Wednesday, July 31, 2019

Declining Fish Stock: over-Fishing the World’s Oceans

The world’s oceanic large fish populations are disappearing at an alarming rate and extinction is a growing concern. An estimated 90% are already gone and the situation will continue to get worse if drastic measures are not taken (University of Phoenix, 2007). Even though the fishing industry will suffer, conservation methods should be developed and enforced soon because large fish populations are endangered and their habitats are being destroyed. Various netting techniques not only deplete fish populations, but also destroy habitats for many of the ocean’s species including plants and animals.Growing world populations and commercial fishing have placed an overwhelming demand on the oceans. Drastic steps should be taken soon to allow fish populations to regenerate and to sustain the numbers necessary to maintain the oceans’ natural balance, and to feed the world’s growing human population. Steps should include conservation methods enforced by the United St ates (U. S. ) government, development of massive fish farms, and cooperation from other countries world-wide. Implementation of such measures will require active efforts from several organizations.According to Jeremy Jackson of the Scripps Institute of Oceanography, the damage to the ocean is almost complete but can be reversed (Wiley, 2000-2009). In an effort to bring this issue to the forefront and gain support, a plan must be devised and presented to key groups. In developing the plan, certain action items must be developed and completed prior to presentation to the National Oceanic and Atmospheric Administration (NOAA) and the Environmental Protection Agency (EPA). The NOAA and EPA are strong influences on governmental policy and the public.Action Item One Within nine months, research regarding the effects of over-fishing large fish populations in the world’s oceans will be conducted. Endangered species and habitats will be identified. Research facts and concerns regardin g the current impact on the environment and effects of the continuation of practices will be documented. Commercial fishing techniques and their impact on fish populations and habitats will be outlined, along with other statists related to marketplace demands and commercial fishing industry economics.Research will also include conservation and sustainment statistics and other information to support new and innovative ideas regarding fish farming. Environmental issues related to fish farming will also be identified and addressed. Locations for fish farms and the resources needed will be detailed along with funding issues. Fishing industries and human populations that will be most impacted by the plan will also be identified. Action Item Two Within three months following the completion of the research portion of the plan, a presentation will be developed.The presentation will include the purpose of the presentation and the urgent need for action will be explained. The purpose of the p resentation is to urge the NOAA and EPA to develop and implement the Healthy Oceans Act to improve and sustain the oceans. According to the Natural Resources Defense Council, â€Å"A Healthy Oceans Act would provide a national vision for protecting, maintaining and restoring oceans while encouraging the development and implementation of local ocean plans†, (para. 10, n. d. ).Continuation of current practices and the lack of conservation efforts will result in devastating consequences. Industry changes will be addressed along with a plan for displaced workers. As part of the plan for fish farming, fisherman can be educated and relocated to areas where fish farms are developed and maintained. Fish farms will aid in marine repopulation efforts, provide jobs for displaced fishermen, and provide an alternative food source. Arnold (2009) states, â€Å"Some scientists say the answer is a massive growth of fish farming — a so-called â€Å"blue revolution† to help feed the planet† (para 2).Action Item Three In tandem with action item two, this action item will also be conducted due to the length of time it will take to pull together the target audience for viewing of the presentation and will be ongoing up to the scheduled date. The target audience includes key individuals from the NOAA, EPA, and various other environmental organizations in the U. S. These organizations are influential in Oceanic environmental issues, have much influence in local and global policies, and have far-reaching educational programs already in place. Action Item FourIn month nine or when the date is set with NOAA and the EPA, informational packets and invitations will be created and distributed to key environmentalists to persuade them to attend. Names of key environmentalists will be identified and invitations sent through month 12. The addition of key individuals will serve two purposes. The first purpose is that they will bring to the meeting their experiences w ith local issues, financial concerns, and objections. The second reason is that they will be able to contribute their own ideas of how the implement the plan and what will work best in their areas.Action Item Five Prior to the meeting date, attendance and the location of the meeting will be confirmed. Reminders will be sent to all attendees along with pertinent information. Equipment will be assessed and the presentation completed. Objections to the plan will be anticipated and addressed in a question and answer session. Perception of the Plan and Effects The plan will include specific recommendations for placing at least 40% of the oceans off limits for the next 15 years (Natural Resources Defense Council, n. d. ). After 15 years the off limits zones will decrease to 30% and be maintained indefinitely.Environmentalists will see the necessity of the plan based upon the decreasing fish populations and degradation of habitats for other marine plants and animals. They will also be conc erned about pollution generated by fish farms. Innovative ideas regarding the reduction of pollution will be presented. Commercial fishermen will be hurt the most and objections from industry fishermen will be strong. Fishermen have spent their lives fishing and with that in mind, opportunities for training, funding, and employment will be made available.Other Problems Caused by Commercial Fishing Commercial fisherman cause other problems to the marine populations by the way they catch fish. They catch many other animals unintentionally in their nets called â€Å"bycatch† (University of Phoenix, 2007). Additionally, they destroy many habitats by net-dragging and contribute to water pollution during their processes. Laws should be developed and enforced regarding bycatch and what should be done with the unintentional catch before they are destroyed in the process. Community EffectsThe creation of underwater parks or fish farms will create more jobs in coastal communities and f or displaced fishermen. Lifestyles changes will affect fishermen the most and perhaps they will realize a financial loss on expensive equipment. Additionally, many of the areas where their fishing has been successful will be made off limits which will also cause financial losses.?University of Phoenix. (2007). Declining Fish Stock VLR. Retrieved October 10, 2009, from University of Phoenix, Week Six, SCI/275 – Water Resource Plan.John Wiley ; Sons, Inc. (2000-2009). Visualizing Environmental Science, Chapter 11. Retrieved October 10, 2009, from University of Phoenix, Week Six, SCI/275 – Water Resource Plan. Arnold, Chris. (2009). Feeding the World with Deep-Sea Fish Farms. NPR. Retrieved October 10, 2009, from http://www. npr. org/templates/story/story. php? storyId=5291579Natural Resources Defense Council. (n. d. ). Reviving Our Oceans. Retrieved October 10, 2009, from http://www. nrdc. org/water/oceans/policy. asp

Tuesday, July 30, 2019

World of Jugs

In North Korea citizens protested against the country authoritarian regime because over the weekend the regime seized most of the country citizens' money via a new currency issue. This caused much violence In North Korea. The Wall Street Journal reported that that the regimes money grab could be the single most Important event In defining North Korea. This event Is more defining and more Important than North Koreans whole grabbing nuclear weapons program thatNorth Korea uses for International Influence. This Issue not only raised protests In multiple Korean cities but also caused reason for the North Korean government to raise patrols on Its border with China. An Investment analyst name Mr.. Cochran said, â€Å"The biggest risk for the North's government is if, after taking people's money, it can't deliver goods and services the way the unofficial market could. † The regime would be most damaged if its people learned it could not control the real price of goods.This whole new currency issue struck many acts of violence including the death of two North Korean men by the hands of police officers. The two men attempted to get the government's limits by dividing their money among a large group of people and urging them to exchange the money for them. Another incident occurred when multiple women working in the goods and produce markets of some towns openly cursed the government knowing they would be arrested for such actions. This issue is viewed as a defining moment for North Korea.

Monday, July 29, 2019

Writing Your Personal Statement

What Is the personal statement? The personal statement is your chance to demonstrate what an excellent candidate y o are for your chosen course/ s. The statement cannot be more than 4000 characters including spaces or 47 lines. AAAS use sophisticated anti plagiarism software, so make sure your statement is all your own work, under no circumstances should you be tempted to Inc elude catapulted material from any source! How should I structure my personal statement?The recommended structure is as follows: paragraph 1 – explain why you are passionate about your subject and why you are such a good candidate for the course paragraph 2 – demonstrate what skills you have already developed from your A level studies and wider experiences paragraph 3 – demonstrate what personal qualities you have, and how much of a contribution to university life you can make The best statements will also start with strong opening and closing sentences, but war et the main 3 sections first before you start to worry about these.Guidelines for each section Paragraph 1 – academic interest This should be the largest section of your statement (at least 50%) The key points for this section are to: show real passion and enthusiasm for your chosen subject show that you have academic curiosity This Is best achieved by Including examples of your wider reading and/ or talks you have attended and/ or other activities you have taken part in outside of your A level lessons. It is

Ernst Junger Essay Example | Topics and Well Written Essays - 1000 words

Ernst Junger - Essay Example At the age of 17 years, Junger ran away from home to become part of a foreign legion. Later on, Junger was brought back by his father but he returned to military service at the outbreak of the World War I where he joined the German Army. While serving at the western front of the German Army, Junger served with distinction and in 1917, he was honored with the Iron Cross First Class. In 1918, he was awarded with Blue Max, the highest military decoration that can be awarded by Prussia. Junger’s experiences during the World War I (WWI) are recorded in his book, Storm of Steel, which was published in 1920. Apart from this book, Junger also wrote other books, novels, essays and articles in many right-winged nationalist journals. From the analysis of his works, various authors have come to view Junger from different perspectives. Some say he is militarist, others a nationalist and others antidemocratic. Still, others argue that he was a fascist while others say he was one of the grea test modern writers of Germany and a celebrity of the conservative revolutionary movement. One author, Nevin describes Junger as one of Europe’s leading and controversial 21st century writers whose remarkable writing career has spanned five periods of the history of modern Germany1. His career as a soldier became the main backbone of his writing career because he wrote out of his experiences in the WWI. Through his book, Ernest Junger and Germany, Nevin brings out the extra ordinary person in Junger, and an important insight into the nature of the history of German and that of the modern world. Those who view Junger has militarist base their arguments on some of his works like the Storm of Steel and the essay entitled On Pain. In his book Storm of Steel, Junger glorified war and this made him so famous. In this book, Junger exalted war as an internal event. He describes it as something that elevates the life of a soldier into a mystical experience. According to him, the life of a soldier is a life that is separated from normal humanity. He also claims that modern military techniques on their extremities have tested the capacity of senses of man2.. The Storm of Steel gives a sharp contrast to some of the famous novels that speak about world war. A good example of this is All Quiet on the Western Front, a book written by the German veteran Maria Remarque. In this book, Remarque gives descriptions of physical injuries and psychological trauma that soldiers go through in war. In effect, it generates in the minds of the readers the sense of horror of war. Although Junger also brings out such for example the terrible killing or wounding of his friends, they are brief and nonchalant3. Eventually, such scenes accumulate and lead to the normalisation of this horror and generate a depression instead of a shocking effect. This has made the book to be criticised as glorifying nationalism and war. From this view, one will not be mistaken to state that Junger as the ability to acknowledge even the most things in human condition and would always get an evidence to contradict the view point of human optimism4. Nationalism and militarism is also evidenced in Junger’s life through his work The Adventurous Heart, a book that was published in 1929 and The Worker published in 1932. In work The Adventurous Heart, he describes the Jews as a threat to unity among the Germans and in the worker, he called for the creation of a society that was totally mobilised and is run by warrior-worker-soldiers. Authors who claim that Junger was a fascist argue that he never showed sympathy to the political style of the native germans that was popular among the Nazis. One of the authors who has described Junger has fascist is Walter Benjamin. Out of a collection of essays

