Wednesday, October 30, 2019

Research Report - Experimentation Essay Example | Topics and Well Written Essays - 1000 words

Research Report - Experimentation - Essay Example The source of the trust-image (dependent variable) in the experiment was a store visit by a close ally and was manipulated as one/zero. The store image was manipulated as positive/negative implying positive or negative the impression on its ability and competence in carrying out basic store services. The experiment used apparel stores for its investigations. This was a good selection especially considering that there are a great number of new apparel stores being opened in India from time to time. This provided an excellent opportunity for carrying out a longitudinal experimental study on emergent stores. Sampling and subjects The subjects used in the experiment were students in a renowned Management Institute in India. Random sampling was used to gather the 160 subjects from four out of the institute’s seven largest dormitories. This is a good sampling procedure because it does not give room for the selection of a biased group of subjects for example subjects of a certain soc io-economic class, taste preference or whose parents own large apparel shops in India. Being college students, the subjects ranged from 20-28 years in age. This was very good considering that individuals in this age bracket were free from parental influence in terms of shopping preference for example apparel purchase. According to Kaul et al (2010), the use of male respondents is another positive aspect of this research and it improves the reliability of its results. This is because product quality for formal and informal men’s wear in large Indian apparel stores is relatively established. If ladies had been sampled in the experiment, the results would have had some levels of bias and unreliability. This is because their formal wears are western and are only available in limited range in few large stores and selected cities. However, the use of ladies under a parallel experiment would have been good for proofing further the reliability of the results obtained from male subjec ts. When the results of pre-visit and post visit scenarios were compared, they were similar. The participants also verified the research results by naming large apparel stores they could recollect after the experiment. As expected, all the participants mentioned various large regional and national apparel shops. This was in line with the hypothesis of the experiment and hence the experiment can be said to be worthy and valid in indicating that store image has an impact on the shopper trust. This was supported by use of a manipulation check to check the experiment’s believability. The manipulation check was in form of an open-ended question â€Å"According to you, on what has your friend probably based his opinion about the store?† Kaul et al (2010), In addition to the manipulation check, an additional item to test the respondents’ willingness to visit the store again was used.. However, it was not necessary to use the manipulation checks and additional test item because the data collected were too rich to be analysed. Therefore, it is true to say that the experiment was overdone. As much as the data collected was too rich, it could also be unreliable because it could just be a reflection of top-of-mind recall instead of all relevant cues. The experiment did not involve repeated experimentations which should have been done after some good

Monday, October 28, 2019

A comparison between these two extracts Essay Example for Free

A comparison between these two extracts Essay Make relevant references to your wider reading in drama Both Pinter and Shakespeare display their thoughts and ideas through the main connection of family, this is also similar to Williams’s â€Å"A Streetcar Named Desire†. Through this connection Both extracts feature sexual elements but at different intensities; they show elements of a flirtatious nature despite the circumstances in which the drama set up. Anne is conversing with a man who is responsible for the death of her husband and father in law in the war of the roses. Initially, she withstands his attempts to seduce her with her use of fiery language, â€Å"Out of my sight. Thou dost infect mine eyes†. The insulting language displays Anne’s initial disgust with the mere sight of Richard. The use of the word â€Å"infect† highlights the genuine hate she originally had for him and also produces an image of disease that is associated with him. However with the use poetic language and sensual imagery of â€Å"kissing†, Richard is able to manipulate her and convince her into not only forgiving him but accepting his ring as well. Richard manages to ameliorate the sense of her words by claiming that her eyes â€Å"have infected† his with love. This is shown similarly in Tennessee’s â€Å"A Streetcar Named Desire† with Stanley’s constant sexual attraction towards Blanche, his sister in law shown through the implications of language he uses and also with his actions towards the end of the drama. In Scene 2, where Stanley is interrogating Blanche about where she gets her â€Å"costume jewellery† ;â€Å"if I didn’t know you was my wifes sister I’d get ideas about you. Stanley observes the taboo about relations with his wifes sister; he reminds Blanche that she should not be flirting with him. Nevertheless, Stanley, later on, sexually assaults Blanche in Scene 10, â€Å"Come to think of it – maybe you wouldn’t be bad to – interfere with † As Stanley reaches for the right word, we are left to wonder whether this is the first time he has thought about assaulting her, whether he has always desired her but has channelled this into hostility. Also too in Pinter’s â€Å"The Homecoming†, although the suggestive language appears towards the end of the extract with Ruth’s surprisingly confident, â€Å"Have a sip. Go on. Have a sip from my glass.† The sudden enticing behaviour almost replicates the Stanley and his immediate sexual attraction to Blanche.

Saturday, October 26, 2019

The Meal Ready-to-Eat Essays -- essays research papers

The MRE (Meal - Ready to Eat) Retort Pouch and Component Packaging OUTLINE I. Abstract A. The Meal, Ready-to-Eat B. Nutrition 1) Caloric value 2) Recommended Daily Allowance II. Introduction to the Retort Pouch A. Make-up of the pouch 1) Tri-laminate MRE retort pouch 2) Manufacturing specification 3) Thermo-stability requirements B. Laminate qualities 1) Three layers and object of design implementation C. Possible problems with military retort pouch use 1) Punctures, tears, holes 2) Outer carton use and integrity boost III. Difference between retort pouch and non-retort pouch A. Adhesive use on seals B. Types of food and retort pouch use C. Other packaging use in MRE IV. Retort Pouch Printing A. Required Markings B. Soldier or inspector use of markings V. Defects Likely to Occur A. Delamination B. Inspection for defect pouches VI. Design Improvement and Testing A. Laboratory testing of pouch suitability B. Pouch component shelf-life 1) Freezing effects 2) Dry storage shelf-life 3) Refrigerated shelf-life VII. Summation A. Combat soldier acceptance B. Field feedback The Meal, Ready-To-Eat (MRE) has been specially designed to sustain an individual soldier in heavy activity such as during actual military operations when normal food service facilities are not available. The MRE is a totally self-contained operational ration consisting of a full meal packed in a flexible meal bag. The full bag is lightweight and fits easily into the soldier's military field clothing pockets. The contents of one MRE meal bag provide an average of 1250 kilocalories (13 % protein, 36 % fat, and 51 % carbohydrates). It also provides 1/3 of the Military Recommended Daily Allowance of vitamins and minerals as determined by the Surgeon General of the United States. Most of the food components of the MRE are packaged in flexible packages. Some of the packages are the same or very similar to those used for previous types of operational ration components, but others are newer forms of packaging technology such as the vacuum packed tri-laminate, non-retortable pouch, and the tri-laminate, retortable pouch. Since almost all of the primary and secondary components of the MRE are packaged in tri-laminate pouches, these will be the primary presentation focus. The retortable pouch, often referred to as the flexible can,... ...he development of improved food preservation techniques has occurred largely on the battlefields of the world. What started as a suitable package for space flight meals and the MRE, the retort pouch is now common for packaging of commercial food products of today. The retort pouch has become an industry icon of convenience and has proven food safety in preservation. REFERENCES Brody, Aaron L. The Return of the Retort Pouch. Food Technology Magazine. Vol. 57, No. 2. February 2003. Pgs. 76-79. Hartman, Lauren R. User is King with Flexibles. Packaging Digest. March 2003. Pgs. 34-38. www.packagingdigest.com NFPA Bulletin 41L, 1989. Flexible Package Integrity. National Food Processors Association, Washington, DC. www.nfpa.org Press Release: New Study Says Food Manufacturers Offering US Consumers Retort Packaging to Meet Conveniency/Lifestyle Demands. Paper, Film, & Foil Converters Magazine. April 29, 2004. PRIMEDIA Business Magazines & Media Inc. www.pffc-online.com Sacharow, Stanley. Is the Retort Pouch Really Ready to Replace the Can? Paper, Film, & Foil Converter Magazine. APR 2003. PRIMEDIA Business Magazines & Media Inc. www.pffc-online.com

Thursday, October 24, 2019

The History of the Roman Government Essay -- Ancient Rome Governmental

The History of the Roman Government The Romans have had almost every type of government there is. They've had a kingdom, a republic, a dictatorship, and an empire. Their democracy would be the basis for most modern democracies. The people have always been involved with and loved their government, no matter what kind it was. They loved being involved in the government, and making decisions concerning everyone. In general, the Romans were very power-hungry. This might be explained by the myth that they are descended from Romulus, who's father was Mars, the god of war. Their government loving tendencies have caused many, many civil wars. After type of government, the change has been made with a civil war. There have also been many civil wars between rulers. But it all boils down to wanting to be involved in government. When the Greeks finally entered Troy after ten long years of siege, a man named Aeneas escaped the city with his father, Anchises, and his son, Ascanius. They went to Mt. Ida, where they were to meet Aeneas' wife, Creusa, but she never showed up. Saddened, Aeneas acquired a boat and sailed around the Mediterranean. He bounced around from Asia Minor to Greece to Crete looking for a place to found a new Troy, but he couldn't find a satisfactory place. As told by Homer in the Aeneid, Aeneas was cared for by the gods. Venus, in particular, was very worried about him. She asked Jupiter, king of the gods about him, and he said this: "Since you are so consumed with anxiety for Aeneas, I shall turn forward far The hidden pages of fate and speak of the future. He shall conduct a great campaign for you. And conquer all Italy and its haughty peoples. He shall impose laws on his own people. And build walled cities for them; the third summer Shall see him rule in Latium, the third winter Of warfare see the Rutulians [an Italian tribe] subdued. But his son Ascanius... It is he who shall consolidate your power-For thirty years with all their turning months; Then shall he move his capital from Lavinium To Alba Longa, which he shall fortify To the uttermost; and there a line of kings... Shall reign and reign till Ilia [Rhea Silvia], a priestess Of royal blood, bear twins begotten by Mars; And one of these, Romulus, fostered by a she-wolf, And joyfully wearing her tawny hide, shall rule And found a city for Mars, a new city, And call his people Romans, af... ...es are Republic, styled after the Romans. The Romans are probably the most influential people of all-time. Works Cited Actium, Battle of. Computer Software. Encarta Encyclopedia, 1996 ed. Adcock, F. E. Roman Political Ideas and Practice. Ann Arbor: University of Michigan, 1959. Asimov, Isaac. The Roman Republic. Boston: Houghton Mifflin, 1966. Burrell, Roy. The Romans. Oxford: Oxford University, 1991. Caesar. Computer Software. Encarta Encyclopedia, 1996 ed. Caesar, Gaius Julius. Computer Software. Encarta Encyclopedia, 1996 ed. Gibson, Elke. Personal Interview. 19 March 1997. Nardo, Don. The Roman Republic. San Diego: Lucent, 1994. "The Reforms of Diocletian and Constantine." CIS: Research and Education (16 March 1997). Republic. Computer Software. Encarta Encyclopedia, 1996 ed. Rise of Rome (753-44 BC). Computer Software. Encarta Encyclopedia, 1996 ed. "Rome, Ancient - the Empire." CIS: http://isdup/menu/133.html; Research and Education, Academic American Encyclopedia; Grolier's (16 March 1997) . Rome, History of. Computer Software. Encarta Encyclopedia, 1996 ed. Sabines. Computer Software. Encarta Encyclopedia, 1996 ed.

