Wednesday, July 31, 2019

Case 7.8 First Securities Company

From the time Ladislas Nay arrived to United States at a young age of 18, he learned that this was the land of opportunity, this sense of hope allowed him to achieve â€Å"success. † However, his â€Å"success† led him to not only cheat and steal people out of their money; it also led him to steal a life filled with happiness for himself and his family. Living with this guilt, and no longer could bear the burden of deceiving widowers out of their money he committed suicide, by not only killing himself but his wife as well.This all began with Ladislas Nay working in a small brokerage firm; he worked hard learning the ropes of the business. From there he went on to work for a few more businesses before landing his final job working for the brokerage firm of Ryan-Nichols & Company. This is where it all began for Ladislas Nay, after a few years of working for Ryan-Nichols and Company; he achieved the status of becoming President of the company and had more than 90 percent o f the company’s outstanding common stock. He was very well known; he had many friends and was liked by all his clients.Ladislas Nay began his manipulation by telling his clients to invest into a fund that he was in charge of. He then turned around and used the funds to lend to other companies; these companies would pay interest on the money loaned. However, Ladislas Nay own company was not aware of him taking people’s money and loaning it to other companies. He was scamming friends and widowers into investing large amount of money into this so called â€Å"fund. † After 30 years this all came to a final end, and Nay’s scam was exposed.Everyone became aware of Nay’s so called â€Å"fund,† and how he had achieved in scheming friends out of their money. He left them with nothing, and even left one widower â€Å"penniless. † However, investors were not happy with this and decided to file a civil lawsuit in order to retrieve their millions of dollars of money they had invested with Nay. Investors felt that if Ladislas Nay’s company where investigated properly this whole scam could have been prevented. However, the courts weren’t hearing this and felt the company was investigated properly.Investors would not give up and pursued in trying to get their money back. They were in and out of court rooms, until finally the investors decided to go after the previous accounting firm. The investors filed suit against Ernst & Ernst, their defense was negligence, investors felt this type of negligence could have been avoided if only they did their jobs correctly. The accounting firm failed to comply with the General Standards rule 201, which states that agencies must exercise due professional care, professional competence, planning and supervision and having sufficient relevant data.In order for Nay to keep himself from being detected of committing fraud he had established a â€Å"mail rule,† where no one was allowed to open or touch any letters that was for him or sent to him. Auditors relied on internal evidence as their source of evidence on documents provided in order to base their opinion. Nay’s illegal act caused financial statements to be materially misstated and external auditors were not aware of his illegal acts. This type of ineffective internal control risk would have been detected by auditors if only they did their job correctly.An audit team’s responsibility is to design procedures to provide reasonable assurance that material frauds that might misstate the financial statements are detected. This would have raised a red flag and they would have approached Nay with a professional skepticism. They would have requested all documents as evidence, in order to validate whether what he was saying and stating in fact was true. Auditors would have traced all documents to test whether all events are recorded, which would have established a state of completeness. Howeve r, due to false documents, the auditors would have found Ladislas Nays of committing fraud.The courts felt differently and dismissed the case stating there was no substantive evidence to support the allegation. Investors were unhappy with this and decided to appeal this, the SEC became involved and also stated that the investors were entitled to documents that were of true statements, and the duty of the auditor is to provide this. The courts felt the auditor’s intention was not of negligence or fraudulent behavior, and decided there was not enough evidence to hold them liable for this and the court dismissed the case.

Tuesday, July 30, 2019

Genetically modified organism Essay

Genetically engineered food is an epidemic all around the world. There are factors that make these types of foods undesirable for many reasons. Public opinions on how genetically engineered foods will effect the consumer market and farmers cannot afford the new seeds that are genetically altered. There are many cons of genetically engineered food that have long term and short term risks. Some risks have been found by scientists while other risks are still unknown and will remain so unless a researcher tests for them. These foods have become very common in America as well as other countries. Almost every grocery store in the United States carries a wide array of food that has been genetically modified. Most of the genetically engineered foods in markets are not labeled to tell consumers they were altered in any way. Environmental risks are also a concern for genetically engineered food. Different animals, including farm animals or insects can be harmed from genetically engineered food. Genetically engineered food has negative effects on the human population. Genetically engineered food was first introduced into society in the early 1990’s. Many people today do not know what kind of extensive research and development goes into making these types of foods. Sharon Palmer, a reporter, writes that genetic engineering is either â€Å"Doomsday tech† or â€Å"biotechnology for the future† (Palmer 1). The process of altering an organism completely changes the original organism and transforms it into something new. This new way of altering an organism’s genetic makeup bypasses common breeding methods used by scientists (Genetically Modified Foods 1). The process of creating genetically altered food usually involves â€Å"identifying the genes governing a desirable characteristic in one organism, and inserting them into another in the expectation that the trait will be transferred† (Genetically Modified Foods 1). Sometimes the process of creating these organisms does not work so scientists have to do the process over again until they get a transformed organism. In 1973 scientists were able to achieve using another organism as a vector which essentially was the beginning of the development of genetically engineered foods. Although genetically engineered foods were not fully introduced until the early 1990s, they were in the process of becoming what society knows today. Newer techniques have been introduced that make it easier for gene insertion. This new method is the use of DNA bullets where â€Å"microscopic metal beads can be coated with DNA fragments, and then â€Å"fired† from a miniature gun into the host cell, where DNA may integrate into the genome† (Genetically Modified Foods 1). A few of the genetically engineered foods are soybeans, corn, canola, cotton, squash and papaya (Palmer 1). There are many other foods that people see on the shelves in grocery stores that may be genetically altered but these are some main ones. Statistics show that â€Å"an estimated 70 to 75 percent of all processed foods in U. S.grocery stores probably contain ingredients from GE plants† (Palmer 6). Many foods have been genetically altered to make them â€Å"better† or resistant to herbicides. Despite the fact that scientists consider these foods to be revolutionary there are hidden consequences to the development of such organisms. The public opinion on genetically engineered food is that it is not a good improvement. Many citizens believe that the introduction of altered foods is going to have negative side effects on everything. People feel that genetically engineered foods should not be put on the market until they have had adequate testing (Current Issues 3). Many of the alterations done to food have not had extensive research conducted to find harmful effects that they might have on humans and animals. Any research that had been done usually had negative effects but scientists found a way to â€Å"throw out† the research so that it would not go against genetically engineered food. Andrew Simms states that the â€Å"evidence of harm is not evidence of the absence of harm† (Simms 1). In Simm’s article he describes how consumers do not need genetically modified food. Scientists brought genetically engineered foods into the market and advertised them as a way to help the world. Different techniques can be used to approach the issue of world hunger. Introducing these foods to third world countries can only harm them not help them. There is a high cost of development for making genetically engineered foods. Also there is a monopoly involved with these foods. There are only a few corporations in the United States that are developing genetically altered seeds. This in turn drives up the price of the seed making it more expensive and poor farmers cannot afford to buy them (Current Issues 3). Farmers have lost billions of dollars because foreign buyers do not want to buy genetically engineered foods (Kupfer 1). Many states have passed legislation against having genetically modified foods. States do not think that genetically engineered foods can help anything except make things worse (Kupfer 2). Foods are altered to have different traits that would normally take a few generations to make but with genetically engineering their DNA scientists are able to do a lot more. Scientist use genetic engineering to make crops or animals drought tolerant and be able to tolerate pests. Consumers do not want crops that are mutations. They want natural crops and animals. Other public opinions on worldwide hunger are that GM crops will not change it. â€Å"People go hungry because they’re either poor, powerless, both, or have no land to grow food on† (Simms 2). Public opinion on genetically engineered food is that they do not want it. Many factors have led people to choose not to accept genetically engineered foods into their lives. Genetically engineered food effects everything in a negative way. There are cons to the development and introduction of genetically engineered foods into civilization. There are many risks involved with these types of foods that are unknown to the public. Scientists try to cover up the experiments they had on genetically altered foods because they had negative outcomes. In one study scientists fed corn to rats and then checked the rats’ livers and kidneys, particularly males, and the study revealed adverse effects. In another study conducted on GM foods many of the mice that ate the food developed health problems or even died during the experiment (Current Issues 4). The introduction of genetically engineered foods has been linked to the rising levels of food allergies in the United States. Genetically modified foods can effect organic foods if they are processed in the same place. Allergic reactions are greater since genetically engineered foods have been introduced (Smith 1). There are many environmental concerns as well. Although long term impact is unknown many researchers can conclude some of the negative side effects. A few difficulties have already developed. Plants can cross-pollinate with other plants around them which may seem like a great thing but it is not. Some plants are engineered to be pest resistant which seems good but in all actuality those plants can cross-pollinate with the weeds around them which in turn makes the weeds stronger and become more resistant to herbicides. The cross-pollination of plants creates a problem for farmers who then have to spend additional money to buy more herbicide to kill new weeds (Current Issues 3). Another common modification is adding a gene called Bacillus thuringiensis which is a bacterium that helps that plant develop poison that kills pests such as bollworms and stem borers. This seemed like a good modification by scientists but in fact the plant emits these toxins into the environment and it is deadly to all insects, not just the pests. Reports have been shown that these toxins from the crops also killed a large amount of butterflies (Current Issues 1). U. S. Government does not require reviews on genetically engineered foods. Genetically altered foods are not FDA regulated either. Foods are being modified without having adequate testing and then put on grocery shelves. People are eating food that they do not know whether or not it is safe. There are many other potential concerns with genetic engineering like an organisms genetic makeup, anti-nutrients, viral DNA, antibiotic resistant genes, absorbing genes, and allergic responses. Many genetically altered foods have been used as feed for animals as well. These animals have shown effects on body growth, changes in blood, kidney, pancreas, liver, erosion and necrosis of the gastrointestinal tract, and alterations in reproduction, development and mortality (Palmer 6). There are many unknown risks of genetically engineered foods. Unknown long term health risks have not been identified and cannot be identified until researchers conduct more research. Genetically modified foods are not something people should rely on in the future as their base food. There are risks today and also many other unknown risks. Genetically engineered food is a hazard to the human population. This creation was introduced to try and stop world hunger, make food cheaper to buy and many other reasons. These issues have not changed because of the introduction of genetically engineered food. The effects these types of foods have on humans and even animals can be harmful. Research shows that there are long term risks involved with genetically engineered foods. Potential cancers, diseases, environmental changes, and possibly a rising cost in food are all negative factors of genetically engineered food. Genetically engineered foods should be eliminated from people and animal’s diets. Works Cited â€Å"Genetically Modified Food. † Current Issues: Macmillian Social Science Library. Detroit: Gale, 2010. Gale Opposing Viewpoints In Context. Web. 27 Nov. 2011. â€Å"Genetically Modified Foods. † The Hutchinson Unabridged Encyclopedia with Atlas and Weather guide. Abington: Helicon, 2010. Credo Reference. Web. 05 November 2011. Kupfer, David. â€Å"Genetically Modified Food Damages Trade with Other Nations†. Genetically Modified Food. Diane Andrews Henningfeld, Ed. At Issue Series. Greenhaven Press, 2009. David Kupfer, â€Å"The Genetic Resistance: ‘Mendocino Is the First GMO-free County in the Nation, and I am Sure It Will Not Be the Last,† Earth Island Journal, vol. 19, summer 2004, pp. 42-44. Copyright  © 2004 Earth Island Institute. Reproduced by permission. Palmer, Sharon, and Chris McCullum-Gomez. â€Å"Genetically Engineered Foods Update.. (Cover Story). † Environmental Nutrition 33. 7 (2010): I-6. Health Source: Nursing/Academic Edition. Web. 5 Nov. 2011. Simms, Andrew. â€Å"Genetically Modified Food Will Not Ease World Hunger†. Social Justice. David Haugen, Susan Musser, and Vickey Kalambakal, Eds. Opposing Viewpoints ® Series. Greenhaven Press, 2010 Andrew Simms, â€Å"World Hunger Needs a Simple Solution Rather Than Hi-Tech GM Food,† Guardian, (UK), August 4, 2003. Copyright  © 2003 Guardian Newspapers Limited. Reproduced by permission of the author Smith, Jeffrey M. â€Å"Genetically Modified Foods May Cause Allergic Responses†. Food Safety. Judeen Bartos, Ed. At Issue Series. Greenhaven Press, 2011. Jeffrey M. Smith, â€Å"Genetically Engineered Foods May Cause Rising Food Allergies,† Institute for Responsible Technology, May 2007. Copyright  © 2007 by Virago. Reproduced by permission by Time Warner Books UK.