Sunday, July 28, 2019

Discuss the invasions of the barbarians and the influence of St Essay

Discuss the invasions of the barbarians and the influence of St. Augustine and the Celts as well as the rise of monasticism and - Essay Example The paper explores the rise of monasticism and Islam, the invasions of the barbarians and the influence of St. Augustine and the Celts. Discussion Celtic Christianity represents features of Christianity that were prominent across Celtic world in the Early Middle Ages. A spotlight on monasticism centering on the sequestered life of monks and nun provides an example of Celtic Christian practice. True ecclesiastical power within the Celtic world lay in the hands of monasteries instead of bishops of dioceses, and the ideal of monasticism collectively esteemed within Celtic Christianity (Noble 192). St. Benedict established his Monastic Rule, which established a system of regulations for the basis and running of monasteries. Monasticism gained prominence throughout Europe and gave rise to numerous early center of learning. The way of addressing monastic varies between the diverse Christian traditions based on their rank and monastic tradition. As early as the 3rd century, the ascetical li fe had attained a noteworthy expansion within the church in North Africa witnessed by the presence of existence of number monasteries at Carthage by the year 400. The structure in which monasticism spread from North Africa to all of the Western Christianity emanates partly from St. Augustine influence. Saint Augustine, Bishop of Hippo was both a theologian and philosopher, and can be regarded as one of the most prominent figures within the development of Western Christianity (Noble 193). When the Roman Empire fell, and the faith of numerous Christians was at stake, Augustine established the concept of Church as a spiritual City of God separate from the material city of Man. The Roman’s utilized the term â€Å"barbarians† to refer to individuals who lived outside the boundaries of the Empire. The middle Ages period can be connected to the fall of the Western Roman Empire within the fifth century to the start of the Renaissance in the fifth century. The collapse of the R oman government accompanied a decline in trade, learning, infrastructure, and security. The Early Middle Ages witnessed the emergence of monasticism in the west. The form of European monasticism derived from the traditional ideas that emanated from within the deserts and Syria. The presence of Christianity within Africa started within the middle of 1st century in Egypt, and by the end of 2nd century within the region around Carthage. The later rise of Islam within North Africa reduced the size and numbers of Christian congregations sparing the Coptic Church in Egypt, the Nubian Church within Sudan, and Ethiopian Orthodox Church. The decline and total desertion of this flourishing Church can be regarded as a sad fact of history. The Arab Muslim incursion of North Africa that started around 643 was completed by the fall of Carthage (698) and Ceuta (709). The Muslim heralded the extinction of Christianity, minimizing the number of bishoprics by the time of Pope Gregory VII (1073-1085). The disappearance of the Church in North Africa can be explained by: the presence of Donatism within the Church in North Africa, which significantly minimized the Church’s interior strength; despite, the Catholic victory over the Donatists at a meeting held in 411 (Carthage), Donatism did not entirely disappear and was still evident in North Africa

Saturday, July 27, 2019

Nursing Essay Example | Topics and Well Written Essays - 2250 words

Nursing - Essay Example There is progress, but it is considered to be a very slow trend which needed to be sped up to deliver the potential gains of the strategy (Department of Health, August 2010). An aspect of the End of Life Care Strategy wherein the Department of Health focused on its initial implementation is the care planning (inclusive of assessment) which comes after the identification of people approaching the end of life and will follow the step of coordination of care in the care pathway. It is also where nurses, being part of the multidisciplinary health care team, have active involvement whether working in hospitals or in community settings, more particularly in assessing the patient and the family regarding their needs, wishes and preferences, and is involved in initiating reviews of the care plan to the team if with patient’s permission, thus influenced the selection of the strategy’s aspect to be discussed by this paper. This will explore the implications of the care planning a spect for community heath care providers (nurses in particular), service users (patients) and significant others (family and carers). Community Health Care Providers The Strategy will give emphasis on the nurses’ role in assessment and documentation of patient’s needs, wishes and preferences in addition to her roles regulated by international, national and local policies during the end of life care. As per the code in Nursing & Midwifery Council (2008), nurses are responsible in gaining patient’s trust, treating them as individuals, respecting their dignity, working with others, providing high standard of care, being open and honest, acting with integrity and uphold reputation of profession. This will require nurses to assess and record the needs, wishes, preferences and agreed set of actions of the dying patient (advanced decisions, where to die, etc.) and to participate with the review of the care plan. An example is the Advanced Decisions to Refuse Treatment as a valid and applicable legally-binding document where the nurse is obligated to follow the physicians’ order to withhold life-preserving treatment as stated therein (NHS, 2010). Other options to be considered are the advanced statement and the DNACPR (Do Not Attempt Cardiopulmonary Resuscitation). Service Users (Patients) The care planning of the Strategy aims to enforce assessment and recording of needs, wishes and preferences of patients undergoing their end of life. This will grant patients with greater autonomy in making decisions for their own health, including decisions on where they would like to die. Moreover, it will enforce the community health care providers to assess and record their needs, wishes and preferences even if the patient or family have not yet initiated the discussion of these matters, thereby raising patient’s awareness on his treatment options. The Strategy slightly decreased the number of patients dying at the hospital and die at home inst ead by offering the patient an option to die at home instead (Department of Health, August 2010). Significant Others Families and/or carers of the patient in end of life are also included with the care planning of the Strategy in terms of reviewing the care plan, yet not as specific as the

Friday, July 26, 2019

Na Research Paper Example | Topics and Well Written Essays - 500 words

Na - Research Paper Example 5. Briefly explain the difference between the qualitative and quantitative risk analysis processes. Qualitative risk analysis process is done through the use of questionnaires and workshops in order to calculate the relative values of assets while a quantitative risk analysis is done through assigning hard financial values to assets. 6. Why is it so necessary to have a diversified team with a variety of experiential and work-related backgrounds for the RA? It is necessary to have a diversified team with a variety of experiential and work related background for the RA to be able to bring out their knowledge, experience and understanding about the assessment and to respond effectively to new dangers as they arise. 7. a) Briefly describe how each selection below is a threat to a network and b) list two vulnerability examples that you would look for/interview for when researching each. Do not provide the same vulnerability for more than one threat. The computer software will crash or will have system failure that results to software bug, power failure and malfunction of the system. The improper use of computers by humans and the system was not designed well are the vulnerability examples of this kind threat. They can create a serious risk to information security. Using unauthorized personal devices such as USB on secure network and passing secret information over non secure method or system to get information are the vulnerability examples of this kind threat. This threat alters or removes information from files. Not having policy restricting the provision of information by the staff of the phone and the system doesn’t have a protected password are the two vulnerability examples of this kind threat. This threat slows down the computer and destroys the computer files. The software doesn’t have anti-virus and the programs downloaded from the internet has malicious software in it are the two vulnerability examples of this kind threat. This

Thursday, July 25, 2019

Social Fashion Application Coursework Example | Topics and Well Written Essays - 1250 words

Social Fashion Application - Coursework Example The essay "Social Fashion Application" concerns the design and fashion. This section covers prototyping and storyboarding as the participatory design techniques which provides an opportunity for the designers and users to work together during the development period. The benefits of such an approach include: a) Requirements are likely to be more accurate thus improving the system quality, b) Can help avoid certain costly application features which users might not be in need of, c) Helps improve the acceptance level of the product. A prototype refers to an application which is rapidly implemented and constitutes only a small section of the expected functionality of the full application. It is intended to help elicit for requirements by giving the involved team a chance to get early feedback relating to their ideas. Other than freezing system requirements before design or coding activities can continue, a throwaway prototype should be built to understand the requirements. The developmen t of the prototype will be based on the requirements known at present. Use of the developed prototype gives the clients an opportunity to actually â€Å"feel† the application. Prototyping would be ideal for a large application as this one because of the absence of an existing system to help in establishing the requirements. The prototype will not be a complete system and will not contain most of the details. It will just give a system which has overall functionality. Other than the active involvement of users during development .and providing an opportunity for the identification of difficult or confusing functions, exposure of end users to the built software prototype also provides an avenue for identification and correction of errors at an earlier stage thus avoiding rework at later dates. However, this approach has the risk of increasing an application’s complexity as the scope of the application can go beyond the initial plans The reason why the prototype model wou ld be appropriate for the Social Fashion Application is that the targeted users need to interact a lot with the desired application. The web interfaces in this application, requires a great level of interaction with the targeted users. Building an application which requires limited training and able to support ease of use among users would take a lot of time in case the development team ignores this model. Story Boards Storyboarding refers to a reiterative and interaction design method which employs a set of pictures or sketches in demonstrating the end to end solution towards a given task scenario. (CRM, 2006) Storyboarding is helpful in exploring potential experiences prior to investing in software development and as well as understanding the human context within which the application will be used. It can be useful in discovering the best design approach being that it is an earlier process thus reducing the development cost (What are Story Boards Good for?) The storyboards can be better alternatives compared to use cases, user stories or task scenarios because the preparation of any of the documents can always be frustrating then possibly end in a software product that is not satisfactory. Also, they can be used to complete the any of the business requirements documents mentioned above. Stories work effectively in the software world for being able to help the

Wednesday, July 24, 2019

On Passion and Self-Growth Essay Example | Topics and Well Written Essays - 750 words

On Passion and Self-Growth - Essay Example The American novelist, literary-critic, and story-teller Elizabeth Hardwick highlights that "The greatest gift is a passion for reading. It is cheap, it consoles, it distracts, it excites, it gives you knowledge of the world and experience of a wide kind. It is a moral illumination." I strongly believe in her statement as my journey in life has been filled with notable experiences derived from reading various books. Before my passion for reading is developed, I must admit that I was first obsessed in the stories my mom untiringly tells me before retiring to bed. Then, the exciting part of deciphering the meaning of the simple words on my earliest books came. Before I know it, I have become a voracious reader whose interests range from culture, sociology, and literature. Reading has sparked my curiosity and invites me to seek the mysteries of life. My passion for reading has hugely enhanced my intellect. Whenever I open a book, I often see myself unlocking a treasure box which will brings me into other places, provides me a glimpse of other culture, and conveys me a wealth of knowledge. It is amazing to know that every book shares its unique story. No matter how simple, each book offers and adds new ideas. Reading has enriched my intellect by bringing me to the world of Shakespeare, Milton, Julius Cesar and even as far as Aristotle's and Homer's. Reading introduced me to the radical ideas of Karl Marx, the different worlds explored by Gulliver, and the persistence of Helen Keller. Books broaden my horizons by adding new words to my vocabulary, polishing my grammar, and enabling me to find ways to communicate my ideas. My passion for reading enlightens me with knowledge and ushers me from the darkness of ignorance. Reading a book the second or third time does not diminish the knowledge that it offers. Being a passionate reader, I have discovered that it is not the writer which conveys and creates meaning in his or her compositions but in fact, the reader constructs his own comprehension on the material being strongly influenced by his background and experiences. Thus, I never really get tired of reading a single book over and over again as the knowledge it imparts vary each time. Aside from shaping me intellectually, reading also further my emotional development. As a thinking and feeling being, a story moves me and fills me with different kinds of emotion. I believe that the most important thing that my passion for reading brought me is the capability to understand the emotions of other people. Reading often requires empathy and putting one's self in the character's shoes. With this, I have developed the ability to accept, understand, and share the joys and sorrows of the people around me. I credit to my passion to reading the rapport I maintain with my social circles. I can say that my passion for reading is the largest contributor to my personal development. Books enrich and stimulate my mind while keeping me in touch with my emotional side. Reading has taught me the greatest lessons in life. I must stress that Denis Diderot identifies only great passions which can elevate the soul to great things. Considering all the things that my passion for reading accomplished in me, then, I can say that it must be the greatest passion a human can be blessed