Wednesday, October 23, 2019

Malicious Attacks

Malicious attacks basically seek to exploit vulnerabilities in a network. These threats can be passive or active and have very negative consequences. The difference between active and passive attacks are that active attacks makes changes or modifications to the data or attempt to gain some type of access to the network, while passive attacks do not make changes to the system at all. According to Solomon, 2012, there are many malicious attacks and threats that can be carried out against the network, some of which are identified below: -Brute force attacks are one of the most tried and true attack methods where the attacker uses a software program to try all possible combinations of a password, security code or user ID, until one of them is successful. -Hijacking is another type of attack that involves the attacker taking control of a session between two machines and masquerades as one of them. This can involve man-in-the-middle, browser or session hijacking. Social engineering is another common attack where the attacker tricks the user in carrying out actions for them; for example, the attacker may obtain the user’s login credentials by posing as an IT Specialist which would then help the intruder gain access to the network. -Computer viruses act like a biological virus, where it infects the host program and could cause the host program to replicate itself to other computers. Some of these viruses have become smarter with the capability to combat malware-detection programs by disabling their detection functions. Trojan horse is a malware program that masquerades as a useful program They use their outward appears to trick users into running them; they look like programs that perform useful tasks but actually hid malicious code. -Rootkits are newer types of malware that modifies or replaces one or more existing programs to hide traces of attacks. -Spyware is a type of malware that specifically threatens the confidentiality of information. It does this by gathering information about a user through an Internet connection without the users’ knowledge. The impacts of all of the above attacks could damage or disrupt the system. It could also cause security privileges to be escalated to allow the intruder to access, modify or even delete private data. Additionally, as a result of any intrusion on the network, users would experience PC slowness, crashes and just no access at all to necessary resources. Malicious software is a major threat to the network, internal attackers, equipment theft and denial threats can pose even more of threat. Internal ttackers reside within the company and could be a cybercriminal, which is why it’s important to monitor the threats constantly and carefully. Equipment theft can also pose a serious threat because if equipment ends up in the wrong hands, confidential information could be exposed like account numbers or access codes. Lastly, Denial threats make assets or resources unavailable or unusable by flooding a specific port on a server rendering authorized users no access to import resources, wh ich could be a severe impact. If there is a vulnerability in the network or organization, then there is a possibility of a threat. If the vulnerability can be eliminated or addressed, the risks of attacks or threats are greatly decreased. Some common vulnerabilities are listed below according to Radack, 2013: -In the user domain where the user lacks the awareness of security policies or accidental violation of acceptable use policy in the user domain. -In the workstation domain there could be weaknesses in installed software and where unauthorized users could access the system. In the LAN domain, transmitting private data unencrypted, unauthorized network access and where malicious software can be spread -In the LAN-to-WAN domain there could be exposure and unauthorized access of internal resources to the public and loss of productivity due to internet access. -In the remote access domain is where brute-force attacks occur on access and private data and data leakage from remote access or lost storage devices. In the system and application domain there could be unauthorized physical or logical access to resources and weaknesses in server operating system or application software. -With VoIP there could be default manufacturer passwords still in place, insecure class-of-service settings and trunk access group restriction settings. The impact of any vulnerability is of course the possibility of a threat succeeding. A vulnerability is considered a weakness and any weakness in a network or organization will quickly be exploited by an attacker. The attacker is able to obtain information in all seven domains if one domain is not fully protected. For example, if a brute-force attack is deployed on a network and successful, it could affect users access to resources. Users could be in accordance with security policies and following correct protocol in order to protect the network as much as they can but if the brute-force attack is indeed successful, they efforts are thwarted. This is why it’s important to address each and every possible vulnerability in the seven domains of a network. If users are equipped with the right security tools; workstations are secure with strict access control policies; LAN servers are secured with various standards and guidelines; LAN-to-WAN security should maintained while allowing users as much access as possible; WAN domain has confidential encryption of data transmission; remote access domain has security controls applied according to policies; lastly if the systems/application domain has security policies, procedures and guidelines implemented in the various applications or systems, all vulnerabilities would be addressed.

Tuesday, October 22, 2019

Reasons for Mexican Revolution essays

Reasons for Mexican Revolution essays There are many sociopolitical reasons why political conflicts lead to revolution marked by violence and death. Ultimately, political systems that do not allow constructive dialog, and a loyal opposition breed discontent amongst the masses, causing mayhem and revolution. During the mid to late 1800's, Mexico was under colonial rule. The country had been invaded by several foreign powers. This came to an end when a General by the name of Porfidion Diaz first tried to overthrow President Benito Juarez in 1872 but was unsuccessful; then again, rebelled against President Lerdo de Tejada in 1876 and won. Don Porfirio, as he was called, became the president and governed for more than 30 years (1876-1911). Under his rule, Mexico had political stability and grew in many areas, creating new industries, railroads, miles of railroad tracks as well as the increase of foreign capital. Nonetheless, this progress was not translated into the peoples well being. Soon there was political unrest. The unhappiest sectors of the Mexican society were the peasants and labor workers. To defend these two popular sectors, Ricardo Flores Magn founded the Mexican Liberal Party. Flores Magn was persecuted by the Porfirist regime, and eventually died in an American prison. In 1906 the army brutally repressed a strike of miners in the Cananea mine in Sonora. As you can see, DÃ ­az did every thing in his power to crush any uprisings. The Cananea massacre is historically considered the spark that finally ignited Mexicos Revolution. This led the downfall of General Porfirio DÃ ­az. Although, he promised free elections, he ultimately reneged and incarcerated his opposition Francisco Madero. Eventually, he was overthrown in 1911 and Madero became the president. Unfortunately peace did not come to this country for a while. Several Revolutionary leaders couldnt settle their differences. Madero wanted to work ste...

Monday, October 21, 2019

The world is so complex, no one can possibly understand it. Agree or disagree

The world is so complex, no one can possibly understand it. Agree or disagree Nowadays, the world population is about 7 billion people and predicts that this figure will continue to grow rapidly in the next several years. While overpopulation, society must focus to human development, this leads to many negative consequences, including making the world more complicated. As a child, people have thought very simple but when they get older, they think all the more complicated. Likewise, for the poor, everything is simple but for the rich, everything is more complicated.Peppers Butternut squash tomato onions garlic dinn...In fact, this world is simply but the human heart is complicated. Ultimately, the human heart is simply, because there are so dominant benefit humans become more complex. For example, the political situation in many countries is now very unstable. There are many protests for multi-party government occurs in Thailand, many terrorist attacks or suicide bombings in the Middle East. Moreover, stress on the nuclear issue between the U.S. and North Kore a is interested.Furthermore, each person has a different preference. Therefore, today's developing technology to serve the purpose of each one. I hear many people say that they want a simpler life, but they make it simple as well as understand it, they make it more complicated. Many people believe that technology will help make things simpler so they constantly evolving technology. However, there is a truth they do not know that they are driven and controlled...

Sunday, October 20, 2019

Nothing Gets Me High Like Writing

Nothing Gets Me High Like Writing Nothing gets me high and offers relief from the suffering like blackening pages, writing.  ~Leonard Cohen This is the part of our profession that we quickly forget. The sea of authors is just that. . . an undulating sea. They rise up with glee about the release of a book. . . then slide down and bottom out when the sales arent as expected. Highs and lows, but mostly about publishing. Most of them blame someone else for their writer problems. Of late Ive seen them blame: 1) Amazon algorithms 2) Amazon promoting its own imprints before other publishers 3) Amazon allowing used book sellers to appear before new books 4) Publishers being greedy 5) Self-published authors gobbling up market share 6) Or vice versa, traditional authors gobbling up market share 7) The glut of cheap sales free, 99 cents, etc. 8) A bad editor 9) Indie bookstores not wanting indie authors And in all that blame, the writer forgets why they started writing in the first place. . . for the high of sculpting words. For the joy of designing that perfect sentence. The business side of writing is in flux, and that flux changes faster and faster. Technology and creative ideas fly like bullets as writers attempt to take advantage and break loose of the fray and be seen. . . and make sales. Fight to be different than all the other people out there writing books. If we dont constantly market, we backslide. And if we constantly market, we write less. And write less quality. Most businesses will tell you to return to the basics when things are not going well. For writers, thats writing well, writing for self, and reaching for that writing high. Sink into writing. Then when its written, come up for air and publish, because if you think about publishing before you finish the book, youll be outdated in your thinking

