Monday, December 23, 2019

Cause and Effect of Stress in Young Children - 1162 Words

Determining Causes and Effects- Draft Version Jacqueline C. Winfield Professor Leverett Butts English Composition- ENG 115 Friday, November 22, 2012 Young children are not always the first people we think of when it comes to the stress factor. We tend to believe that they are living in their best years, however with changes in economic situations such as parents not remaining married, being exposed to violence, and even feeling the need to belong a child can become overwhelmed. According to Wikipedia contributors, stress in young children can be beneficial to proper growth and development if it is not persistent (2013). Stress in young children should be monitored by caregivers, teachers, and others to prevent youth from†¦show more content†¦This increases the needs for medical doctors and researchers to aid in children’s well-being. Stress can make one over-aggressive causing children to become more violent. This possibly will increase the rates in bullying in schools at present to domestic abuse in the future. Post-Traumatic Stress Disorder (PTSD) is define as a mental condition that can affect a person who has had a very shocking or difficult experience and that is usually characterized by depression, anxiety, etc.( Merriam- Webster, 2013). When PTSD is not diagnosed for a long period it harms the brain causing impaired brain circuit formation resulting in small brain size in younger children (Wikipedia, 2013). Another effect of stress in youth is obesity. It has been an ongoing problem in past years. With the increasing demand of fast food chains it has become a quick fix for people to over indulge in horrible eating habits. With fast food restaurants’ remanding open late night and the famous value menu we are losing our youth to chubbiness. Between the factors of PTSD and obesity a child may become withdrawn. When this happens it can increase suicide rates. Children who are withdrawn may struggle in school, have frequent mood changes, feel neglect, and generally inadequate to their peers. As shown in the graph below, children make up 50% of people affected byShow MoreRelated Effects Of Being A Foster Care On Children And Adolescents1219 Words   |  5 PagesMackenzie Murphy English Composition 101 Dr.Kom Kunyosing Cause and Effect Essay November 16, 2015 Effects of being in foster care on children and adolescents Being in foster care can either have a positive effect on someone or it could have a very negative effect on someone. In my case, it not only had a positive effect but it also had some downfalls. Most often times children/adolescents are placed in foster care because it is a safer environment for themRead MoreThe Effects of Poverty on Children Essay1217 Words   |  5 Pages When analyzing children growing up in poverty a lot of factors come into play such as their physical, psychological and emotional development. To grow up in poverty can have long term effect on a child. What should be emphasized in analyzing the effects of poverty on children is how it has caused many children around the world to suffer from physical disorders, malnutrition, and even diminishes their capacities to function in society. Poverty has played a major role in the functioning of familiesRead MoreFailing Expectations On Future Generations960 Words   |  4 Pagesnegative decision because children develop stress and unstable futures; nevertheless we can solve the issues of divorce by visiting marriage counselors, communicating with one another, and partaking in trail marriages Growing up with divorced parents can have a negative effect on children. â€Å"It diminishes children’s future competence in all five of society’s major or tasks institutions: family, school, religion, marketplace and government† (Fagon and Churhill 1). Children growing up with divorcedRead MoreThe Effects Of Divorce On Children And Children1548 Words   |  7 Pages The Effects of Divorce on Children Mikele J. King Medaille College Abstract The current divorce rate suggests that one out of every two marriages will end in divorce. This paper is a critical literature review that explores the hypothesis that divorce has detrimental effects on children. Six different risks have been suggested to cause the differences in an increased need for help between divorced family children and two-parent family children: parental loss, economic loss, more lifeRead MoreDivorce : Why It Affects Children More Than Adults872 Words   |  4 PagesDivorce: Why It Affects Children More Than Adults In today’s world many things affect children way more than it will adults. Children, while younger, are more vulnerable than adults are, and they have more potential to become â€Å"corrupted†. Divorce is one of the many occurrences that definitely affects children way more than adults. Divorce affects the adults with money issues, loss of a partner, and the lifestyle of the adult and with over â€Å"fifty percent of marriages† (Corcoran 1997) ending in divorceRead MoreThe Effects Of Stress On Infants And Young Children1711 Words   |  7 Pagesour environment shapes us is through stress, either experienced directly or indirectly. Stress is a complex physiobiological response that can have enduring biological, emotional, and behavioral consequences (Lupien et al, 2009). A fetus is sensitive to hormonal and other physiological indicators of stress within the womb and exposure to stress carries on after conception and continues to affect emotional and cognitive functioning of infants and young children. Similar to many other psychologicalRead MoreEffects of Non-Normative Life Events on Preschool and Middle Aged Children; Cognitive and Socioemotional1627 Words   |  7 PagesEffects of Non-Normative Life Events on Preschool and Middle Aged Children; Cognitive and Socioemotional. This paper is intended to answer the question of what the effects are of non -normative life events on preschoolers and middle childhood aged children; cognitively and socioemotionally. This is very dear to me as I have two young children as well as older step children that have dealt with medical conditions with their father and I, as well as divorce with my older step children. ManyRead MoreThe Effect on Smoking Cigarette Banned in Public Essays1282 Words   |  6 Pagesrisk of dangerous drugs that cause the disease to the body of smokers and people who live nearby. Currently, there are many more smokers are aware of the adverse effects of smoking. But the number of smokers is still increasing. Especially worrisome and continue to cause adverse effects in both polite society and the environment. Smoking is much more to keep the population down to health problems and premature death. Of death, with smoking rates higher than other causes of death combined, includingRead MoreDivorce : The Effect On Children1084 Words   |  5 PagesHalterman Professor Tausch CTI 102 D Written Communication 4 October 2014 Divorce: the Effect on Children In today’s society, divorce has become a normal occurrence. Married couples today are getting divorces due to many different reasons; conflicts in the marriage, a loss of romantic feelings, perhaps a spouse is having an affair, or other types of problems. Most divorces have children that are really young and due to their age, they do not have any idea how to deal with this type of situationRead MoreAll around the world domestic violence is a threat to all different types of families, including1000 Words   |  4 Pagestypes of families, including children and adults. â€Å"It is estimated that approximately 3 million incidents of domestic violence are reported each year in the United States† (Feinstein). The most common victims of domestic violence are women, and children. Organizations that offers protection for victims includes: National Network to End Domestic Violence, Survivor Network, and National Council on Child Abuse and Family Violence. Domestic violence can have negative effects on people causing; emotional