Tuesday, July 23, 2019

Care of Patient Undergoing Total Knee Replacement Surgery Essay

Care of Patient Undergoing Total Knee Replacement Surgery - Essay Example The procedure merely involves what can be considered as 'resurfacing' of the bones of the joint. The prosthesis implanted is placed on the surface of the bones that meet at the knee - the femur and tibia and cemented to the bones, while most of the ligaments and usually all of the tendons of the joint are spared (Soohoo et al, 2006). Reporting on the frequency of Total Knee replacement surgeries, Kane and others (2003) indicated that in 2001 alone approximately 171,335 primary knee replacements and 16,895 revisions were performed. Kane et al (2003) argue that due to the fact that Knee replacement surgery is an elective procedure and especially because the prevalence of arthritis is expected to grow as the population ages, the care for patients undergoing total knee replacement surgery becomes an increasing concern for the healthcare profession. instruments, and assists the surgeon by passing instruments, sutures, and supplies. Therefore, the scrub nurse must have extensive knowledge of all surgical instruments and how they are used. On, the other hand, the circulating nurse serves as a liaison between scrubbed personnel and those outside of the operating room. The circulating nurse is free to respond to request from the surgeon, anaesthesiologist or anaesthetist, obtain supplies, deliver supplies to the sterile field, and carry out the nursing care plan. Other functions of the circulating nurse includes: initial assessment of the patient on admission to the operating room, helping monitoring the patient; assisting the surgeon and scrub nurse to don sterile gowns and gloves; anticipating the need for equipment, instruments, medications, and blood components, opening packages so that the scrub nurse can remove the sterile supplies, preparing labels, and arranging for transfer of specimens to the laboratory for analysis; savi ng all used and discarded gauze sponges, and at the end of the operation, counting the number of sponges, instruments, and needles used during the operation to prevent the accidental loss of an item in the wound (Mcewen, 1996). In the following pages, the organisation and layout of Total knee replacement surgery will be discussed using my experience with the surgical procedure of Mr. A as a yardstick. Intraoperative care for Mr. A included all the activities performed by the health care team during surgery that ensured the patient's safety and comfort, implementation of the surgical procedure, monitor and maintain vital functions, and document care given. The intraoperative time period can vary greatly from less than one hour to 12 hours or more, depending on the complexity of the surgery being performed. Since the purpose of intraoperative care is to maintain patient safety and comfort during surgical procedures, decisions about patient positioning and other features of the operating room is influenced by a number of factors, especially conditions of the patient and potential risks or complications of the surgical procedure. The goals of intraoperative care include maintaining homeostasis during the procedure, maintaining strict

Strategic Management Research Paper Example | Topics and Well Written Essays - 750 words - 2

Strategic Management - Research Paper Example Thus, according to Balanced Scorecard Institute (2014), strategic planning refers to the organizational management activities which set priorities, focus resources and energy and ensure that stakeholders work towards attaining the organizational goals. On the other hand, strategic management is described as a comprehensive set of continuous activities and processes which an organization uses for systematic coordination and alignment of resources and actions to the vision, mission and values of the organization. Thus, planning typically describes a time-bound practice while strategic management is an ongoing engagement. Furthermore, the institute observes that strategic management would be used to define the procedures, policies and themes of an organization as opposed to planning which entails the organization of how resources would be allocated to various business operations so as to achieve its objectives. Thus, strategic management is different from planning. Evaluating the process of strategic management gives further insights into how better to define strategic management. Thus, Dess, Lumpkin and Taylor (2005) define it as both an art and science of formulation, implementation, and evaluation of functional decisions that make an organization achieve its objectives. With this regard, Clayton (n.d.) gives the 5-step strategic management process in organizations. Goal setting involves clarifying the organizational vision eventually leading to the development of a mission statement which succinctly communicates goals to employees and shareholders. The second stage is analysis where the organization gathers relevant information and data for accomplishing the vision. It involves conducting the SWOT (strengthens, weaknesses, opportunities and threats) analysis of the organization. This would then be followed by strategic formulation which involves the determination of strategy, reflecting upon and making decisions to design plans and strategi es to address the

Monday, July 22, 2019

Domestic Partnership Essay Example for Free

Domestic Partnership Essay The advantages gained by providing benefits to domestic partners can outweigh the costs. This report will define domestic partnerships, outline the various benefits available for dependants, provide analysis related to the cost of providing benefits to dependants of domestic partnerships, discuss various benefit package options and related costs, and provide details related to the value the company stands to gain by offering such benefits. Domestic Partnership Domestic partnerships are generally thought of as a relationship between two members of the same sex. While same sex relationships garner most of the attention, domestic partnerships are not always between members of the same sex. California Family Code Section 297 defines domestic partners as â€Å"two adults who have chosen to share one another’s lives in an intimate and committed relationship of mutual caring. To establish a domestic partnership in California, a couple must file a Declaration of Domestic Partnership with the Secretary of the State, share a common residence, not be married or in a domestic partnership with someone else, not be related by blood, both are over the age of 18, both are the same sex, or opposite sex over the age of 62 and meet the eligibility criteria under the Social Security Act. Legal Issues Currently, 18 states offer domestic partner benefits for same-sex partners of state employees. Several state and local governments that offer health insurance and other benefits to employees’ unmarried domestic partners are currently facing lawsuits. Proponents of the Defense of Marriage Acts (DOMA) claim these constitutional amendments prohibit governments from offering such benefits to any dependent of a relationship that does not fit the state’s constitutional definition of marriage. Both gay-rights advocates and the American Civil Liberties Union dispute such amendments and are currently engaging DOMA proponents in courts across America in attempts to resolve their differences (Gentile, 2006). The costs associated with defending such legal matters can prove to be very cumbersome. Types of Employer Benefits When seeking employment, benefit packages play a major role in attracting and keeping employees. Employer benefits consist of more than the basic medical, dental, and vision plans. A variety of additional benefits being sought after by potential employees include, but are not limited to, retirement plans, life insurance and the family medical leave act. To qualify for domestic partner benefits, employees may be asked to sign a statement or submit an affidavit asserting they live with a domestic partner and are financially interdependent† (Greenwald, 2003). Health Insurance â€Å"For most nonelderly people in the United States, health insurance and access to health care derive from one’s own or a family member’s employment† (Ash and Badgett, 2006). In all fairness, these types of benefits should be offered to these types of families under the cu rrent guidelines of Domestic Partnership. Two levels of benefits are offered by employers, single coverage and family coverage. Single employees are at a disadvantage when it comes to compensation because some employers offer their employees a flexible benefit to assist with costs. These benefits will include all the same privileges that legally recognized families are currently receiving. The entitlement shall consist of doctor’s visits, prescription drug coverage, hospitalization, and eye exams (Briggs, 1994). Dental Benefits Dental care is an essential benefit which should be available to all family members. Preventive dental care could significantly reduce loss of productivity and catch problems before they become chronic or severe† (Gustin, 2003). Dental benefits are very affordable and valuable. One available option is for this company to offer dental as a voluntary option. This would enable the employees and their domestic partner to take advantage of the dental plan at a group rate, but the employee woul d be responsible for the cost (Gustin, 2003). Retirement/401K Retirement Plans and 401K’s are benefits that are only available to employees; however, choosing beneficiaries is a very important detail to these plans. Although domestic partners cannot be given all of the rights of spouses, plans can be structured to provide them with many of the benefits available for spouses† (Davis, 2007). In addition to being named as beneficiary, a hardship withdrawal can be taken based on the need of the domestic partner, and domestic partners will have the right to rollover death benefits (Davis, 2007). Life Insurance Employee life insurance is available at a more affordable rate through employer plans. Adding family members is an optional benefit. Under this plan, domestic partners and children would be entitled to life insurance coverage for just pennies a day. This would incur no expense for the employer and the employee would benefit from a group rate. Cost to Employees and Employers The cost of healthcare is on the rise and no end to this crisis is in sight. Most people believe all employers should offer health insurance to its employees; however, with the cost of healthcare so high companies who offer these benefits are trying to find ways to offset costs. If all employers did offer health, dental, and life insurance, who would cover the cost? A survey administered by the Commonwealth Fund titled The Public’s Views on Healthcare Reform in the 2008 Presidential Election asked that question to 3,500 randomly selected adults. 70% of people surveyed thought the cost should be shared equally between the employer, employees, and the government. 80% of the people surveyed also thought that if an employer did not offer health insurance they should contribute to the cost of coverage (Lubell, 2008). Tax Equity The Tax Equity for Domestic Partner and Health Plan Beneficiaries Act of 2007 was introduced March 29, 2007. The act states employers offering healthcare insurance have to provide healthcare coverage to domestic partners, same-sex or opposite sex. This law has been added to stop federal tax inequalities same-sex couples currently face when receiving healthcare benefits offered by their employers (Postal, 2007). The new law significantly affected employers in the Northeast and Western states because 42% of larger companies in the Northeast, and 38% of companies in the West have same-sex domestic partner healthcare coverage. Only 14% of large companies in the Midwest and 10% of companies in the south have this type of coverage (Cohen, 2004). Dual Coverage Because the cost of healthcare has increased 15% since 2003, some states in the U. S. have prohibited employees from claiming their spouses/domestic partners as dependents; thus, prohibiting dual coverage in the workforce. Banning dual coverage for these employees saves the state tax payers several million dollars per year while the employees and their families have suitable health insurance coverage. Employees rely on dual health insurance coverage to cover out of pocket costs resulting from procedures which are not fully covered by their primary carrier. Dual coverage insurance can save families hundreds, if not thousands of dollars per year, but can potentially cost the employer hundreds or thousands more (Employer-Sponsored, 2004). Annual Cost According to a research study performed by The Henry J. Kaiser Family Foundation and Health Research and Education Trust in 2006, private employers nationwide spend an average of $4,242 for single coverage and $11,480 for family coverage on employer sponsored health insurance coverage annually (Employer Health, 2006). Whether the employee is a single hetero-sexual or homo-sexual the rate for single coverage remains the same. The same for family coverage, the married hetero-sexual couple and the same-sex or opposite-sex domestic partners family coverage cost also remains the same. Employees are paying an average of $1,860 for single coverage and $4,848 for family coverage annually. These costs are causing employers to raise workers’ insurance premiums or reduce coverage. Some companies perform internal audits to eliminate ineligible dependents, older children, and ex-spouses/ex-domestic partners. If an employer finds dependents on an employees’ insurance that should not have been covered, the employee is required to pay back medical bills and insurance premiums through payroll deductions (Employer-Sponsored, 2004). Using information from these internal audits employers may notice a slight domestic partner enrollment increase: 0. 1%-0. 3% for gay and lesbian partners and 1. 3%-1. 8% for heterosexual partners. The increase in enrollment does not significantly affect the annual cost to the employer for employer-sponsored benefits provided to domestic partners and their families (Ash and Badgett, 2006). Benefits to the Company Healthcare continues to be a concern to both employees and employers. Employers are developing and offering programs and incentives to attract various types of workers, including those in domestic partner relationships, to attract more qualified candidates. Making benefits available to an employee’s domestic partner, a company is likely to hire and retain an employee whose work output is optimal. Employees in a domestic partner relationship appreciate their employer considering their particular need which results in a higher production rate. Davis 2007). Increased Productivity An employee who is healthy and has a healthy family is less likely to call in sick and take unnecessary time off to care for his or her family. In a study conducted by Ipsos-Reid (2004), two main contributors to employee absenteeism are depression and stress. Health benefits made available to an employee and his or her domestic partner can help reduce these factors. Mark Cauthen, benefit manager for the city of Colorado Springs, believes if one’s dependents feel better, the employee is more productive and focused at work (Wojcik, 2007). Preventative Measures Many companies have recognized the importance of helping employees manage their work and personal lives. Some of the more common preventive measure benefits currently being offered to employees, their domestic partners, and other immediate family members residing in the home are: wellness, flu shots, and fitness programs. Offering these various programs help the employee feel the employer cares for the health of his or her family resulting in increased productivity (Meghji 2007). Lower attrition rates An employer must also be concerned with the effect of employee retention. Currently 50% of Fortune 500 companies are providing benefits to employees involved in same sex domestic partnerships and heterosexual partnerships. Conclusion Offering benefits to domestic partners makes good business sense. While providing benefits to domestic partners may slightly increase employer cost, the benefits will prove profitable. As the research has indicated, enrollment will increase slightly which will not pose a financial hardship to any corporation.