Monday, July 29, 2019

Operational managment report on apple company Essay

Operational managment report on apple company - Essay Example Since the disposal of a high amount of wastage is highly detrimental for the people living on the earth, there have been various enactments to regulate the environmental issues particularly with the waste management. Tougher environmental standards have been enacted to ensure that the firms do reduce the wastage to the maximum extent. In order to avoid these environmental liabilities the product recycling has been made a function of the product life cycle management of larger companies to save considerable time and money which otherwise would have been spent on the discharge of the environmental liabilities. In the present study this paper while detailing the broad issues connected with the product life cycle management analyses in detail the steps taken by major computer manufacturers Apple computers in the area of product life cycle management as a function operational management. The purpose of any manufacturing organization is to provide a quality product or service to its customers. In doing so the firm attains a competitive edge to its products by bringing in new ideas to the market quickly and faster than the competitors. In this way the firms are able to provide the maximum satisfaction to the customers. An addition to this phenomenon is the service to the human beings in the form of meeting the environmental liabilities, by improved product designs whereby the products are recycled at the end of their useful life. Enormous time and money are being sent by large corporations in the area of developing new product designs that will improve the effective working life of the product and at the same time making the production processes easier for manufacture and repair than existing products and services. The role being played by the innovative product designs and technological advancement is commendable in this respect. Such development of the new product designs to meet the recycling requirements often face a host of problems both internal to the organization as well as external in relation to the customers and other external stakeholders of the firm. 1.1 Internal Problems: Any new product design to meet the requirement of both fitting the production processes as well as satisfying the environmental requirements of recycling face the following problems within the organization. The design process Should

Sunday, July 28, 2019

Maldoror by Comte de Lautreamont Essay Example | Topics and Well Written Essays - 250 words

Maldoror by Comte de Lautreamont - Essay Example He himself shifts into various animal forms and sees people do the same. He wants people to embrace the base, vile animal within themselves in order so that they will become evil too. Animals live by their appetites, they have no higher reason or calling. Maldoror wishes to see humanity reduced to this base form. He transfers into animal form to escape his disgust for humanity. It is easy to sense the poet's own disgust with humanity. He clearly is unhappy with human hypocrisies and sees in the animal kingdom something that is purer or freer of guile. He sees an insect as a beautiful thing, not as something disgusting. This is worthy of note. Few works in the history of literature have made as much of an impression as this one. Its non-narrative structure and powerful imagery influenced a generation of surrealists. But it also contains a larger, almost theological message: We should value the distinction between us and animals.

Saturday, July 27, 2019

Investment Portfolio Assignment Example | Topics and Well Written Essays - 500 words

Investment Portfolio - Assignment Example Conversely, the present Risk-Free Rate RFR provided by the US Treasury Bill has been fixed at 0.182% for the year 2012. Moreover, the prevailing market rate of return Rmt = 5.24% (NYSE, 2012). While the company investment is relatively profitable, the expected returns on assets on the risk taken by Dell remain quite volatile. This is reflected by the low Sharp ratio as well as Treynor ratio. The decision to invest in the open market is however, compensatory. It is quite evident that the portfolios of these six companies are performing differently. UPS has a high Sharp Ratio which means it is in a better chance of realizing high returns on its assets and investment. Besides, the Treynor ration of Wal-Mart indicates that the company is well positioned to enjoy good returns from the volatile risks taken by the company as argued by Sanwal (2007). Finally, is worth nothing that Ford and General Electric are relatively stable in the stock market with little volatility in the invested assets

The Reasons for the Collapse of WorldCom in 2002 Coursework

The Reasons for the Collapse of WorldCom in 2002 - Coursework Example Corporate governance is known to entail associations amid the board, other bodies involving an indirect form of engagement with the organization, management and stakeholders of the organisations. The mentioned aspect is even supposed to present a comprehensive composition from which the intentions of that particular organization are believed to descend. However, it becomes imperative to mention the procedure through which the behaviours of the directors in a particular organization are supervised and controlled. The process is also learnt to entail the factor of decision making, supervision and responsibility and is termed as corporate governance on the whole (Monks & Minow, 2011: 433). Brief Background of WorldCom WorldCom was founded in Mississippi. The nature of its business operations was telecommunications and the company was learnt to have surfaced from murkiness in a period of rage in relation to corporate behaviour with regard to the mentioned sector. The rage was measured to be let loose as a result of deregulation in the telecommunications sector in the United States (US). ... It i worth mentioning that Bernard Ebbers was selected as the Chief Executive Officer (CEO) of the company in the year 1985 and was considered to be majorly responsible for the progress as well as for the downfall of the company. The progress of WorldCom attained its zenith with the acquirement of MCI Communications in the year 1998 which was recorded to be the biggest and most noteworthy corporate merger (Ngoda, 2011). The Reasons behind the Collapse A huge amount of accounting misstatements was identified as the major reason that triggered the collapse of WorldCom. The accounting misstatements were found to conceal the progressively grave situation of the mentioned company. Fake or rather unproven accounting entries involving a huge amount were learnt to be made in the financial methods of the company with the intention of attaining the aspired record of financial results. The major contributor to trigger such a fraudulent activity was stated to be the pursuance of a particular bus iness strategy by the CEO, Bernie Ebbers. During the period of 1990s, the only focus of the CEO was supposed to be on the attainment of remarkable progress with the help of acquirements. The company was learnt to be making aggressive moves towards acquiring other companies with the aid of the stocks held by the company. The stocks of the company called for the requirement to record a constant rise in terms of their worth in order to carry out the acquiring spree. However, this particular aggressive strategy followed by Bernie Ebbers witnessed a halt when the company was compelled to discard a planned unification with Sprint owing to antitrust oppositions (Berglund, n.d.). This definite halt triggered a strong influence over the CEO to project a picture

Friday, July 26, 2019

Leadership and Ethics Essay Example | Topics and Well Written Essays - 1000 words

Leadership and Ethics - Essay Example Any failure to hold on to the code of conduct with vested interests such as saving labor costs amounts to unethical behavior. The employment legislation in place puts managers to task where they are expected to become accountable to the process of hiring foreign workers. Lack of compliance may get public office managers to lose their jobs, get fines or suffer from adverse publicity. Managers face the unethical influence of politicians in their organizations. Political parties view the undocumented workers as potential sources of votes. Politicians push reforms that favor workers who are hired in the country illegally in order to boost their voting blocks. Democrats and Republicans push for initiatives such as health care or social welfare that impress the illegal workers because they know their efforts would translate into votes. Managers have suppressed authority for making such decisions. The decisions are made nationally unless immigration policies are revised to reinforce their capacity to take charge in their offices. Political influence brings economic deprivation for legally documented skilled workers. There is a link between organization structure and the degree of ethical behavior in any well-to-do organization. A hierarchical and rigid organization structure limits opportunities for employees and they lack the capacity to develop their moral intelligence (Raines, 2010). Employees whose roles are limited within the organization are not involved in activities that confront them with ethical dilemmas. The workers do not understand ethical or unethical behaviors when they are carrying out their duties. Additionally, a rigid structure features an autonomous decision-making process. Employees do not have the capacity to make high-level decisions because the work environment does not give them relevant experience in moral development. Lack of proper moral development may translate