Saturday, October 19, 2019

Personal leadership Essay Example | Topics and Well Written Essays - 1250 words

Personal leadership - Essay Example One of the most notable things about this individual was how they learned to lead. While a handful of managers at the restaurant had experience in hospitality management from formal training, this particular manager had learned his management skills from on the job work. In these regards, his skill-set stood out slightly from managers that had the formal background and in some instances one could detect a slight sense of superiority from those that had actually gone through formal schooling. Instead, this manager had begun his career as a host in one of the less populated restaurants, and later moved to serving. As he succeeded at these positions upper level management soon offered him a managerial position at that particular restaurant; after succeeding at this restaurant he transferred to the larger restaurant, where I came into contact with him. Consider this brief background account, it’s clear that the individual developed their leadership and managerial skills from in-ho use interactions and personal life experience rather than formal training. In examining his leadership skills this was evident as there seemed to be a greater level of understanding, efficiency, and empathy with the employees and business practices than the managers that predominantly had formal training. In terms of defining leadership there are a number of issues that must be considered in relation to this individual’s philosophy. While some my disregard the insight that can be gleamed from the perspective of a restaurant manager, this paper argues that in actuality this perspective is highly relevant to nearly all forms of business as it consists of a combination of a variety of class understandings. For instance, the restaurant provides a solid combination of lower, middle, and upper class patrons that must be considered and negotiated with; there is also a highly diverse workforce, with different ages and nationalities that must be managed. In these respects the position demands a highly malleable individual. In terms of this man’s leadership philosophy it was clear that he adopted a policy of mutual respect for employees. He treated all individuals equitably and had a general understanding demeanor. If there were any specific leadership philosophies embodied in his approach I believe they would generally be linked to this element as a base factor. Extending beyond the equitable treatment of employees and customers there were a number of elements within his treatment of employees that were highly notable. In terms of new employees he was understanding and open, allowing them to develop in a constructive and not overly critical way. In terms of experienced employees his approach was one wherein rather than having to demand respect through professional rank, he gained respect by being a reliable and efficient employee. In very few instances was there employee disrespect, as the general consensus in regards to his leadership approach was positi ve. In achieving this level of respect it was clear that it was accomplished through his daily actions. For example, he always showed up for work on time and was highly efficient in terms of restaurant tasks. One such skill was his ability to route food orders to the specific waiters and ensure the food arrived at the table in a timely way. Another skill was being able to speak with all customers on a level that made them feel comfortable with his

Friday, October 18, 2019

REFLECTIVE REPORT Essay Example | Topics and Well Written Essays - 750 words

REFLECTIVE REPORT - Essay Example During the first meeting, we engaged in a brain storming session in which each of us though of possible topics/subtopics for discussion. We evaluated the numerous suggestions and narrowed down the subtopics to a few. Based on the few areas, each member of the group was assigned one part to research and write on. We agreed by consensus that each person would also present the part that they had researched on on the day of the presentation. Abiola was assigned the topics myths and religion and religious beliefs while Bernadin was assigned the part of defining science and religion. Oluwabumni was to research on the relationship between religion and science even as Tuoyo researched on the kind of relationship that may arise between science and religion. Kalu was to do the conclusion while I was to work on the introduction. In the meetings that followed, we basically got updates on the progress made by each group member. Based on the information that each one of us gathered, we made comments, criticized, and made suggestions as we deemed fit. This was meant to see us come up with the best possible presentation. As we discussed on the progress of each member, we were keen to ensure that our criticisms and comments were objective rather than subjective. In preparation for the presentation, I relied on different sources of information. I visited the British Library where I got access to several useful sources. I had a more or less similar experience to what I had previously at the library. The amount of information related to the topic was overwhelming and I had a bit of trouble narrowing down to a few books, journals, and periodicals. I was lucky to have had a previous experience with the same situation and so I took less time settling down of the few sources that I finally read and used as sources for the presentation.

How cultural values get reflected in technological artifacts Essay

How cultural values get reflected in technological artifacts - Essay Example Poster informs that the media of first media age is centralized and restricted as it is in the hands of certain producers and consumers who use media for their own purposes. Moreover, Poster adds that no value is given to culture in first media age while the second media age because of its being unrestricted will give value to culture. Technology helps any culture to depict its cultural values. With the help of technological development, media is going to be free to reveal its culture with freedom, as is informed by Poster. According to Poster, technology has affected the society and culture as a whole because it is only because of technological developments that the media is going to enter from first media age to the second media age. With technological development, there will also be culture development and media will enjoy more freedom as compared to its previous status. According to Poster, with the help of technology and culture in the second media age, the communication process will be decentralized. According to Mark Poster, the second media age is closely related to enhancement in technology. Mark Poster informs with the help of interface that the technology has improved. According to him, the word interface means a connection between human beings and the machines. Computers have an interface that allow them to be connected to human beings, while being worked at. According to Mark Poster, it is the technology that can be considered as associated to the second media age. With the help of technology, the second media age will be more supportive for media. Communication in second media age will be decentralized. Winner, in his article, â€Å"Do Artifacts Have Politics?† informs that culture and technology are related to politics. According to Winner, technological design, artifacts and social order have the power to affect the affairs of a community.

Thursday, October 17, 2019

Company's strategy Essay Example | Topics and Well Written Essays - 500 words

Company's strategy - Essay Example The companies argue that they are not responsible for telling consumers about disadvantages of their products because it will eventually ruin their income and business. The customers in the case study had to search the internet in order to find expected disadvantages of obesity food. The food researchers are working to find, pinpoint and solve health problems caused due to usage of fast food for number of years now (Hill, Wyatt, Reed, & Peters 2003). The court established a comment that said that the company was not at all the only source of information on the side-effects of fast food and therefore, the claim of the plaintiffs is invalid. The legal authority also added that the food chain never requested nor forced anyone into eating their stuff. The company held on to the point that they are not liable for providing information about the quality of the food. But, if one views the case from a societal angle then, the company had a duty to inform the customers about the side-effects of the products. Still, the businesses do not consider ethics as the core and composite part of the business and say that their concern is profitability and because of this reason, ethics are rated at a much lower rank. However, various stakeholders of the company view the case study in a very divergent and different way. Nevertheless, customers considered themselves as betrayed by the company.

Legal Envirn of Business Essay Example | Topics and Well Written Essays - 500 words - 1

Legal Envirn of Business - Essay Example On reviewing the executive employment agreement between Jonny Bee Good and the Big Bad Company, there was a valid agreement made on the twenty first day of April in the year 2010. On this issue, the signature part is provided at the end of the terms and provisions’ script. This means that the executive should only sign to the contract after going through the entire script. On allocation of duties, Jonny Bee Good was hired as the president of the company expected to serve with much loyalty, faithfulness, and total devotion. However, the company had the right to modify or change the executive’s position and duties during the term of their agreement. On the issue of compensations, the company offered compensation with respect to its customary payroll practice. Two hundred and twenty five thousand dollars was the executives’ base salary by the Big Bad Cars Company. The salary was to be reviewed annually by the board in accordance to the company’s review polici es and practices. Incentive compensation programs would be in operation whereby the executive would be eligible to in participation. On the issue of termination of the contract, according to the contract, the agreement was supposed to operate in full force with no breakage until the two parties are associated in breaking it. The two parties could only terminate the contract upon agreement. The company could also terminate the agreement in absence of the executive but only upon a written notice, while the company would pay executive the compensation to which he would be entitled. The executive held the right to terminate the contract with or without a good reason but upon a written notice of ninety and thirty days respectively. Contract between the two parties was meant to last for a period of two years according to their agreement. In that case, a total or $450,000 would be entitled for Jonny Bee Good as his compensation after the contract. Centrally

Wednesday, October 16, 2019

Company's strategy Essay Example | Topics and Well Written Essays - 500 words

Company's strategy - Essay Example The companies argue that they are not responsible for telling consumers about disadvantages of their products because it will eventually ruin their income and business. The customers in the case study had to search the internet in order to find expected disadvantages of obesity food. The food researchers are working to find, pinpoint and solve health problems caused due to usage of fast food for number of years now (Hill, Wyatt, Reed, & Peters 2003). The court established a comment that said that the company was not at all the only source of information on the side-effects of fast food and therefore, the claim of the plaintiffs is invalid. The legal authority also added that the food chain never requested nor forced anyone into eating their stuff. The company held on to the point that they are not liable for providing information about the quality of the food. But, if one views the case from a societal angle then, the company had a duty to inform the customers about the side-effects of the products. Still, the businesses do not consider ethics as the core and composite part of the business and say that their concern is profitability and because of this reason, ethics are rated at a much lower rank. However, various stakeholders of the company view the case study in a very divergent and different way. Nevertheless, customers considered themselves as betrayed by the company.

Tuesday, October 15, 2019

A World of Art Essay Example | Topics and Well Written Essays - 1250 words - 1

A World of Art - Essay Example The other the triangle between Mary and Jesus represents the cup of the last grail. Look out the windows, one can see the country side which is not congruent with the subject matter. He uses the technique of Chiaroscuro. It is dark in the room and bright outside. It is interesting to note that he used the same country side in his Mona Lisa painting which he completed in 1503. The colors used are green and orange(brown). There is symmetry with the large rolls on the table. Important paintings Perspectival study of the Adoration of the Magi: (Art Authority) Pen and ink, traces of silver point and white on paper. Fascinating to see his study in perspective of texture, the use of Chiaroscuro, the use of sienna to show white, the three dimensional by the fact that we can see the thickness of the stairs and the pillars. the lines showing how everything is done in perfect mathematical dimensions then The Adoration of the Magi: (Art Authority) oil on panel. The oil thing which remains from t he perspective is the stairs and the pillars but they are quite distant. It was as though he used the study to do several painting. The texture is very primitive for a Leonardo da Vinci. The trees are two dimensional and Mary is in one color. Perhaps it is a question of aging. The people are half real. Titian, The Assumption of the Virgin: Oil on wood. A perfect study in vertical perception there is an incredible sense of movement, towards the heavens. In analyzing the lines, there are the two triangles with two parallel lines. The texture of the fluffiness of the clouds but also the heaviness the angles have of carrying Mary Profane Love: a perfect contract between the Assumption and this perfect technique of Chiaroscuro. There is the light shining on her face and her hand. She is also looking at someone but we do not see him either. There is also the mirror which shows you something that the person in the painting doesn't see. This is a technique which began with Leonardo da Vinci . The texture of her clothes is magnificence Van Gogh, Starry Night : oil on canvas. It is not polychromatic though he does use a great deal of blue. He avoided using red. He uses hatching in the modern sense of the word. His brush makes short rapid strokes of the same color. The texture has very little dimension to it other than a little bit of the town. I would not call it two dimensional. Road with Pollarded Willows and A Man with a Broom (Art Authority) is from carbon, ink, and watercolor on paper. His texture is three dimensional. You can see the end of the road but you see the beginning of the impressionist school as the road slightly bends to the right. As he advanced in his training, he mixed different techniques each time of pencil and ink, or pencil, ink and water color to cite an example. He showed his being influenced from different schools. He painted 37 self portraits. It is documents that none of them look directly at the viewer but the Self Portrait 1887 looks straig ht on. His self portrait in the straw hat looks like a modern version of hatching. Jasper Johns, Numbers in Color: uses the technique of pattern and polychromatic. He called his paintings of clusters "crosshatchings (Johns) Grey numbers (Art Authority) is the same technique of patter without color Andrea Mantegna, The Lamentation over The Dead Christ 1494: tempera on canvas. The texture is three dimensional. He uses lines in one angle to gain depth to take away from the size of his feet. There is