Sunday, July 21, 2019

Recruitment Methods of ISIS

Recruitment Methods of ISIS Abstract This paper covers a small area of topics on the infamous organization, the Islamic State of Iraq and Syria (ISIS). These topics include: a brief history of the organization, who ISIS is recruiting, why the recruits are joining, and the methods in which ISIS uses to recruit its members. Because of ISIS’s clever and effective recruiters and their methods of recruitment, they are on their way to establishing a caliphate, which refers to uniting all Muslims for the purpose of total, world domination. Recruitment Methods of ISIS According to communication strategist and cyber war expert advisor, James P. Farwell (2014), in the summer of 2014, the Islamic State of Iraq and Syria (ISIS) made an ostentatious appearance onto the worldwide stage, with the desire to institute its religious authority across the world (Farwell, 2014, p. 49). ISIS developed a caliphate, led by Abu Bakr al-Baghdadi (p. 49). The organization’s primary tool for increasing its influence across the globe has been â€Å"brute violence† (Farwell, 2014, p. 49). However, through their methods of recruitment, they have tried to establish credibility and implement legitimacy by skillfully advertising their propaganda through social networking and cyber technology, making it look attractive to prospective fighters (Farwell, 2014, p. 49). This paper will discuss who ISIS is recruiting, why the recruits are joining ISIS, and the recruitment methods that the organization uses to gather members, in order to accomplish their purpose of conquering the world. The slogan, â€Å"Baqiya wa tatamadad,† as stated by Amanda Borquaye (2016), is the slogan created by ISIS, meaning ‘â€Å"lasting and expanding,’† which has produced fearin many different areas around the world (p. 28). As recorded by author, Patrick Cockburn (2015), during summer of 2014, throughout the course of several weeks, ISIS altered politics in the Middle East (p. 1). Jihadi soldiers intertwined religious â€Å"fanaticism† and military experience to succeed in war against Iraqi, Syrian, and Kurdish forces (Cockburn, 2015, p. 1). ISIS aimed to destroy the Sunni opposition to the regimes in Iraq and Syria while it extended all throughout those areas (Cockburn, 2015, p. 1). ISIS did not show any concern that the list of their enemies grew greater over time, which included such areas as the United States and Iran (Cockburn, 2015, p. 1). As history has shown, ISIS generating enemies has not been a problem.    As Iraq and Syria began to disperse into their separate communities, the Shia, Sunni, Kurds, Alawites, and Christians were struggling to survive (Cockburn, 2015, p. 1). If someone was not in compliance with the ideology of Islam, they were labeled as â€Å"apostates† and â€Å"polytheists† and forced to flee or were brutally murdered (Cockburn, 2015, p. 1). The scare tactics and the forms of public violence that ISIS started using to torment their adversaries were the most extreme that had been seen in several decades (Cockburn, 2015, p. 1). The members of ISIS desire to restructure the world by committing violent acts (Cockburn, 2015, p. 5). Parts of this ideology can be attributed to the war in Iraq in 2003 and the war in Syria in 2011 (Cockburn, 2015, p. 5). Because of events like these, ISIS has discovered a new battlefield in which they are able to fight and flourish (Cockburn, 2015, p. 5). They have managed to accomplish this task by recruiting as many jihadists a s possible. Who are they recruiting? ISIS prompts their recruits to institute and obtain a caliphate, which means ‘â€Å"a unified Muslim state run according to a strict interpretation of Islamic law’† (Borquaye, 2016, p. 28). As believed by dedicated jihadists, violence is the single method in which to achieve this caliphate (Borquaye, 2016, p. 28). Over a significant amount of time, ISIS has developed the abilities of recruiting Westerners, despite viewing themselves as common enemies of the West and everything that Western culture honors and represents (Borquaye, 2016, p. 28). According to Lisa Blaker (2015), of the University of Maryland, there has been an estimated 3,000 or more nationalists from Western countries that have immigrated to the Middle East to join ISIS, contributing to the extremist movement (3). Some of these Western nationalists that ISIS is recruiting are American teenagers. According to Husna Haq, a correspondent for the news organization, The Christian Science Monitor, there are four reasons why teenagers, especially American teens, are being seduced in joining ISIS (Blaker, 2015, p. 4). The first reason is that organizations like ISIS are able to help young people to develop a sense of identity (Blaker, 2015, p. 4). They intentionally target this demographic because these teenagers are lost and have no sense of belonging or purpose (Blaker, 2015, p. 4). Joining groups like these makes them feel like they finally have a family and a purpose in life (Blaker, 2015, p. 4). The second reason is that ISIS functions as an advanced propaganda machine (Blaker, 2015, p. 4). Because we live in the Internet age and it is popular among young people, the Internet is an easy tool to lure members of this age group (Blaker, 2015, p. 4). The third reason is that ISIS creates a sense of religious obligation, which is why it is so attractive to American teenagers (Blaker, 2015, p. 4). Lastly, ISIS has made females one of their biggest demographics that they recruit (Blaker, 2015, p. 4).   The demographic of young Muslim-American females seems to be very popular (Blaker, 2015, p. 4). The most common group of Muslim-American females who join are those who feel isolated from their non-Muslim peers (Blaker, 2015, p. 4). Surprisingly, there appears to be a great desire for the recruitment of females to join ISIS. One of the most popular demographics that ISIS recruits are women. In these cases, they have had success by women recruiting other women (Blaker, 2015, p. 5). One of the most effective recruiters is Umm Ubaydah, who immigrated from Europe to Syria in 2014 (Blaker, 2015, p. 5). She has a blog that she uses as a recruitment tool for women (Blaker, 2015, p. 5). Her posts typically incorporate information on what to bring, the appropriate type of clothing, a sufficient amount of money, and includes information about what everyday life for women is like in Syria (Blaker, 2015, p. 5). Additional information that she posts include support on how to cope when leaving one’s family (Blaker, 2015, p. 5). A Senior Counter Extremism Researcher for the Institute for Strategic Dialogue, Erin Marie Saltman, claimed that women are successful as recruiters of other women because there is a sense of comfort manifested when communicating with fellow women (Blaker, 2015, p. 5). Conversing with a fellow woman provides a sense of consolation of leaving one’s family (Blaker, 2015, p. 5-6). As reported by CNN, about 1 in 6 ISIS recruits are women (Blaker, 2015, p. 6).   Ã‚  Ã‚   According to Alberto Cerzone and Anita Peresin (2015), professors of counterterrorism at George C. Marshall Center, roughly ten percent of ISIS’s Western recruits are females. As of 2015, it was estimated that there were over 200 Western females who abandoned their homes to join ISIS, the majority of them from France (Cerzone and Peresin, 2015, p. 499). The rest of the women were from other European nations, including the United Kingdom, Germany, Austria, and Belgium, with the numbers constantly rising (Cerzone and Peresin, 2015, p. 499). The International Centre for Study of Radicalization at Kings College London, found the majority of these females are between the ages of 16-24, but some are as young as thirteen (Cerzone and Peresin, 2015, p. 499). The majority of these females run away to the Middle East without telling their parents, which raises concerns and questions for security experts and the general Western culture (Cerzone and Peresin, 2015, p. 499). They typically come from Muslim families or have converted to Islam, but in either instance, families are appalled that their daughters are interested in joining this â€Å"violent jihad† (Cerzone and Peresin, 2015, p. 499).   Ã‚  Ã‚   According to Lauren Vogel (2016), of CMAG News, ISIS has also been recruiting doctors and health workers. The recruitment of these specialists began in 2015 when ISIS increased its focus of establishing control over territory to institute a caliphate, which they believe will bring all of the Muslims together to conquer the world (Vogel, 2016, p. 1). Since the summer of 2015, ISIS had advertised the need for doctors through social media, blogs, splashy magazines, and high-budget videos to showcase the state’s emerging health system (Vogel, 2016, p. 1). The advertisements show off the substantial amount of services they provide, the latest facilities and equipment, experienced professionals, and two medical schools (Vogel, 2016, p. 1). ISIS is especially eager for medical professionals because a numerous amount of local doctors have left the organization’s territory (Vogel, 2016, p. 1). There have been reports of doctors who were forced to treat patients at gunpoint, some who were targeted for arrest, and others who were executed for refusing to provide care (Vogel, 2016, p. 1). Like others that ISIS recruits, there are various reasons why they are recruiting medical professionals. Lorne Dawson, co-director of the Canadian Network for Research on Terrorism, Security and Society, said, â€Å"‘It’s a storm of factors, from a quest of significance and identity, to maybe some experience of discrimination’† (Vogel, 2016, p. 1). A popular reason why these professionals join is because of social justice (Vogel, 2016, p. 2). A large number of medical professionals are driven by altruism, and the determination to assist others, and the radical message uses that (Vogel, 2016, p. 2). Dawson says, â€Å"‘People find it amazing that a doctor would want to be part of this ultraviolent group committing atrocities, but on the flipside a lot of what ISIS does looks like humanitarian, social welfare and medical work’† (Vogel, 2016, p. 2). Another possible factor that draws doctors is discrimination (Vogel, 2016, p. 2). An American survey was done that showed that 24% of Muslim doctors often were victims of religious discrimination in their careers and 14% currently were experiencing it in the workplace (Vogel, 2016, p. 2). No matter for what reasons medical professionals are attracted to ISIS, they still go through the same radicalization process as any other recruit (Vogel, 2016, p. 2).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Methods of recruitment ISIS’s skills of maneuvering media is a significant factor in the way that they recruit (Borquaye, 2016, p. 28). ISIS has used the Internet and online social media as a tool of circulating their message (Borquaye, 2016, p. 28). They use these forms of media in hopes of recruiting individuals, especially young people, to join them in the Middle East and fight alongside them with other jihadists, or simply to support the organization (Blaker, 2015, p. 1). These supporting roles typically fall to the young women who join (Blaker, 2015, p. 1). ISIS has designated â€Å"sympathizers† to carry out acts of violence wherever they may be when they are not able to travel to the Middle East (Blaker, 2015, p. 1). Social media networks, such as Facebook, Twitter, and YouTube do not have complete sanctions that restrict ISIS propaganda from spreading across the world in real time (Blaker, 2015, p. 1). UK surveillance chief, Robert Hannigan, said, â€Å"ISIS and other extremist groups use platforms like Twitter, Facebook and WhatsApp to reach their target audience in a language it understands. Their methods include exploiting popular hashtags to disseminate their message† (Blaker, 2015, p. 4). In 2015, John Greenberg, of the Tampa Bay Times, conducted research which found that each day, there are up to 200,000 pro-ISIS tweets per day (Blaker, 2015, p. 1). This study also counted re-tweets and some that were generated through computer programs (Blaker, 2015, p. 1). Some of these tweets even included death threats to Twitter’s CEO and other Twitter employees (Blaker, 2015, p. 2). According to extremism analyst, J.M. Berger (2015), there were 46,000 Twitter accounts that were owned by supporters of ISIS as of the year 2014. Since then, Twitter has suspended a great number of accounts by ISIS supporters, but the supporters simply create other accounts after suspension (Berger, 2015). As of today, there is estimated to be around 40,000 accounts owned by ISIS supporters, with about 2,000 who primarily tweet in English (Berger, 2015).   Ã‚  Ã‚   One form of social media advertising that ISIS uses that is extremely effective is videos. According to a reporter for TheBlaze, Sara Gonzales (2017), ISIS posted a video this past April that featured a boy who seemed to be around the age of six or seven years old, taking part in a double-beheading. The group increasingly uploads videos that are sophisticated, good quality, and with pictures that contain impressive visual effects (Blaker, 2015, p. 1). They post various videos, each one different from another (Borquaye, 2016, p. 28). The goal is to make a different video that will appeal to each of the demographics that they are trying to reach (Borquaye, 2016, p. 28). Their most significant speeches were uploaded to the Internet in seven languages and the videos they post present similar violent characteristics to those used in Hollywood films (Borquaye, 2016, p. 28). Many of the videos that they publish have music with lyrics that have been translated to English and various other European languages (Blaker, 2015, p. 3). The newest videos that they have published feature English-speaking jihadists (Blaker, 2015, p. 3). Sean Heuston, who teaches English and film studies at The Citadel, has done extensive research on extremist video propaganda (Blaker, 2015, p. 3). He said, ‘â€Å"Its actually surprising how contemporary and hip-looking some of these things are, especially considering the fact that the messages that they are promoting are essentially medieval’† (Blaker, 2015, p. 3).    This sort of recruiting technique has enabled the organization to disperse powerful and emotional images (Farwell, 2014, p. 50). This narrative emphasizes that the strength and dominance of ISIS is increasing, asserting that full control is inevitable (Farwell, 2014, p. 50). Many of these images are intended to portray the organization’s members as fearsome warriors by showing gruesome beheadings and executions that are meant to torment their adversaries (Farwell, 2014, p. 50). However, ISIS also post images that display foot soldiers eating candy bars and holding cats, communicating that although ISIS is strictly Islamic, they also advocate for the welfare of people, and not just killing them (Farwell, 2014, p. 50). As written by Imran Awan (2017), ISIS also portrays the fighters in their videos with a â€Å"‘moral conscious’† by showing them helping and protecting civilians (p. 139). A number of their videos feature members visiting fighters in infirmaries and handing out candy to children (Awan, 2017, p. 139). This shows the attempt to showcase the supposed compassionate feature of ISIS.   Ã‚   Additionally, ISIS has developed their own app, which a person could download for free in order to stay updated with current information on the group (Awan, 2017, p. 139). The app was titled â€Å"‘The Dawn of Glad Tidings’† (Awan, 2017, p. 139). However, the app was detected and suspended after it (Awan, 2017, p. 139). Once the app was downloaded, users were able to view tweets, links, hashtags, pictures, videos and comments on their own accounts (Awan, 2017, p. 139). The majority of the information on the app was controlled by ISIS’s â€Å"social media arm† (Awan, 2017, p. 139).   Ã‚   Dr. Anne Speckhard, Professor of Psychiatry at Georgetown University, and researcher, Lorand Bodo (2017), conducted a short study, measuring the dissemination of ISIS propaganda on the Internet. The study mainly included observing search engines, such as Google, Bing, and Yahoo (Speckhard and Bodo, 2017). They based their study on prior research that was gathered from Facebook (Speckhard and Bodo, 2017). They used hashtags, keywords and phrases in English and Arabic that were familiar to ISIS members, endorsers, and distributors on social networks (Speckhard and Bodo, 2017). As they expected, they found a good number of social network accounts, Internet sites, and forums that were promoting ISIS propaganda (Speckhard and Bodo, 2017). Interestingly enough, they found that each one of those sources were connected to the same source, which they called the â€Å"Daily Harvester† (Speckhard and Bodo, 2017). In this particular situation, the Daily Harvester is referred to as â€Å"Abu Abdellah Al-Ifriqi† (Speckhard and Bodo, 2017). It is presumed that Abu Abdella is an official representative of ISIS (Speckhard and Bodo, 2017). Speckhard and Bodo observed Abu Abdellah over the course of a month, while determining the keywords and phrases that he was using to spread his message (2017). They found four specific stages that surfaced in monitoring his activity (Speckhard and Bodo, 2017). First, Abdellah observed official ISIS media channels, like Amaq News Agency and Al-Hayat Media (Speckhard and Bodo, 2017). Second, he gathered audio, files, news reports, pictures, and videos, in which he uploaded into one document (Speckhard and Bodo, 2017). Third, Abdellah posted documents only to two websites, which were justpaste.it and addpost.it (Speckhard and Bodo, 2017). These â€Å"‘paste-websites’† permit any person to post a link that may be shared (Speckhard and Bodo, 2017). Lastly, he posted the generated link on social networking sites, forums, and various different websites to reach as many individuals as he can, with a wide â€Å"compendium† of the latest ISIS propaganda (Speckhard and Bodo, 2017). However, Abu Abdellah is not the sole Daily Harvester (Speckhard and Bodo, 2017). There are many Daily Harvesters, each one as dangerous as the other (Speckhard and Bodo, 2017). They are extremely dangerous because they are able to disseminate large quantities of ISIS propaganda, with just a click of a link, which makes it available to anybody (Speckhard and Bodo, 2017). Essentially, anybody who is capable of maneuvering Google can attain this information and simply input it into Google Translator to see and read in their own language (Speckhard and Bodo, 2017). Due to the ease of access of this information, it would be hard to stop or even attempt to counteract these methods that ISIS uses to recruit its members.      Conclusion The goal of ISIS from the beginning was to develop a caliphate, in which they would unite all Muslims to achieve global dominance (Vogel, 2016, p. 1). Thus far, they have taken steps to accomplish that by performing significant acts of violence and making themselves known on the Internet, mainly through social networking sites (Farwell, 2014, p. 49). Popular ways of doing this are creating high-quality videos, and tweeting thousands of times a day from thousands of pro-ISIS Twitter accounts (Berger, 2015). Because of their cleverness and the forms ISIS uses to promote their propaganda, it is not an outrageous thought that total domination could be inevitable (Farwell, 2014, p. 50). References Awan, I. (2017). Cyber-Extremism: Isis and the Power of Social Media. Society, 54(2), 138-148. https://link.springer.com/content/pdf/10.1007%2Fs12115-017-0114-0.pdf. Berger, J. (2015, October 23). Tailored Online Interventions: The Islamic States Recruitment Strategy. https://ctc.usma.edu/posts/tailored-online-interventions-the-islamic-states-recruitment-strategy Blaker, L. (2015). The Islamic State’s Use of Online Social Media. The Journal of the Military Cyber Professionals Association, 1(1), 1-9. http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1004&context=mca Borquaye, A. (2016). Countering the Islamic State in Iraq and Syria: Why the West Has it Wrong. JUIS. 2027-34. Cervone, A., & Peresin, A. (2015). The Western Muhajirat of ISIS. Taylor & Francis, 38(7), 495-509. http://web.b.ebscohost.com/ehost/pdfviewer/pdfviewer?vid=4&sid=d6ffa458-1214-4bad-96b5-b4c5c0931508%40sessionmgr102 Cockburn, P. (2015). The rise of Islamic State: ISIS and the new Sunni revolution. London: Verso. Farwell, J. P. (2014). The Media Strategy of ISIS. Survival (00396338), 56(6), 49-55 Gonzales, S. (2017, April 18). Latest ISIS recruit video shows young school-aged boy participating in execution. http://www.theblaze.com/news/2017/04/18/latest-isis-recruit-video-shows-young-school-aged-boy-participating-in-execution/ Speckhard, A., & Bodo, L. (2017, April 23). How ISIS Disseminates Propaganda over the Internet Despite Counter-Measures and How to Fight Back. http://moderndiplomacy.eu/index.php?option=com_k2view=itemid=2494%3Ahow-isis-disseminates-propaganda-over-the-internet-despite-counter-measures-and-how-to-fight-back Vogel, L. (2016). Why are Doctors Joining ISIS?. Canadian Medical Association.   http://www.cmaj.ca/content/early/2016/01/11/cmaj.109-5217.full.pdf