Sunday, December 15, 2019

A Fine Balance Characters Free Essays

4 Characters: Dina, Ishvar, Om, Maneck. Ishvar is Om’s nephew. Dina is widowed. We will write a custom essay sample on A Fine Balance: Characters or any similar topic only for you Order Now Maneck college student. Dina Shroff, who was raised by her strict brother after her father died she meets Rustom Dalal. The couple fall in love and marry, but on their third wedding anniversary Rustom is killed in a bicycle accident, leaving Dina alone. Rustom’s aunt teaches Dina to sew her eyesight begins to fail, so she is forced to find another way to make money Her friend Zenobia introduces her to Mrs Gupta, who offers her some tailoring piece work She hires Ishvar Darji and his nephew Omprakash, originally from a small village, to do the work. Ishvar’s father wanted a better life for his sons and so sent them to a neighbouring town to learn to be tailors They became the apprentices of Muslim tailor Ashraf Ishvar was seventeen, racial hatred of Muslims reached boiling point and any homes or shops belonging to Muslims were burnt to the ground Ishvar and his brother Narayan saved Ashraf’s shop by claiming it belonged to them, leaving Ashraf forever in their debt. Narayan returned to the village and set up a successful tailor business for lower caste people He married and had a son. His business was very successful and it gave him enough money to build a proper house All was going well until Narayan discovered that the elections were being fixed by Thakur Dharamsi, a powerful land owner Narayan confronted Thakur, who had him tortured Not satisfied with just killing Narayan, Thakur decided to punish his whole family. Narayan’s wife, daughters and parents were tied up and burnt alive in their home. Omprakesh and Ishvar were the only ones to escape they continued working in their tailor shop, but were forced out of business when a ready-made clothing shop opened in the town. Maneck. He grew up in a mountain village, where his father was the proud owner of the local village store and inventor of a popular drink, Kohlah Cola Maneck was sent to college and became good friends with the student president, Avinash Avinash led an uprising against the conditions and became involved in politics When the Emergency was declared, Avinash had to go into hiding, leaving Maneck alone His mother then arranged for him to move in with Dina Dalal The four are quite happy for almost a year, but then the Emergency starts to impact their lives. The tailor’s shack is demolished in a government beautification program, forcing them to live on the streets After two months they bribe their way out and persuade Dina to let them move in with her. Ishvar decides it is time for Om to find a wife, so they return to Ashraf’s town There they bump into Thakur, who recognises the pair Ashraf is beaten to death and Ishvar and Om are given compulsory vasectomies Thakur visits them as they are recovering from the operation and arranges on a medical pretext to have Om’s testicles removed. Ishvar’s legs become infected and have to be amputated. Maneck finishes his college course and returns home His father’s business is failing due to cheap imports of commercial soda, and Maneck decides to leave, taking a job in the Middle East. Dina finds herself all alone. A Beggarmaster who had been protecting her from her landlord’s bailiffs is murdered, leaving her vulnerable; she reluctantly returns to live with her brother. Eight years later, Maneck returns home for his father’s funeral. Maneck reads some old newspapers and discovers that Avinash was found dead by the side of a railway track and Avinash’s three teenage sisters hanged themselves because their parents could not afford their wedding dowries. Maneck decides to visit Dina She explains that Ishvar lost his legs and that the tailors are now beggars Maneck leaves Dina’s house, pretending not to recognize the tailors in the street, and heads for the railway station where he steps in front of a train. How to cite A Fine Balance: Characters, Papers

Saturday, December 7, 2019

Computer Security for Attack Experiences - myassignmenthelp.com

Question: Discuss about theComputer Security and other Issues for Attack Experiences. Answer: Attack Experiences A friend described to me an instance when the bank he was working for was hit by a cyber attack two years ago. The criminals posed as clients, who wanted to open a bank account. They persuaded the accounts opening officer to plug in a disk drive in to his computer so that he could download the clients documents and images. The flash disk was infected with a virus which quickly spread to the other computers in the organization, attempting to hijack core banking credentials and other information. The attack did not inflict any type of damage since the IT department was fast in arresting its spread. At the same time, the bank was hesitant to divulge any details because they feared it would affect the trust customers had in them. The attack was mainly successful because the customer service agent was not following the company policy regarding the use of disk drives, regardless of whether they were personal or from third parties. The company could have blocked disk drive access from the computers to further ensure that people who failed to follow policy did not hurt the companys interests. The computers which were affected by the attack were quarantined and taken off the network, as IT auditors ascertained the extent of the spread. Thereafter, an antivirus capable of neutralizing the threat was procured and applied on the infected computers, as well as the network. The security system used by the company was also reviewed. Had the employee in question and other received thorough training on the danger that such devices posed, it is likely that the attack could have been prevented. The attack could also have been prevented through the use of software that blocks disk drive access to the computer, requiring the customers to bring their documents in hard copy or have photos taken at the bank. Ransomware Attacks The Wannacry, Petya and NotPetya ransomware attacks have recently hit the global computer networks, affecting systems from Ukraine to the United States and Australia. The attacks were able to get into the computer systems of government bodies and companies, lock them and demand payment to reopen them or decrypt data they held. The payment demand was in terms of bitcoins, to reduce the chances of being tracked down. The ransomware was highly successful, at least in terms of how fast and wide they spread. It was aided in this by the fact that it was highly sophisticated, the tools used to make it being stolen from the NSA. They used the vulnerabilities found in Microsoft Windows to bypass security systems, and used emails as one of the tools of spreading, making its pace fast and not easily detectable. According to information released by Kaspersky after the third attack, NotPetya, all companies were advised to update their security systems and operating systems. This was based on the belief that vulnerabilities which had since been fixed (before the attack) were used to hijack computers. Users were also warned not to open any emails they found suspicious while reviewing their security setup frequently. The perpetrators of the attacks demanded a payment in bitcoins be sent to them o that they could then give the victim a code to decrypt the files in their computers. Kaspersky and other computer systems security companies soon issued decryption tools to get rid of the ransomware. The decryption tool would roll back the effects of the ransomware, though this is an extensive process owing to the complex nature of the attack itself. Zero-Day Attacks The ransom ware described above Wannacry, Petya and others can also qualify as being zero-day attacks. The attacks were able to find vulnerabilities in Windows operating systems, which had not been patched before. The vulnerabilities were discovered by research going into years, and initially performed by the NSA. The NSA later lost these tools and information on the vulnerabilities, which were then used to fashion highly complex hacking tools in the form of the afore-mentioned ransomware. Other software has also come under attack. For instance, adobe flash player was the victim of attacks which had discovered a weakness in its code, which was then exploited before a patch could be developed by the company. The malware was discovered by actions of hackers who must have spent a considerable amount of time examining the code looking for possible loopholes to exploit. In early 2017, FireEye discovered an attack used to attack computer systems using vulnerabilities in Microsoft office. This attack was addressed in conjunction with Microsoft to coordinate a response. In 2015, FireEye also discovered an attack directed at Windows to steal credentials, the malware would hijack the system and encrypt data with a financial objective. To defend against zero-day attacks, computer services companies such as Adobe and Microsoft frequently release patches so as to address any vulnerability. Upon release, it is the duty of the user or company to ensure the patches have been run. Organizations can also do frequent checks on their computer systems with the aim of discovering any vulnerabilities, or attacks being perpetrated with the use of these vulnerabilities. Antivirus comparison Antivirus Provider Features Mcfee Mcfee (free) Norton bit defender Firewall Yes Yes Yes Yes antispam Yes Yes Yes Yes parental control NO Yes Yes Yes Backup NO NO Yes no Currently, I use a free antivirus, AVG it has a few features which I admire, and work for me. The antivirus I use is light on the computer. It does not affect the normal operations of the computer, though it extends the switch off time and reboots too. It has capabilities to protect against many forms of malware, including phishing and other malicious attacks, while also having an easy-to-reach support center. It does not have a parental control or backup mechanism, which I think is a disadvantage. I have to run back-up manually, as opposed to Norton which enables this remotely. I would recommend Norton to users. It costs around 50 dollars for an annual subscription. It has several features which I think are great to have on a computer, while the price is not prohibitive. The free Mcfee also comes with several features, all for free. It is important to note that free antivirus has several limitations, especially when it comes to online protection. Again, Norton is best equipped to handle such threats. Blowfish Blowfish has held the reputation as one p0of the few whose code has never been cracked, since it was first launched in 1993. Blowfish has several strengths apart from this. Blowfish is designed to use a 448-bit key. The key can be cracked. However, it would take an impractical amount of resources, including time and equipment to break it. According to some estimates, millions of years would pass before the code is cracked. The only other avenue is trying lucky numbers, which is not an effective method of trying to break the code. By comparison, most browsers use keys which are either 40-bit or 128 bit. While the 128-bit key is considerably strong and hard to break, the 40bit key can be cracked through the use of a personal computer, and within hours. While other block ciphers are patented and sold, Blowfish is free, meaning that it is easier to access and use. This has helped enhance its spread among users around the world. Blowfish has its weaknesses. It is an old code, having been designed in the pre-2000 era. It was not made for some of the modern threats that computer advances have brought about. The creator of the tool has since been able to create a replacement, Twofish. The cipher is more difficult to crack, especially in instances where previous versions of Blowfish, such as the 40 and 64-bit version were susceptible to attack. The cipher is used currently to secure browsers among other security applications. Key Management Life Cycle Key Management Life Cycle diagram Destruction Archival Expiration Rotation Monitoring Deployment Backup CREATION The Key Management Life Cycle includes the steps outlined in the diagram and better annotated below. A key should be valid depending on its length. The longer it is, the longer the lifespan. Both the organization and the user have a shared responsibility to secure the keys. Creation - A key is generated by the key manager or a trusted third party. The attributes of the key are then stored in a special database, which is also encrypted. A keys activation happens automatically or manually, or it can be timed to activate at a point in time. Backup This involves storing a copy of the key in case of future loss or other instances. The process also includes encryption and storage. Deployment Deployment refers to the time when the key is being applied to secure the device in question. Prior to deployment, the key is additionally tested to ensure operations are compatible with other system properties, and avoid data loss or theft. Monitoring Monitoring the key is necessary to assess its success for the role it is supposed to perform. Rotation During rotation, the key encrypts all the data it should, this process is intensive and very important. Expiration Key rotation completion may signal the start of the end for use of the key. This also depends on the life cycle of encrypted information. Highly sensitive data also force keys to be in operation for a shorter time. Archival Archival of the key happens after it has been expired. This is done to for record keeping and for future instances when the encrypted information may be needed Removal form service the life of a key ends when it is destroyed, deleted or terminated. Network Firewall Comparison Fortinet Cisco FireEye Rule-based or application-aware Application-aware Application-aware Application-aware stateless or stateful filtering stateless stateless stateful Content filtering yes yes no IDS/IPS IPS IDS IDS Costs 1195 1500 9600 In view of the information outlined below, Cisco may be the best buy. It has a recognized name in the market and offers competent support. While FireEye also does the same, its price range is too high; though it could also be attributed to the value it brings the user, in terms of enhanced security, ease of use and ability to understand t more swiftly than the other two options. Case Project 8-5: Cloud Computing Benefits Cloud computing benefits Cloud computing is becoming more common in organizations. It allows for efficiency, while saving costs, especially since organizations no longer need to have physical servers to store and process information Vendors features and costs Vendor IaaS PaaS SaaS Storage Amazon EC2 (Elastic Cloud Compute) Amazon Web Services* Amazon Web Services* S3 (Simple Storage Service) Google n/a Google App Engine (Python, Java, Go) Google Aps Google Cloud Storage HP Enterprise Services Cloud Compute Cloud Application Delivery HP Software as a Service Enterprise Services Cloud Compute IBM SmartCloud Enterprise SmartCloud Application Services SaaS products SmartCloud Enterprise object storage Cloud computing and storage of learning material Cloud computing and storage can be applied in the storage and processing of academic material such as lectures and notes. The information would be quickly accessed by both lecturers and the students through protected accounts to the system. Cloud computing is feasible in this case because it may not be possible to store the information locally and have students access it through an intranet or specific computers. It is therefore important for the school to enhance efficiency by adopting cloud computing.