Hybrid Vehicles Essay Example for Free

Hybrid Vehicles Essay The 21st century is considered as the time for more advance development and innovation of the human society. Prior to this era, mankind has already been busy with making ground-breaking design to significantly improve how people live their lives. However, due to changing times, these actions have resulted to some consequences that initiated changes for the better and for the worse. Some of the changes that have transpired in the past nine years since the commencement of the 21st century are the occurrence of global warming and the recently devastating global financial crisis. Evidently, these problems have been caused by humans but they are aware that these crises exist. Because of their realization, many learned as well as ordinary individuals have drafted solutions on how to mitigate the effects and even eradicate the problems at hand. In relation to the growing threat of climate change and fiscal recession, experts have devised a simple apparatus that would address these two problems. This wonder solution is the hybrid vehicle. Nowadays, it is common knowledge that global warming is mainly caused by the emission of harmful gases in the earth’s atmosphere. More so, the increase in oil prices has been one of the major factors for the decline of the US economy. Through the hybrid automobile, these alarming causes can be directly dealt with if this type of automobile will be utilized for public transportation. By doing this, the production of carbon emissions can be greatly reduced, fares would significantly decline and use of gas would be lessened thus helping millions of commuters to save money and at the same time the environment. A hybrid vehicle is a specific kind of automobile that has â€Å"two or more major sources of propulsion power. † This vehicle is usually made out of a â€Å"conventional gasoline and electric motor. † These two parts are the source of power for a hybrid which means that gas and electricity or any other renewable energy such as â€Å"hydrogen, propane, CNG and solar energy† are simultaneously used to run the vehicle. As a result, fuel â€Å"efficiency, increase in horse power, longer driving range and reduced greenhouse gas emissions† can all be accomplished by one single machine (What-is-what. com, 2007). In comparison with regular and other green cars available in the market, the hybrid vehicle is more beneficial to use. Hybrid vehicles can only accumulate an â€Å"average of 33 to 60 miles per gallon during city driving and 27 to 68 miles per gallon in highway driving. † According to the Environmental Protection Agency, these numbers are way better than the performance of other types of vehicles. This only shows that by using hybrid vehicles, users can definitely reduce their gas expenses. In a year, this type of vehicle can consume only $600 to $700 worth of gas which is lower to the average cost of $2000 annually using ordinary vehicles. Also, a hybrid is only low maintenance due to the fact that it utilizes less gas which results to less strain on the engine. Furthermore, the battery is another major part of the hybrid that supplies energy to the motor. This power source can be regularly drained and recharged but need not to worry about its durability because it was made to withstand various problems. Also, most manufacturers offer warranty just in case it wears out (Green Living Answers, 2009). In contrast with electric cars, a hybrid has smaller batteries which do not require constant charging. In addition, using electric cars can cause some drawbacks such as â€Å"availability of charging stations, lack of range, low top speed, and lack of acceleration† (Halt, 2009). Moreover, there are numerous initiatives pioneered by the government and business establishment in order to provided monetary incentives and perks to hybrid users. First, the â€Å"Federal Tax Credits for Advanced Vehicles† which entails â€Å"new tax credits for advanced vehicle technologies ranging from $250 to $3,400 depending on the vehicles level of fuel economy improvement. † Second incentive is giving out discounts for auto insurances on hybrid vehicles. Third, hotel discounts are given to users of hybrid vehicles (Union of Concerned Scientists, 2007). Given all these facts, it is apparent that hybrid vehicles can bring positive changes to the current global situation. By employing this innovation on a large scale, revolutionary transformation can immediately be seen and felt by the public. In this case, the looming threat of climate change and oil price hike can be alleviated by using Hybrid vehicles for mass transportation. References Green Living Answers. (2009). Hybrid Cars vs Regular Cars. Retrieved May 4, 2009, from http://www. greenlivinganswers. com/hybrid-vehicles/hybrid-cars-vs-regular-cars Halt, G. (2009, March 19). Electric Cars Vs Hybrids. Retrieved May 4, 2009, from http://ezinearticles. com/? Electric-Cars-Vs-Hybridsid=2120736 What-is-what. com. (2007, November 2). What is a Hybrid Vehicle? Retrieved May 4, 2009, from http://what-is-what. com/what_is/hybrid_vehicle. html Union of Concerned Scientists. (2007). State and Federal Hybrid Incentives. Retrieved May 4, 2009, from http://go. ucsusa. org/hybridcenter/incentives. cfm