Thursday, July 25, 2019

Canadian defence at the onset of the Battle of Hong Kong, 1941 Essay

Canadian defence at the onset of the Battle of Hong Kong, 1941 - Essay Example Having gained much of China the Japanese next targeted HongKong. The war between China and Japan was, therefore, a cause for the attack of HongKong since Japan was stretching its rule further from its boundaries. The HongKonginvasions took the world by storm and the speedy retaliation of the allies to support HongKong was marshalled. The Japanese invasion of Hong Kong finally happened in December 1941 (Tsang, 119). It was of the wars that led to World War II. The Japanese army invaded Hong Kong, which was under the British. The Japanese had not stated clearly, why they would to attack HongKong and had not notified the British. TheBritishwere not prepared for the war since it was a surprise attack. The forces in Hong Kong were the Indians, Canadians and British forces. The main resistance to the Japanese forces was the local troops in Hong Kong, and they were no march for the invaders. The invasion overwhelmed the Indian, British and Canadian forces, who were part of the Commonwealth forces. They were outnumbered, and therefore they would not have defended the island under the British protectorate. The leader of the troops was Sir Robert Brooke. He had under his command few British troops. He thought that the troops on the ground would reduce the time that the Japanese would take to complete take over HongKong. Since HongKong was under the British protectorate there,a decision to change adds reinforcement to the forces at HongKong. Winston Churchill was the premier of Britain at the time of the attack on Hong Kong. He decided to add more troops, which had not been the case since initially they had recommended few troops. He had envisioned an imminent defeat should the Japanese attack the island(Barman, C. & Barman, R., 94). The then British premier, WinstonChurchill, decided to send a contingent of the British Army to ensure that reinforcements would be available should there be an attack. The Chinese had control of

Wednesday, July 24, 2019

Saudi woman's right to drive Research Paper Example | Topics and Well Written Essays - 1500 words

Saudi woman's right to drive - Research Paper Example In Saudi Arabia, women are seen as minors, legally. They must seek permission from men on matters concerning education, healthcare, and employment. Women in Saudi Arabia are not allowed to drive or be seen driving in public. Saudi Arabia ratified the Convention on the Elimination of All Forms of Discrimination against Women (C.E.D.W.A), but still women face discrimination. The government ratified the convention saying that in case of contradiction between the Islamic law and the convention, then the Islamic law would overrule the convention. It is crucial, while addressing these issues to understand the religious and cultural complexities that exist in Saudi Arabia (Abbass, p. 20). In Saudi Arabia, religious and cultural claims function as justifications for the oppression of women. As the Saudi Arabian women went out to protest the oppression, various philosophical theories could be observed; functionalism, conflict and symbolic interaction. In Saudi Arabia, women rights exist under religion and customs. In this region, the separation of women and honor is central to life. All women in Saudi Arabia have male guardians. This country prohibits women driving. Manal al-Sharif started a Women’s Right to Drive movement in 2011. She is a women’s right activist who filmed herself drive and posted the footage on popular media. Because of this, she was detained but later released and rearrested for deviance.

Tuesday, July 23, 2019

How Important Was Nationalism as a Cause of Revolution in 1848 Essay

How Important Was Nationalism as a Cause of Revolution in 1848 - Essay Example uperiority in Europe became evident in 20th century, when millions of Jews were massacred in German anti Semitism campaign and the Holocaust (Tackett, 2003). It is apparent that conservatism caused social and political challenges in Europe. Consequently, other ideologies developed as suitable alternatives in the 19th century. Some of the ideologies included socialism, trade union movements and democracy. Karl Marx and Friendrich Engels are the pioneers of socialism. Socialism was the direct opposite of nationalism and liberal ideologies and it emphasized on the collective community wellbeing rather than individualism advocated by the nationalistic and liberal movements. To ensure existence of collective communism in society, socialists advocated for proactive and planned state initiated policies to bring the desired social change. In Europe, socialists opposed capitalist and laissez- faire economics vehemently. Regarding economics, socialists supported state ownership of all means of production and distribution (Periwal, 1995: 76-81). In 1848, Karl Marx and Engels published the Communists Manifesto one of the most revolutionary writings of the century produced during a period of profound economic and political changes in the European continent. The two authors argued that human existence was characterised by perpetual struggle between the existing classes of people. At every stage of human development, each ruling class was replaced by another (Marx and Engels 1998). In European context, three classes had already ruled the region, beginning with monarch that had been replaced by aristocrats. In the 19th century, socialists argued that the middle class also referred as bourgeoisie replaced aristocrats. Therefore, socialists predicted that the time for the working class... This essay stresses that during the period of the French uprising, the Habsburg ruled the Austrian empire. Nationalism ideologies started in Hungary where demands for sovereignty within the precincts of liberalism reigned supreme. During the period, the Habsburg Empire was characterised by oppressive practices including compulsory serfdom. The persistent calls for political reforms prompted the emperor to initiate some political changes, including the abolition of serfdom. However, lack of unity among the various opposing factions hindered a concerted effort for comprehensive demands for reforms. In addition, Habsburg Empire comprised of diverse populations a situation that hindered unity of purpose and nationalism. This paper makes a conclusion that it is apparent that nationalism was one of the most influential ideologies in 19th century. Although other ideologies especially socialism became popular, the triumph of revolutionary concept of nationalism ensured its entrenchment in the European continent for many years. The success of nationalism in France and Habsburg Empire demonstrated that national awareness is more influential in any society than the class-consciousness advocated by socialists. However, in 20th century, some political leaders, who propagated for racist nationalism for selfish political interests, misused classical nationalism that advocated for self-determination and freedom. This resulted to occurrence of serious crimes against humanity such as genocide.

Monday, July 22, 2019

Is it Nature or Nurture Essay Example for Free

Is it Nature or Nurture Essay You become a certain way because of your nature, or what you are born with, or because of your environment which is nurture. Nature comes from genetics; your talent can be defined by natural talent, intelligence, temperament/attitude and disorders/conditions. Determination is the gray area between these too. Nurture on the other hand is your environment; your peers, family, social media, the media or school could influence you to pursue your dreams. Is it nature that Sung-Bong Choi could sing like an angel from above? Or was it the fact that he was determined to make something of himself after hearing that guy sing, that could be nurture. But determination makes it a little confusing. It could be both, you could be born with a natural talent, nature, but if you never start singing or if you dont have a passion for singing or dont have the opportunity to pursue a career in singing then nothing comes of it. That’s when nurture takes in place; if you audition for a TV show like American Idol or if you go to Nashville or Hollywood to pursue your dreams and have people helping you a long the way, that’s nurture. If your born with a talent and you have people around you influencing your decision then your dreams, your passion could come true. Sung- Bong Choi was born in Seoul and abandoned in an orphanage at the age of three. At the age of five years old he ran away because of how badly he was beaten and treated. For the next ten years he lived on the streets, sleeping on stairwells and selling gum and energy drinks to survive on his own. Until one day, he was 14 years old, he heard a guy singing classical music in a night club and became completely inspired. He searched for teachers to teach him how to sing like that singer. Finally a teacher agreed to teach him without charge and even helped him get into a arts school at age 16. Then one day in 2011 he auditioned for Koreans Got Talent (KGT). He told his story and sang beautifully; he brought the judges to tears. He is now signed to a record company. Was he born with the ability to sing? Or did the years of schooling at the arts school and that singing teacher lessons help him? I think that he had to be born with the ability to sing which is nature. But I feel as if nurture helped him pursue his dreams. If he wouldnt have seen that singer in the night club that night he wouldnt have been inspired and he wouldnt have looked for teachers to help him learn how to sing classical music. If he wouldnt have went art school he wouldnt have been able to sing greatly and the KGT audition wouldnt have happened and most likely he would still be selling gum and energy drinks or doing some low paying manual labor job; nurture played the biggest part in my mind. Wilma Rudolph was born number 20 out of 22 children; at the age of four she contracted polio that caused her to not be able to walk and she would fall all the time. She recovered but still had to wear braces on her legs and an orthopedic shoe to support her feet for two years. At 12 she fully recovered and could walk just like everyone else. She followed in her sisters foot steps in basketball but she had ran track two years prior and noticed by a Tennessee State scout in 1953. Long story short she won the Olympic Gold Medal in the 4100 relay in 1959. To overcome a disease as horrible as polio and to win an Olympic Gold Medal for running? Most people never walk again or even die from that disease. I think that she was born with the natural talent for running because her legs were pretty badly twisted from the polio; her parents pushing and her mom believing in her so much played a huge role. But I think nature and determination wins with Wilma; she was born to run. Misty Copeland had a troubled childhood, her mom always had boyfriends and really was consumed in those relationships. Her mom decided to put her in the Boys and Girls Club, that was an outlet for Misty. She never studied ballet until she was thirteen. Most kids start learning ballet as young as three years old to get their body and their feet in shape to bend and move like the ballerinas do. A woman taught ballet once a week at the Boys and Girls Club and it was free. But Mistys mother did not have a car and her sister worked two jobs so she would go and stay with the woman, Cynthia Bradley, during the week and go home to her mother during the weekends. After practicing and going through many struggles in 2008 she became a member of the American Ballet Theatre. She was the only African American to ever dance for the company. Misty was born to dance, otherwise her body  would have not been able to learn at such an advanced age. Cynthia inspired her and helped her be a better dancer. If it wasnt for Cynthia, I dont think Mistys mother would have let her continue to dance. So Im going to say it was both in this case, she was born to dance but Cynthia encouraged her to pursue the dream of being a ballerina and Misty was determined to make it happen. With myself at the stage I am in, in my life right now I think its both that has made me who I am. My mom is a very determined woman, but I was raised by my aunt. If I was raised by my mom I cant guarantee that I would be in college right now or even finished high school. I was born with determination to be whoever I want to be and I choose to be a teacher. My mom volunteers at various elementary schools and she loves to work with kids so I get that from her. But without my aunt raising me to be the woman that I am today, I dont think I would be writing this paper for you. So I choose nature because of my determination to be who I want to be and nurture because my aunt taught me from a young age that education is important and so I decide to make education my life.