Saturday, July 20, 2019

The Colorado Rivers Help and Hindrance of Settlement in the Western United States :: Colorado River Geography American History Essays

The Colorado River's Help and Hindrance of Settlement in the Western United States Geographers can tell you that the one thing that most rivers and their adjacent flood plains in the world have in common is that they have rich histories associated with human settlement and development. This especially true in arid regions which are very dependent upon water. Two excellent examples are the Nile and the Tigris-Euphrates rivers which show use the relationship between rivers and concentrations of people. However, the Colorado River is not such a good example along most segments of its course. There is no continuous transportation system that parallels the rivers course, and settlements are clustered. The rugged terrain and entrenched river channels are the major reasons for sparse human settlement. We ask ourselves, did the Colorado River help or hinder settlement in the Western United States? As settlers began to move westward, the Southwest was considered to be a place to avoid. Few considered it a place to traverse, to spread Christianity, and a possible source of furs or mineral wealth. Finding a reliable or accessible water source, and timber for building was difficult to find. There was a lack of land that could be irrigated easily. By the turn of the century, most present day cities and towns were already established. Trails, roads, and railroads linked several areas with neighboring regions. Although the Colorado River drainage system was still not integrated. In the mid 1900’s many dams had been built to harness and use the water. A new phase of development occurred at the end of the second World War. There was a large emphasis on recreation, tourism, and environmental preservation. The terrain of the Colorado River is very unique. It consists of Wet Upper Slopes, Irregular Transition Plains and Hills, Deep Canyonlands, and the Dry Lower Plains. Wet Upper Slopes: Consist of numerous streams that feed into the Colorado River from stream cut canyons, small flat floored valleys often occupied by alpine lakes and adjacent steep walled mountain peaks. These areas are heavily forested and contain swiftly flowing streams, rapids, and waterfalls. These areas have little commercial value except as watershed, wildlife habitat, forest land, and destinations for hikers, fishermen, and mountaineers. Irregular Transition Plains and Hills: These areas are favorable for traditional economic development. It consists of river valleys with adequate flat land to support farms and ranches. Due to the rolling hills, low plateaus, and mountain slopes, livestock grazing is common.