Monday, October 14, 2019

Managing a Patient Diagnosed with Breast Cancer

Managing a Patient Diagnosed with Breast Cancer Managing a patient diagnosed with breast Cancer Fungating Care context- The patient assessment and care planning took place in a care home following the patients admission due to decline in health, as she was unable to manage independently at home. In this reflective account of person-centred assessment, I will be comparing and contrasting the residents information that I undertook during my time at practical placement, associating it with the (Driscoll 2007) model, a well-known framework for reflection demonstrating (Discolls 2007) the three processes when reflecting on a residents person-centred assessment. These three processes include: what (description of the event), so what (an analysis of the event) and now what (proposed actions following the event). Driscolls model will help me apply theory to practice. In accord with the Nursing and Midwifery Council (NMC) Code of Professional Conduct, performance and ethics (2015) protecting confidentiality and privacy of staff members and the patient all names and the place where the person- centred assessment took place will remain unidentified, for this assessment the patient will be known as Mrs Woody. First, four weeks into practical placement at the care home, I discussed with my mentor who she thought would be a suitable patient, to carry out the person-centered assessment. To prepare for this I read through all the patients care notes, by the end of the week, me and my mentor discussed that Mrs Woody was a good patient to carry out the assessment, as I was involved in the care plan, being involved in the wound dressing, this got me involved with getting to know the different types of dressings and what they were used for. Mrs Woody was diagnosed with breast Cancer with Fungating tumour. Breast tumour is a chronic disease (Lawrence 2016) that causes depression, loneliness, but other days they might feel more positive about their self(MacMillan Cancer 2014). By the end of week 5, Mrs Woody was asked if she could be the person I used for a person-centred account, I wanted to find out more about Mrs Woodys breast cancer, as I found it interesting. Mrs Woody is a patient whos got ca pacity so she could give consent herself. It is important to obtain patient consent before undertaken their care notes, this informs Mrs Woody about how her information is being used (Bowrey and Thompson 2014). When explaining things to Mrs Woody, both verbal and non-verbal communication was used. It is important that Mrs Woody knew every detail about the person-centred assessment, ensuring that her name, place and other personal details were confidential. (NMC 2015) I found it difficult talking to Mrs Woody who has been diagnosed with depression, quite difficult than I had expected, as I always made time to have a conversation with Mrs Woody, so she wouldnt feel nervous about answering questions. Mrs Woody got agitated when I spoke to her in a clear calm voice asking her simple sentences, this gave Mrs Woody, the chance to talk directly to me, and to express her feelings. There were times when Mrs Woody pretended to have not hear what I said, so Mrs Woody started talking about what she was more interested in. I then brought her back to the questions, explaining them in more detail, by adding in things about her family, which got her attention again, which is more therapeutic towards her as it is vital to nursing. I felt confident knowing that Mrs Woody was at ease when she interacted in the person -centred assessment. I interacted with Mrs Woody for the first four weeks of placement, which helped her get to know me better. This was to support and reassure Mrs Woody so she didnt feel nervous about talking to me for the first time. It also helped me to get to know Mrs Woody before undertaken the assessment, while interacting I was accessing how long, I would have to spend with Mrs Woody, given her enough time to undertake the assessment, as I knew that she liked to talk about her family. Given Mrs Woody more time will help her gather her thoughts, without being rushed. The information that I gathered from Mrs Woody did match against the information on the medical and nursing notes. The only question that was left blank in the patient and family perspective box was systems assessment when Mrs Woody was asked this question she didnt fully understand what it meant, so I tried to simplify the question, by asking her about her physiological, psychological, sociological, and spiritual status, but Mrs Woody just looked at me and stated: that she did not want to answer that question. I respected Mrs Woodys wishes and moved on to the next questions. It is very important that Mrs Woody could answer all the questions about herself, as if Mrs Woody couldnt answer any of the questions about herself then, we would have had to make a review with the doctor to check out Mrs Woodys signs and symptoms, this could have been a result of Mrs Woody being diagnosed with dementia. The questions Mrs Woody answered were straight forward questions, about her past and relevan t questions. After getting consent from Mrs Woody, I was able to collect relevant case notes under the supervision of my mentor, the case notes contained past medical history, dietitian,doctors notes and care plans. My mentor was involved in the whole interview of Mrs Woody, who was in her bedroom this interview was undertaken in a confidential place (NMC 2015) as it was personal towards Mrs Woody. I explained to Mrs Woody in an informal manner, what was going to happen, and if it was okay to carry out the assessment today. By asking Mrs Woody if it was okay to undertake the person- centred assessment, showed that I was respecting her rights, in what she wanted to do. To improve Mrs Woodys care needs we could have carried out this assessment when her family was there, this way we could have got more information out of Mrs Woody about her past medical history. I gathered accurate information on my one-to-one talk, to support Mrs Woodys clinical care needs, I will be researching nutrition for Anorexia Cachexia Cancer. Doing this condition for Mrs Woodys clinical care, allows me to see what the problems can cause and how the illness can result in different parts of the body, for example, this can cause loss of appetite due to Mrs Woody having Cancer, Mrs Woody is losing electrolytes and proteins from the wound, as nutrition has a big impact on the wound healing. I felt that doing this type of cancer was good as if I didnt understand something about the condition I could go back and ask my mentor, this support was good for a student as your learning off another member of staff, in the care setting instead of reading journals. In conclusion, it is seen that I have mentioned the (Driscoll 2007) model of reflection. Stating the reasons why this framework was chosen as well as why reflection is important in Nursing. By using the three stages in the (Driscoll 2007) model of reflection this has helped to develop a therapeutic relationship with Mrs Woody by using interpersonal skills. This shows that Mrs Woody feels safe and happy within the care setting, and gets on well with staff members, as Mrs Woody was unable to manage independently at home due to her being diagnosed with breast Cancer Fungating. Mrs Woody communicated well with me and the nurse, during the assessment, this is very important. This shows that Mrs Woody feels comfortable and has a good relationship with the health professional staff, when talking to professionals about her personal care plan. Overall, I feel that getting to know the patient before doing the assessment, made it easier for me to communicate with Mrs Woody, as having a relation ship with her made the conversation flow more easily, making Mrs Woody not feel nervous. This skill is essential towards nursing, as I found Mrs Woody felt comfortable talking to professionals. If I was to undertake this person-centred assessment again to make it better, I would get the family involved in the person- centred assessment, by getting the family involved they could have supported, what Mrs Woody was saying, by expanding on what she was asked, this could have given me more detail about her past and relevant medical history. This makes it clear why Mrs Woody kept on getting distracted and talking about her family. If Mrs Woodys family was in the room this might not have happened. When consent was given from Mrs Woody within the end of week 4, I could have given her a date when the assessment was going to be done and should have given her a choice if she wanted her family to be present when the assessment was being done. By given Mrs Woody the choice this was respecting Mrs Woodys rights. The main learning that I as a student Nurse, can take from this reflecting practice is that (Driscoll 2007) model is effective on health professionals, as the three reflective questions make you think more as what you have to develop, and analyse what you just done. This model helped me to develop my learning skills. (Driscoll 2007) model can identify weaknesses and strengths when it comes to someones care. Developing new skills reflecting on past experience can help me achieve my highest potential, as with the (Driscoll 2007) model it has outlined my weaknesses and strengths. Part 3 Using information and data gathered during the assessment process identify one clinical care need for your patient and discuss the evidence based rationale for this choice. The clinical care need that I have chosen to reflect on within the person-centred assessment is nutrition, for patients with Cancer Anorexia Cachexia. With Cancer Anorexia Cachexia symptoms it is a metabolic disorder (Tazi and Errihani 2010). Cancer Anorexia Cachexia happens when a patient like Mrs Woody, losses weight, fatigue and feels weak, with increase weight loss resulting in loss of fat mass. This is not the patients choice in wanting to lose weight as weight loss is involuntary, it can not be even prevented by nutritional support (Mondello 2015). This condition can be seen as an end of life or chronic condition, such as, infections, acquired immunodeficiency syndrome (AIDS), chronic pulmonary disease and renal disease (Tomoyoshi 2015). Nutriment is important in helping patients with Cancer treatment and the development to become better (Reeves et al. 2007). Having a poor diet when having Cancer Anorexia Cachexia is a common problem with most Cancer patients, as it has been known to have vital symptoms of poor outcomes, such as decreased quality of life, making them weak and losing their ability to mobilise. Cancer patients needs a good balanced diet for the body to store nutrition, and maintain their body weight, a good balanced diet, this will have an effect on good quality life (American Cancer Society 2015). While if cancer patients have a poor diet, this can cause undernutrition, which leads to the patient having a high factor of infections, increasing their end of life care (Vigano et al. 1994) With Mrs Woody having Cancer Anorexia Cachexia at the age of 83 years old unfortunately, there is no treatment for anyone with this condition (Fearon 2013) having this condition it is vitally important that Mrs Woodys clinical status is took into consideration when caring for her, as due to the factor that she is 83 and has this condition it does not only lead to weight loss, but can also affect other symptoms, ÂÂ  Promoting positive outcomes from the health professionals for Cancer Anorexia Catherxia by increasing dietary needs, and minimising symptoms which will influence the patients quality of life (Bauer 2007). Due to not having enough nutrition in the body, this has effected Mrs Woodys mobility making her need assistance with two people. This condition affects the skeletal muscle wasting, and body weight as nutrition has been decrease. Lacking appetite is a problem for Cancer Anorexia Cachexia patients as this might have a different mindset on therapeutic options. Decrease weight loss, could be due to being diagnosed with cancer, causing the patient to have not only have decreased nutritional intake, but swallowing can also be a problem (Bauer 2007) It is important that health professionals detect and treat Mrs Woody with other causes that Cancer Anorexia Cachexia brings to her, such as depression, Mrs Woody is a palliative patient, depression can effect Mrs Woody differently some days, she might get up one morning feeling content, or other mornings it might affect her my getting up feeling depressed and an inability for her mood to be lighted. Pain is another factor effecting Mrs Woody, p ain is common in cancer patients, and in lifelong illnesses (Higginson and Costanantins 2008). With Mrs Woody having Cancer Anorexia Cachexia her pain should be well controlled as there is medicine to prevent her feeling in discomfort. It should be recommended that every patient with Cancer Anorexia Cachexia, to see about nutritional counselling as this will help patients who have this condition, being seen by a nutritional will help a patient like Mrs Woody to establish her physical function and body weight (Ravasco 2007). When attending a nutritional counselling for Cancer Anorexia Cachexia that a patient gets full support out of attending, which will include different nutritional aspects, eating problems and clinical history. This allows the patient with Cancer Anorexia Cachexia to keep a food diary, keeping a diary will help them see if there is any dietary changes, the diary will show the intake of caloric and show if there is any energy deficit. With the increase of caloric intake and nutrition, patients with Cancer Anorexia Cachexia have to understand that sometimes it does not work, with the increase of caloric it is known to help cancers. (Norleena 2011) Being diagnosed with cancer it is known that having treatment can cause nutrition symptoms. Nutrition systems can cause obstruct oral intake, which then leads to the patient losing weight. This includes, different symptoms like, nausea, sore mouth, problems with swallowing, depression and changes in the smell and taste (Wojtaszek et al 2002) With having any of these symptoms it can impact the patients quality of life. It is advised that patients go and see a Dietician, Oncology, or even a nurse, as having any of these symptoms can affect the patients ability to eat. Getting the help from a health care professional will decrease the side effects in some way, as well as helping the patient to eat again and enjoy their food. Health care professionals, within the care setting are involved in sending Mrs Woody to nutritional screening assessment. There are a variety of assessments that can be carried out for patients who are at a risk of nutrition, they use different assessment like skin testing, hypersensitity (delayed) and guidelines to institution- specific. Conclusion With the clinical care need of nutrition for patients being diagnosed with Cancer Anorexia Cachexia this condition is a metabolic disorder. It is important that for the best clinical care for patients being diagnosed with this condition, that they stick with the nutritional assessment of Cancer Anorexia Cachexia. Also having this condition the patient can talk to a health care professional, if they are having problems with eating or swallowing, also professionals help patients to set goals appropriately, which then improves quality of life for the patient. Some researchers have seen Cancer Anorexia Cachexia as an end of life condition, if they dont have a good nutrition Identify an outcome focused goal for this clinical care need, ensuring the goal involves the patient and is SMART (Specific, Measurable, Achievable, Realistic, Timely). The goal that I will be focusing on for Mrs Woody is a 45 diet plan, for patients with Cancer Anorexia Cachexia which will involve the SMART assessment. The SMART assessment is what goal you want to achieve, there are five main parts to this goal and they include Specific, Measurable, Attainable, Relevant and Timely. (Haughey. 2015) A specific goal for a Cancer patient in a care home setting is to improve the increase of calorie, by improving calorie this will improve quality of life to symptom manage nausea . The increase to calorie are different for each patient, this is due to everyone being different sizes, people being taller than others, treatment and side effects. A high calorie should be recommended for the patient, as it prevents the patient losing weight (Wickham et al 2015). The goal for Measurable in a Cancer patient is weight management. With the increase of calories into the diet will help to maintain some body weight, if the patient is well enough it is vital that they get referred to the dietician, for supplements and weekly weight. The UK guidelines do not have a set guideline for doing physical exercise after treatment (Cancer Research UK 2015). But it is recommended by the (Macmillan Cancer Support 2012) that exercise is a good way to help control weight by muscle strength, and cardiovascular exercise. This will improve the patients quality of life, keeping their mind of their condition. Achievable goals for a Cancer patient, is necessary when on a 45 diet plan, increasing a Cancer patients appetite, sometimes the psychological aspect of Cancer, appetite can be affected by mood, general health and ability to fight infection, soÂÂ   using a MUST tool will help improve the patients appetite, which will be documented in a food diary. In the food diary the health care staff will keep an eye on the intake of fortifying diet, adding calories and high calorific snacks to the diet. Smoothies are good for adding in calories, as they have a range of vitamins in them. Vitamins are important nutrient for Cancer patients as it will decrease side effects, and helps the immune system (Parker 2017). A realistic goal for a Cancer patient when on the 45 diet plan, is to increase weight, and not to lose weight. With a patient being underweight it can cause infections. These infections can be hair falling out, or/and decrease body muscle. When a patient is underweight there is a high risk of the patient being diagnosed, with Osteoporosis, being underweight people find it hard to absorb minerals and vitamins (Meghan 2008). The timely goal will be the end result, which will be then reviewed in 4 weeks to see how well the patients get on, with the 45 diet. The focus within the 4 weeks is to see if there is any improvement in weight.