Animal Testing Essay Example for Free

Animal Testing Essay Living in the twenty-ï ¬ rst century society is beginning to raise questions about the importance and relevance of issues that could very easily alter our way of living. Animal testing is one of these issues; the use of non-human animals in experiments. When an opinion regarding whether or not animal testing is ethical is mentioned in conversation or our news, citizens generally begin to question its morality. In debates, the issues on animal testing should be divided into two sub-categories: what is necessary for survival, and what is moral. If animals do feel a little pain, can you imagine how they feel? They are forced to do something that they do not want to do just because they cant actually say ‘no’. Yet, scientists, the well educated people, believe that we should keep it, so should we really get rid of it? Animals used: Many different species of animals are used in research. In 2003, the majority of procedures used mice and rats. Other mammals accounted for around 3% of the total, including 11,000 pigs, 5000 dogs and 3000 primates (for example, monkeys and marmosets). Laboratory mice are used more often in research every year than any other animal species. Mice, and other rodents such as rats and hamsters, make up over 90% of the animals used in biomedical research. In addition to having bodies that work similar to humans and other animals, rodents are small in size, easy to handle, relatively inexpensive to buy and keep, and produce many offspring in a short period of time. However, rodents may not always be the best animal to use in certain experiments. In these cases, dogs, cats, rabbits, sheep, ï ¬ sh, birds, reptiles and amphibians, or other kinds of animals may be used. All of these animals together make up less than 10% of the animals used in research. Methods of testing the drug: 1.Exposure Testing Some animals are tested by exposure testing. Animals like rats, dogs, cats, monkeys and birds are exposed to things that people would normally be exposed to. Exposure includes inhaling cigarette smoke or being in a place where furniture polish is sprayed. Exposure to microwaves, UV lights, the sun and extremes in temperature are also ways animals are tested. The results found include diseases that show up because of exposure to elements, learning disabilities that might occur (based on maze and behavior tests after exposure) and pregnancy complications that go along with exposure. These tests are usually used to make conclusions about what a humans reaction would be to the speciï ¬ c substances or conditions that the animals were exposed to. Conclusions might be that products are safe for humans based on exposure to animals or that products and elements are not safe based on what happened to the animals. 2.Skin Testing Some products, like cosmetics, are tested on animals by skin testing. In this method of testing, animals have products applied to their skin. This is done especially with pigs. The products, like cosmetics and other skin care products, are introduced to the animals skin, and the results are recorded. Most of this testing is done by cosmetic companies themselves, who are looking for any adverse reactions the products might have. Reactions they are looking for include breakouts, skin irritations, sicknesses or allergies that crop up with exposure. Research companies might be paid by cosmetic companies to test the products of competitor companies to make sure that the products they are selling will perform better. Cosmetic companies and skin care companies are also looking to test how well their products work Skin testing on an animal http://www.peta.org/b/thepetafiles/archive/tags/skin against the claims they have made for their own +corrosion/default.aspx products. 3.Injection Testing Many animals are tested with injection testing. For drug testing, this might mean injecting an animal with a drug to see what the side effects of the drug might be. Allergy medications, acne medications, seizure medications and disease medications are tested on health animals to test for side effects like sicknesses, birth defects or behavior problems. Other animals are tested by ï ¬ rst being injected with a disease or a sickness, and then injected with a course of drugs to see which drug might beneï ¬ t it the most. Diseases include AIDS, Cancer, Parkinsons Diabetes and Epilepsy. The beneï ¬ ts they are looking for include a reduction in symptoms, a cure for the disease, or a way to slow down the diseases progress. Injection testing usually measures the effects of the substance that is being injected on the animals, in order to see what results those things might have Ingected animal testing for people. http://urchinmovement.com/ 2011/08/11/the-rise-of-the-planetof-the-apes-animal-testing-goesmainstream/ 2 Nayla Khalifa AlKhalifa 4.Creation Testing Some animals are created in order to be tested, or their creation itself is the test. Scientists play with the genetic makeup of animals and attempt to create new animals. They also perform experiments on animals in utero, such as inject them with drugs, expose them to chemicals and change their genetic makeup to see if these experiments can be accomplished successfully and then to see if those results can be repeated for humans. Animals are cloned in labs to see if the cloning process works and what drugs, processes and genetic manipulations affect cloning in what way. Cloned animals are then studied to determine the effects of cloning on a general population. 5.Behavior Testing Some animals are tested in a way that is unobtrusive. Behavior tests are not usually meant to test a product or cosmetic or drug. They are tests that look at the lives of the animals and their behaviors. Some tests might include testing the speed at which mice can run various mazes or testing an animals ability to recognize colors or symbols. These tests might include exposing animals to loud sounds like music or yelling or to stressful situations including loud sounds, ï ¬â€šashing lights or strange smells or vibrations. Researchers then watch their behavior and make conclusions about what might happen to people in the same situation. Behavior tests also include studying the way a dog thinks by having him respond to commands and stimuli or testing the way another animal reacts when praised or yelled at. These behavioral tests give more information about how animals think and how their brains work, and also provide insights into why humans might have some of the same behaviors or issues as animals. What are the alternatives? There is a huge range of non- animal research techniques that, as well as being a more humane approach to science, can also be cheaper, quicker and more effective. These include: ââ€" Cell cultures Almost every type of human cell can be grown in culture and this has been key to understanding cancers, sepsis, kidney disease and HIV/AIDS. Cells grown in test tubes are routinely used in chemical safety testing, vaccine production, medicines development and to diagnose disease. ââ€" Chemical methods Analytical techniques used by chemists can be used to detect toxins in products, such as the LCMS method to replace the use of mice who are injected to detect toxins in shellï ¬ sh. ââ€" Tissue and organ culture Tissues from humans donated after surgery or even death can be used to investigate diseases and also test whether drugs might be safe and effective, before they are used on humans. ââ€" Computer models Programs run on computers can be used to predict whether a chemical is going to be harmful based on its similarity to other chemicals, or to even simulate body processes such as heart rate. ââ€" Human Volunteers Studies of humans can often be the best way to replace animals. We can now see inside peoples’ brains using imaging machines or test microscopic amounts of new drugs harmlessly on volunteers, as well as conduct large scale studies of populations to help see what might cause disease (epidemiology). Scientists are moving away from using animals but it is a slow process and they need more support. My opinion on animal testing is that we still need it but we should try to minimize the amount of animals being used and the pain the may experience even when pain relievers and anesthetics are used. We should use alternatives as much as we need to. We should not completely ban animal testing until we have a full replacement for it that works just as well or even better. Scientist are actually just trying to save someones life, I think many people in this world would see that as a selï ¬â€šess act. Personally I would rather an animal die than a cancer patient. They also test on animals as some of them are very much like humans, that means if an animal has a positive reaction towards a drug we are one step closer to curing a disease and we would all rather an animal die during research than a human. Animals are mostly used to develop medicines for the sick and have they have actually helped ï ¬ nd different treatments for cancer, strokes, and may other diseases that many people die from each year. Anyone that thinks that they are against animal testing is basically telling some cancer patients that they would rather them die then some rats. I would never ban animal testing. I ï ¬ nd that the people who protest against animal testing are an insult to the poor people that are ï ¬ ghting for their lives lying in a hospital bed some where with one chance of getting their life back by taking a drug that may have been tested on animals. It makes me feel really uncomfortable knowing that healthy people want something which will drastically decrease the standard of living of others. A complete ban on animal testing will have very serious negative effects on medical research. I believe that developing better, more effective and safer drugs is more important than sparing a few rats. Either way, if we continue animal testing ( which we are now ) too many animals are getting hurt, money is being spent, and products are still being tested, but if we ban animal testing we only have alternatives that work with only certain parts of an animals body. So, if we do either one we will still have issues.