Saturday, November 30, 2019

Winkel vs. Family Health Care free essay sample

End Chapter Questions Chapter 9 9. 4 – Business Ethics: Winkel vs. Family Health Care FHC entered a written employee contract to provide certain benefits to Winkel. During the period of the contractual agreement, both parties entered into a modified oral agreement of the written contract. The agreement was that FHC would pay a higher salary and give a profit – share bonus. FHC gave Winkel the increase in salary a year later, but did not give in the profit-share. 1. Does Winkel receive the profit sharing bonus? Yes!Because in the State that this contract is performed under, Winkel is entitled to the profit share bonus. The original written contract states nothing about the raise or profit-share. Unfortunately because FHC went into an oral modification of the written contract which is permitted in the State, FHC must hold to its oral obligation. 2. Did Dr. Vranich of FHC act ethically in raising the defense that the contract was not in writing? No! Dr. We will write a custom essay sample on Winkel vs. Family Health Care or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Vranich did act ethically by owning up to one part of the oral modification in paying Winkel the higher salary.By executing one portion of the oral modification she maybe felt she did not have to execute the other portion. Dr. Vranich did not act ethically in raising this defense because an oral modification was made and partially executed which in the State that this occurred allows an executed oral agreement. Chapter 10 10. 7 – Implied Terms When considering the case of Cerdes vs. Wright, we have a situation where implied terms can be involved. What makes this case implied is because we are dealing with a modern contract that allows certain situations of the contract to be somewhat flexible.In this case, Cerdes is suing Wright for breach of contract. Cerdes did not finish the job in enough time that was suitable for Wright. Therefore Wright proceeded to hire other service to complete the job. Due to the fact that time was the purpose of the change in contractors, implied terms can be enforced. The length of time that should be assumed in this case if not stated in the contract should be based on the job and how long it should typically take for a construction of a house. You would be able to determine this by an average number of homes that size being built.If the Cerdes is discovered to have taken too much time, then he should not be awarded the full amount of the contract. Chapter 11 11. 4 Preexisting Duty In this case a contract has been constructed to Gough to provide certain things in the construction of a shoe store. After Gough completed the task, the next day the project fell apart. Even though the contractor told Gough to comeback and rebuild the project and also would pay, Gough may not be allowed to recover his money. The reason for this is because the original contract stated that they were responsible for all of the Labor!!!Therefore because it was a preexisting duty the initial contract is what is considered. Chapter 13 13. 1 – Unilateral mistake In the Case of Steele vs. Goettee, Goettee signed a contract handing over an estate that was estimated at a certain square footage. It was revealed that there was a Big mistake in the estimation of the property. This has caused the value of the offer to go up and now the Steele family is suing. Because this is a matter where there was a miscalculation in numbers and it also would be a steal if this contract had went through, the estate holder can rescind the contract.

Tuesday, November 26, 2019

Examine how Valvular heart valve disease has caused a major problem worldwide The WritePass Journal

