, as Apple hits 8.8-percent high of total mobile phonemarket. [online] Available at: https://9to5mac.com/2012/05/01/idc-samsung-takes-top-smartphone-marketshare-in-q1-as-apple-hits-8-8-high-of-total-mobile-phone-market/ Kotler, P. Armstrong, G.2013. Principles of marketing 15th global edition. Pearson. Kotler, P., Keller, K.L., Ancarani, F. and Costabile, M., 2014. Marketing management 14/e. Pearson Lantos, G.P., 2015. Consumer behavior in action: Real-life applications for marketing managers. Routledge Laudon, K.C. and Traver, C., 2016. E-Commerce 2016: Business, Technology, Society. Pearson Higher Ed. Masi, B.2009. Strategic Analysis of Apple Inc. [online] Available at: https://www.scribd.com/doc/24134877/Strategic-Analysis-of-Apple-Inc-Brian-Masi McGrath, D. 2012. Apple coming to Dominate electronics Supply Chain. Available at https://www.eetimes.com/electronics-news/ Morschett, D., Schramm-Klein, H. and Zentes, J., 2015. Strategic international management. Springer. Raza-Ullah, T., Bengtsson, M. and Kock, S., 2014. The coopetition paradox and tension in coopetition at multiple levels. Industrial Marketing Management, 43(2), pp.189-198. Reisinger, D.2012. Samsung pulling away from Apple in Smartphone market. Available at https://news-cnet.com/ Stone, M.D. and Woodcock, N.D., 2014. Interactive, direct and digital marketing: A future that depends on better use of business intelligence. Journal of Research in Interactive Marketing, 8(1), pp.4-17 Strategic Management Insight. 2013. SWOT analysis of Apple. Available at https://www.strategicmanagementinsight.com/ Tontini, G., Picolo, J.D. and Silveira, A., 2014. Which incremental innovations should we offer? Comparing importanceperformance analysis with improvement-gaps analysis. Total Quality Management Business Excellence, 25(7-8), pp.705-719. Wagner, M., Schaltegger, S. Wehrmeyer, W. 2001. The relationship between the environmental and economic performance of firms. Greener Management International, (34), 95108. Webber, R., 2013. The evolution of direct, data and digital marketing. Journal of Direct, Data and Digital Marketing Practice, 14(4), pp.291-309.