Sunday, July 21, 2019

Security Challenges for Health Information Systems

Security Challenges for Health Information Systems Curtis Anderson   Health Care Information Systems faces challenges of many organizations protecting their information systems from potential threats, such as viruses, accidental fires, untested software, and employee theft of data. Falling into three categories: Human threats (intentional or unintentional human tampering), Natural and environmental (floods, fires, and power outages), and Technology functions (failure of drives, and no backup), viruses are the most common and virulent forms of computer tampering. Another common security issues has to do with internal breaches, usually caused by installation or use of unauthorized software, illegal and illicit communication surfing sites, and e-mail harassment, and using an organizations computer for personal gain. Hardware, like software, used in health care information systems must be protected from loss caused by theft, thereby exposing confidential patient information (Wager, Lee, Glaser, 2013, p. 352-356). The Department of Health and Human Services Security Rules published in the Federal Register on February 20, 2003 (68 Fed. Reg. 34, 8333-8381), and was updated by the HITECH legislation, which is governed by HIPAA Security Rule protects ePHI health information that is maintained or transmitted in electronically, is closely related to HIPAA Privacy Rule, which governs all protected health information (PHI) (Wager et al., 2013, p. 356). With the advancement of mobile technology and the development of applications found in many portable devices, health intervention is beneficial in the delivery of health care data. A conducted systematic review and meta-analysis shows the effectiveness of mobile-health technology, through a controlled trial of mobile technology interventions that is used to improve the delivery process of health care information. The conducted independent study of data allocation concealment, allocation sequence, measured the effects by calculating estimates, and random effects meta-analysis(Free et al., 2013). The study showed a low risk of bias, where the health care trials supported outcomes for the appropriate management of disease, and showed significant benefits to the improvement in nurse/surgeon communication use of mobile phones for reducing diagnoses with the use of mobile technology. The conclusion of these trials showed health care providers supporting the process of intervention benefici al, but a more quality trial outcome is needed to be certain of the results. Security Challenges The responsibility of the healthcare organization should be to protect health information at all times; a critical process of security practices and regulatory compliance in the healthcare industry (Kwon Johnson, 2013). Using the Ward’s cluster analysis, a minimum variance that is based on the adoption security practice between organizations, measured the dichotomous data to indicate the presence or the absence of security practices. When identifying the relationship of clusters and regulatory compliance, the results of the Healthcare Information and Management Systems Society conducted a telephone-based survey, which found the United States healthcare organizations adoption of security practices, breach incident, and perceived compliance levels related to Health Inform Technology for Economic and Clinical Health, and the Health Insurance Portability and Accountability Act, that state laws governing patient information security, identified three clusters: Leaders, Follower, a nd Laggers, producing a difference of non-technical practices, with the highest level compliance being associate with the organization who employed the use of a balance approach using the technical and non-technical practice (Kwon Johnson, 2013). Security Strategies Security incidents have been closely related to the use of laptops, other portable and/or mobile devices and external hardware storage that contain or used to access Electronic Protected Health Information (EPHI), falls under the responsibility of HIPAA Security Rule, which requires reviewing and modifying security policies and procedures on a regular basis (HIPAA Security Guidance, 2006). The reinforcing of ways to protect EPHI when accessed or used outside of and organization’s purview, using strategies can be reasonable and appropriate to conduct business activities using a portable medial/device (such as USB flash drives) to store EPHI, and the ability to access or transport EPHI using laptops, person digital assistants (PDAs) , home computers and non-corporate equipment, delegated by the Centers for Medicare and Medicaid Services (CMS), enforce HIPAA Security Standards, to determine actions covered by the organizations is reasonable and appropriate to safeguard the confid entially, integrity and availability of EPHI (HIPAA Security Guidance, 2006). The organization should establish risk analysis and risk management drive policies to reduce vulnerabilities that can be associated with remote access, and offsite use of EPHI. Establishing training policies in the workplace to address any vulnerability that may be associates with remote access to EPHI, by changing and safeguarding passwords, protecting remote device/media by creating polices that prohibits these devise unattended, and the transmitting of EPHE on open networks or downloading EPHI on open networks or downloading EPHI on a remote computer (HIPAA Security Guidance, 2006). It is important that a security incident and non-compliance issue be address in order to manage any harmful effects of the loss of the device, by securing and securing evidence, managing harmful effects, and notifying the affected party. Allowing for or the requiring of offsite use of, or access to EPHI should have and established strategy plan developed and implemented for the authorization and access of EPHI in accordance with HIPAA Security Rule  §164.308(a)(4) and the HIPAA Privacy Rule  §164.508(HIPAA Security Guidance, 2006). Social Networks Underlying factors have concluded that a lack of information regarding the benefits, and limitations of social media health communication amongst the general public, and health professionals, use a systematic approach to identify, these benefits, and/or limitations of social media to communicate health data by a methodological quality of study that is assessed. There were seven main issues of social media, which includes focusing on increased interactions with others, to facilitate, share, and obtaining health messages, as the new dimension to health care medium use by the public, patients, and health professionals who communicate health issues for improving health outcomes. The study shows that social media can be used as a powerful tool, which offers collaboration between users, and social interaction for a range of individuals to share data electronically (Moorhead et al., 2013). Securing Data on Social Networks There is a remarkable surge surrounding personal health record (PHR) systems for the patient and consumer, however biomedical studies do not show a potentially adequate capability and utility of PHR system (Tang, Ash, Bates, Overhage, Sands, 2006), hinders toe widespread deployment of PHR adoption. Since health care records are more than just a static repository for patient data, it combines data, knowledge, and software tools, to help patients become active participants in their own care. However, the challenges of, technical, social, organizational, legal, and financial requires further study, that requires stakeholder, patients, provider, employers, payers, government, and research institutions to play key roles for developing PHR technology to overcome the barriers to the widespread adoption of PHRs, and develop polices, the cost associate with PHR in medical errors, dollars, and lives, to realize the potential benefits of routine health care and catastrophic disasters (Tang et al., 2006). Strategies to Safeguard Data The use of new technology, applications and platforms, such as â€Å"social media,† has created new opportunities in healthcare but raises privacy and security challenges, The need to adapt old police and procedures, privacy and security protocols to cover communication channels and date sharing needs to be used effectively to protect a healthcare organization from the risk of a disclosing the privacy of a patient’s data (Social Media in Healthcare: Privacy and Security Considerations, n.d.). This process of using online tools and platform for sharing content and information for the purpose of: Delivering pre-development content – sending e-mail or posting on a website, engaging a population in discussion – to facilitate brand awareness/customer satisfaction, and manage communication – that offers individuals and organization a convenient organized way to consolidate their communication. The challenges healthcare organizations face is: Ethical challenges – an acceptable standard of regulatory and legal requirements that is mandated by Title II of HIPAA, and Sarbanes-Oxley Act (SOX), the National Center for Ethics in Healthcare (NCHEC), and the World Health Organization Ethics and Health Initiative (Social Media in Healthcare: Privacy and Security Considerations, n.d.), to avoid any misconduct or unethical behavior becoming a serious issue with regard to the use of social media. The U.S Supreme Court decision on Sorrell v. IMS Health, Inc. addressed the issue of aggregated databases and the sale of prescriber data for marketing prescription drugs, where the ability to distribute, exchange, and use date from multiple sources is integral to clinical informatics, research, public health, quality improvement, and other healthcare operations. A pharmacy filling a prescription collects detailed information which includes patient and provider names, drugs, and the dosage and prescribed quantities, and the date of the prescription being filled, allows a pharmacy to sell prescription information to data-mining companies of a patient’s information once it has been de-identified by meeting the HIPAA standards. However, legislation sought to restrict the sale of prescription date for marketing purpose using the prescription confidentiality law of 2006, where a data-mining company must obtain permission from the provider before selling prescription records (Peters en, DeMuro, Goodman, Kaplan, 2013). Hackers, cyberattacks and data breaches are the major attacks from outsiders, the motive and type of hackers is complex to chief information security officers (CISOs) and their staff in order to take action to protect and defend their data system. Causing grate consequences to the organizations, along with bad press, impact on reputation, and drop in share prices, requires legal action if a breach involves personal data theft. Identified as a data breach, the loss of control compromises unauthorized disclosure, unauthorized acquisition, and unauthorized access to data physically or electronically (Hayden, 2015). The protection of all date is impossible, as the proliferation of portable media, smartphones, USB drives and laptops increase the opportunity for the loss or theft of these devices along with their data requires that steps be taken to enable the encryption of mobile devise, and to immediately inform security management of a device being stolen, lost, data being compromised. Trends in enterprise mobility has made mobile device security imperative, and the sales of smartphones is surpassing PC sales, the completive edge and benefits of mobility can be lost if the smartphone and tablet PC are not protected against mobile security threats: Mobile malware – Smartphones and table are susceptible to worms, viruses, Trojans and spyware. Eavesdropping – wireless networks use of link-level security lack end-to-end upper-layer security, allowing for unencrypted data to be eavesdropped upon. Unauthorized access – the storing of login information to applications on mobile devise can be easily access to allow intruders access to email accounts and applications, and social media networks. Theft and loss – storing significant amounts of sensitive data on a mobile device can be critical if you are in a hurry and leave you iPhone in a taxicab, restaurant, and data loss can occur. Unlicensed and unmanaged applications – this can cost a c ompany in legal cost (Learning guide: Mobile device protection, 2015). Government and Quasi-government Benefitting from health surveillance, has pioneered, informatics analysis, and solutions in the field of informatics to serve other facets of public health, to include emergency response, environmental health, nursing, and administration. As the systematic application of information and computer science and technology, public health practice, research, and learning professions apply mathematic, engineering, information science, and social science to public health problems and processes that are important to biomedical or health informatics (Savel Foldy, 2012). With seven ongoing elements of any public health surveillance system: Planning and system design – to identify information and sources that addresses the surveillance goal. Data Collection – The use of different collection methods, to identify the appropriate use of a structured data system that supports easier, faster, and higher-quality data entry fields compared to free test, useful vocabulary, and data standa rds. Date management and collation – are used to share data across different computing/technology platforms to link data with data from a legacy system. Analysis – is used for the statistical and visualization application, to generate algorithms that alert users of aberrations in health event. Interpretation – this is useful to compare information from one surveillance program with other data sets. Application to public health programs – this utility assesses surveillance data directly flowing into an information system that support public health interventions and information elements (Savel Foldy, 2012). The challenges of surveillance informatics includes an efficient and effective way to combine sources of complex data and information into an actionable knowledgeable to meet the challenges to arise at a faster, better, and lower cost surveillance and interpretation of health events and trends, the leveraging of technology standards ability to not only talk and listen, but understand each other. Adopting such a system is insufficient since both semantic and syntactic standard must be implemented and tested to ensure system validity. In conclusion, healthcare security is vital to the securing and protecting a patient’s privacy and healthcare information from being breached, lost, stolen, while protecting the healthcare system from viruses, worms, malware and spyware, that can affect the integrity of an organization, a drop in stock prices, and legal issues. Protecting any system that stores vital organization and personal information should be a priority. References Free, C., Phillips, G., Watson, L., Galli, L., Felix, L., Edwards, P., Haines, A. (2013). The effectiveness of mobile-health technologies to improve health care service delivery processes: a systematic review and meta-analysis. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pubmed/23458994 HIPAA Security Guidance. (2006). Retrieved May 20, 2015, from http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/remoteuse.pdf Hayden, E. (2015). Data breach protection requires new barriers. Retrieved May 20, 2015, from http://searchsecurity.techtarget.com/feature/Data-breach-protection-requires-new-barriers Kwon, J., Johnson, E. M. (2013). Security practices and regulatory compliance in the healthcare industry. Retrieved May 20, 2015, from http://connection.ebscohost.com/c/articles/84758015/security-practices-regulatory-compliance-healthcare-industry Learning guide: Mobile device protection. (2015). Retrieved May 20, 2015, from http://searchmobilecomputing.techtarget.com/guides/Mobile-device-protection-and-security-threat-measures Moorhead, PhD, MSc, S. A., Hazlett, PhD, MSc, D. E., Harrison, MSc, L., Carroll, MD, MPH, J. K., Irwin, PhD, A., Hoving, PhD, C. (2013). A New Dimension of Health Care: Systematic Review of the Uses, Benefits, and Limitations of Social Media for Health Communication. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3636326/ Petersen, C., DeMuro, P., Goodman, K. W., Kaplan, B. (2013). Sorrell v. IMS Health: issues and opportunities for informaticians. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pubmed/23104048 Savel, MD, T. G., Foldy, MD, S. (2012). The Role of Public Health Informatics in Enhancing Public Health Surveillance. Retrieved May 20, 2015, from http://www.cdc.gov/mmwr/preview/mmwrhtml/su6103a5.htm?s_cid=su6103a5_x Social Media in Healthcare: Privacy and Security Considerations. (n.d.). Retrieved May 20, 2015, from http://himss.files.cms-plus.com/HIMSSorg/Content/files/Social_Media_Healthcare_WP_F Tang, MD, MS, P. C., Ash, PhD, J. S., Bates, MD, D. W., Overhage, MD, PhD, J. M., Sands, MD, MPH, D. Z. (2006). Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption. Retrieved May 20, 2015, from http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1447551/ Wager, K. A., Lee, F. W., Glaser, J. P. (2013). Health Care Information Systems (3rd ed.). San Francisco, CA: Jossey-Bass.