Examine how Valvular heart valve disease has caused a major problem worldwide Introduction: Examine how Valvular heart valve disease has caused a major problem worldwide Introduction:Definition:Cellular sources:Biomaterials:Sterilization methods:Pre-clinical trials:Biomechanical culture:Commercialized products:Challenges:Conclusion:REFERENCES:Related Introduction: Valvular heart valve disease caused a major problem worldwide, result in increasing rate of morbidity and mortality (Rashid et al., 2004). Each of the four valves of heart can be affected by dysfunction (Mol et al., 2009). The common solution is the replacement of diseased valves either mechanical or bioprostheses. However, they are associated with shortcoming. Patients with mechanical valves are associated with long term of anticoagulation therapy which leads in higher risk of complications (Hjortnaes et al., 2009).   Bioprosthetic valves are less durable, enable to grow and repair and lead to calcification. Moreover, they are associated with reoperation especially with young patients. None of these valves are capable to restore native valves functions.   To overcome replacement shortage of heart valve, in the mid of 1980s in the USA, tissue engineering concept was proposed as alternative solution and has the capability to produce autologous heart valves (Matsumura, 2003). Definition: Tissue engineering of heart valves is manipulation of biological molecules and cells for the purpose of creating new structures capable of metabolic activity. (Vesely, 2005). Approaches: Worldwide, two main approaches have been used to achieve the desirable and clinical needs of heart valves; regeneration and repopulation (Vesely, 2005). In the first approach, decellularized xenograft (ECM proteins; collagen or fibrin) or allograft served as valve biological scaffold, mixed with autologous cells (myofibroblast and endothelial) has been seeded in vitro (Mendelson and Schoen, 2006), (Neuenschwander, 2004). However, limitations of this approach are; the construct lack the ability to grow, long term mechanical properties could alter physical properties of the native valves and a possibility of disease transmission (Neuenschwander, 2004). Moreover, inflammatory reaction due to ECM proteins used may deteriorate the scaffold result in biomechanical damage (Mendelson and Schoen, 2006). A biodegradable synthetic scaffold is the traditional approach in which cells of a specific phenotype are transplanted onto a bioresorbable scaffold in the shape of heart valves (Vesely, 2005).These biocompatible materials offer several advantages; Due to degradation products, they have neither side effects nor immunogenic reactions.   They are harmless and easy to handle. At the site of implantation, the remaining autologous living structures after complete biodegradation of the scaffolds have the ability to remodel, to adapt and to grow (Neuenschwander, 2004). The danger of the transmission of new infections and immunogenic reactions is minor as a result of utilization of autologous cells which lead to identical bioengineered tissues to host cells (Neuenschwander, 2004). Extracellular matrix material is formed by the cells after attachment and the polymer scaffold degrades (Fuchs et al., 2001). As shown in (Shinoka et al., 1995) mixed cell population of endothelial cells and from ovine arteries were isolated and separated from each other by fluorescence-activated cell sorting. An acetylated low-density lipoprotein marker was used to label endothelial cells. Myofibroblasts were seeded onto polyglycolic acid scaffolds which then seeded with endothelial cells. Before new tissues being regenerated, the degrading scaffold cannot tolerate pressures of the left ventricle (Vesely, 2005). Therefore, the constructs were implanted in sheep in place of the native right posterior leaflet of the pulmonary valve.   This approach results in trivial pulmonary regurgitation in autografts but moderate in allografts and doesn’t show stenosis (Shinoka et al., 1995). Repopulation is the less popular approach. Complex structure (collagen) is fabricated by manipulating biological molecules.   Prior to implanting, cleaning off the porcine aortic valve from cells is required, and leaving intact the connective tissue matrix. Then, the acellular matrix of the patients cells is repopulated, stimulated and thus result in creating a living tissue resemble to the native tissue (Vesely, 2005). Cellular sources: In tissue engineered valve applications, mesenchymal stem cells and differentiated tissue-specific cells (including circulating endothelial progenitor cells or smooth muscle cells) are the two main types used. They are harvested from either patients or experimental animals (Vesely, 2005). Stem cells along with the appropriate matrix are expected to provide a broader source of either autologous or allogenic cell lines once differentiated to the proper end point. Thus, they are beneficial for therapeutic use in the cardiovascular field (Vesely, 2005). Animals’ tissues such as canine and pigs are conducting in a research with variability in successful implantation.   Mesenchymal stem cells for TE of ECM scaffolds have been obtained from canine tissues. Also, due to presence of type 1 and IV collagen and fibronectin, ECM from pig’s tissues showed ability to grow to a single layer (Rashid et al., 2004). In most approaches, veins (saphenous vein) or peripheral arteries (radial artery, mammary artery) are efficient sources of cells. Mixed vascular cell populations give rise to myofibroblast and endothelial cells lines. myofibroplasts derived from arteries show decreased proliferation in monolayer culture and ECM formation when cultivated on three dimensional structure compared to cells obtained from veins (Neuenschwander, 2004). Another promising alternative source of heart valves can be derived from progenitor cells derived from peripheral blood and bone marrow cells (mesenchymal stem cells). MSC can be differentiated into different tissues, are easy to obtain, shows high proliferating capacity in vitro and faster growing than vascular derived cells. They produce well developed ECM after cultivation under bio-mimetic conditions (Neuenschwander, 2004). Biomaterials: There are two principal choices of scaffold; naturally or synthetic polymeric scaffolds. Exogenous ECM scaffolds are required to provide mechanical support until the target newly tissue is formed and become stable. Designing is based on the target cells population needed to implant at the injury or diseased sites. In vivo, they are degraded alongside the implanted functionally tissues grow and organize their matrix structure (Kim et al., 2010). Non-toxic, biodegradable and biocompatible scaffolds serve as a temporary matrix for the seeded cells due to their own a highly porous microstructure that supply nutrients required for growth and necessary for waste removal. They possess structural integrity to withstand in vitro and in vivo loading. The most widely used in HVE are polyglycolic acid (PGA), polylactic acid (PLA) and their copolymers (PGLA). PGA is highly resorbable, linear, a highly crystalline and have a high melting point. PLA reduce the rate of hydrolysis and have limited water uptake. In all of that, to facilitate tissue growth, growth factors are integrated in the scaffold. However, a number of disadvantages must be overcome; slow or incomplete degradation that cause inflammation, limited nutrients and oxygen delivery to deep cells and fibrosis (scar) occupied the space formed after scaffold degradation (Mendelson and Schoen, 2006). Natural scaffold composed of decellularized xenograft or allograft tissue or ECM components such as collagen or fibrin (Mendelson and Schoen, 2006). Fibrin gel scaffold can be designed into a valve structure to form a biodegradable, autologous scaffold.   Blood is the source of fibrin gel and mould into autologous manner to work against immunogenicity. Seeding cells into fibrin scaffold results in good tissue development with viable fibroblast. However, fibrin scaffold would lack mechanical strength (Knight, 2004). Furthermore, in a process similar to the contraction of a wound healing, cells entrapped in collagen gels compact the gel, improve their property and increase density (Mendelson and Schoen, 2006). But, any scaffold made from collagen alone would like to degenerate very quickly due to in vivo forces affected heart valves (Knight, 2004). Moreover, hyaluronan is a glycosaminoglycan polymer with a repeating disaccharide structure and being used as biocompatible material ECM scaffold. It imparts viscoelastic properties and applies pressure that gives tissues compressive resistance (Vesely, 2005). Sterilization methods: Several methods are used to sterile materials utilized in process of seeding and tissue harvesting. 1) Dry heat sterilization in which items are placed in an oven for one hour at 160T to be sterilized by dry heat. 2) Moist heat sterilization is used to autoclave objects and solutions not suitable for dry heat sterilization for 20 minutes at 121 T, 15 pounds per square inch (psi). 3) 0.2ptm filters are used to sterilize solutions not suitable for autoclaving (Knight, 2004). Pre-clinical trials: Animal model is an essential part of biomedical research to approve tissue engineered devices by FDA in order to carry on clinical trials. Using animal tissues as sources relies on many factors; cost, ethical considerations, availability and the nature of the tested tissue. In Zilla study (Zilla et al., 1994), baboons were used to study the proliferation of seeding (endothelial cells) EC on polytetrafluoroethylene (PTFE) grafts. Compared to the control of unseeded graft, seeded graft showed persistent confluent EC layer through time with the aid of fibrin glue enriched with RGD (Zilla et al., 1994). Due to similar anatomy and physiology to that of humans, pigs have been used widely for experimental study. Also, they are cooperative without general anesthesia. They are capable of rabid growth so limiting the time required for TE construct (Rashid et al., 2004). Biodegradable polyglycolic acid (PGA) scaffold was treated by sodium hydroxide and modified seeded bovine SMC and EC were used by Niklason and co-workers in after 24 days of implantation in swine model. Ovine and caprine are also models to study TE due to large size and easy access to the carotid artery in the long neck. They can be used for long term study because adult animal can’t grow (Rashid et al., 2004). In a number of researches, sheep model was used widely but ordained for failure as a result of exuberant fibrotic response to implants (Vesely, 2005). Compared to humans, implants grow rapidly with fibrotic tissue in sheep (Schoen, 2011). In preclinical testing, the choice of animal model is a challenge owing to immunologic considerations (Mendelson and Schoen, 2006). Biomechanical culture: Various parameters determine the optimal conditioning protocols; the scaffold, the magnitude and types of mechanical cues, the sensitivity of cell to the used scaffolds. Bioreactors in TEHV have been developed to improve tissue formation, organization and functions and to stimulate dynamic mechanical of the TEHV. Moreover, to mimic native excitation-contraction coupling, electrical stimulation has been used. Additionally, to mimic the diastolic phase of the cardiac cycle, a diastolic pulse duplicator bioreactor has been developed which result in dynamic tissue straining (Sacks et al., 2009). Commercialized products: In October 2000, CE Mark approved use of the CryoLife Synergraft. It was similar to decellularization matrix approach by removing cellular antigens using extraction and dissolution. It was expected to sound mechanically as acellular matrix. Unfortunately, complications related to stenosis, inflammation and valve rupture result in death and thus withdrew from the market (Vesely, 2005). Challenges: Till date, no EHV constructs have been commercialized. Before translation of the construct to patients, numerous steps must be considered and assured laboratory.   For example; ethical issues, safety, efficacy and quality of the product should be evaluated. Additionally, medical devices interactions results such as; thrombosis, infection and inflammation will have to be accepted. There is a need to develop tools to monitor the fate of transplanted and endogenous cells, biomarkers to evaluate the patients variability to implantation. in all of that, suitable approach is required that ensure efficiency and safety (Schoen, 2011). Conclusion: Three main issues determine the success of tissue engineered heart valve; 1) sources of cells, 2) the (matrix) scaffold that serves as a guiding structure and determines the three dimensional shapes of tissue development and cell attachment and 3) the optimal culturing condition for cell growth. State of art of TEHV today is still on research, significant challenges must be solved before start in clinical application. REFERENCES: FUCHS, J. R., NASSERI, B. A. VACANTI, J. P. 2001. Tissue engineering: a 21st century solution to surgical reconstruction. The Annals of thoracic surgery, 72, 577-591. HJORTNAES, J., BOUTEN, C. V. C., VAN HERWERDEN, L. A., GRUNDEMAN, P. F. KLUIN, J. 2009. Translating autologous heart valve tissue engineering from bench to bed. Tissue Engineering Part B: Reviews, 15, 307-317. KIM, B. S., PARK, I. K., HOSHIBA, T., JIANG, H. L., CHOI, Y. J., AKAIKE, T. CHO, C. S. 2010. Design of artificial extracellular matrices for tissue engineering. Progress in Polymer Science. KNIGHT, R. L. 2004. Development of methods for the tissue engineering of cardiac valves using mesenchymal stem cells. MATSUMURA, G. 2003. Successful application of tissue engineered vascular autografts: clinical experience. Biomaterials, 24, 2303-2308. MENDELSON, K. SCHOEN, F. J. 2006. Heart Valve Tissue Engineering: Concepts, Approaches, Progress, and Challenges. Annals of Biomedical Engineering, 34, 1799-1819. MOL, A., SMITS, A. I. P. M., BOUTEN, C. V. C. BAAIJENS, F. 2009. Tissue engineering of heart valves: advances and current challenges. Expert Review of Medical Devices, 6, 259-275. NEUENSCHWANDER, S. 2004. Heart valve tissue engineering. Transplant Immunology, 12, 359-365. RASHID, S. T., SALACINSKI, H. J., HAMILTON, G. SEIFALIAN, A. M. 2004. The use of animal models in developing the discipline of cardiovascular tissue engineering: a review. Biomaterials, 25, 1627-1637. SACKS, M. S., SCHOEN, F. J. MAYER JR, J. E. 2009. Bioengineering challenges for heart valve tissue engineering. Annual Review of Biomedical Engineering, 11, 289-313. SCHOEN, F. J. 2011. Heart valve tissue engineering: quo vadis? Current Opinion in Biotechnology. SHINOKA, T., BREUER, C. K., TANEL, R. E., ZUND, G., MIURA, T., MA, P. X., LANGER, R., VACANTI, J. P. MAYER, J. E. 1995. Tissue engineering heart valves: valve leaflet replacement study in a lamb model. The Annals of thoracic surgery, 60, S513-S516. VESELY, I. 2005. Heart valve tissue engineering. Circulation research, 97, 743. ZILLA, P., PREISS, P., GROSCURGH, P., Rà ¶SEMEIER, F., DEUTSCH, M., ODELL, J., HEIDINGER, C., FASOL, R. VON OPPELL, U. 1994. In vitro-lined endothelium: initial integrity and ultrastructural events. Surgery, 116, 524-534.