Wednesday, December 4, 2019

BCP and Disaster Recovery Plan †Free Samples to Students

Question: Discuss about the BCP and Disaster Recovery Plan. Answer: Introduction Security has been evolved for the long term to be in the standard terror that aims to have more than the cloud investments while the observations is been made on the improvements been made on the security. Checking to the public cloud security, the observations and ideas been made and are improving towards the security and stopping it form the malicious activities. Infrastructure as a Service (IaaS) usually aims to provide the virtualised computing resources over the internet connectivity. It mainly focus on delivering the infrastructure and outsourcing it to provide the security of the data which is been collected from the internet. Keeping the security terms in mind, the data is been violated and making the duplicated data and change the original data keeping all the issues and working on it the company deploying software is to keep the biggest concern about the privacy and the security regarding the issues. Because of all these concerns the organisation is not stopping it from mig ration of the database from 1 platform to another platform (Alhazmi Malaiya, 2013). When the database is been moved to the cloud device the security been shared during the risk with the responsibility which is been provided is to have an appropriate reason for it sometimes the expertise who are working in big industries allow them to increase the sensitivity of the data to the other party i.e. the third party which have the cloud providers to increases and make it difficult for the risk settings through which company keep on making the updating and perform the operations daily (Yang Jia, 2013). Once the database is been moved in to the IaaS instance in the cloud, the level of security is been increased into the cloud services. But for maintaining the security in the cloud the most important thing is to keep in the mind i.e. the budgeting of the security on the public cloud station which is totally different from the other platforms which generally have the other way of differentiating and preventing it from the risks. The most fundamental method which is being used from prevention is that the provider uses the shared responsibility models which mainly aim to spread the risks between the sellers and the potential buyers. Generally it happens that the customers generally dont buy the products and the equipments which are similar because sometimes the issue is been raised between the security in the cloud and the data canters (Xiao Xiao, 2013). Budgeting and taking the preventions in the security in the public cloud generally start from the applications that have the various infrastructure components that are existed, like serving of the documents, hosting a website, etc. In IaaS providers tend to allow the main responsibility which is to be provided to the customers. The benefits and issues that would be the result of your deployment of these security measures are- That is basically prevents from reducing the total infrastructure costs, it basically provides the group off virtual machines which are being hosting on the track. This basically helps the organisation in serving on a large scale of the servers, capacity of the storage, network connections, load balancing, etc. It tends to reduce the capital IT investments and the expenditures. The main benefits are: Maximising of the Resources with the Minimal Investments Increasability of the speed in the market Advantages to Drive competitive and its innovation Maximising Flexibility. Reduces various connectivity to the entry and reduce barriers for the large data centers (Wei, et al., 2014). The risks associated with migrating this mission critical database to the cloud The Database- Generally cloud environment generally faces the threats which are being placed as the corporate traditional corporate networks. This threat is mainly occur when the data is been violated from the one source to another source it generally happens because of the large amount of the data being stored in the networks on the cloud servers (Wei, et al., 2014). This tends to damage the sensitivity of the data which is been exposed. The IaaS infrastructure- It is essential to have a large storage i.e. should be cloud based storage service which requires the more demanding and usability of an application should be secured more so as to tolerate best hosted application services. The communications between Webbs and their IaaS database in the cloud- Insufficiency in the network based in the virtual networks and the tailoring with the accessibility to the web and to the IaaS database it generally have the limited accessibility to the networks infrastructure and IP based controls and network standards and it various zones are not applied usually (SILVA, 2016). Risks and the issues associated with the backing up of data on cloud computing: Confidentiality: The risk of unauthorised access to the data is called as the risk of confidentiality information is one of the vital assets of any organisation. And hence keeping the sensitive information confidential is critical for any organisation. As it is a general fact that clouds operates on the public networks it is more prone to cyber-crimes like data leakage, internet terrorism etc. When the data is moved on online platforms the hackers or the intruder seeks to decrypt the confidential data of the company so as to gain access to the companys confidential and sensitive data (Rong, Nguyen Jaatun, 2013). Integrity: The risk of integrity the risk of unauthorized alternations and modification of highly relevant information of the company. Data saved on the online platform can be safeguarded from the issues of data loss and damage through the use of tight data controls. However, even information saved on online mode i.e. the cloud is vulnerable to risks of data cracking, data hacking and other cyber-crime etc. the hackers of the information are discovering new techniques to have gain unauthorised access to the sensitive data of the company so that they can alter it by adding deleting or modifying the critical information of the company (Pearson, 2013). Standardisation risk: This risk occurs because the cloud system is not standardised. The cloud solutions are not all uniform as the vendors or the cloud service provider sets out different protocols to provide the services like backup and recovery plans of important data of company. Provider often has different opinion as to what is relevant and important when the issues of back-up and recovery provision arise (Rittinghouse Ransome, 2016). Connectivity: The proper working of internet network is the must for migrating the important data of the company to online modes and hence network issues imposes the risk of outage where the data can be stuck or get corrupted in between due to the improper network connectivity. Loss of data control: When the data is saved on premise platforms the business managers have full control over their important data but when the critical information is transferred to the public clouds the owners of the information may have to face the risk of loss of control over their own data (Khoshkholghi, 2014). Issues of data storage on cloud platforms Data privacy: The cloud platforms although are the cheap source of information safeguarding however due to the huge public network on the cloud system it is difficult for the cloud service providers to prevent the risk of hacking or cracking of data that is stored on the clouds. As cloud computing offers the cost effective and easily manageable infrastructure the users of cloud computing services are increasing day by day and due to the high access of cloud computing system by the users it is difficult for the cloud service vendors to control the risk of unauthorised access or data stealing (Kavis, 2014). Data recovery: Cloud services are often used by the businesses to get their critical data safeguarded from the risks and uncertainties of data corruption or data loss. Cloud computing enables the users to secure their data from those risks and uncertainties by providing the back-up services. However with the increased users of cloud services the cloud traffic is growing rapidly with each passing day therefore the cloud users have to face issues like slow data recovery or sometimes the data is recovered by the unauthorised persons without the actual users knowledge (Amiri, Cavusoglu Benbasat, 2014). Data backup: With the growing crowd over the cloud service platforms the cost of data back-up services are increasing affecting the cost effectiveness of the backing up features of cloud computing. To store the data as the backup plan the clouds are providing not the reliable storages as the data is highly vulnerable to the risk of unauthorised access (Hashem, et al., 2015). Retrieval of data from the cloud: Time consuming: Once the data is transferred to online modes it may sometimes get cumbersome for the users to take back their data in house as it may involve considerable time due to slow retrieval processes on cloud as a result of heavy users traffic. This process may make the users to wait for enormous time. Complex retrieval processes: The data retrieval sometimes gets complicated due to the involvement of technical issues in the data transfers and thus difficult for the business managers to cope up with the complexities of retrieval processes (Alhazmi Malaiya, 2013). The Webbs has started initialising to use the cloud backups and the DR plans so as to have the top priority of the backup recovery. DRP plans are very essential for the certain reasons which is been used in an organisation. It is essential to plan for the DRP system to continue all the business process in an organisation to simultaneously perform all the business activities which mainly deals with the goods and the services. The clouds initially offer the businesses to the virtual way of storing the large amount of data. It is essential to store all the files and the folders which is been kept at the data centers. Webbs protect access to these services that they are now moving to the Cloud The first thing to recognize the best suitable services that are being in the trend to use the best services for storing and migrating the best possible services for migrating the database to the cloud is so that the data should not be violated or been breached to the other platform and should not continue from preventing it the Webbs uses the (Fox, Patterson Joseph, 2013). Cloud backup and restore infrastructure This process is used to safeguard the business activities and to prevent from the disaster so as to protect the files which are been collected from the website or from the necessary applications needed. This process helps in to quickly access and perform the network operations and to rapidly increase in the restoring of the files when the system gets failed or the file is lost. The main benefits and the features of this software for which the Webbs uses It helps in saving time for easily creating, scheduling and managing of the file-level backups using the control panel. This software is less costly and save money. It helps in securing the organisational data This software is more reliable as comparison to other software It helps in easy way of accessing by the users for restoring the files from the Cloud control Panel. It helps in Customizing the scheduling which helps mainly in taking the backups very frequently. Provides the facility of the File based backups which help in restoring all the files and folders from the system (Almorsy, Grundy Mller, 2016). Conclusion Therefore it can be firmly concluded from the entire research that migration of data can cost severe consequences to the business if proper security measures are not used and implemented in data transferring from physical modes to online modes. In order to ensure the data security the businesses are thus required to critically analyse the potential risks involved in the data migration. Moreover, the business managers are required to make proper recovery plans of data before transferring it online. References Alhazmi, O. H., Malaiya, Y. K. (2013, January). Evaluating disaster recovery plans using the cloud. InReliability and Maintainability Symposium (RAMS), 2013 Proceedings-Annual(pp. 1-6). IEEE. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Amiri, A. K., Cavusoglu, H., Benbasat, I. (2014). When is IT Unavailability a Strategic Risk?: A Study in the Context of Cloud Computing. Dutta, A., Peng, G. C. A., Choudhary, A. (2013). Risks in enterprise cloud computing: the perspective of IT experts.Journal of Computer Information Systems,53(4), 39-48. Fox, A., Patterson, D. A., Joseph, S. (2013).Engineering software as a service: an agile approach using cloud computing. Strawberry Canyon LLC. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Kavis, M. J. (2014).Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley Sons. Khoshkholghi, M. A., Abdullah, A., Latip, R., Subramaniam, S., Othman, M. (2014). Disaster recovery in cloud computing: A survey.Computer and Information Science,7(4), 39. Pearson, S. (2013). Privacy, security and trust in cloud computing. InPrivacy and Security for Cloud Computing(pp. 3-42). Springer London. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Rong, C., Nguyen, S. T., Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), 47-54. SILVA, B. (2016). A framework for availability, performance and survivability evaluation of disaster tolerant cloud computing systems. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Xiao, Z., Xiao, Y. (2013). Security and privacy in cloud computing.IEEE Communications Surveys Tutorials,15(2), 843-859. Yang, K., Jia, X. (2013). An efficient and secure dynamic auditing protocol for data storage in cloud computing.IEEE transactions on parallel and distributed systems,24(9), 1717-1726.