Saturday, July 20, 2019

Freedom :: American America History

Freedom In the Narrative of the Life of Fredrick Douglass written by Fredrick Douglass, he and the rest of the slaves in 1840 had to be tricky to survive. Douglass used trickery to his advantage and made it into a positive action, freedom. Douglass went through many hardships and disturbing ordeals. He witnessed his younger brother get his head bashed in, that in it self is horrific enough. He overheard Mr. Auld, one of his masters, telling Mrs. Auld that it was unsafe to teach a slave to read (Douglass 42). Douglass took this as motivation and strove to learn to read and write. Douglass's next master was Edward Covey, a well-known slave breaker, for a year. Covey was very tricky. He would pretend to ride into town, then walk back and sneak up on the slaves as to scare and deceive them. One day, after a severe beating by Covey, (Douglass 86) Douglass ran for refuge for one night from a slave named Sandy Jenkins. Jenkins believed that a certain root had magical powers and told Douglass that if he wore it on his right side no white man could beat him (Douglass 90). He returned the next day wearing the root, and to his surprise, Covey did not beat him for a time. A few days later, Covey tried to tie him up for a beating. Douglass fought back and after a two-hour struggle, Covey gave up. Since Covey did not want to ruin his reputation as a slave breaker, he never sent Douglass to the authorities to be punished for hitting a white man. Douglass used Covey's own reputation against him and tricked him into never crossing and punishing him again. When Douglass's year was over with Covey, he went to live with Mr. Freeland. Freeland became his new master and had two slaves. A little while after Douglass came to live there, he sparked interest in the others and began to teach them to read and write in Sabbath school. "It was understood among all who came, that there must be as little display about it as possible." (Douglass 103) Douglass managed to teach many, whom might suffer up to nine lashes for leaving their plantation (Douglass 104). The religious masters thought the slaves were spending the Sabbath in wrestling, boxing or drinking whisky, when all along they were learning to read and write. Freedom :: American America History Freedom In the Narrative of the Life of Fredrick Douglass written by Fredrick Douglass, he and the rest of the slaves in 1840 had to be tricky to survive. Douglass used trickery to his advantage and made it into a positive action, freedom. Douglass went through many hardships and disturbing ordeals. He witnessed his younger brother get his head bashed in, that in it self is horrific enough. He overheard Mr. Auld, one of his masters, telling Mrs. Auld that it was unsafe to teach a slave to read (Douglass 42). Douglass took this as motivation and strove to learn to read and write. Douglass's next master was Edward Covey, a well-known slave breaker, for a year. Covey was very tricky. He would pretend to ride into town, then walk back and sneak up on the slaves as to scare and deceive them. One day, after a severe beating by Covey, (Douglass 86) Douglass ran for refuge for one night from a slave named Sandy Jenkins. Jenkins believed that a certain root had magical powers and told Douglass that if he wore it on his right side no white man could beat him (Douglass 90). He returned the next day wearing the root, and to his surprise, Covey did not beat him for a time. A few days later, Covey tried to tie him up for a beating. Douglass fought back and after a two-hour struggle, Covey gave up. Since Covey did not want to ruin his reputation as a slave breaker, he never sent Douglass to the authorities to be punished for hitting a white man. Douglass used Covey's own reputation against him and tricked him into never crossing and punishing him again. When Douglass's year was over with Covey, he went to live with Mr. Freeland. Freeland became his new master and had two slaves. A little while after Douglass came to live there, he sparked interest in the others and began to teach them to read and write in Sabbath school. "It was understood among all who came, that there must be as little display about it as possible." (Douglass 103) Douglass managed to teach many, whom might suffer up to nine lashes for leaving their plantation (Douglass 104). The religious masters thought the slaves were spending the Sabbath in wrestling, boxing or drinking whisky, when all along they were learning to read and write.

Friday, July 19, 2019

The Depression :: essays papers

The Depression Imagine for a moment, waking up one day to find yourself on a dirty floor, a pile of rags, or maybe even the street. You look down at yourself to find you're wearing the same clothes you wore yesterday, except they are completely filthy and have lots of holes in places like the knees and elbows. You have no access to a mirror to show you what you look like so you go to touch you hair with your hand and find it to be a pile of grease and dirt that obviously hasn't been washed in days, maybe even weeks. You get up and start to head for work, or school, only to realize you have no place to go. The pain of hunger eats away at you, but you just ignore it knowing that there is nothing for you to eat and you have no money to buy any food. You have no job, no money, no family, no hope. Welcome to the Depression. The 1920's was a time of great prosperity in the lives of most Americans and our natural human ignorance made us think it would stay that way forever. We had just come out of the Great War and business was booming, along with agriculture and the stock m arket. The outlook for the future was great, but people failed to understand that economies can't be on the upswing forever, it has to come down sometime. All of the signs of a depression were there; the farmers were producing too much, the uneven distr ibution of income, easy credit/huge debts, imbalance of foreign trade; people just didn't notice them. Not until October 29, 1929--BLACK TUESDAY--anyway, when the bottom of the stock market fell out, taking millions of American lives with it. Even thoug h any didn't admit it, they knew what was on the way. People who had been buying stocks on margin (10% down) suddenly found themselves penniless and in bigger debt than they could imagine. America went into a panic, pulling money out of banks in a frenz y causing many to close their doors. President Hoover tried hard to make the times better for the unemployed first by setting aside almost $800 million for public works like the now Hoover Dam. Conditions, however, failed to improve. His other policies, the Reconstruction Finance Corporat ion (RFC) and the Home Loan Bank Act, also didn't make much difference. The election of 1932 made it clear that the American people were unhappy with Hoover.

Japanese Internment :: essays research papers

After the Japanese attacked Pearl Harbor in December 1941, the United States was filled with panic. Along the Pacific coast of the U.S., where residents feared more Japanese attacks on their cities, homes, and businesses, this feeling was especially great. During the time preceding World War II, there were approximately 112,000 persons of Japanese descent living in California, Arizona, and coastal Oregon and Washington. These immigrants traveled to American hoping to be free, acquire jobs, and for some a chance to start a new life. Some immigrants worked in mines, others helped to develop the United States Railroad, many were fishermen, farmers, and some agricultural laborers. Inevitably, after the Japanese attack on Pearl Harbor, that began World War II, Japanese-Americans were frowned upon and stereotyped because of their descent. However, Japanese immigrants contributed to economic expansion of the United States. Whites resented the Japanese immigrants, but reaped economic profit from the Japanese-American residents’ discipline and hard work. Japanese-Americans of this time seem to be attacked; however, they choose to uphold their disconnection with the rest of the Americans. Many Japanese felt they had superiority over Americans, creating tension and disconnection.   Ã‚  Ã‚  Ã‚  Ã‚  Nevertheless, Japanese were resented and disliked by whites. Due to pressure from state leaders near the west coast, President Roosevelt, on February 19, 1942, signed Executive Order 9066. This resulted in the which resulted in the violent imprisonment of 120,000 people of Japanese ancestry. When the government gave its internment order, whites rounded up, imprisoned, and exiled their Japanese neighbors. In 1942, 110,000 Japanese Americans living on the West Coast of the United States were relocated to ten internment camps. More than two thirds of those sent to internment camps, under the Executive Order, had never shown disloyalty and were also citizens of the United States. In April 1942, the War Relocation Authority was created to control the assembly centers, relocation centers, and internment camps, and oversee the relocation of Japanese-Americans. It took another forty years for the US government to recognize the violations of this population's constitutiona l rights.   Ã‚  Ã‚  Ã‚  Ã‚  The internment camps were permanent detention camps that held internees from March, 1942 until their closing in 1945 and 1946. Although the camps held captive people of many different origins, the majority of the prisoners were Japanese-Americans. There were ten different relocation centers located across the United States during the war. These Japanese Americans, half of whom were children, were incarcerated for up to 4 years, without due process of law or any factual basis, in bleak, remote camps surrounded by barbed wire and armed guards.