Friday, November 22, 2019

Bric Countries India Opportunities And Challenges Economics Essay

Bric Countries India Opportunities And Challenges Economics Essay India has now become the tenth largest economy in the world however it needs to engage more dynamically with the other emerging economies to move up the ladder in realising her dream to become one of the leading economic powers in the world. The world is looking at India due to her impressive economic growth. India being the fourth largest economy in terms of purchasing power parity attracts large FDI in different sectors. All these coupled with economic reforms undertaken in 1991 by Narsinhma Rao government, has made India the second fastest growing economy in the world  . Thus to become economic power India needs to accelerate its economic reforms and take further steps to overcome institutional and infrastructural bottlenecks. 35. There has been increase in the share of industries over the years however the revival of manufacturing sector is the reason for rapid growth in GDP. India has become one of the favourite destinations for IT, pharmaceuticals, biotechnology, automobile, consumer goods etc. As per the recent reports   [ 14 ]   published, India has pulled ahead of China to lead the Forbes list of best countries for new jobs. However the potential to engage with other BRIC countries to fuel her economic growth have not yet fully exploited. There is a requirement for India to move beyond cosmetic ties & forge strong cooperation in fields of trade, IT sector, energy, science and technology and defense and space technology sector to enable mutual benefit of all countries in the group and fuel her economic growth. 36. As per the Goldman Sachs report   [ 15 ]   India will be the third largest economy in the world and by 2030, when it will outperform Japanese economy. To realise this dream, India needs to improve its rural infrastructure such as electricity, roads, irrigation and transport to generate employment and should also at the same time invest heavily in social infrastructure. The de-regulation of economy, simplification of procedures and r elaxation of entry barriers for business activities is must for further growth in FDI. The urgent need to improve infrastructure in rural areas for its development so that it not only participates in the growth of the country but also adds to it.   [ 16 ]    Brazil 37. Brazil is the largest economy in Latin America and the eighth largest in the world, based on nominal GDP and ninth largest by purchasing power parity. Brazil is one of the fastest growing economies in the world with an average growth rate of 5 %. As per Goldman Sachs report Brazil will become one of the five largest economies in the world in the times to come, thus becoming one of the most sought after industrial destination. Brazil is member of various economic organizations. At present its 60 % of exports consist mostly of manufactured or semi manufactured goods. Its main trade partners as per recent reports are Latin America (25.9 %), EU (23.4 %), Asia (18.9 %), the United States (14.0 %), and others (17.8 %). Brazil has a broad base in the sophisticated technological sector that ranges from automobile, petrochemicals, fertilizers, submarines, aircrafts, space research and also a pioneer in many fields, including deep water oil research, ethanol production and blending.   [ 17 ]   Thus it offers great opportunities for India to get into economic and trade ties to exploit potential of Brazil and thus further increasing the mutual trade which has not yet reached the desired level.   [ 18 ]