Sunday, October 13, 2019

The Medicinal, Industrial, Recreational, and Commercial Uses of Marijua

The Medicinal, Industrial, Recreational, and Commercial Uses of Marijuana "Penalties against possession of a drug should not be more damaging to the individual than the use of the drug itself" said President Jimmy Carter in a message to Congress in 1977 (Family Council on Drug Awareness). Unfortunately, congress did not and has not listened to him. Even though numerous government-sponsored studies have proven that the use of the cannabis plant is safe and has many benefits, it is still illegal. Cannabis sativa is a flowering plant that has two main variations: marijuana and hemp. Marijuana contains the chemical delta-9-tetrahydrocannabinol (THC) which alters the mind when smoked, eaten, drank, or taken in the pill form. It is often called grass, pot, reefer, Mary Jane, herb, weed, or one of over 200 slang terms (National Institute of Drug Abuse). Hemp is bred to have lower THC content so that it does not have mind-altering capabilities. It is often used to make fibers, clothing, oil, ropes, and to aerate the soil in crop rotation. The qualities of both str ains of the cannabis plant are not new discoveries to humankind. In fact, the Chinese first recorded use of marijuana in the year 2727 B.C. (Schleichert 5). People in every inhabited continent legally used marijuana for recreation and medicine for thousands of years. It was not until after the "Reefer Madness" campaign of the 1930s that marijuana became illegal in the United States. The campaign gave exaggerated stories and false information to scare people away from the use of cannabis. Ever since, studies have shown that marijuana is safe and beneficial and activists have pushed for legalization, but governments refuse to legalize it. Instead, they have harsh laws prohibit... ...: Should they be Legalized. New Jersey: Enslow, 1996. Potter, Dr. Beverley and Dan Joy. The Healing Magic of Cannabis. Berkeley: Ronin, 1998. Schleichert, Elizabeth. The Drug Library: Marijuana. New Jersey: Enslow, 1996. Simmons, Michael. Afterword. "The Madness Continues." Reefer Madness. New York: St. Martin's Griffon, 1998. 397-435. Swan, Neil. "Marijuana, Other Drug Use Among Teens Continues to Rise." NIDA Notes. Apr 1995. On-line. Internet. Available WWW: http://165.112.78.61/NIDA_Notes/NNVol10N2/Marijuanateens.html. Woolf, Marie. "Cannabis less harmful than aspirin, says scientist." Independent News 20 Oct 2000. On-line. Internet. 23 Jan 2001. Available WWW: http://www.independent.co.uk/news/UK/Health/2000-10/cannabis201000.shtml. Zimmer, Lynn, Ph.D. and John P. Morgan, M.D. Marijuana Myths, Marijuana Facts. New York: Lindesmith Center, 1997. The Medicinal, Industrial, Recreational, and Commercial Uses of Marijua The Medicinal, Industrial, Recreational, and Commercial Uses of Marijuana "Penalties against possession of a drug should not be more damaging to the individual than the use of the drug itself" said President Jimmy Carter in a message to Congress in 1977 (Family Council on Drug Awareness). Unfortunately, congress did not and has not listened to him. Even though numerous government-sponsored studies have proven that the use of the cannabis plant is safe and has many benefits, it is still illegal. Cannabis sativa is a flowering plant that has two main variations: marijuana and hemp. Marijuana contains the chemical delta-9-tetrahydrocannabinol (THC) which alters the mind when smoked, eaten, drank, or taken in the pill form. It is often called grass, pot, reefer, Mary Jane, herb, weed, or one of over 200 slang terms (National Institute of Drug Abuse). Hemp is bred to have lower THC content so that it does not have mind-altering capabilities. It is often used to make fibers, clothing, oil, ropes, and to aerate the soil in crop rotation. The qualities of both str ains of the cannabis plant are not new discoveries to humankind. In fact, the Chinese first recorded use of marijuana in the year 2727 B.C. (Schleichert 5). People in every inhabited continent legally used marijuana for recreation and medicine for thousands of years. It was not until after the "Reefer Madness" campaign of the 1930s that marijuana became illegal in the United States. The campaign gave exaggerated stories and false information to scare people away from the use of cannabis. Ever since, studies have shown that marijuana is safe and beneficial and activists have pushed for legalization, but governments refuse to legalize it. Instead, they have harsh laws prohibit... ...: Should they be Legalized. New Jersey: Enslow, 1996. Potter, Dr. Beverley and Dan Joy. The Healing Magic of Cannabis. Berkeley: Ronin, 1998. Schleichert, Elizabeth. The Drug Library: Marijuana. New Jersey: Enslow, 1996. Simmons, Michael. Afterword. "The Madness Continues." Reefer Madness. New York: St. Martin's Griffon, 1998. 397-435. Swan, Neil. "Marijuana, Other Drug Use Among Teens Continues to Rise." NIDA Notes. Apr 1995. On-line. Internet. Available WWW: http://165.112.78.61/NIDA_Notes/NNVol10N2/Marijuanateens.html. Woolf, Marie. "Cannabis less harmful than aspirin, says scientist." Independent News 20 Oct 2000. On-line. Internet. 23 Jan 2001. Available WWW: http://www.independent.co.uk/news/UK/Health/2000-10/cannabis201000.shtml. Zimmer, Lynn, Ph.D. and John P. Morgan, M.D. Marijuana Myths, Marijuana Facts. New York: Lindesmith Center, 1997.

Friday, October 11, 2019

Consumer Decision On Phones :: essays research papers

Due to the speed of technological advances nowadays, it is increasing difficult for anyone to predict the marketing strategy for an electronic device. As for telephones today, they are becoming more and more sophisticated in both capabilities and application of these capabilities. A potential buyer is nevertheless confronted with decisions – cordless or non-cordless, caller ID or no caller ID and so on. Well, by analyzing this market through an economist’s point of view, the quality of product almost always grow directly according to price. To analyze the 1999 phone market fully using the neoclassical approach, many factors would have to be discussed. As discussed in the Time article by Katie Hafner, â€Å"Everything but a Dial: Phone Choices†, telephone prices ranges are related to their capabilities. The amount of consumption of these various goods solely depends on the price and the utility that consumers receive from purchasing the product. When deciding to purchase a telephone, a consumer would most likely to separate telephone capabilities into different categories first and then choose from a selection of phones that best suit their needs (their utility). The amount of goods sold by a company would depend on the price of the phone and how it competes with other companies in the market. Therefore, in order to effectively market a new line of telephones, the capabilities of a telephone and its price must be taken into consideration. First, a research must be done on consumer preference and what population it would be served. Empirical data must show a significant number of demand for a specific capability before the production is run (ex. whether if there are enough couch potatos in United States that desire a telephone which is integrated into a remote control for the television). Second, the price of the new product must be competitive in the market. By comparing the new line of product to its competitors, the price should be set at a level that is weighted according to its unique functions. Henceforth, it is with these above factors in consideration that a company will be able to do business more successfully. Since this is not a perfect world, consumers do not have perfect information about the products they have purchased. In addition, there are important issues that the neoclassic theory of consumer demand failed to address above. The neoclassic theory of consumer demand cannot predict the demand for new products and explain the theory of ‘want creation’ through advertising and effective marketing.