Thursday, July 18, 2019

Role of Material Culture in Contemporary Graphic Design

This survey explores the function of material civilization in humanistic disciplines and design category at colleges in Singapore. Normally, pupils in a modern-day in writing design category face many troubles peculiarly in synergistic creative activity of humanistic disciplines and design. Basically, this survey tends to place and analyse the advantages of utilizing material civilization in a modern-day in writing design category. Furthermore, this paper besides attempts to plan an effectual course of study that will fulfill the demands of utilizing material civilization in a modern-day in writing design category. Concurrently, in writing design schools today face ever-increasing demands in their efforts to vouch that pupils are good equipped to come in the work force and voyage a complex universe. Research indicates that material civilization can assist back up larning refering civilization and past histories, and that it is particularly utile in developing the higher-order accomplishments of critical thought, analysis, and scientific enquiry. But the mere presence of material civilization in the schoolroom does non guarantee their effectual usage when it comes in adding cogency and substance to graphic design survey. This survey explores the assorted ways material civilization can be used to better how and what pupil learn in the schoolroom peculiarly in originative design and humanistic disciplines. Furthermore, this paper pointed out the usage of material civilization as an effectual acquisition tool in analyzing past history and civilization is more likely to take topographic point when e mbedded in a broader instruction reform motion that includes betterments in instructor preparation, course of study, pupil appraisal, and a school ‘s capacity for alteration. In this survey, the research worker investigated several variables that may act upon the development and advancement of pupils in different modern-day in writing design categories at colleges of Singapore. These included perceptual experiences of job trouble, originative designing, value of art, and quality of work. The research worker believes that enabling the pupils to utilize material civilization aided by the process in in writing design will ensue in effectual acquisition and apprehension in originative design and provides quality design and art. This research will analyse and look into the function of material civilization and personal perceptual experience of the pupils in Singapore. This shall include a treatment on the positive and negative variables related to material civilization and modern-day in writing design, an analysis of public presentation of the pupils in school in relation to material civilization was besides conducted. Particularly, the research will concentrate on analyzing the function of material civilization in modern-day in writing design provided by the school instructors/administrators. Basically, the consequences of the survey will take the research worker to the development and invent an effectual course of study in humanistic disciplines and design with regard to material civilization in in writing design.Problem StatementThis research worker finds the necessity for a survey that specifically tackles the effects of material civilization in modern-day in writing design at Colleges in Singapore. Spec ifically, this survey intends to research the important impact of this stuff to the Colleges in Singapore that are related in modern-day in writing design. It will show the public presentation of the pupils by placing failings and inefficiencies and urging solutions. Basically, the job of this survey is about conventional methodological analysis in learning which used a dry lector is truly dull and takes a batch of clip to complete a modular or course of study of each subject depending on lector capablenesss, accomplishments, handiness, temper and pupil indulgent of what their idea. That is non effectual for pupils to acquire an effectual manner to larn, there is a demand to acquire a new and effectual attack since material civilization may now touch the cultural and historical value of a certain art or design. The intent of utilizing material civilization in a modern-day in writing design category is to develop a better acquisition than conventional method in colleges but through the early opposition, it emphasized their ability to appreciate art and larn it cultural and historical value execute the complex undertakings needed in modern-day in writing design. Through material civilization pupil can develop a bond and apprehension of one ‘s traditional civilizations that motivate ocular communicating pupils to make strong cultural individuality in writing design. Furthermore, this survey will seek to reply the undermentioned questions: Can apprehension of one ‘s traditional civilizations motivate ocular communicating pupils to make strong cultural individuality in writing design? Can material civilization attention deficit disorder cogency and substance to graphic design survey?AimThis survey seeks to understand to the full how pupils ‘ consciousness of their traditional civilizations might be the factor that motivate them to research and research their civilizations as a in writing design subject.HypothesissThis paper will work on the undermentioned hypothesis: Material civilization in in writing design category in colleges dramas important consequence to the pupils ‘ consciousness of their traditional civilizations. Material civilization in in writing design category in colleges has important consequence to the memory keeping of the pupils when it comes in analyzing traditional civilization. Since it is exciting, disputing and merriment to utilize, so it encourages pupils to analyze the material civilization once more and once more. Material civilization has important consequence to the larning betterment of the pupils since it attaches to one ‘s traditional civilization.Definition of Key FootingsGraphic Design- Graphic Design is the procedure and art of uniting text and artworks and pass oning an effectual message in the design of Son, artworks, booklets, newssheets, postings, marks, and any other type of ocular communicating ( hypertext transfer protocol: //www.geemultimedia.com.au/glossary.asp ) . Material Culture- Material Culture is a term frequently used by archeologists as a non-specific manner to mention to the artefacts or other concrete things left by past civilizations. An archaeologist therefore can be described as a individual who surveies the material civilization of a past society ( www.encyclopedia.com ) . Art- Art is the procedure or merchandise of intentionally set uping elements in a manner to impact the senses or emotions. It encompasses a diverse scope of human activities, creative activities, and manners of look, including music, literature, movie, sculpture, and pictures ( www.encyclopedia.com ) . Education- Education encompasses the instruction of specific accomplishments, and besides something less touchable but more profound: the conveyance of cognition, good judgement and wisdom. One of the cardinal ends of instruction is to leave civilization across the coevalss socialisation. ( www.encyclopedia.com ) Knowledge- Knowledge includes, but is non limited to, those descriptions, hypotheses, constructs, theories, rules and processs which to a sensible grade of certainty are either true or utile. ( www.encyclopedia.com ) School-A school is a type of educational establishment. The scope of establishments covered by the term varies from state to state. ( www.encyclopedia.com )Reappraisal of LiteratureWorld history has witnessed the birth, development, and accomplishments of the most gifted people. These people have their distinguishable gifts and country of command – literature, political relations, humanistic disciplines, scientific discipline, and so forth. Still, much of their success can be traced back to the sort of life and personality they had. Childhood experiences, support from people around them, environmental influences and personal motives frequently determine how a talented individual makes usage of his innate abilities to go an of import figure in his chosen field of expertness. The universe of humanistic disciplines is one of the most interesting subjects of survey. This field normally includes some of the most curious people who can show their personalities through alone pictures, sculptures, and drawings. Art instruction is culturally identified as a capable country that enables pupils to utilize their imaginativeness and creativeness to bring forth pieces of graphics from a broad assortment of stuffs. This designation may besides include the survey of celebrated creative persons and their well-known graphics ( Oliver, 2010 ) . On the other manus, the cultural individuality is constructed through assorted marks and symbols that the civilization property to art instruction. Symbols include art devising stuffs ( The Culture of Education in the Visual Arts, 1999 ) . These stuffs that are attached to one ‘s civilization were known as â€Å" material civilization † . Material civilizations are going known to the instructors in modern-day in writing design because of its motivational consequence to their pupils in analyzing civilization and art. In in writing design category, art symbol with regard to stuffs are important. An illustration of art instruction symbols are the assortment of medias- both two and three dimensional that are used to exemplify capable affair. In add-on to more practical symbols of art instruction are the human-centered symbols which may include linking with creative persons and their work, both modern-day and historical ( The Culture of Education in the Visual Arts, 1999 ) . The art and trades around communities, in shops and on postings will ever be a symbol of a contemplation of art instruction ( The Culture of Education in the Visual Arts, 1999 ) . Another aspect of making a cultural individuality is to reflect on the cultural rites that are frequently associated with art instruction. The most evident rites include the assorted procedures that are employed to do art. It is of import to retrieve that such rituals/processes are influenced by the geographical location of the school territory ( Oliver, 2010 ) . Another cultural rite attributed to art instruction is the physical presentation that the art instructor must supply for pupils in order to learn them specific techniques. This presentation frequently includes safety safeguards as rites that the pupils will so purely employ to make art without aching themselves with the tools in the devising ( Oliver, 2010 ) . Other ritual distinctive to art instruction is the pattern of reviewing pupils ‘ art work, frequently done by the whole category in order to supply constructive feedback and unfavorable judgment of the finished piece of art. One concluding rite that should be imperative to an art instruction plan is category field trips to museums, galleries, and creative persons ‘ studios that connect the acquisition of art in the school to really sing art in the community ( The Culture of Education in the Visual Arts, 1999 ) . It is of import to link these cultural rites and symbols of art instruction to non merely demo how they produce a cultural individuality, but besides organize a sense of societal solidarity among pupils, instructors, and communities ( Oliver, 2010 ) . The ocular humanistic disciplines or the in writing designs are humanistic disciplines that we see. It has its ain language-the linguistic communication of feelings, emotions and thoughts without words. We could detect the universe outside and inside us through ocular humanistic disciplines. The ocular creative person through mute can pass on with us when he creates ocular work of humanistic disciplines like painting. Paintings and plants of art in general are meant to travel us, particularly in ways that words frequently ca n't. Graphic designs inspired by stuff civilization play a major function non merely in academic intents but besides in wellness and Medicare related facet and in the community every bit good. It develops the intelligence and the overall personality of the pupils. Furthermore, in writing designs inspired by stuff civilization besides provide meaningful self-expression of all pupils. It is used in therapy processs for helping kid development. It assists in educating handicapped kids, particularly those who are unsighted and have hearing jobs. And eventually, ocular humanistic disciplines besides help in edifice communities and mural undertakings. In analyzing in writing designs inspired by material civilization, it shows that ocular humanistic disciplines and cultural individuality are related. The cultural individuality is constructed through assorted marks and symbols that the civilization property to art instruction.MethodologyThis subdivision of the research proposal