Wednesday, November 20, 2019

Collaborative writing Assignment against Euthanasia Essay

Collaborative writing Assignment against Euthanasia - Essay Example Besides, there are critical aspects of medical profession that need to be taken into consideration as far as doctor’s role in physician-assisted suicide is concerned (Jeffrey 76-8). The society put their trust on doctors as having moral responsibility of keeping the patients in state of life in line with their Hippocratic Oath. There are several arguments that attract the opposition against Euthanasia that seems real if given critical analysis. Legalizing euthanasia will create a legal loophole that can be misused by the doctors in regard to physician-assisted suicide. One such legal aspect is possible â€Å"slippery slope† from the process of euthanasia to murder. This will particularly target the poor and disabled people who may not sustain prolonged medical monitoring condition and expensive medical bills. The principle of life requires sustained help and medical support to an individual with the cardinal goal of saving life. In this respect, the aspect of socio-economic ability is not considered (Kopelman 87-9). However, in reality medical cost for some conditions requires funds which may exhaust a family and render the hospital or doctors financially incapacitated to continue offering services. For the poor and the handicap, this may compel the doctors to initiate physician-assisted suicide as a way of eliminating the cost factor. There is possible legal incentive that this doctor’s right may create to the insurance firms that may resort to termination of life with the aim of saving money. This is unfair and highly unethical in line with the common moral tenets of businesses practices and medical code of ethics. The aspect of deliberate killing of the poor and the disabled if this practice is legalized evokes the concept of Ethics which can effectively convince the proponents to think otherwise. According to Jeffrey (pg.20), â€Å"Clearly, it would be unwise to give doctors the power to issue lethal prescriptions for the

Tuesday, November 19, 2019

Linkedln Essay Example | Topics and Well Written Essays - 750 words

Linkedln - Essay Example LinkedIn was officially launched in 2003, with a wide network. The company possesses a diversified business model and generates its revenue from talent and marketing solution along with subscription of premium products. It is a social networking site used by the professionals for their business purposes as well as to increase connectivity with the public and other allied professionals in different fields. The site is used for various marketing reasons by the companies and it provides an opportunity to the members to showcase their talents. It provides a business oriented atmosphere and its objective is to increase connectivity. It is a useful social media for developing marketing strategies to increase connectivity for the professionals (LinkedIn Corporation, 2013). Risk Factors The social media with the advancement of technology is becoming an integral part of business networking. The platform is aggressively used by the businesses for the purpose of marketing along with increasing connectivity. LinkedIn can trigger a wide variety of risks to the organizations such as the risk of information leakage. The risk factors involved can be the leakage of confidential information by the third party which can prove to be a breach. The placement of the advertisements on the site of LinkedIn at times can be tricky which might make the user to download the infected application which causes leakage of personal information. This might lead to the misuse of data and might cause a fraudulent act. The loss of privacy can be a risk for the companies using the platform and their customers as well owing to the fact that a significant extent of personal and corporate information is exchanged through LinkedIn. The risk involved for these sites largely come from the hackers as th ey tend to extract the information and cause legal risk. The platform being open for every user does not provide adequate safety, security on social and legal basis. At the same time, the social networking site is useful for showcasing the prevailing opportunities and talents (Navetta, 2011). Growth History and Reasons for Growth LinkedIn site has shown a growth trend in the past few years. In the year 2003, the site had 4500 members in its network. With the use of the diversified business model, the LinkedIn platform has shown a tremendous growth. It has at present nearly 225 million users in not less than 200 countries. It also has revealed a steady growth as it has 4800 employees worldwide in more than 20 languages. The total revenue amassed by LinkedIn in 2013 has been nearly US$393 Million with the increase in the number of members. Moreover, officials from Fortune 500 companies are their members. LinkedIn uses the data driven strategy to enhance the growth of the site and incr ease its revenue. The data provided through the site to the end users are helping to improve the marketing strategies of the user companies. This strategy is facilitating the business and the members to decide on the marketing strategies along with decision making to increase the performance. This kind of strategy aids in providing accurate and efficient data which in turn facilitates the social networking platform in increasing the subscription and in generation of revenue. LinkedIn makes money by using premium accesses, sales of ad for the products and by providing solution to the corporate clients (LinkedIn Corporation,

Saturday, November 16, 2019

Nothing but Useless Essay Example for Free

Nothing but Useless Essay I am not a video game addict but many of my acquaintances are. I am not a video game fan simply because I am not good as others at playing with the same enthusiasm and commitment. My acquaintances like playing video games because it helps them relax and feel as if they were kids again. Their children also play video games developed specifically for their age group. Video games develop reaction, problem-solving abilities, attention, and concentration. None of my acquaintances has ever committed a violent act. Video game exists in its virtual space, which does not make claims on real life. Video games get the brunt of the criticism. Our government is anti-video game. Yet, market forces can be the only regulatory mechanisms of violence in video games. Only two or three of the top best-selling video games are violent. Video games have no violent impact on a video gamer. Younger players may be vulnerable to the violent game content when the play video games that are not suitable for their age. Although first person shooter violence is common to video games, it is not likely to promote aggressive behavioral models. Kids play with toy soldiers but nobody thinks that this teaches them violence. Video games cannot be considered violent in relation to age, gender, socio-cultural belonging, and educational level. The reaction to the games content depends on the individuals personal traits. Girls do not react with greater arousal to violent content than boys. At least, no research has found any significant difference. It is unlikely that performing violent actions during the play may cause aggression in kids. Although Grand Theft Auto 3 was banned in Australia because of its graphic violence, it does not mean that it could have influenced the increase in crime rates. The problem is that minors often have uncontrolled access to adult games with violent content. Boys aged 7-12 like action adventure. They develop killing instinct only in virtual games but also in the games they play outdoors. Nevertheless, childrens exposure to violent content targeted at mature video gamers should be restricted by their parents and caregivers. I am defending video gaming on behalf of long-time gamers whose hobby has not turned them into psycho-terminators. Video gamers live in their own world of established video game rules, and they wish they could play safely without being disturbed. Were in the habit of regulating our most innocent activities.

Thursday, November 14, 2019

The Allegory of the Cave: Turn Around :: essays research papers

The Allegory of the Cave: Turn Around   Ã‚  Ã‚  Ã‚  Ã‚  Putting the Allegory of the Cave into my own words seems comparable to the Christian idea of using the lord's name in vain. First, I'd like to introduce a phenomenon I have observed throughout my life time. I call it soul resonance. Bear with me here. When two objects emit sympathetic vibrations, the sound or force multiplies. Example: Two tuning forks of the same frequency are struck upon each other and held a few feet apart. The vibration is much stronger. Something basic about each object recognizes a similar quality in the other, and amplifies it. As with so many other laws of science, this law applies to many other phenomena. I believe this is what people feel when they first hear the Allegory of the Cave . . . soul resonance. Somehow, something deep inside tells them that here we have found a singular truth.   Ã‚  Ã‚  Ã‚  Ã‚  The Allegory, taken as the story of one man, narrates his life from ignorance to enlightenment. He sits within a cave, facing away from a blazing fire. He stares at the wall opposite him, watching pretty shadow puppets. He listens to the exotic, wonderful, and large words whispered in his ears by the puppeteers. He would naturally turn around, or perhaps even stand, but chains bind him to the ground, and the puppeteers have servants who hold his head in place. One day, a situation arises where he finds that the chains are broken, and he stands. This is against the will of the servants, but they have no physical power over him, if he does not allow it. He turns round and sees the fire and the puppeteers and then he realizes that all has been lies. He is not what they have told him. He does not feel what they have said he does. The fire blinds him. The puppeteers, seeing they have lost another to knowledge, quickly get rid of him by pushing him into the dark cave that looms off to the side, hoping for his demise. The man is lost, he has gone from darkness to light to darkness once again. Something within him tells him to climb, and he does, scrabbling. He cuts himself many times, and many times he almost falls to his demise on the rocky ground below. He pauses often. Until there comes a time when he sees a distant light at the exit/entrance to the cave. When he sees this light, he is not sure whether this is yet another shadow puppet on the wall, but it is upward and that is where he must go.