Womens Rights Movement in the US Essay -- essays research papers

Women rights Throughout the years of marriage and relationships there has been many changes towards the different roles that men and women play. Over this time though there are also things that have remained the same. The male female relationship has always had a type of â€Å"guidelines†. Over the past forty years these guidelines have become less and less followed.   Ã‚  Ã‚  Ã‚  Ã‚  Men and women’s attitudes towards each other are something that has always, for the most part, remained the same. For all of time men have been the seekers. It is a mans job to find himself a partner. Women get to wait and choose who they accept and who they decline. For example men have always asked women to dances or social events. This has come from males being the dominate gender in society.   Ã‚  Ã‚  Ã‚  Ã‚  The roles that men and women play in relationships are something that has changed. Up until recently the roles of a relationship were always pretty much the same. Males were viewed as the dominate figure in the relationship or in the family. It was the job of the male to provide for the family, whether it was hunting for food or having a good job. The male was seen as the head of the family and would provide discipline to the children. On other hand the mother was the care taker. She would be the one to stay home with the kids and not work. The female would provide for the family by cooking and cleaning and taking care of the house. This is the way that society had w... Women's Rights Movement in the US Essay -- essays research papers Women rights Throughout the years of marriage and relationships there has been many changes towards the different roles that men and women play. Over this time though there are also things that have remained the same. The male female relationship has always had a type of â€Å"guidelines†. Over the past forty years these guidelines have become less and less followed.   Ã‚  Ã‚  Ã‚  Ã‚  Men and women’s attitudes towards each other are something that has always, for the most part, remained the same. For all of time men have been the seekers. It is a mans job to find himself a partner. Women get to wait and choose who they accept and who they decline. For example men have always asked women to dances or social events. This has come from males being the dominate gender in society.   Ã‚  Ã‚  Ã‚  Ã‚  The roles that men and women play in relationships are something that has changed. Up until recently the roles of a relationship were always pretty much the same. Males were viewed as the dominate figure in the relationship or in the family. It was the job of the male to provide for the family, whether it was hunting for food or having a good job. The male was seen as the head of the family and would provide discipline to the children. On other hand the mother was the care taker. She would be the one to stay home with the kids and not work. The female would provide for the family by cooking and cleaning and taking care of the house. This is the way that society had w...

Friday, July 19, 2019

Eriksons Psychosocial Theory :: Psychology Sociology Erikson Essays

Erikson's Psychosocial Theory Erik Erikson is possibly the best known of Sigmund Freud’s many followers. He grew up in Europe and spent his young adult life under the direction of Freud. In 1933 when Hitler rose to power in Germany, Erikson emigrated to the United States and began teaching at Harvard University. His clinical work and studies were based on children, college students, victims of combat fatigue during World War two, civil rights workers, and American Indians. It was these studies which led Erikson to believe that Freud misjudged some important dimensions of human development. Throughout this essay, Erikson’s psychosocial model will be explored, discussed and evaluated interms of it’s concepts, theories and assumptions. The theoretical underpinning will be discussed with reference to the nature versus nurture debate and also the continuity versus discontinuity argument. It will then be shown how Erikson has influenced the way psychologists view the importance of identity during adolescents. Firstly, however, Erikson’s work will be put alongside that of Freud’s to establish an understanding of the basis from which it came. Erikson’s psychosocial model was heavily influenced by Freud, and shares a number of central ideas. For example, both Freud and Erikson agree that every individual is born with a number of basic instincts, that development occurs through stages, and that the order of these stages is influenced by biological maturation (Sigelman, and Shaffer 1992). Erikson also believes, as did Freud, that personality has three components: the id, the ego, and the superego. Therefore it is fair to say that Erikson is a psychoanalytic theorist. However, Erikson does argue that social and cultural influences have a critical role in shaping human development, and less significance should be placed on the role of sexual urges. Freud did note however, that social agents such as parents should be regarded as important, but it is Erikson who highlights the forces within a much broader social environment, including peers, teachers and schools which are highly important according to Erikson. Erikson, then, moves more towards the ‘nurture’ side of the nature - nurture debate than did Freud, viewing nurture as equally important in development. This ‘nurture’ outlook highlights the emphasis on environmental forces within Erikson’s model. Experiences in life, changes achieved through learning, the influence of methods of child rearing, societal changes and culture all have an exceptionally important role on human development according to Erickson. In addition, Erikson’s theory encompasses the whole of the human life-span, outlining the stages that occur, which will be looked at more closely later on.

Thursday, July 18, 2019

The Three Character Traits of Macbeth

Macbeth bumped Into three witches after his battle. The three witches tell Macbeth he will become thaln of cawdor and glamls, and then king. He then becomes the thaln which opened up an opportunity for him to become king. He then writes a letter to his wife in which he wrote to her about everything that was going on and she decides they need to kill the king in order for him to seize the throne. Macbeth kills the king but his wife has to return the daggers to the guards, to frame them for the crime, because Macbeth did not.After all that the King Duncans' sons run away becuase they fear that they were gonna be put to blame. Macbeth then becomes king. Once he became king, he did not want anyone else to have the same power as him or to do the same thing to him, as he did to King Duncan. Also he remembers one of the prophecies of the witch where they told Banquo the his children will be king. So he then orders the murderers to kill his best friend, Banquo and his son, Fleance . Macbeth is then haunted by Banquos ghost at his party.After all that he goes back to the witches and he sees three things; a bloody baby saying â€Å"beware Macduff, a bloody helmet saying that he cant be killed by anyone born of a woman, nd a child with a crown and a tree branch saying that he does not need to worry till the Birnam woods moves to Dunsinane. Macbeth started to worry and demanded Macduff and all his family killed, but Macduff left already. Lady Macbeth starts getting crazy and comitts suicide. Macduff heads over to Macbeths' castle with the army to kill him. Macbeth is killed, and gets his head cut off by Macduff.Macuff was born by C-section which was not considered to be born of a woman. One of the aspects that Macbeth grasps to make him an antagonist Is greediness. The three witches that he met In the beginning told him his prophecy, which Is that he Is going to be the future king of Scotland, † All hall, Macbeth! That shalt be king hereafter† (l, l†, 53 ). At first he doesn't believe the prophecy at all and thought that they were being foolish. But then the predlctlon of the witches starts to come true after being persuaded by his wife, Lady Macbeth, that he had to take some steps to make It come true.Once the first prophecy came true, he wanted all the prophecies of the witches to come true. Once Macbeth Is king, he becomes one of the most owerful person in his land, yet he still demands for more respect and power and does not want anyone to nave any part In It. 10 make tnls nappen ne KIIls Banquo, nls best friend, so he wouldn't create a line of king as it was one of the witches prophecy and attempts to kill Banquo's son, Fleance, however he escapes. Macbeth was told by the witches that no human born from a women, that is everyone, could kill him. Be bloody, bold, and resolute; laugh to scorn, The power of man, for none of woman born, Shall harm Macbeth† (‘V, i, 85). Macbeth believes this and gets greedy making im tru st that no one could kill him. Overall this proves that Macbeth is definitely a greedy person in this play. Another open feature that Macbeth is distinguished for is ambition. Macbeth wants to prove to his wife that he is the one that she desires for and to do that, he listens to whatever she has to say. He is so deeply in love with his wife and ambitious towards her that he starts committing dangerous and risky crimes.Macbeth is also very ambitious towards becoming king. In order to become king he had to kill King Duncan. † I go, and it is done; the bell invites me. Hear it not, Duncan; for it is a knell; That summons thee to heaven, or to hell† ( II, i, 69). This quote indicates that it is time to kill King Duncan. He is also speaking to Duncan though he is not actually present. He tells the imaginary Duncan to not pay attention to the bell as it marks his death and therefore will send him to either hell or heaven. Again, Macbeth was very ambitious in becoming king but he is also ambitious to remain king.He kills Banquo so that no could take over his position as king. â€Å"It is concluded. Banquo, thy soul's flight; If it finds heaven, must find it out tonight† ( Ill, i, 157). This quote is saying Macbeth has made all the arrangements of the murder Banquo's and that he is going to heaven or hell because he is dying tonight. After that he also finds out the one of Banquo's children would be king, so his ambition towards remaining king leads him to kill Banquo's son, Fleance, however Fleance escapes and is never heard after that incident.To sum it up, ambition is definitely a character trait in this play. Finally, the third character trait of Macbeth is bravery. It is barely noticeable in Macbeth but he is recognized for it. Macbeth at first seemed to be a courageous, rave and capable warrior who would risk anything for his country. At the beginning of the play Macbeth's skills and strength saved the day on the battlefield. † For brav e Macbeth -well he deserves that name-; Disdaining fortune with his brandish'd steel† ( l,ii, 18).The quote shows that Macbeth is brave and he is the one who helped defeat Sweno, the king of Norway. Macbeth also shows bravery because he goes after what he wants and accomplishes it. For instance, Macbeth wanted to become king, to do that he bravely killed King Duncan which is evil but it shows that he would do anything to full fill his desire. Macbeth is brave near the end because when all of his prophecies were finished, he still fought Macduff. † Tell thee, Macduff was from his mother's womb; Untimely ripp'd† ( V, viii, 19).The witches said that no human born from a women could kill Macbeth and Macduff said that he was delivered prematurely. So according to the witches prophecies he is able to kill Macbeth. Thus bravery is definitely one of the character traits of Macbeth in this play. In conclusion Macbeth is a person who is consistently stuck in ugly situations. respectful towards the king by winning the important battle and the war but also rutal and cruel because after he killing Macdonwald by slicing him from his middle to his Jaws and placed his head on a stick.Macbeth was also everybody's hero for winning the war. He was also a good friend to Banquo, in fact they were best friends. But then Macbeth changed, he become greedy. He met these three witches who completely changed his life When he was not happy and satisfied with what he had, Macbeth felt that he had to move up a level and become king. Macbeth was confused at first and was not sure if he should kill the king or not, started to argue to himself if e should stay on the good side or move to the bad side.He told his wife, Lady Macbeth, everything and she started to convince him to kill King Duncan and seize the throne. After all of this, once he becomes king, he becomes crazy when he sees blood on his hand and started to think that he can not get rid of the blood on his hands af ter killing the king. After that he is heartless and started to kill every single person who dared to cross his path or anyone that he suspects is a threat. Macbeth is ambitious to be totally in control. Macbeth without a doubt was out of control and vil when he kills Macduffs' children and wife.He is also very self assured and brave because he refuses to run away when an army is attacking his castle. But after all that, he still shows some kindness towards Macduff by saying that he does not want to kill him before he is killed by him. Although Macbeth would have been a great and brave king, it was the manipulation of his wife and the three witches that led him to an evil path. He became a greedy and very ambitious king. After a while, because of his fearlessness, he died devastatingly. words: 1539