Thursday, November 28, 2019

The Death Penalty Essays - Penology, Criminology, Criminal Law

The Death Penalty Capital punishment is the legal infliction of the death penalty on persons convicted of a crime. Today, in modern law, the death penalty is corporal punishment in its most severe form. It is irrevocable: it ends the existence of those punished, instead of temporarily imprisoning them. Although capital punishment is not intended to inflict physical pain, execution is the only corporal punishment still applied to adults. The usual alternative to the death penalty is life-long imprisonment. For the past decades capital punishment has been one of the most hotly contested political issues in America. This debate is a complicated one. Capital punishment is not merely-or even primarily-a legal question. It is a practical, philosophical, social, political, and moral question as well. I don't have any problems with the death penalty only if all avenues have been investigated and nothing is questionable. I believe in the concept of "an eye for an eye" and "a tooth for a tooth" because there are always consequences to the things you do and murder should not an exception. The notion of deterrence has been at the very center of the practical debate over the question of capital punishment. The fear of death deters people from committing crimes. I believe that the death penalty has a deterrent value because it removes the criminals from society so they will never be able to committing anymore crimes. Also future criminals must understand the consequences of committing a crime. Abolitionists have long argued that deterrence is little more than an assumption, that most murders cannot be rationally deterred by any penalty, including death. They are crimes of passion, committed in moments of intense rage, frustration, hatred, or fear, when the killers aren't thinking clearly of the personal consequences of what they do. I respect their beliefs, but I still believe in its deterrence value. I believe the serial murderers that continuously kill should be put to death so that no more lives will be lost. I believe in capital punishment because I know of a person who was killed in a drive-by shooting. He was a good student and had plenty of potential. The juveniles who took his life are currently in juvenile hall. What saddens me the most is that these violent teenagers have a potential of freedom when they turn eighteen. I believe these criminals should have been executed because there is a chance that they will commit a murder again. If the death penalty was applied to them, it guarantees that they will never murder again. July 9, 1998 English 1A

Sunday, November 24, 2019

The eNotes Blog Thatll Be a Gazillion Dollars, Plus Tax The High Cost ofTextbooks

Thatll Be a Gazillion Dollars, Plus Tax The High Cost ofTextbooks I remember the first time I had to buy books as an undergraduate.   I took my schedule and dutifully pulled book after book off the shelves for my courses and tried not to hyperventilate as I mentally tallied the increasing tab. Since I was a literature major, I was relatively lucky. My trade paper readings were typically between $20 and $40 dollars, but there were usually three or four required books per class. In addition to the required books, there was frequently a required course packet, a collection of copywritten essays the professor had had copied and bound. These course packets could vary widely in price, but I do not recall any being less than fifty dollars.   With a six course load, books fees were hundreds of dollars every single semester. Yet, looking at the science majors cart beside me, I knew I was getting off easy. Just one of their hefty, hardcover textbooks was $200 or more. We all stood in line and wondered just how long a person could survive on Ramen noodles Now, I graduated (staticcracklingmumbling) years ago. Okay ten years agowith my Masters degree. Since then, there have been incredible technological advances: no one knew a Nook or a Kindle or an iPad could even be a thing in the world in 2003. If we had known such innovations were coming, Im certain most of us would have guessed ebooks would have made textbooks and other materials far cheaper for students. Nope. Let me say that louder. NOPE. In fact, textbooks have gone up EIGHT HUNDRED AND TWELVE PERCENT since 1978!   Look! Ummm, what? And why? Both  The Atlantic  and  Slate  have recently written about this issue. In Slate, Kevin Carey puts some of the blame on professors who order up their wish list of course materials for their classes with little regard to how necessary the book is to their class. (I cannot say that this has been my experience as a professor, but perhaps that is because I teach in a relatively low-income district. We are all hyper  aware of how much our students have to shell out for required materials and make every effort to minimize those costs.) Carey also identifies another reason for the elevation of textbook costs: bundling.   Publishers include things like software or handbooks that you may not want or need, either as a student or a professor, but you have no choice in the matter; you have to buy the bundle. Still, the move to digital textbooks is increasing   and this astronomical rise in prices is likely a last-ditch effort for the textbook publishing moberrr.. businessto collect all the money possible while they can. I wonder whats going to happen to the price of Ramen noodles in ten years?

Thursday, November 21, 2019

Assignment Example | Topics and Well Written Essays - 1750 words

Assignment Example Prodcts and Services LUBRICANTS ADNOC Distribution is one of the key suppliers of lubricants worldwide. The lubricants manufactured, marketed and distributed by ADNOC varies from engine oils, industrial, marine and hydraulic lubricants, and highly specialized oils and greases. As with all products, ADNOC’s lubricants are formulated to meet the highest quality level as prescribed by the international bodies such as international institutions such as the American Petroleum Institute (API), the US Military Authorities, the British Defense Force (DEF/STAN) and the Committee of European Engine Manufacturers (CCMC). ADNOC Distribution has operated a state-of-the-art lubricants testing, blending and packaging plant since 1979. ADNOC Distribution’s lubricant operation is regarded as one of the best blending and packaging plants in the region. AVIATION SERVICES ADNOC Distribution supplies fuels and services, to the aviation industry. This service is facilitated by its access to an extensive network of production and refinery facilities.   This is further supported by ADNOC’s efficient and reliable network. ... Customers can choose from a full range of octane levels, through its service stations. ADNOC also offers other vehicle services in its service stations. In 2000, ADNOC added Oasis Convenience Stores facility in its service stations, to provide value-addition. ADNOC has also recognized growing consumer interest in cleaner and environmental friendly fuels such as natural gas. ADNOC is in the process of developing a comprehensive network of natural gas pipelines throughout the city of Abu Dhabi, which will ensure a reliable delivery method directly to consumer’s homes and offices. (ADNOC Distribution Website) ADNOC – Vision and Mission The falcon in the emblem of ADNOC represents its noble vision of confidence, leadership, reliability, pride, alertness, responsiveness, and dynamism. As stated in its Mission statement (ADNOC Distribution Company Profile 2007: pp27) – ADNOC Distribution’s mission is to become the region’s leader in the marketing and dist ribution of refined petroleum products and associated services through: †¢ Respected earnings for our shareholders. †¢ Service excellence to our customers. †¢ Development and involvement of employees. †¢ Operational excellence in our business processes. To achieve our mission, we will constantly seek growth opportunities while respecting our core values and business ethics. ADNOC The Organization ADNOC is organized under a General Manager, into three separate divisions of Commercial, Operations and Service Support, each headed by an Assistant General Manager. While the Commercial division includes Sales & Marketing, Public Relations and Call center, Operations include HSE (See later ADNOC initiatives), Service