Monday, November 11, 2019

Readers of Huck Finn

The ending of Adventures of Huckleberry Finn by Mark Twain is indeed puzzling. On the surface, the story looks a perfect happy end – more or less, everybody seems satisfied with the new order of things: Jim is now a free man, Tom is fully recovered, and Huck gets rid of his father and receives a chance to move West to start an independent life free of â€Å"civilizing† efforts of well-meaning adult women. This looks like a perfect American ‘happy end’ which so often ends Hollywood movies even if the previous course of events had seemed unlikely to bring about such a happy combination of circumstances. Perhaps the sympathetic treatment of the runaway slave on the part of Huck seemed idealized to many of Clemens’ contemporaries and later critics. At the same time, the ending contains one very important message that makes it less ideal than it may seem on the surface. This is the whole behaviour of Tom Sawyer who had known all the way that Jim was in fact a free man, yet had chosen to withhold this information from his friends simply to have a spectacular liberation. In doing so, he had subjected Huck and Tom to many trials and dangers that are surely exciting to read about, but overall so difficult that few of us would like to repeat it on their own. This callous and insensitive action on the part of Tom, although he tries to justify it with a lame excuse that he had meant to repay Jim with money for his troubles, vividly demonstrates that his treatment of Afro-Americans is less idealistic. In showing Tom’s lack of sensitivity for the feelings of another human being simply because this human being happens to be a black slave brings home to the readers of Adventures of Huckleberry Finn the real situation of the relationship between slave-owners and slaves. To a great degree, such attitude puts Huck’s heroic deeds in context and reveals that many people would probably choose to imitate Tom’s behaviour rather than Huck’s especially if this promised them an opportunity to have fun. True, the readers realize that Tom is not a typical white male as there is probably no such thing as a purely stereotypical person who simply follows all the norms of his class without showing any individuality. Tom does have a very bright and outstanding individuality, and he is notable for his love of a good prank. Thus, he is going to take liberties with the lives and need of other people, including those of his own class, as he had shown during his school jokes. However, would he be willing to make a white person from a respectable background undergo such hardship as Jim did? The question remains unanswered, and the readers can very well suspect that Tom can be doing many things to have fun with things that are life and death to other people, less empowered than himself. Therefore, the ending of the book does reveal the inhuman attitudes of white slave-owners toward their black slaves. The author does show that the life of a black person is no bed of roses even after the basic question of personal freedom is solved. This freed person finds oneself in the setting in which the white majority are taught to see their black fellow citizens as worthless individuals in contrast to themselves – as people whose human value is at least slightly less than that of their own. As to Huck’s kind treatment of the runaway slave, this does not seem so improbably even one considers the wide scale of the abolitionist movement in the nation. Huck is shown to experience pangs of conscience when he conceals a runaway slave, feeling affinity with his own class and race. Yet, like many people in theory born to be slave-owners, he oversteps the prejudice the society imposes upon him and manages to become a moral person by helping a human being. Summing it up, the ending of Huck Finn does not seem to contain any improbable elements that would confirm that Twain cheated. The closure of the book does show that white people often tended to see slaves as inferior, and that many were able to rise above prejudices to help slaves. Twain, Mark. Adventures of Huckleberry Finn. 13 Jan. 06 .      

Saturday, November 9, 2019

Christianity verses islam Essay

The attitudes of Christianity and Islam toward merchants and trade are similar yet different. Over time Christian and Islamic attitudes towards the merchants and trade have changed.  The attitudes of Christianity and Islam toward merchants and traders are similar. A way that these two religions attitudes towards their merchants and trade was that they both allowed being treated better under god easier for merchants to achieve if they were honest about what their trade. In the Muslim Qur’an it states â€Å"On the day of judgment, the honest, truthful Muslim merchant will take rank with the martyrs of the faith† (Doc 2). This statement proves that merchants could be treated better under god if they were honest. Also in the Christian Bible, New Testament (Matthew) it states â€Å"It is easier for a camel to go through the eye of a needle, than for a rich man to enter into the kingdom of god† (Doc 1). This means that it is easier for the honest merchants to enter t he kingdom of god than the rich upper-class Christians. All in all, the Christian and Islamic attitudes toward the merchants and trade are similar. As well as the attitudes of Christianity and Islam toward merchants and trade being similar they were different. A way that Christianity and Islam attitudes were different was that some Christians thought that if they gave away their money earned to charity they would be able to become closer to God by serving him, but in Islam they only thought that honesty could get you closer to God. In The Life of St. Godric by Reginald it states â€Å"now he had lived sixteen years as a merchant, and began to think of spending on charity, to God’s honor and service† (Doc 3). Although this statement proves the difference it may be bias because it was written by a colleague of a merchant, this could mean that he was experiencing things different than what they were really supposed to be by law. In the Qur’an it states â€Å"On the day of judgment, the honest, truthful Muslim merchant will take rank with the martyrs of the faith† (Doc 2). The statements from these two wr itings together prove that the attitudes towards merchants and trade were different between Christianity and Islam. Over time both Christianity and Islam attitudes towards merchants and trade  changed. Christianity started off with the Christian merchants not bidding with the traders to bidding with the traders. Thomas Aquinas wrote â€Å"the seller must not impose upon the bidder† (Doc 4). And this change was presented when a letter was written placing an order for English wool saying â€Å"with god always before us, we will carry out your bidding† (Doc 6). Both these statements could be bias due to the writer, the first quote from Aquinas could be bias because he was a theologian which means he studied gods and so he could have wrote more about what the bible states and not what actually happened. Then the letter was written by a merchant which means they could have had different experiences with trade than other merchants. Islam started off with their merchants needing to be honest and ended up with their merchants seeking to make profits and gambling, and gambling for more money is not very truthful. The Qur’an it states â€Å"On the day of judgment, the honest, truthful Muslim merchant will take rank with the martyrs of the faith† (Doc 2). Ibn Khaldun a leading Muslim scholar wrote â€Å"We have already stated that traders must buy and sell and seek profits† and he wrote â€Å"they come under the heading of gambling† (Doc 5). All in all both Christianity and Islamic attitudes toward merchants and trade changed over time. In conclusion Christianity and Islam had attitudes toward merchants and trade that were similar and different, and that both religions attitudes changed over time. A document that was not present that would have been helpful would be a document written by Muslim or Christian merchants because the documents that were written by merchants were written by British and Italian merchants.

Thursday, November 7, 2019

Computers in Law Enforcement essays

Computers in Law Enforcement essays The Use of Computers in Law Enforcement A person living in todays world cant help but notice that most all businesses use computers. These businesses use computers to do many things, but it seems to me that most computer activities in the business world are for three main reasons: (1) identification of their product, (2) tracking of their product, and (3) communication of some kind, either with me as a customer, or with the place that supplies the business with their products to sell. As I started to gather information about the use of computers in law enforcement, a new area for me, I began to realize that computers in law enforcement seem to be used for the same three reasons as computers in business. In law enforcement, the product is the criminal. In order to identify the criminal, there are lots of databases that law enforcement officers can use, if they are up on the latest technology. Finger printing identification is available through the Integrated Automated Fingerprint Identification System that has about 40 million fingerprints in it. Another database that police use is the National Crime Information Center 2000. This is a database on missing persons, stolen vehicles, stolen property, and criminal background checks. This is one that is used a lot by officers who have laptop computers in their cars. Another database is made completely of pictures, which are stored as images. These images are of things like, pictures of stolen things, pictures of tattoos and scars, mugshots of criminals, and pictures of signatures. Another database used by law enforcement is the National Instant Check System, which is a list of persons that cannot buy or carry firearms because of their past criminal history. This database started after the Brady Bill was passed. There are databases of license plates, drivers license numbers, social security numbers, and many other things to help law enforcement office ...