discusses the meth ods to be used. This illustrates the method of research that identifies its pertinence. Likewise, the subdivision illustrates how the research was to be implemented and how to come up with relevant findings. Furthermore, this methodological analysis portion of the research underwent into several phases. In the research design, the research worker collected informations from pupils and instructors in some Colleges in Singapore that are utilizing material civilization in their in writing design category. At the clip of informations aggregation, the research worker gathered and amount upped the informations acquired from these resources. Study Puting In conformity to the end of this survey i.e. to look into the function of material civilization in modern-day in writing design, the research worker decided to carry on the probe in 10 Colleges in Singapore. Basically, in these 10 chosen schools in Singapore, a random sample of 10 pupils each will be chosen. The pupils to be included should be familiar to graphic design and material civilization. Research Design By and large talking, there are two research places, frequently call paradigms, which research workers can take from. The first is the quantitative paradigm in which research worker efforts to understand causal relationship of bing phenomena or efforts to spot the cogency of the theory in a peculiar societal context ( Creswell, 1994 ) . And since one of the intents of this survey determine the function of material civilization in modern-day in writing design, the quantitative research place is taken here because it is appropriate for the research intent. Aside from this, the 2nd attack, called the qualitative paradigm, is non chosen. Actually, as indicated in the paper of Daymon & A ; Holloway ( 2002 ) , the qualitative design the research worker assumes this place and efforts to understand a peculiar societal phenomenon by utilizing the histrions ‘ frame of mention. In add-on, informations are presented non in numerical signifier but in existent words which is in contrast to the purpose of this research. There are few research schemes that frequently used for carry oning research such as study, instance survey, action research, Ethnography etc. Harmonizing to Yin ( 2003 ) , there are three conditions to be considered for taking an appropriate research scheme i.e. : The type of research inquiry The extent of control an research worker has over existent behavioral events. The grade of focal point on modern-day as opposed to historical events From the paper of Saunders, et Al. ( 2007 ) , study attack frequently uses questionnaires to roll up a big sum of informations from a ample population in a extremely economical manner. Therefore, the study attack is normally able to use a more representative sample among a monolithic population for the survey, seeking to accomplish generalisibility of the consequences. The instance survey, nevertheless, harmonizing to Denscombe ( 1998 ) , is an probe that focuses on elaborate, in-depth descriptions and analysis of one or a few administrations. This attack is usually use to research the phenomenon by in-depth informations gained in the research context. This implies that the research consequences gained by instance survey can non be generalized to a larger population due to that the probe scope is limited. By sing this restriction of instance survey attack, the research worker opted to take the study method. Population and Sampling Plan The sample size consists of pupils, who are the logical key source related closely to the issue under probe, every bit good as the instructors totaling to 10 topics. There is no ground to believe that 10 instructors is non a big adequate sample size because ultimately it is this person who works straight with the issue and instructors has the most intimate cognition of the topic. Basically, the study respondents are asked sing their perceptual experience towards material civilization and in writing designing and pupil ‘s public presentation. In kernel, Guilford & A ; Fruchter ( 1973 ) argued that in taking sample sizes, the Slovin ‘s expression should be considered. Therefore, in choosing the sample size ( 100 pupils ) in this paper was identified by Slovin ‘s expression. The Slovin ( 1960 ) expression is given as: Where: e= needed mistake border ( percent demand for non-precision due to the usage of the sample as an option of the population ) . N= size of population n = size of sample Data Collection Procedures Yin ( 2004 ) provides six different beginnings of informations aggregation that is normally used in instance survey methodological analysis, which include certification, archival records, interviews, direct observation, participant observation and physical artefacts. The information aggregation method uses study and interview that is to take topographic point with the pupils and instructors, as these are the closest people working with the topic under examination here – Material civilization – and should function as the key source. In add-on, pupils are besides surveyed to understand how they feel about the usage of material civilization in their in writing design category since the instructor may supply colored information, nevertheless accessing the pupils is capable to the permission of the instructor who acts as the gatekeeper. If appraising the pupils is possible the study that pupils will make full out will be left on the instructors ‘ desk where they can make full it out and return it to a bead box in a closed envelope without a name or other placing information. The inquiries for the employees are created after a thorough reappraisal of literature. For certification that refers to secondary information about the material civilization and in writing designing, such considerations have been taken to cut down concerns as they would otherwise refer to bias or the dependability and cogency of the findings. Trusting on certification are used even if the pupils do take part since it strengthens the findings further ( Yin, 2003 ) . Documentation specifically includes public presentation studies and records, or books and journal articles discoursing material civilization and in writing design. Accessing of the instructor is traveling to take topographic point by first, directing the school an lineation of the survey and ethical content signifiers and arrange meeting, through the telephone or MSN given geographical restraints, to explicate what it is the research wishes to make and how it will profit the organisation. Ultimately, what the research worker wants to make is spot how preparation is able to increase pupils ‘ public presentation and the mechanisms that school in Singapore has in topographic point to guarantee this. Executing the above measure is utile since the gatekeepers are traveling to desire to protect the involvements of their pupils and the organisation ( Holloway & A ; Walker, 1999 ) . Overall, the attack above is based on dialogue, which as research workers note, â€Å" Access is negotiated and re-negotiated throughout the research procedure † ( Gubrium, & A ; Holstein, 2001, p. 301 ) . The instructor was besides assured that confidentiality – by non let go ofing information that they do non desire to be released — and namelessness – by utilizing anonym for pupils, participants and scenes — will be secured ( Daymon & A ; Holloway, 2002 ) . It is non unreasonable for the instructor to take part in the survey given the stairss executed above which are suggested by research methodological analysis practicians. Finally, research inquiries are based from the literature as is suggested by research methodological analysis practicians. Datas Analysis To find the perceptual experiences of the pupil respondents refering to material civilization and in writing design, the research worker a set of guide inquiries for the interview and prepared a questionnaire. A non-threatening questionnaire in nature that can be completed within 30 proceedingss are considered. The respondents graded each statement in the survey-questionnaire utilizing a Likert graduated table with a five-response graduated table wherein respondents are given five response picks. The tantamount weights for the replies are: When the full information consumer responses have been collected, the research worker used statistics to analyze it ; and was assisted by the SPSS in coming up with the statistical analysis for this survey. For the inside informations gathered from diaries, an rating was drawn in order to place the function of material civilization to modern-day in writing design. Furthermore, this research will use the several statistics in order to find the differences between their perceptual experiences towards the impact of material civilization on pupil ‘s public presentation and art grasp. As stated above, the research worker was aided by the Statistical Package for the Social Sciences ( SPSS ) in the devising and creative activity of the statistical analysis for this survey. SPSS is one of the mainly and extensively accessible and powerful statistical package bundles that has a extended scope of statistical patterns, which permits a research worker to sum up information ( e.g. cipher standard divergences and agencies ) , identify whether there are major differences between groups ( e.g. , ANOVA & A ; t-tests ) , observe relationships among variables ( e.g. multiple arrested development & A ; correlativity ) and graph end product ( e.g. line graphs, saloon charts, pie chart, etc. ) ( Sauders, Lewis & A ; Thornhill 2007 ) .Reasoning RemarksSignificance This survey will be a important enterprise in advancing civilization consciousness among in writing design pupils. This survey will be good to future leaders. By understanding the demands of the pupils and the benefits of quality instruction, these practicians will be assured of a larger advancement public presentation. Furthermore, this research will supply recommendations on how to value pupils as they are taking a big portion in the overall public presentation of the school quality instruction. This survey would besides be of aid to those school and market scientists who are interested in happening out the societal deductions of the roar and the flop stages of the school industry. Furthermore, pedagogues can derive from this survey, as they find the connexion between how they have designed their course of study and what are the existent demands of the citizens. In that manner, they would be able to do immediate alterations, if necessary, or continued betterment of their plans, through farther surveies. Furthermore, it is hoped that this survey would assist the pupils to better acquisition and grasp accomplishment through Material civilization in Art and Design at colleges in Singapore because Material civilization has many advantages/effectiveness such as keeping and motivational factors in conformity to the tilting behaviour of pupil. Therefore, pupil can travel profoundly into each subject countries they need to larn without lector engagement because material civilization is related to the history of the humanistic disciplines they are comprehending. Furthermore, this paper introduced of import alterations in our educational system and gives a immense influence to the manner we communicate information with pupils. It would do them as an active participant in their ain acquisition procedure, alternatively of merely being inactive scholars of the educational content. Apparently, this research besides hoped can provides an chance to derive a greater apprehension of the factors that impact on the pupils ‘ experiences of material civilization in larning procedure. Finally, this survey would profit future research workers in the field of the, instruction, humanistic disciplines and design direction, concern and the societal scientific disciplines since it depicts the hereafter of the school industry and its varying effects to many sectors of society. Restrictions This survey will merely cover material civilization as portion of analyzing modern-day in writing design in humanistic disciplines and design for the college pupils in some colleges in Singapore. Basically, this paper will merely cover pupils selected from semester 1, conducted from some colleges in Singapore. As there are legion issues environing the school, this research will chiefly analyze plan development and public presentation advancement. The result of this survey will be limited merely to the informations gathered from books and diaries and from the primary informations gathered from the consequence of the questionnaire study and interview that will be conducted by the research worker. As the research was completed in a comparatively short period of clip other factors and variables are non considered. This might hold an impact on the consequences of the survey. Basically this research survey will enable the research worker to plan a quality course of study that will fulfill the demands of the pupils.