Wednesday, November 20, 2019

Maternal and New born care Research Proposal Example | Topics and Well Written Essays - 1000 words

Maternal and New born care - Research Proposal Example During the pregnancy, proper care should be taken to ensure no complications are encountered and in case of any problems, they should be handled with urgency. After childbirth, the issue of newborn care then comes into play concern about the newborn health, nutrition and development. In rural and peri-urban populations in India, proper maternal healthcare is not adhered to during pregnancy. Due to this, children are born with numerous health complications. The mother may die or lose the child. Majority of these take place because of the lack of access to adequate information on proper maternal health. There also exist a lot of cultural beliefs and practices that hinder the women from accessing heath services and information from health care providers. There is also the problem of high level of poverty that limits the amount of disposable income that can be spent on medical care. Matters concerning health need to be handled with a certain level of urgency especially those involving maternal health and newborn health. Most of the problems encountered have very simple solution but the absence of adequate information among folks in rural and peri-urban settlements is causing devastating health effects. Knowledge particularly on proper maternal nutrition is lacking. Folic acid is an important variety of the vitamin B9. Extremely water-soluble and in occurs in the natural state as folate. In fortified foods, folate occurs as folic acid. Folic acid is important for a pregnant woman it aids in proper growth and development during pregnancy (World Health Organization, 2003). It significantly diminishes the probability of a baby being born with any defects. These defects always mainly occur to the brain and the spinal code. Folic acid achieves this through the development of the neural tube. Consuming a diet-containing vitamin B9 reduces the chances of getting any de fects by up to seventy

Sunday, November 17, 2019

Critical Commentary on 'The Coming of the White People' Essay

Critical Commentary on 'The Coming of the White People' - Essay Example As Harris reports, the Bolivian people love to believe that the decisive periods are ‘before the Spanish, colonial rule, and the republican period’ (ibid). According to Harris (1995), this Euro-centric history of most colonial nations had its origin from the concepts of rationality and order associated with the European modernism and consequent self-image Europeans developed. This high self-image had a very serious impact on the cultures and places they conquered. One such reason is that it is the coming of the colonial government that made many colonies understand the importance of written documents. For example, the scholar points out that works like ‘Europe and the people without history’ are totally centered around the way the coming of Europeans brought the previously autonomous populations into the European world system (ibid). Another point as put forward by Harris is that the process of colonisation had the same effect on both the Europeans and the c olonies. In other words, the same has been mythologised in both the places. It is pointed out by Harris that Columbus was a great mythologist who knew very well how to prepare influential interpretations of the voyages he made. Moreover, such explorers like Thomas Cook and Columbus associated their explorations with the achievement of a new spirit associated with either Enlightenment or Renaissance. One can see that this claim gains support from Obeysekere (1997, p. 79). Moreover, the works tries to identify the way many colonies consider Europeans as god-like figures. The first argument put forward by the scholar is that in many cases, it was the self-image of the Europeans themselves that was reflected in their own reflections of history. For example, the scholar points out the story behind the way Captain Cook was considered as god by Hawaiians. While European historians still love to proclaim that Hawaiians identified Cook with their deity Lono, it becomes evident from other acc ounts that Europeans were predisposed to the belief that they would be treated as gods by the natives. For example, even during the voyage, Columbus speculated that the new people might treat them as gods. Thus, even when Cook was killed by the natives, the same kind of European interest in depicting themselves as god-like figures came into play. In fact, this version of history is enforced by the Europeans on the world because at that point of time, written documents were almost entirely the provenance of Europeans. This point is supported by Sahlins (1995, p. 9). Very similar cases are reported by the scholar (Harris, 1995) in the case of Mexico and the encounter of Pizarro with King Atahualpa. In the first instance, Cortes’ arrival in Mexico was considered as the fulfillment of a prophecy related to the return of god Quetzalcoatl. It is point out by the scholar that evidently, Cortes made use of this prophecy and actively encouraged it to become a myth. In fact, very simil ar was the case of King Atahualpa. When the Spanish came under the leadership of Pizarro, the king Atahualpa felt that Viracocha had come. Admittedly it is even now common in that part of the world. While some historians like Sarmiento (1572) report that the king and his people considered Pizarro as Viracocha, people like Acosta (1590) go one step further ahead and claim that the natives called the Spanish Viracochas because they believed they