Wednesday, July 17, 2019

Preventing Obesity to Prevent Diabetes Essay

Diabetes is an ailment in which the piece system refuses to produce or make sequester use of insulin. Insulin happens to be a ductless gland which is required to convert starches, saccharide and opposite foods into energy for e genuinelyday life. Although the causes of diabetes remain as a mystery, many medical nears commit that genetics and scurvy lifestyle choices e g. lack of exercise that result in corpulency may very puff up be responsible for the disease (Diabetes).Of course, when insulin is prevented from converting starches, sugar and other foods into energy, metaphorically speaking, it is as though a soulfulness has lost a leg or an arm, especially when the case-by-case is just a child. At a growing st age, childrens bodies should be in effect converting foods into energy, so that they can direct into mentally and materially wellnessy battalion the futurity of our institution. Besides, all kinds of preventable abnormalities be equally harmful.Imagine the effect on a childs self-esteem, not solitary(prenominal) when he or she is called fat and unhandy by his or her slim and twin classmates, but also when he or she mustiness undergo manipulation for diabetes at the time that his or her classmates are at play. The International fleshiness TaskForce reports that almost 1. 7 billion people around the cr swallow upion are at a heightened assay of weight-related, non-communicable diseases such as type 2 diabetes (Diabetes and Obesity).Moreover, the International Diabetes Federation has predicted that by 2025, the number of people with diabetes, including children, may execute at least 333 one million million million (Diabetes and Obesity) Insulin is responsible for taking the sugar from the human blood to the human cells. If glucose starts to build up in the blood rather than passing game to the cells, two problems may result (1) The cells could aim energy-starved and (2) Eventually the high blood glucose aim may start to hurt the eyes, nerves, kidneys or heart (Diabetes). Unsurprisingly, such suffering is very difficult for a child to bear.Fortunately, however, persons that are suffering from diabetes may seek their doctors advice apart from making changes in their lifestyles to prevent these problems. If the mortal suffering from diabetes is overweight, the doctor may advise weight loss. Effective weight reducing plans, in addition to increased physical activity, may help the diabetic person to a large extent (Diabetes and life style). According to a report print by the World Health Organization, to a greater extent than 22 million children under vanadium years old are cogent or overweight, and more(prenominal) than 17 million of them are in create countries. from each one of these children is at increased risk of maturation type 2 diabetes (Fight childhood Obesity to Help Prevent Diabetes). Obviously, this is expert opinion on the relationship in the midst of obesity and diabetes. I f a child is watch television or playing photograph games most of the time and becoming obese, his or her parents should be sending the child to move around with his or her friends in a park instead. Seeing that children in developing countries are also suffering from obesity, and indeed the risk of developing diabetes, it is clear that obesity may be inherited to boot.Children of poor families do not get plenty to eat in any case. What is more, if and when they develop diabetes, their families cannot establish to get them treated. But, even if a childs parents can afford to get him or her treated, medical treatment is more expensive than prevention of obesity. The calcium Department of Education reports that overweight children and youths are more prone to developing serious health problems now and in the future (final exam Task Force Recommendations).After all, this is the age of McDonalds and Burger King, which makes it even more authorized to prevent obesity in children a s well as adults. It is easy to procure a hamburger from Wendys on the way back from school both(prenominal) for the mom and the child. However, the cost of sickness is oft propagation higher than the convenience of a lug through fast food restaurant. Everybody wants children to pageantry and help the nation and the entire world to prosper as well. Besides, all health experts are of one voice as far as the relationship among diabetes and obesity is concerned.The fact that most people diagnosed with diabetes are obese, be they adults or children makes it obligatory to check obesity. It has been timelessly stated we are what we eat. Therefore, it is topper for both children and adults to be nourished by healthy foods. Fruits and vegetables are always considered maestro to fats and hamburgers. Exercise and keeping fit are always remediate than excess weight. naught has ever doubted that human beings love to eat good food.At the same time, however, it must be borne in mind t hat obesity may turn into a serious disorder. It may negatively affect the individuals mental state, by big(p) his or her self-esteem. What is more, a child that is cater on McDonalds five times a week may finally become incapable of studying in school if diabetes ends up hurting his or her eyes. Mothers too may be rendered at sea as far as housework is concerned. Undoubtedly, therefore, in the case of diabetes, it must be timelessly stated obesity prevention is better than cure.