Prg420 V10 Week 4 Individual Assignment Essay

PRG420 (Version 10) – Week 4 Individual- Simple Commission Calculation Program Part 3 Modify the Week Three Javaâ„ ¢ application using Javaâ„ ¢ NetBeansâ„ ¢ IDE to meet these additional and changed business requirements: * The application will now compare the total annual compensation of at least two salespersons. * It will calculate the additional amount of sales that each salesperson must achieve to match or exceed the higher of the two earners. * The application should ask for the name of each salesperson being compared. The Javaâ„ ¢ application should also meet these technical requirements: * The application should have at least one class, in addition to the application’s controlling class. * The source code must demonstrate the use of Array or ArrayList. * There should be proper documentation in the source code. Source Code: /** * Program: Simple Commission Calculation Program Part 3 Purpose: to calculates and display the total annual compensation of a salesperson. Programmer: Class: PRG420 Instructor: Creation Date: Programmer Modification Date: Purpose: to add name of sales person and also functionality to manage the list of sales persons an comparing their annual compensation Program Summary: This program will calculate and display the total annual compensation of a salesperson. Here in this program the salary of the salesman and its commission rate is fixe and program accepts sales amount. */ import java.util.ArrayList; import java.util.Scanner; import java.text.NumberFormat; class SalesPerson { private final double fixed_Salary = 35750.00; private final double commission_Rate = 12.0; private final double sales_Target = 125250.00; private String name; private double annual_Sales; //default constructor public SalesPerson() { name = â€Å"Unknown†; annual_Sales = 0.0; } //parameterized constructor public SalesPerson(String nm,double aSale) { name = nm; annual_Sales = aSale; } //getter method for the name public String getName(){ return name; } //setter method to set name public void setName(String nm){ name = nm; } //getter method for the annual sales public double getAnnualSales(){ return annual_Sales; } //method to set the value of annual sale public void setAnnualSales(double aSale) { annual_Sales = aSale; } //method to calcualte and get commission public double commission (){ double commission = 0; if(annual_Sales>= (sales_Target*(80/100))) {//80% of the sales target if(annual_Sales>= sales_Target){ commission = sales_Target * (commission_Rate/100.0) + (annual_Sales- sales_Target)* (75.0/100.0); } else commission = annual_Sales * (commission_Rate/100.0); } return commission ; } //method to calcualte and get annual compensation public double annualCompensation (){ return fixed_Salary + commission(); } } public class Main { public static void main(String args[]){ //array list to have a collection of sales persons ArrayList sales_Persons = new ArrayList(); //create an object of Scanner calss to get the keyboard input Scanner input = new Scanner(System.in); do{ //prompt the user to enter name System.out.print(â€Å"Enter salesperson name (stop to EXIT) : â€Å"); String name = input.nextLine().trim(); if(name.equalsIgnoreCase(â€Å"stop†)) break; //creating an object of SalesPerson class SalesPerson sales_Person = new SalesPerson(); //set name of sales person sales_Person.setName(name); //prompt the user to enter the annual sales System.out.print(â€Å"Enter the annual sales : â€Å"); double sale = input.nextDouble(); //set the value of annual sale of sales person object sales_Person.setAnnualSales(sale); //add sales Person to array list sales_Persons.add(sales_Person); //read a blank line input.nextLine(); } while(true); //getting the 2 minimum annual compensation double min = -1; double secondMin = -1; if(sales_Persons.size()>=3){ //intilization double firstValue = sales_Persons.get(0).annualCompensation(); double secondValue = sales_Persons.get(1).annualCompensation(); //intechanging if in reverse oreder if (firstValue < secondValue) { min = firstValue; secondMin = secondValue; } else { min = secondValue; secondMin = firstValue; } double nextElement = -1; //compring the 2 to n values for (int i = 2; i < sales_Persons.size(); i++) { nextElement = sales_Persons.get(i).annualCompensation(); if (nextElement < min) { secondMin = min; min = nextElement; } else if (nextElement < secondMin) { secondMin = nextElement; } } } //displaying result NumberFormat nf = NumberFormat.getCurrencyInstance(); //All salespersons and their total annual compensation System.out.println(â€Å" †); System.out.printf(String.format(â€Å"%-20s%-20s†,†Name†, â€Å"Total annual compensation† )); System.out.println(); for(SalesPerson salesperson :sales_Persons){ System.out.printf(String.format(â€Å"%-20s%20s†,salesperson.getName(), nf.format(salesperson.annualCompensation()))); System.out.println(); } //dipslyaing the all sales persons additional amount of sales other the 2 memebrs who have minimum sales System.out.println(â€Å" †); for(int i=0; i< sales_Persons.size();i++){ double compensation = sales_Persons.get(i).annualCompensation(); if(compensation == min || compensation == secondMin) continue; System.out.println(â€Å"Name of Salesperson : â€Å"+sales_Persons.get(i).getName()); System.out.println(â€Å"The total annual compensation : â€Å"+nf.format(compensation)); System.out.println(â€Å"Total Sales Total Compensation†); double sale = sales_Persons.get(i).getAnnualSales(); for(double j =sale; j