Friday, November 15, 2019

Social Work Case Study | Essay

Social Work Case Study | Essay Case study: Jenny Eleanor This essay will focus on the current situation of Jenny, a single parent, and Eleanor, her six year old daughter, who currently live on a large local authority housing estate. Whilst close attention will be paid to their situation and the needs arising out of it, it is not the substantive function of this paper to prescribe specific courses of action in their case only. Rather, it is to identify and discuss the issues raised by their case, considering the appropriate social work processes, policy, and legal framework. Overall, it will be argued that there are two significant issues to be explored through the circumstances of Jenny and Eleanor’s case. Firstly, the nature and effectiveness of multi-agency working in education and the human services, and secondly, the problems faced by these professionals when adults, either deliberately or through incapacity, are not fully cooperative in ensuring the appropriate care of their child. As McCullough points out, ‘Throughout th e UK, provision and means of delivering children’s services have been changing profoundly. Predominant among the reasons driving these changes is concern about the way in which children are kept safe.’ (McCullough 2007: p.27) The paper will therefore discuss these issues, taking into account how such issues may be dealt with in a context of evidence-based and anti-discriminatory practice. In the first instance it may be helpful to include a brief synopsis of the known facts about Jenny and Eleanor’s situation, as a guide to identifying their needs. The case study reports that they are from a White British background: they live in a local authority housing estate which, it is stated, is regarded as ‘rough’, i.e. socially problematical and economically deprived. This categorization is not supported by any objective assessment, such as referral to any social scales or indices, and so appears rather unscientific and possibly discriminatory. Jenny and Eleanor have experienced five different housing placements in the last seven years. Jenny has been the victim of domestic violence, both in previous relationships and from Derek, her current partner and Eleanor’s father. Eleanor was unfortunately the witness to many of the assaults on her mother, and is herself thought to have been the subject of violence from her father. As the result of one of the assault on Jenny, Derek was awarded two year custodial sentence, and is currently expected to be released in four months time: he requested contact with Eleanor whilst in custody. Eleanor is enrolled at a local primary school, where records reveal that her attendance is low and represents a cause for concern: she has appeared withdrawn, and on occasions been violent towards other pupils. Furthermore, the school nurse has registered concerns about Eleanor’s development. In the light of these facts, it is now up to the relevant services to make the appropriate arrangements, using such measures as the statutory and policy frameworks allow. One of the principle factors in their immediate future the matter of Derek’s release from custody is beyond the control of those agencies immediately involved in Jenny and Eleanor’s welfare, so it is up to them to make their dispositions accordingly in the light of this contingency. What follows is a discussion of the relevant issues as they arise out of the jurisdictions, expertise, and responsibilities of the various agencies involved. This discussion will start with the subject who is likely to be of most concern to the educational and human services, i.e. the most vulnerable individual, Eleanor. As a six year old, she is the only person in the situation who does not have self-determination, is consequently reliant on the various agencies appointed for her care: it is now up to them to ensure this is ensured. As Myers-Blair points out, ‘The basic equipment for emotional development (physical and neural) is present at birth, and in a very diffuse way emotional behaviour begins at birth, or perhaps even before.’ (Myers-Blair, 1975: p.60). The immediate concerns over Eleanor’s welfare devolve upon two separate but related spheres: her school and home life. The relevant professionals must unravel the intertwining requirements and responsibilities inherent in this situation. However, as the Department for Children, Schools and Families itself acknowledges, ‘The professional background of workers is both a strength and a barrier to multi-agency working. As each profession has developed its own language and body of knowledge, it not only serves to provide a professional identity but can alienate those outside the profession who do not share their language or way of thinking. Professionals also develop a different way of working in order to achieve their aims.’ (DCSF, 2007: p.5) Obviously, all of these considerations must proceed from the basis that Eleanor is physically safe, with possible physical abuse from Derek, the previously violent partner, being the most obvious threat to this. If sufficient evi dence of this threat is assembled, then the multi-agency effort is largely irrelevant, since the Local Authority, through the Social Services Directorate, will have a clear responsibility to act accordingly under sections 27 and 17 of the Children Act 1989, and remove her from the situation. The decision as to whether any contingent arrangements involve Eleanor only, or Eleanor and Jenny, will depend on the perceived or actual threat, and Jenny’s position in relation to this. As Asen pointedly reminds us, ‘When professionals are unable to decide whether to let the children remain with its natural family or not, this indecisiveness can be abusive in its own right: it leaves the child in a situation of limbo – which in some cases can last years – further adding to the child’s emotional or physical suffering.’ (Asen, 2000: p.227) Depending upon how matters proceed in relations between Jenny and Derek, Social Services will also be responsible for the next level of care, i.e. ensuring that Eleanor is not suffering from any forms of neglect or subsidiary abuse arising out of the situation. Assuming that this situation is being monitored, the weight of responsibility shifts back into the educational environment: this is not to say that the social worker loses control of the situation, or becomes less relevant to Eleanor’s care: quite the contrary. In fact, by virtue of the serious nature of Eleanor’s home situation, they may well become the ‘lead professional’ within the multi-agency effort, as will be discussed below. It is simply the case that the all the professionals involved effectively have their actions governed by overlapping and interlocking statutes. At present, the latter stipulate that Eleanor should be in school: that school will almost certainly be a mainstream school, i.e. not a PRU (Pupil Referral Unit) or other specialized facility: furthermore, the law provides that every professional effort should be made to ensure that Eleanor is supported in achieving the expected educational progress. This in essence is where the social w ork and educational efforts will interact: since achievement of the expected progress will hinge upon Eleanor’s mental and physical well-being, as well as her innate cognitive ability, the home and school environments will become linked around this effort. The essential point here is that the social services case worker will be reliant on the judgment and expertise of the school based professionals with respect to Eleanor’s learning and emotional well-being. This is very much an open-ended process: a number of successive measures and support systems will have to be put into place before any alternative or specialized provision is even considered. In the first instance, the school’s Child Protection Officer – usually the Headteacher in the context of a Primary school like Eleanor’s – will feedback directly to Social Services, if there is any