Marketing Communications

Introduction whatever of the aspects that characterize the rate of flow line of condescension environment take on its increase dynamism, volatility and uncertainty. This poses challenges for businesses that atomic number 18 rigid and not well prep bed to change with the transformations in the grocery store (Williamson et al., 2013). On the unseasoned(prenominal) hand, it creates opportunities for companies that permit the expertness of implementing requisite changes that result bind them remain relevant to their bum commercialises. Some of the main aras that suffer been ever-changing in cheeks in recent years take trouble and intercourse styles, organisational structures, admissiones to merchandise and the utilization of railway locomotiveering science in different departments at bottom organizations (Shimp & Andrews, 2013 Diefenbach & Todnem, 2012). This paper in melt downs to spoken confabulation several issues that relate to the changes and developments taking place in the business environment. It presents an analysis or opportunities and threats that companies like yokel and Google face in relation to the rapid proficient advancements. It as well as addresses the appropriate communion approaches that companies should drill to avail inherent and outside(a) discourse and the discourse conflate that is dod at Apple to merchandise placeplace itself to its marker clients. In relation to this, the report presents an analysis of a conference rouse apply by Nike, a leading sports equipment and app bel manu detailures in the UK, to establish how powerful it is in attaining its merchandise objectives. Opportunities and Threats for Google and yahoo in adherence to rapid expert changes Google and Yahoo argon well-nigh of the well renowned net- base companies that offer search engine and netmail ser ill-doings to a ample track down of users. Both companies overly deal in packet development. establish on the se rve and harvest-tides offered by these companies, they argon directly affected by technological advancements, specially in the ICT sector (Segev & Ahituv, 2010). The opportunities and threats that these advancements expose the companies to are questioned in this section.OpportunitiesThere are several opportunities presented to these companies as a result of technological advancement. star of these is that it provides a gigantic range of avenues done which the companies grass communicate with their clients and vice versa (Hundal & Grover, 2012). It in like manner provides adjoind avenues finished which the companies cigarette market their ingatherings. Technological advancements in the ICT sector across the clod nominate besides led to an change magnitude in net profit entreeibility. For Yahoo and Google, an increase in internet accessibility provides an opportunity for them to earn to a greater extent tax in accrue through advertisements (Shih et al., 2013). This is because they are among the most visited websites internationally. Google is ranked as the most visited website, while Yahoo is ranked the ordinal (Alexa, 2014). Being business oriented, technological advancement will also make it possible for them to market their products and services to a larger market base through strategical market confabulation strategies. It also provides an opportunity for them to soak up e-commerce strategies, which are cost-effective for the corporation and convenient for clients. Among the advancements that adjudge taken place is the development and increased use of smartphones (Persaud & Azhar, 2012). Given that both companies deal in parcel program development, it provides an opportunity for them to create revenue from developing applications that fag end be used on these devices. Google has effectively taken advant board of this advancement and has developed the Android operate system (Gandhewar & Sheikh, 2011). The particular that its operating system is congruous with many sprightly devices like manufactured by different companies like Samsung and LG increases its usability. With the festering number of worldwide populations using smartphones, the community has a lot to utility as Android is among the top smartphone operating systems (Butler, 2011).ThreatsWith the increase in the technological advancements in the market, these companies are also ex represent to a range of threats (Lovelock & Wirtz, 2011). unrivaled of these is the increase in competition from early(a) companies that provide the same(p) products and services. With internet companies like Twitter and Facebook having a growing number of users, they provide a threat for Yahoo and Google in terms denote revenues (Lagrosen & Josefsson, 2011). There is also a possibility of other internet based companies coming up to provide rileder competition. In the software business, Googles Android operating system faces a threat from Apples iOS, if it d ecides to adjust it and make it compatible to other devices (Butler, 2011). Other technology companies may also come up with more in advance(p) products and stop merchandising approaches than Google and Yahoo, which business leader reduce their watercourse market shares. Another threat that is associated with technological advancements is posed to the human resources of these companies. Employees face the risk of losing jobs because a wide range of jobs that were initially handled by people bottom of the inning now be done even better by machines (Lovelock & Wirtz, 2011). Even though this might come as a relief for these companies as they deal salary costs, the fact that these advancements may increase unemployment undermines the loving responsibility efforts that these companies may aim. The increase in technological advancements also increases the levels of cyber crime. Even though the systems of Yahoo and Google may be secure from this risk, given that they take on me asures in place to address this issue, clients who have opened netmail accounts with them may not be as secure. Hackers may gain access to their emails, obtain their personal development and use it against them. Even though such cases might occur as a result of base email security measures by the user, some of them tend to blame the email hosting companies like Yahoo or Google as introduction the reasons for their predicaments. As a result, this ruins the genius of these companies.Communication at GoogleInternal and external intercourseCommunication is among the aspects of a business that are paramount to its success. Internal confabulation refers to the firing of messages or randomness at heart the organization. This could be within the same department or interdepartmental talk (Wright, 2012). External confabulation refers to the parley that goes on in the midst of the organization and external stakeholders, who mainly comprise of customers. When carrying come to th e fore internal communication, at that place are several factor ins that have to be considered. For instance, the messages ought to be confidential to avoid access from external parties. In this case, Google has a company intranet, which consists of an internal message board and email system (Goodman, 2006). This mountain only be accessed by company employees who have been allocated usernames and failwords. These channels of communications have been highly secured, make it impossible for an external party to access the information or messages pointed. Internal communication in organizations also has to be effective and quick. For Google, this is facilitated by the fact that it has a picturee communication structure. According to Butler (2010), horizontal or lateral communication is the free electric current of information or messages across different utilitarian groups in the organization. Employees and managers across all departments and employee levels at Google move fr eely without any hierarchical boundaries (The financial Express, 2005). This approach to communication enhances cooperation among employees and also quickens the process of resolving conflict. On the contrary, it reduces the authority of departmental heads in the organization. External communication is meant to evoke products or services offered by the company, or to advertise its clients products to a wide range of customers (Wright, 2012). It after part also be meant to need with customers with the vex of qualification them feel like they are part of the organization. Depending on the aim that is to be met by external communication, there are several measures that can be used. One of the most effective tools that the company uses to accomplish this is through its website. Based on the fact that its website is the most visited in the world, there is a high level of warranter that it will communicate to a wide auditory intellect (Segev & Ahituv, 2010). Even with the high nu mber of visits on the companys website, many customers who may be proposeed by the messages might not be among the website visitors. Thus, another utility(a) option that the company uses is through sending e-mail messages directed to certain clients that could be interested in the goods or services of the company. In 2012, the company fagged over $231 million in merchandise its products, which include the Google+ affectionate media platform, Gmail and the Google Chrome web browser (Efrati, 2012). trade communication theories relevant to the communication strategyThere are several marketing communication theories that can be considered as being relevant to the communication strategies utilized at Google. One of these is the heightened appreciation place (Dahlen et al., 2010). It is based on the fact that companies wishing to carry out consumer market look into to establish the fundamental attri howevere that attracts consumers to a rat. Market communication strategies are t hen knowing to sleeper the identified attributes of the product or service to the brand (Fill & Hughes, 2013). For instance, in the advertisement of its Google+ service, the company is aware of the need for people to interact and share instant messages and videos on social media. Google then links this need in the market to Google+, encouraging more clients to subscribe. Another exercise that can be used to represent the market communication strategies at Google is the advertising exposure warning. This instance suggests that advertisement objectives can only be met if it created five effects to the signal consumer (Fill & Hughes, 2013). These effects are creation of awareness, conveying messages about the positive attributes of the products, generation of feelings among the target audiences towards the brand, creating a brand spirit and starting corrupt intentions (Dahlen et al., 2010). This model also relates to the advertisement efforts that have been implemented by Goo gle as it markets a wider range of its products. The AIDA model can also be used in explaining marketing communication. It is regarded as one of the oldest and most popular market communication models. This model states that there is a hierarchy of events that have to occur for a marketing communication strategy to be termed as having been successful. In chronological order, these are attention, interest, desire, and action. After the attention of the target clients have been drawn, marketers are required to raise their interest in the products or services being advertised through highlighting their advantages. After this has been done a sense of desire is created in the clients by providing them with the assurance that the products or services will satisfy their needs. This will trigger action from the buyer, which is demonstrated by making the purchase. At Google, this model has been widely used, especially when it spent rough 231 million to market its products in 2012 (Efrati, 2012). However, this model has authoritative criticism for being out-dated and irrelevant for the present market environment.The Communication Mix of AppleThe communication intermixture is referred to as the specific approaches that are used by companies to promote their services or products to their target customers. There are five elements that make up a communication mix. These are discounts and advances, public relations, direct marketing communication, advertising and personal selling (Wright, 2012). At Apple, the marketing mix element that is mainly used is direct marketing communication. This approach involves interactive communication with the aim of quest a certain response from the target audiences. With acknowledgment to the recent development at Apple when it was preparing to arrive at PrimeSense, an Israeli 3D chip developer, it was vital for the company to inform its external and internal stakeholders or the imminent acquisition (Velazco, 2013). Some of the approa ches that the company could use to pass this information include direct email communication, social media interaction with its clients and through its website. The company has maintained a large customer data base that contains the contacts of its customers and other Apple stakeholders (Wright, 2012). This also makes it easy for the company to pass such vital information directly to its customers and other external stakeholders. Internal stakeholders, who mainly comprise of employees, can be formally informed through circulation of a memo or posting the message on internal communication platforms.Importance of Cross-functional communicationCross-functional communication is applicable within the organization. It is referred to as the communication among people from different departments or functional groups in the organization (Shimp & Andrews, 2013). The importance of cross-functional communication that is beneficial to Apple Inc is the fact that it enhances cooperation within the o rganization as different teams clip towards attaining the same organizational goal. Encouraging cross functional communication also promotes awareness of whatever is taking place across the entire organization, which eliminates cases of ignorance of misinformation. Some of the challenges that are associated with ineffective cross-functional communication in organizations include the failure for members of certain departments in the organization to appreciate or recognise the contributions do by other departments (Diefenbach & Todnem, 2012). This may result to ravaging rivalry that may affect the attainment of organizational goals adversely. In a scenario where Apple might plan to acquire another company, cross-functional communication enables all the departments to be equally ready for any changes or spare responsibilities that may arise after the acquisition (Diefenbach & Todnem, 2012).Analysis of an compound market communications runnelMarketing communication campaigns are defined as strategies that are implemented by organizations with the aim of increasing market awareness about their products or services. This is usually with the aim of increasing the purchasing intentions of the target audience. According to (Bergemann & Bonatti, 2011), ideal integrated marketing communication strategies effectively coordinate all product promotional messages to hold back that they are all consistent. This section presents a market communication campaign that was launched by Nike, a company that deals in the manufacture and distribution of sports equipment (Nike, 2014). The marketing communication campaign was implemented with the aim of increasing the companys market share in the UK to extend its lead. This is as a result of the stiff competition from Adidas (Thomasson, 2014). The campaign intended to make use of all the available avenues to increase awareness of the UK market about the brand. It also intended to market the new products that it had launched an d seen as appropriate for the target market. These mainly include sports shoes. This marketing communications campaign targeted a wide range of customers, who ranged from 18 to 50 years of age (Nike, 2014).Factors that make the campaign successfulThere are several aspects of the campaign that make this campaign successful in attaining its originally set goals. One of these is the wide range of media outlets were used to pass the message to the audience, basing on the fact that media purpose varies among individuals within different age groups (Bergemann & Bonatti, 2011). Another factor that made the communication campaign successful was the fact that it highlighted the favourable attributes of the companys products, which included the inexpensive prices and the comfort of the shoes. Referring to the heightened appreciation model, this is an effective trigger of purchase intentions among the target audiences (Fill & Hughes, 2013). Given that this marketing communication campaign w as strategically designed, the only aspect that could undermine its capability to attain the intended goals is the launch of a quasi(prenominal) or better campaign by its key competitors.Media UsedDifferent forms of media were used in this campaign to increase the size of it of the audience that could be reached. These were classified as scrape, pass around and interactive media. Print media comprised of newspapers and magazines. These targeted different clients. For instance, ads that were placed in fashion magazines targeted the fashion enthusiasts who could need Nikes products to work out. Broadcast media basically comprise of wireless and TV (Lamb et al., 2008). Different market segments were targeted by advertising on a wide range of TV and radio channels, and at different times. Given that communication campaigns in print and broadcast media are one way, they were designed to contain as much information as possible to answer any questions that clients could have regarding the product (Bergemann & Bonatti, 2011). Interactive media comprised of all the media outlets that could allow the company and its clients to immerse real time with each other (Correa et al., 2010). These comprised of social networking, mobile and via the companys blog. As opposed to print and broadcast media platforms, interactive media provided capabilities for the company and target customers to engage constructively (Kim & Ko, 2012). Some of the major social media platforms that are ideal for such form of communication mingled with companies and customers include Facebook, Twitter and Google+. Despite the advantage of real-time engagement that social media presents for companies, information on a flaw of negative attribute on the product spreads very fast (Correa et al., 2010).ConclusionThis paper has cover a wide range of issues that relate to the present-day business environment. In regard to the technological advancements that are taking place in the present-day business e nvironment, Google and Yahoo have been used as cases to discuss the opportunities and threats that these advancements present to the company. The paper has also presented an overview of internal and external communication in Google, which has incorporates that factors that are considered and the channels that are used in the communication. Different marketing communication theories have also been presented. These include the heightened appreciation model and the advertising exposure model. In the paper, different organizations have been used in the explanation of various concepts presented. Based on the arguments that have been presented in the paper, companies have to ensure that they effectively communicate with their customers and also encourage cross-functional communication so as to succeed in the current hypercompetitive business environment. Failure to implement an appropriate communication mix will not only have adverse effects on the marketing efforts of the company, but wi ll also hamper internal operations. For early research, the marketing communication theories and models should be analyzed more broadly so as to establish their relevance to different businesses.ReferencesAdler, G., 2013. Management Communication. New Jersey assimilator Hall.Alexa, 2014. Web company Information Top Sites. Online on hand(predicate) at http//www.alexa.com/topsites Accessed 7 April 2014. Bergemann, D. & Bonatti, A., 2011. Targeting in advertising markets implications for offline versus online media. The RAND journal of Economics, 42(3), pp.417-43. Butler, C.J., 2010. Internal and lateral communication in strategic alliance decision making. Management Decision, 48(5), pp.698-712. Butler, M., 2011. Android changing the mobile landscape.Pervasive Computing. IEEE, 10(1), pp.4-7. Correa, T., Hinsley, A.W. & De Zuniga, H.G., 2010. Who interacts on the Web? The intersection of users personality and social media use. Computers in human being Behavior, 26(2), pp.247-53. Da hlen, M., Lange, ?F. & Smith, ?T., 2010. Marketing communication theory A Brand Narrative Approach. California rear Wiley & Sons. Diefenbach, T. & Todnem, R., 2012. Reinventing Hierarchy and Bureaucracy From the Bureau to profits Organizations. Bingley Emerald concourse Publishing. Efrati, A., 2012. Once Shunning Ad Promos, Google Now Flaunts Itself. The smother Street daybook, 27 March. Accessed 7 April 2014. Fill, C. & Hughes, G?., 2013. CIM Coursebook Marketing Communications. New Jersey Routledge. Gandhewar, N. & Sheikh, R., 2011. Google Android An Emerging software product Platform For Mobile Devices. International Journal on Computer Science & Engineering, pp.12-17. Goodman, J., 2006. Intranet Strategy. London The Ark Group. Haigh, P., 2010. Social Network Websites Their Benefits and Risks. London Optimus Education eBooks. Hundal, B.S. & Grover, S., 2012. Consumer Responsiveness towards SMS Advertisements and its strongness in the Present Scenario. Journal of Marketing & Communication, 7(3), pp.34-39. Lagrosen, S. & Josefsson, P., 2011. Social media marketing as an entrepreneurial learning process. International Journal of Technology Marketing, 6(4), pp.331-40. Lovelock, C. & Wirtz, J., 2011. Services Marketing People, Technology, Strategy. Upper weight down River Prentice Hall. Moore, I., 2005. Does Your Marketing Sell? The Secret of Effective Marketing Communications. Boston Nicholas Brealey Pub. Nike, 2014. About Nike Inc. Online Available at http//nikeinc.com/pages/about-nike-inc Accessed 7 April 2014. Persaud, A. & Azhar, I., 2012. Innovative mobile marketing via smartphones are consumers readyMarketing Intelligence & Planning, 30(4), pp.418-43. Petit, C., Dubois, C., Harand, A. & Quazzotti, S., 2011. A new, innovative and marketable IP diagnosis to evaluate, qualify and find insights for the development of SMEs IP practices and use, based on the AIDA approach. World Patent Information, 33(1), pp.42-50. Plunkett, J.W., 2009. Plunketts E-Comm erce and Internet profession Almanac 2009. Texas Plunkett Research. Schultz, F., Utz, S. & Goritz, A., 2011. Is the medium the messagePerceptions of and reactions to crisis communication via twitter, blogs and traditional media. Public relations review, 37(1), pp.20-27. Segev, E. & Ahituv, N., 2010. Popular Searches in Google and Yahoo A Digital Divide in Information UsesThe Information Society, 26(1), pp.17-37. Shih, B.Y., Chen, C.Y. & Chen, Z.S., 2013. An empirical study of an internet marketing strategy for search engine optimization.. Human Factors and Ergonomics in Manufacturing & Service Industries, 23(6), pp.528-40. Shimp, T. & Andrews, J.C., 2013. Advertising promotion and other aspects of integrated marketing communications. Mason Cengage Learning. The Financial Express, 2005. Creative motivation at Google Inc. The Financial Express, 14 May. Thomasson, E., 2014. Adidas sees hit from emerging market currency swings. Reuters, 5 March. Velazco, C., 2013. Done Deal Apple Confi rms It Acquired Israeli 3D Sensor Company PrimeSense. Online Available at http//techcrunch.com/2013/11/24/apple-primesense-acquisition-confirmed/ Accessed 7 April 2014. Williamson, D., Cooke, P. & Jenkins, W., 2013. Strategic Management and Business Analysis. New Jersey Routledge. Wright, M., 2012. Gower Handbook of Internal Communication. Burlington Gower Publishing.