Thursday, October 10, 2019

The Phenomenon of Human Trafficking

Table of contents 1. Introduction2 2. Definition of Key terms;2 2. 1. Human trafficking2 2. 2. Victim2 3. Victims of human trafficking3 4. Trends in human trafficking3 5. Causes of human trafficking4 5. 1. Poverty and desire for better life of exploited victims4 5. 2. Corruption and the abuse of influence4 5. 3. High profits and Low risk. 5 6. Recruitment strategies for human trafficking victims6 6. 1. Being born in to slavery6 6. 2. Use of force6 6. 3. Fraud6 6. 4. Coercion7 7. SEVERE FORMS OF TRAFFICKING IN PERSONS8 7. 1. Sex Trafficking8 8. Prevention of trafficking in humans8 . 1. Economic alternatives to prevent and deter trafficking8 8. 2. Public awareness and information9 8. 3. Protection and assistance for victims of trafficking9 9. Case study10 9 held for human trafficking – News 2410 10. Conclusion11 11. References12 Introduction The phenomenon of human trafficking or modern-day slavery has received increased media coverage globally; this is because millions of peopl e around the world suffer in silence under slave-like conditions of forced labour and commercial sexual exploitation from which they cannot free themselves. Human trafficking not only continues but appears to be on the rise worldwide primarily because most countries are involved in human trafficking to some extent, either as a place of recruitment, transit or the destination for trafficked individuals. This essay addresses the phenomenon of human trafficking as a form of victimisation and will define key concepts, identify and discuss victims of human trafficking and its trends. The discussion will further look in to the causes of vulnerability to trafficking, reasons for trafficking, strategies for recruiting trafficked people and the responses or courses of action to reduce human trafficking. A case study of recent trafficking issue will also be provided to show the reality of the problem and lastly the conclusion will sum up the discussion in a nutshell. Definition of Key terms; 1 Human trafficking Hodge and Lietz (2007; 163) explain that human trafficking involves the recruitment, transportation, transfer, harbouring or receipt of people, by the use of force, threat or other forms of coercion, abduction, fraud, and deception. It also includes the abuse of power and position by giving or receiving payments to achieve the consent of a person having control over another person, for the purpose of exploitation. Exploitation as explained by Hodge and Lietz (2007; 163) include forced prostitution and other forms of sexual exploitation, forced labour and services, servitude and the involuntary removal of organs. The United Nations Office on Drugs and Crime explain human trafficking as an act of recruiting, transporting, transferring, harbouring or receiving a person through a use of force, coercion or other means, for the purpose of exploiting them (UNODC, 2010). 2 Victim According to Howley and Dorris (2007; 229) victims are persons who have suffered harm, including physical or mental injury, emotional suffering including grief, economic loss and/or substantial impairment of rights accorded them by the state law through acts or omissions that are in violation of the criminal law operating in the territory. Victims of human trafficking Winterdyk and Reichel (2010; 5) states that human traffickers tend to victimize the most vulnerable of the global community consisting mostly young women and children and to a certain extent men. According to Winterdyk and Reichel (2010; 5) victims live in desperate, brutal circumstances behind a wall of secrecy and deception and the victims are often sick due to physical and psychological trauma they experience especially when they try to escape. Bales (2004; 56) further elaborates that traffickers instil trauma through a sense of terror and helplessness and by destroying the victims sense of self. Perpetrators also threaten death and serious harm against victims and their families, they also isolate their victims from sources of information and emotional support where they can get help (Bales, 2004; 56). An explanation by Fichtelberg (2008; 151) clearly states that victims of human trafficking are forced into sex trade industry which includes prostitution, pornography, sex tourism, strip dancing, live-sex shows, servile marriages or illegal labour markets such as sweatshops, farm work, domestic work , industrial work, begging, child soldiers, participating in crime or other activities they did not agree to engage in. Fichtelberg (2008; 152) further elaborates that victims are often â€Å"invisible† as they are often isolated from their family members and other members of their ethnic and religious community and therefore unable to speak the local language and unfamiliar with the culture. Victims may not self-identify themselves as victims of human trafficking due to lack of knowledge about the criminal justice system of the host country, fear of retribution against themselves and their families by traffickers, fear of accusation within their families, post traumatic stress disorder and stigma (Fichtelberg, 2008; 152). Trends in human trafficking According to Hodge & Lietz (2007; 163) determining the number of individuals who are trafficked is difficult due to high levels of secrecy and corruption within the human trafficking industry. Furthermore, victims are often hesitant to share their experiences due to fear of reprisals and as a result estimates of the prevalence of trafficking have varied considerably. Hodge & Lietz (2007;163) further states that approximately 600,000 to 800,000 people are trafficked across international borders annually, of which 70- 80% are female and approximately 50% are children. Among all females, approximately 70% are trafficked for prostitution and other forms of sexual exploitation, while the remaining are males trafficked for forced labour and performing criminal activities for their traffickers (Hodge & Lietz, 2007;163). Causes of human trafficking 1 Poverty and desire for better life of exploited victims According to Logan, Walker and Hunt (2009; 10) poverty is one most important factor in becoming a target of human trafficking because the poverty that the trafficked immigrants experience in their countries of origin is too extreme that it threatens even basic survival, thus making them vulnerable to any promises of better livelihood. Logan, Walker and Hunt (2009; 10) further elaborates that vulnerability to trafficking is on the rise due to a mix of poverty and high levels of population density, infant mortality rate, children younger than 14, civil unrest and violence, cultural acceptance of trafficking and lower levels of food security in those poverty stricken nations. In addition, Logan, Walker and Hunt (2009; 10) explain that impoverished people often want to go to stable and wealthy countries like America for a better life then criminals use their dreams against them and put them into trafficking as they are desperate and willing to accept any opportunity to better their livelihood and help their family members who are also struggling. Corruption and the abuse of influence Surtees (2008;49) explains that corruption of government authorities including politicians, state functionaries, law enforcement officers and immigration officials play a critical role in the operation of human trafficking networks and allows trafficking to continue from, through, and within their countries. Surtees (2008;49) further elaborates that these corrupt officials supports trafficking in many ways; through document falsification, illegal border crossings, overlooking prostitution venues in identifying victims, compromising criminal investigations, lack of investigation and judges dismissing cases or imposing minimal sanctions against international human trafficking networks. Lehti and Aromaa (2007; 125) also states that some individuals within international organized crime syndicates are current or former officials and use their position and/or experience to support criminal ventures. Former members of security agencies, for example, are able to combine their security experience (which includes intimidation and torture) with high-level connections to political, professional and law enforcement agencies, allowing them to function with impunity by hiring legal and business experts as intermediaries or brokers through which they recruit people for trafficking (Lehti and Aromaa, 2007; 125). 3 High profits and Low risk. According to the U. S Department of State (2004) human trafficking is the third most profitable form of international organised crime after narcotics and arms sales. According to this report the sale of trafficked people is generating massive profits for traffickers because unlike narcotics and arms, which are sold once, people who are sold into prostitution and involuntary servitude earn profits continually, year after year, for their exploiters while victims get minimal wages or basically nothing due to debt bondage imposed to them by traffickers (U. S Department of State, 2004). In addition to high profits, Hodge & Lietz (2007; 166) explains that the risks associated with trafficking are quite minimal because prostitution is legal in many places like Germany and Netherlands therefore complicating efforts to incarcerate traffickers. Hodge & Lietz (2007; 166) further elaborates that even in countries where prostitution is clearly illegal, traffickers often go unpunished for their crimes because cases regularly fall apart due to lack of protection for witnesses, family involvement in the trafficking activity and fear of deportation. Furthermore, enforcement efforts usually focus on the women instead of the exploiters, consequently people often attempt to remain unnoticed for fear of being charged, particularly if they are trafficked internationally (Hodge & Lietz, 2007; 166). Recruitment strategies for human trafficking victims A study by Skinner (2008; 131) states that people are trafficked in three main ways which include being born into slavery, use of force i. e. eing kidnapped, sold, or physically forced and by fraud or being tricked. 1 Being born in to slavery According to Skinner (2008; 131) in some countries families may be permanent servants because they were born into it. This is mainly because their families may have been slaves or in debt bondage literally for generations and when they bear children they are automatically under the same circumstances and may be sold to whoever is involved in the human trafficking business. 2 Use of force Skinner (2008; 131) contends that in some countries children are literally sold into slavery out of their will by parents or other caregivers mainly because of the economic situations of the families. Skinner (2008; 131) further states that victims are then raped, beaten, intimidated, tortured and confined so as to control them after they have being sold. Forceful violence as explained by Skinner (2008; 131) is used especially during the early stages of victimisation, known as the ‘seasoning process’, which is used to break the victim’s resistance so as to make them easier to control. In some cases, Skinner (2008; 131) states that people who are often approached to work in the sex industry often refuse and traffickers may kidnap or abduct such individuals and smuggle them to the country of destination to work as slaves or sold to other traffickers. 3 Fraud Hyland (2001; 31) states that traffickers use seemingly legitimate organizations to recruit young women and children in to trafficking situations. This often involves the use of false advertisements promising desperate people a better life in another, usually richer, nation that offers jobs to work as waitresses, maids, landscapers and dancers. In other cases, Hyland (2001; 31) explain that women who work in nightclubs may be approached and promised much higher earnings for doing similar work in wealthier nations only to find that they will be forced in to prostitution and sex related exploitations. According to Hyland (2001; 31) some victims may be made to sign false contracts to make the whole experience seem even more legitimate, and sometimes psychologically binding them even more to the trafficker to erase any suspicions from the victim. Hyland (2001; 32) further states that in some instances, victims are approached by individuals known to their families in their home countries who invite them to come along with them for a job offer but only misleading them into trafficking situations where are often subjected to debt-bondage, usually in the context of paying off transportation fees into the destination countries. 4 Coercion According to the Trafficking Victims Protection Act (2000), traffickers often make representations to their victims that physical harm may occur to them or others should the victim escape or attempt to escape. Such representations can have coercive effects on victims as direct threats to inflict such harm may cause victims to live in fear and become hopeless and hence easy to control. Coercion as explained by the Trafficking Victims Protection Act (2000) means threats of serious harm to or physical restraint of any person, it also includes any scheme, plan, or pattern intended to make a person to believe that failure to perform an act would result in serious harm to or physical restraint against any person; or the abuse or threatened abuse of the legal process SEVERE FORMS OF TRAFFICKING IN PERSONS According to the Trafficking Victims Protection Act (2000), severe forms of trafficking in persons’’ involves sex trafficking in which a commercial sex work is imposed on someone by the use of force, fraud, or coercion. It also includes recruitment, harbouring, transportation, provision, or obtaining of a person for labour or services, through the use of force, fraud, or coercion for the purpose of subjection to involuntary servitude, peonage, debt bondage, or slavery. Sex Trafficking According to Hodge & Lietz (2007; 165) sex trafficking means the recruitment, harbouring, transportation, provision, or obtaining of a person for the purpose of a commercial sex. Hodge & Lietz (2007; 165) further states that sex trafficking is no longer primarily localized in one geographic region but has increasingly become a transnational and a global problem. For example, a young girl may be recruited in Botswana, sold and â€Å"trained† in Italy, with the United States being the ultimate destination. Moreover, Hodge & Lietz (2007; 165) states that traffickers primarily target young women and girls, who are disproportionately affected by poverty, the lack of access to education, chronic unemployment, discrimination, and the lack of economic opportunities in countries of origin. According to Hodge & Lietz (2007; 165) most trafficking victims originate in Asia, Africa, Eastern Europe and to a lesser extent, Latin America while destination countries tend to be wealthy nations like America in which large sex industries like pornography exist or where prostitution is legalized or broadly tolerated as in the case of Germany and Netherlands. Prevention of trafficking in humans 1 Economic alternatives to prevent and deter trafficking According to Beyrer (2001; 547) states that initiatives to enhance economic opportunities for potential victims of trafficking can be used as a method to deter trafficking since the traffickers often target people who live in poverty in the promise for better livelihood. Such initiatives may include microcredit lending programs, training in business development, skills training, and job counselling. Other alternatives as stated by Beyrer (2001; 547) are the provision of grants to nongovernmental organizations that can help to accelerate and advance the political, economic, social, and educational roles and capacities of women in their countries. Furthermore, countries should initiate programs that promote women’s participation in economic decision which can help to empower women economically as they appear to be the primary target and most vulnerable to human trafficking (Beyrer, 2001; 547). 2 Public awareness and information Beyrer (2001; 548) states that countries should establish and carry out programs to increase public awareness on human trafficking particularly among potential victims about the dangers of trafficking and the protections that are available for them. Beyrer (2001; 548) further elaborates that governments should initiate programs to keep children, especially girls, in schools to reduce vulnerability at an early age and to educate persons who have been victims of trafficking. Moreover the development of educational curricula covering issues of human trafficking can also help to create awareness at an early stage Beyrer (2001; 548). Protection and assistance for victims of trafficking According to Beyrer (2001; 549) victim protection begins when a victim is rescued and reunited with their family and continues when they are assisted to rebuild their lives. It may include keeping victims safe from threat, violence and abuse, counselling, help with income generation, education and vocationa l training. Beyrer (2001; 549) further states that prosecution of traffickers ensures the victim receives full justice, including meaningful prosecution of the perpetrator. It requires vigorous law enforcement, fighting corruption, identifying and monitoring trafficking routes, and cross-border coordination. Moreover, Beyrer (2001; 549) further states that protection and assistance of victims can be achieved through policies or framework including government and NGO guiding principles, plans and strategies, which support all of the anti-trafficking initiatives that assist victims. Case study 9 held for human trafficking – News 24 Ermelo – Nine Nigerian men arrested for alleged human trafficking have appeared in the Ermelo Magistrate's Court, Mpumalanga police said on Tuesday. Captain Leonard Hlathi said the men appeared in court on Friday, and their case was postponed to April 16 for a bail application. He said it was alleged that the men forcefully took a number of women from around the country to Ermelo, where they were forced into prostitution. They were given R30 a day for food, and from time to time they were forced to take drugs to ensure they remained addicts. The 12 women, between the ages of 18 and 30, told the police the men took all their earnings and they were not paid for the jobs that they were doing. Home affairs officials confirmed that the suspects applied for asylum in South Africa, and according to the information in their application forms, they do not qualify for asylum. † He said they were being charged under the Sexual Offences Act and for kidnapping. â€Å"These men can consider themselves a bit lucky as human trafficking laws are in the process of being legislated. These acts of the suspects were exactly equivalent to human trafficking. † Source; news24. com The above case study reflects on the reality of the problem of human trafficking in South Africa as it the case in all countries around the world. According to the case study it is evident that traffickers target mostly young women who are more vulnerable and defenceless. As already discussed trafficking is a sustained by huge profits due to exploitation of the victims, the case study further support that statement as it states that the victims were given only a little amount enough to buy food and the profit they make from forced prostitution goes to the perpetrators. Conclusion In conclusion, women, children and people in general are not property to be bought and sold, used and discarded. Rather, they are human beings with certain fundamental human rights that prevent them from being sold into slavery. People should therefore know their rights and exercise them and countries should unite and cooperate in the war against human trafficking because it is a very complicated problem that cannot be solved by one country as it is a multinational crime involving highly organised crime syndicates. Citizens should also assist in the war against human trafficking by avoiding flashy job opportunities which often offer unrealistic rewards. At last people should also report suspicious cases of trafficking as this victims often work in public places including restaurants, hotels and massage parlours. References Bales, K. , (2004). Disposable people: New slavery in the global economy. Berkeley, CA: University of California Press Beyrer, C. (2001). Shan women and girls and the sex industry in Southeast Asia: Political causes and human rights implications. Journal of Social Science and Medicine. Vol. 53. (6). Pp. 543–550. Fichtelberg, A. (2008). Crime without borders: An introduction to international criminal justice. Upper Saddle River, NJ: Pearson Hodge . R. & Lietz . C. A (2007). The International Sexual Trafficking of Women and Children . Journal of Women and Social Work. Vol. 22 (2). Pp. 163-174. Howley, S. , & Dorris, C. (2007). Legal rights for crime victims in the criminal justice system. (3rd ed. , Thousand Oaks, CA: Sage. Hyland, K. (2001). Protecting human victims of trafficking: An American framework. Berkeley Women’s Law Journal. Vol. 16 (3). Pp. 29-71. Lehti, M. , & Aromaa, K. (2007). Trafficking in humans for sexual exploitation in Europe. International Journal of Comparative and Applied Criminal Justice. vol. 31 (7). Pp. 123–45. Logan. T. K. , Walker . R. & Hunt . G. (2009). Understanding Human Trafficking in the United States. Trauma Violence Abuse. vol. 10. (1). Pp. 3-30 Skinner, E. B. (2008). A crime so monstrous: Face-to-face with modern-day slavery. New York: Free Press Trafficking Victims Protection Act (2000), Human trafficking. (URL accessed 21 march 2010); http://www. state. gov/g/tip/rls/tiprpt/2007/86205. html United Nations Office on Drugs and Crime (2010). Human trafficking. URL (accessed 20 March 2010): http://www. unodc. org/unodc/en/human-trafficking/what-is-human-trafficking. html