evidence of abuse. The school Special Educational Needs Coordinator will subsequently be responsible f or ascertaining whether or not Eleanor has any educational or emotional special needs: if so, she must have an IEP (Individual Education Plan) classified as Step One, Two or Three, depending on their severity. The latter will also determine whether or not Eleanor may require a Statutory Statement of Educational Needs (usually referred to simply as a ‘statement’). If so, she may qualify for additional support through the Local Educational Authority’s Statutory Assessment Office. This in turn will involve the Educational Psychology Service, who will have to make a formal assessment based on observation of Eleanor in a school context. If it is deemed appropriate, she will also be referred to the Primary Behaviour Support Service, the School’s Pastoral Support Service, the Family Support Service, and the Primary Mental Health Service. What are the implications of these potential multiple referrals from a practical point of view? As the DCFS guidance advises, ‘It is the processes involved in building relationships between agencies and between providers of services and the communities they serve, which is vital, because this is where the real work has to be done. It is a real challenge to us all, not least finding the time and space to work on these issues when many services are provided from at least 8 am to 6 pm, five days a week.’ (DCSF, 2007: p2). What this euphemizes is the attempted integration of services which proceed from a series of parallel and successive statutes. This include the Children Act 1989, the Children Act 2004, the Education Act 2002, the Learning and Skills Act 2000, the Disability and Discrimination Act 1995, The Special Educational Needs Code of Practice 2001, the Special Educational Needs and Disability Act 2001, and the Data Protection Act 1998. The school based effort, into which the social worker must be integrated, is built around the role of the Inclusions Officer, who must in turn convene a school-specific inclusions team comprised of all the practitioners involved. Whilst all of this sounds fine on paper, the practical challenges of coordinating the support and care of a child in Eleanor’s situation cannot be underestimated. Take, for example, the role of the Lead Professional itself. As the Children’s Workforce Development Council concedes, ‘A lead professional is not a job title or a new role, but a set of functions to be carried out as part of the delivery of effective integrated support.’ (CWDC, 2007: p.5). In other words, the role is titular only and attracts no timetabling facility or resources, but must run parallel – and crucially, in addition to – the practitioner’s other responsibilities. As the CWDC frankly puts it, ‘†¦clear communication is necessary between both services so that the individual is not overwhelmed with lead professional and caseload responsibilities. Speak to your manager to ensure that they take account of any lead professional responsibilities in setting yo ur workload, and that your performance in delivering the lead professional functions is recognized and recorded.’ (CWDC 2007: p.2, para 3.14). This is far more than a Human Resources issue however. The whole rationale of the multi-agency movement and Every Child Matters initiative is to mitigate the kind of short-circuits, doublings-up and straightforward mismanagement which contributed to the Victoria Climbie tragedy. As McCullough reminds us, ‘In Laming’s detailed and damning report, twelve different occasions were identified when appropriate intervention by one or more of these agencies could have saved Victoria’s life†¦in his summing up, Laming noted that â€Å"the legislative framework for protecting children is basically sound. I conclude that the gap is not a matter of law but in its implementation.†.’ (McCullough 2007: p.28). The problem is that whilst the role of the lead practitioner is non-statutory, the responsibilities accru ed by the incumbent are not. As the CWDC again concedes, ‘†¦There are particular implications for staff who may be working part-time in a multi-agency setting and part-time in their home agency.’ (CWDC 2007: p.2, para 3.14). Arguably then, the same issues which underlay Victoria’s death are potential factors in any such case, including Eleanor’s. The mere creation of a job title, i.e., Lead Practitioner, or mechanisms such as the Common Assessment Framework, guarantees nothing if the staff involved are overstretched, unsupported and undirected. The fact that Jenny has cancelled two possible contact appointments so far is disappointing, and may well represent an impediment to the advancement of Eleanor’s care in the future. At present however, it does not constitute an insurmountable barrier to the coordinated effort of the multi-agency team, and definitely is not a pretext for inaction on their part. As the school has noted, Eleanor’s emotional well-being is questionable, indicating a serious potential impediment to her progress. As Meadows indicates, ‘Certain emotional states are frequent and salient, and become parts of feeling about the self, so that they can then influence a wide range of behaviours, such as perception, emotional expression, cognitive processing and social relations.’ (Meadows, 2006: p.438) Instruments in an around the curriculum, such as the SEAL (Social and Emotional Aspects of Learning) programme may be used to help Eleanor externalize and come to terms with the events whic h have shaped her experience: essentially these means must be tried in order to redress any lack of emotional support she is receiving at home. As Maslow points out, ‘†¦thwarting of these needs produces feelings of inferiority, of weakness, and of helplessness. These feelings in turn give rise to either basic discomfort, or else compensatory or neurotic trends.’ (Maslow, 1970: P.1) Also, as Samuels reminds us, ‘Basically, if the child’s needs are not met appropriately at each developmental level, the psyche becomes unable to adequately regulate self-esteem by the use of adequate mechanisms.’ (Samuels, 1977: p. 35). The problem is that, whilst the statutory framework stipulates that the school is currently the focus of support for Eleanor’s needs, the latter obviously do not stop there. As Schaefer et al. observe, since behavioural problems in the home usually precede those occurring elsewhere, part of the focus has to be behaviour in the home.’ (Schaefer et al. 1984 p.96). Consequently, whilst ‘Inter-Professional Collaboration’ has to be an overriding consideration for the social worker, it is likely to be the case worker themselves who initiates much of the strategic action, such as the proposed ‘cold-call’ home visit. The focus on Eleanor does not of course mean that Jenny’s needs, as an individual or as a parent, can be overlooked. A holistic approach, encapsulated within an action plan and developed with the Family Therapy or Support Service will be required. However, for environmental as much as professional reasons, as will be discussed below , Eleanor must remain the primary concern within this case. As this conclusion is being written, the manifest weaknesses of the supposedly revamped multi-agency framework have been revealed in the most devastating manner: through the death of a seventeen-month child, who was in the Child Protection Register’s ‘at risk’ category. Whilst any legislative or policy outcome of this tragedy is obviously some way off, some commentators have been quick to apportion responsibility to the inter-agency working framework. ‘When procedures become so exacting and time-consuming, the exercise of judgment is deemed neither necessary nor possible. Indeed, it will get you into trouble, because it is not part of the procedure.’ (Dalrymple 2008) Calls for less weight to be given to parental wishes and rights, and more to be placed on the safety of the child, are already being heard. The outcome of such debates, it may be argued, may have significant effects on the conduct of cases such as that of Jenny and Eleanor. Bibliography Adams, R., Dominelli, L. Payne, M. (2002) Social Work Themes, Issues and Critical Debates, Basingstoke, Palgrave Anning, A., and Edwards, A., (2006), Promoting Children’s Learning from Birth to Five: Developing the New Early Years Professional, Open University Press, Maidenhead. Asen, E., ‘Working with families where there is parenting breakdown’, in Reder, P., McClure, M., and Jolley, A., (eds), (2000), Family Matters: interfaces between child and adult mental health, Routledge, London, pp.227-236. Bowlby, J. (1969). Attachment and Loss: Vol I Attachment, London: Hogarth Press. Bowlby, J. (1973). Attachment and Loss: Vol II Separation, Anxiety and Anger, London: Hogarth Press. Bowlby, J. (1980). Attachment and Loss: Vol III Loss, Sadness and Depression, London: Hogarth Press. Bradley, G. and Parker, J. (2003) Social Work Practice: Assessment, Planning, Intervention and Review, Exeter, Learning Matters Ltd. Brayne, H and Carr, H. (2005) Law for social workers, Oxford, New York Butler, P. (2002) Failure to attend overshadowed Climbie inquiry [online] August 27  Available from: http://www.guardian.co.uk/society/2002/aug/27/climbie  [Accessed 16 November 2007] Children’s Workforce Development Council, (2007), The Lead Professional: Practitioner’s Guide, CWDC, Leeds. Crawford, K. Walker, J. (2003) Social Work and Human Development, Exeter, Learning Matters Ltd. Dalrymple, T., ‘We can’t be surprised by the death of baby P’ The Times Online, 12 Nov 2008, INTERNET, available at http://www.timesonline.co.uk/tol/comment/columnists/guest_contributors/article5133966.ece?Submitted=true, [viewed 12.11.08] Davies, L (2007) The Big Picture: Is protection working? [online] November 15  Available from: http://www.communitycare.co.uk/Articles/2007/11/15/106450/the-big-picture-is-protection-working.html  [viewed 20.11.07] Department for Children, Schools and Families, (2007), Common Core of Skills and Kn owledge for the Children’s Workforce, DFES Nottingham. Department for Children, Schools and Families, (2007), Integrated Working Exemplar: Young child with behavioural problems: Integrated working to improve outcomes  for children and young people, HMSO, London. Department for Children, Schools and Families, (2007), Effective practice: Multi-agency Working, HMSO, London. Department of Health, (1999) Working Together to Safeguard Children, London, The Stationery Office. Department of Health, (2002) Modernising services to transform care: inspection of how councils are managing the modernisation agenda in social care [online] June 27  Available from:  www.dh.gov.uk/en/Publicationsandstatistics/Lettersandcirculars/Chiefinspectorletters/DH_4004590  [Accessed 21 November 2007] Department of Health, (2004) Executive Summary, National Service Framework for Children. Young People and Maternity Services [online] October 4  Available from: www.dh.gov.uk  [Accessed 15 November 2007] Department of Health, (2005) Background to Every Child Matters [online] May 10  Available from: www.everychildmatters.gov.uk/aims/background/  [Accessed 03 November 2007] Department of Health, (2006) Framework for the Assessment of Children in Need and their Families (fifth impression), United Kingdom, The Stationery Office. Department of Health, (2007) Local Safeguarding Children Boards [online] November 14  Available from: http://www.everychildmatters.gov.uk/socialcare/safeguarding/lscb/  [Accessed 26 November 2007] Friedrickson, N., and Clive, T., (2002) Special Educational Needs, Inclusion and Diversity, a Textbook, Open University Press, Buckingham. Goleman, D., (1996), Emotional Intelligence: Why It Can Matter More Than IQ, Bloomsbury, London. ‘Good to be Me’, (May 2005) Primary National Strategy: Excellence and Enjoyment, Social and Emotional Aspects of Learning, Department for Education and Skills, HMSO, Gurney, P., (1988) Self-Esteem in Children with Special Educational Needs, Routledge, London Gillen, S and Lovell C. (2007) Victoria Climbie Foundation head calls for child protection probe [online] November 5  Available from: www.communitycare.org/articles  [Accessed 12 November 2007] Glover-Wright, D. (2007) Social Work, As We See Ità ¢Ã¢â€š ¬Ã‚ ¦, Community Care, 5-11 April, p.28 Guardian Unlimited (2007) a. Ministers deliberately making asylum seekers destitute, say MPs [online] March 30 Available from: www.guardian.co.uk/immigration/story  [Accessed 04 November 2007] Healy, K (2005) Social Work Theories in Context, Basingstoke, Palgrave MacMillan. Hockey, J. James, A. (2003) Social Identities across the Life Course, Basingstoke, Palgrave Macmillan. Hopkins, G. Wetherall, G. (2007) Fatal Failings Community Care The voice of social care 11-17 January 2007, p. 34-38 Horner, N. (2003) What is Social Work? Context and Perspectives, Exeter, Learning Matters Ltd. Howe, D., Brandon, M., Hinnings, D. Schofield, G. (1999). Attachment Theory, Child Maltreatment and Family Support, London, Palgrave. Howe, D. (2005) Child Abuse and Neglect, Basingstoke, Palgrave Macmillan. Laming, L (2003) The Victoria Climbie Inquiry Report of an Inquiry by Lord Laming, London, Stationery Office. Meadows, S., (2006), The Child as Thinker: The Development and Acquisition of Cognition in Childhood, Routledge London. McCullough, M., (2007), ‘Integrating Children’s Services: the case for child protection’, in Siraj-Blatchford, I., Clarke, K., and Needham, M., (eds), (2007), The Team Around the Child: Multi-Agency Working in the Early Years, Trentham, Stoke-on-Trent. Mens Health Network (2000) Family Violence [online] September 1  Available from: http://www.menstuff.org/issues/byissue/domesticviolence.html#femalebatterers  [Accessed 11 November 2007] Myers Blair, G., Stewart Jones, R., Simpson, R.H., (1975), Educational Psychology, 4th Edition, MacMillan, NY. Office of the High Commissioner for Human Rights, (1989) Convention on the Rights of the Child [online]  Available from: www.unhchr.ch/html/menu2/b/k2crc.htm  [Accessed 15 November 2007] Parton, N. (2006) Safeguarding childhood, Basingstoke, Palgrave Macmillan Parton, N. OByrne, P. (2000) Constructive Social Work, Basingstoke, MacMillan Press. Pierson, J. Thompson, M. (2002) Dictionary of Social Work, Staffordshire University, Collins. Plummer, D., (2001) Helping Children to Build Self-Esteem: A Photocopiable Activities Book, Jessica Langley, London. Podesta, C., (2001) Self-Esteem and the Six-Second Secret, Corwin, Thousand Oaks, California. Quinney, A (2005) Collaborative Social Work Practice [online]  Available from: www.learningmatters.co.uk (sample chapters)  [Accessed 19 September 2007] Schaefer, C.E., Breismeister, J.M., and Fitton, M.E., (1984), Family Therapy Techniques fro problem behaviours of children and teenagers, Jossey-Bass, Sanfrancisco. De Shazer, (1982), Patterns of Brief Family Therapy: An Ecosystemic Approach, Guilford Press, NY. Nind, M., Rix, J., Sheehy, K., Simmons, K., (eds) (2003) Inclusive Education: Diverse Perspectives, Open University Press/David Fulton, Buckingham and London Schofield, G. (2002) Attachment Theory: An introduction for Social Workers, Norwich, Social Work Monograph. Siraj-Blatchford, I., Clarke, K., and Needham, M., (eds), (2007), The Team Around the Child: Multi-Agency Working in the Early Years, Trentham, Stoke-on-Trent. Taylor, J. Daniel, B. (2005) Child Neglect, London, Jessica Kingsley. Thompson, N. (2001) Anti-Discriminatory Practice, 3rd edition, Basingstoke, Palgrave Thompson, N. (2005) Understanding Social Work Second Edition, Basingstoke, Palgrave MacMillan Trevithick, P. (2005) Social Work Skills, Open University Press Ward, L. (2007) Not every child matters [online]  Available from: http://politics.guardian.co.uk/comment/story/0,,1995795,00.html  [Accessed 21 November 2007] Warren, J. (2007) Service User and Carer Participation in Social Work, Exeter, Learning Matters. Whelan, D (2003) Using Attachment Theory When Placing Siblings in Foster Care. Child and Adolescent Social Work Journal, 20(1), pp.21-36

Wednesday, November 13, 2019

The Origination Of Punk Rock Essays -- essays research papers fc

The Origination of Punk Rock   Ã‚  Ã‚  Ã‚  Ã‚  The time was in the mid-seventies, there was a void in the music industry that needed to be filled. This need for a new sound was aptly filled by punk rock, a new type of sound that had evolved from mostly rock and a little pop music. The focus of this paper is on punk rock and it’s ample beginnings, early pioneers of the new sound, punk rock listener’s cultural background and their ideas as a whole, bands influenced by the punk rock movement, and the state of punk rock today.   Ã‚  Ã‚  Ã‚  Ã‚  The year is 1974, this year marks the birth of punk rock (1974). There is controversy as to where punk started out at, some say it began in London while others say it started out in New York City. It can be safe to say that two very distinct sounds classified as punk originated at about the same in both London and New York City (Punk). Punk rock began in the bars and nightclubs until the bands garnered enough support to receive a record contract.   Ã‚  Ã‚  Ã‚  Ã‚  When the punk rock explosion occurred in the mid-seventies, a number of new, excitingly innovative bands burst upon the scene. Bands like the Ramones, The Clash, The Velvet Underground, The Virgin Fugs, Patti Smith, The New York Dolls, Iggy Pop and The Stooges, and the punk band with the most success, The Sex Pistols. The thing that made punk rock so unlike anything the music industry had heard before was the notable lack of talent displayed on the musician’s part. Not to say that all punk bands were devoid of any talent, just that anyone with second-rate instruments and the ability to play at least three chords on the guitar could form a punk band. This is part of what punk’s appeal was, it was a new sound that appealed to many of the youths of that era. As Johnny Ramone, the guitarist for the Ramones, stated, â€Å"We were new at writing songs and new at playing our instruments, so we couldn’t write anything too complicated, really† ( 1974). Punk rock bands often had a flair for the flamboyant, not just with their appearance but with their humor, sarcasm, and often carelessness about society and social norms. For example, The Virgin Fugs, their outlook on life is often displayed in the titles of their songs. Songs like â€Å"I Saw The Best Minds of My Generation Rot†, â€Å"Kill For Peace†, and â€Å"New Amphetamine Shriek† captured the F... ..., Bad Brains were all heavily influenced by the punk revolution (History). Also, bands like Nirvana and Pearl Jam seem to have the mind frames of punk rockers and were undoubtedly influenced by them, the sound doesn’t carry over into their own music.   Ã‚  Ã‚  Ã‚  Ã‚  Punk, as it was really intended, will never become commercialized and incorporated as a large part of the music scene. But then again, punk was based on rebellion against mainstream culture and to be publicized and critically acclaimed would be contradictory to the basis of everything punk stands for. True, one can see bands on MTV that claim to be punk, but the true hardcore punk fans will tell you that they are posers. The industrialized, commercialized, mainstream music seen on MTV is really more like punk/pop, it’s good music that may have been influenced by punk, but not true punk rock.   Ã‚  Ã‚  Ã‚  Ã‚   Works Cited â€Å"A History of Punk† http://www.fastnbulbous.com/punk.htm â€Å"Punk† http://www.music.warnerbros.com/rocknroll/cmp/episode9.html â€Å"The Birth of Punk† http://www.pqdweb?TS=953580845&Did=000000042640912&Mtd=1&Fmt=3&Sid=1&Idx=21&Deli=1&3/20/00 The Origination Of Punk Rock Essays -- essays research papers fc The Origination of Punk Rock   Ã‚  Ã‚  Ã‚  Ã‚  The time was in the mid-seventies, there was a void in the music industry that needed to be filled. This need for a new sound was aptly filled by punk rock, a new type of sound that had evolved from mostly rock and a little pop music. The focus of this paper is on punk rock and it’s ample beginnings, early pioneers of the new sound, punk rock listener’s cultural background and their ideas as a whole, bands influenced by the punk rock movement, and the state of punk rock today.   Ã‚  Ã‚  Ã‚  Ã‚  The year is 1974, this year marks the birth of punk rock (1974). There is controversy as to where punk started out at, some say it began in London while others say it started out in New York City. It can be safe to say that two very distinct sounds classified as punk originated at about the same in both London and New York City (Punk). Punk rock began in the bars and nightclubs until the bands garnered enough support to receive a record contract.   Ã‚  Ã‚  Ã‚  Ã‚  When the punk rock explosion occurred in the mid-seventies, a number of new, excitingly innovative bands burst upon the scene. Bands like the Ramones, The Clash, The Velvet Underground, The Virgin Fugs, Patti Smith, The New York Dolls, Iggy Pop and The Stooges, and the punk band with the most success, The Sex Pistols. The thing that made punk rock so unlike anything the music industry had heard before was the notable lack of talent displayed on the musician’s part. Not to say that all punk bands were devoid of any talent, just that anyone with second-rate instruments and the ability to play at least three chords on the guitar could form a punk band. This is part of what punk’s appeal was, it was a new sound that appealed to many of the youths of that era. As Johnny Ramone, the guitarist for the Ramones, stated, â€Å"We were new at writing songs and new at playing our instruments, so we couldn’t write anything too complicated, really† ( 1974). Punk rock bands often had a flair for the flamboyant, not just with their appearance but with their humor, sarcasm, and often carelessness about society and social norms. For example, The Virgin Fugs, their outlook on life is often displayed in the titles of their songs. Songs like â€Å"I Saw The Best Minds of My Generation Rot†, â€Å"Kill For Peace†, and â€Å"New Amphetamine Shriek† captured the F... ..., Bad Brains were all heavily influenced by the punk revolution (History). Also, bands like Nirvana and Pearl Jam seem to have the mind frames of punk rockers and were undoubtedly influenced by them, the sound doesn’t carry over into their own music.   Ã‚  Ã‚  Ã‚  Ã‚  Punk, as it was really intended, will never become commercialized and incorporated as a large part of the music scene. But then again, punk was based on rebellion against mainstream culture and to be publicized and critically acclaimed would be contradictory to the basis of everything punk stands for. True, one can see bands on MTV that claim to be punk, but the true hardcore punk fans will tell you that they are posers. The industrialized, commercialized, mainstream music seen on MTV is really more like punk/pop, it’s good music that may have been influenced by punk, but not true punk rock.   Ã‚  Ã‚  Ã‚  Ã‚   Works Cited â€Å"A History of Punk† http://www.fastnbulbous.com/punk.htm â€Å"Punk† http://www.music.warnerbros.com/rocknroll/cmp/episode9.html â€Å"The Birth of Punk† http://www.pqdweb?TS=953580845&Did=000000042640912&Mtd=1&Fmt=3&Sid=1&Idx=21&Deli=1&3/20/00