Monday, November 4, 2019

Risk assessment in auditing of financial statements Research Paper

Risk assessment in auditing of financial statements - Research Paper Example SAS No. 109 was issued in 2006 along with seven other auditing standards. What’s important about these eight (8) auditing standards was their common theme – adherence to risk assessment and the audit response to such an assessment. These eight auditing standards were expected to bring about major changes and to give guidelines and guidance when auditing nonpublic entities (McConnell and Schweiger, 2007). The primary objective of these eight standards was to improve the conduct of audit by the external auditor through requiring the auditors to acquire a deeper understanding of a company’s internal controls so that the auditor is in a better position to â€Å"identify risks of material misstatement of financial statements† (McConnell and Schweiger, 2007). With this primary objective, the issuers hope that there will be better â€Å"linkages between assessed risks and the nature, timing and extent of audit procedures performed in response to those risks† (McConnell and Schweiger, 2007). The first paragraph of SAS No. 109 established the provisions and guidelines for obtaining â€Å"an understanding of the entity and its environment†¦to assess the risk of material misstatement of the financial statements† (AICPA, AU Section 314, 2006). The second paragraph provides brief summaries of the specific sections of the standard. The subsequent paragraphs expound on the summaries provided in the second paragraph. Paragraph 3 lists â€Å"examples of considerations for establishing a sufficient understanding† of the entity (AICPA, AU Section 314, 2006). Paragraph 4 calls on external auditors to â€Å"use professional judgment to determine the extent of the understanding required of the entity and its environment† (AICPA, AU Section 314, 2006). Certain paragraphs of SAS No. 109 outline and explain the risk assessment procedures (i.e, inquiries, analytical procedures and observation) an auditor needs to perform to obtain such an understanding. The

Saturday, November 2, 2019

LSBM Research Project Report Assignment Example | Topics and Well Written Essays - 3000 words

LSBM Research Project Report - Assignment Example ..............................................6 Research resources†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..7 Implementation†¦...................................................................................................8 Data collection and analysis †¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦9 Recommendation †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦11 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 Bibliography†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.14 Report outline 1. Formulation of the research out line 2. Introduction and general background to (LSBM) 3. Identification of the research process 4. Body Identification off the student enrollment problems at (LSBM) Literature review of the possible reasons why (LSBM) has less students Writing a research proposal for the project Preparation of a timetable Matching resources to the different research questions Implementation of research Collection and recording of data Using the best evaluation techniques Interpretation and analysis of the data Recommendations 5. Conclusion Introduction I will begin this essay by looking at how the general plan and strategies of the marketing department is affecting the student population of the school. Being at the centre of London, and having a well financed marketing department, LSBM is expected to have the h ighest number of students who come seeking education in the school. However this is not always the case. Our main question in this essay is to find out if indeed there is a way that the plan and the general strategies of the marketing departments have influenced the student population of the school. What are some of the actions that the school can take to improve the student population in the school and to try to keep the existing students in the school. If there is a problem with the marketing department and their overall marketing strategies, what are some of the things that should be done to help improve their general performance to the school. Different methodologies have been used in this research to collect data and to find out how this data relates with the research question. Research process Marketing process, involves the systematic identification, collection distribution and analysis of data for the purpose of knowing the problem and coming up with a solution. The timing f or performing this research is perfect and we will use quantitative marketing research to come up with the general research methodology and strategy. The strategies that are used here are mostly quantitative since most of the data that we use here is numerical. Factors determining the research project There are lots of influential factors which determine the type of research project to be selected. The main influential factor however is the relevance of the topic of the research paper. A research paper with a more relevant topic has high chances of being selected as compared to a research paper whose topic is completely irrelevant. To know how relevant the topic of a research is, you need to look deeply into the issues which are discussed in the research proposal. If the issues are genuine, then the research qualifies to be chosen. In our case here the most influential factor that has led to the research proj

Thursday, October 31, 2019

Is the U.S. Winning the Drug War in Latin America Essay

Is the U.S. Winning the Drug War in Latin America - Essay Example CON: U.S is losing the drug war in Latin America 1. U.S government has failed to re-evaluate her strategy to fight the drug menace. 2. The war fight largely focuses on the users and therefore leaves the other partners in the trade to thrive well in the trade. 3. There is no concrete drug enforcement mechanism to restrict the production of drugs. 4. The affordability and cheap processing makes it difficulty to wipe drugs out of Latin America. 5. A lot of resistance from human rights organization derails the efforts to do away with the drugs. The U.S will to control drug trafficking and abuse in Latin America confirms that it is very committed to wipe the drugs from these region. To begin with, since 1960s, the government has invested a lot of her efforts and attention to wage war on drug trade in Latin America. Regan and Bush declared war on drugs in U.S and Latin America when they occupied their presidential offices. The Bush successor; Bin Clinton continued with the worth fight on d rugs when he came into power in 19931. Since then, the U.S government has been strong on the war on drugs in Latin America. The U.S government recently got a support from Latin countries such as Mexico, Cuba, and Columbia. For instance, president of Mexico, Calderon has been in the forefront to combat drugs in the country2. Since he took office in 2006, he has made leaps towards the drugs war. For example, his government has formulated policies to deal with the consumers and traders of illicit drugs. These efforts have paid handsomely because the consumption of drugs has subsided. Obama’s government is in talks with Latin America Governments. Biden’s trip in 2012 to Latin America shows that the government has given negotiations a favorable chance. Biden was seeking to discuss on how leaders in that region can decriminalize drugs with an aim to stop its trade. Second, the new laws are in formulation stages. Policy analyst have advocated for a change in the current polic ies to allow U.S to win war on drugs. Arguably, their insights will provide new strategies to curb drugs trafficking in Latin America and U.S. The medical professionals have suggested programs to treat the drug victims. In addition, the social advocates suggests, that creation of awareness about dangers of engaging in drugs is the way to go. All these concerted efforts promise a win in the war on drugs in Latin America3. Third, the debates on drugs have attracted a lot of public interest. The Latin and the U.S population feel that drug consumption is not socially acceptable. They propose tough punishments for the growers, manufacturers, suppliers, and sellers. The public warns of the dangers of permitting drugs to get into the society. They provide a procedure, which can deter the abuse of drugs. The public suggests that, through identification, imprisonment, and persecution, the war can yield fruits4. Moreover, the drug user will be accountable for their actions. Implementation is now happening in the Latin America. This is a huge step towards gaining victory in the drug war. The increase of funds through budgetary allocation to fight drug abuse demonstrates U.S readiness to see the better end of the war. There has been a significant attention on the budget to allocate enough money in the drug war. In 1990, U.S budget on drugs was at $ 9.7 billion. This almost doubled in 2000 when it hit $ 17.7 billion mark. On top of this, the Drug Enforcement Administration department staffed

Tuesday, October 29, 2019

International Marketing ..Rococo Chocolates Research Paper

International Marketing ..Rococo Chocolates - Research Paper Example However the island of Grenada being hit by a tremendous hurricane spell huge loss for the cocoa planters and farmers. Rococo chocolates helped the hurricane affected farmers and planters through the production and sale of a special variety of chocolates. The joint venture that took place between Rococo Chocolates and Grenada Chocolate Company helped in the formation of Grococo. The joint venture form focuses on the production of organically based products of chocolate, which bears the hallmark of quality and taste. Grenada Chocolate Company also looks forward to the betterment of the farmers working in cocoa plantations. Cocoa produced from these farms help in the production of chocolates. The company in this light operates as a cooperative firm that takes special endeavor to grant equal work and better opportunities for both the plantation and the factory workers (About Rococo, 2009). Marketing Environment of Rococo Chocolates The marketing or the business environment of a firm is d ivided along two sets of factors viz. internal and external. The directions and policy mechanisms of the company can control the internal set of factors. On the contrary the external set of factors are those, which cannot be controlled by the actions of the company. These factors belong to the external environment of a firm. ... Internal Factors of Rococo Chocolates Rococo chocolates through its marketing policies have taken a further step to expand its market share through the use of Internet marketing. The chocolate firm though operates on wide markets through big retail firms in a desire to increase customer traffic have started selling its products online through its websites. The company launches the Internet site during December 2009 to help enhance the idea of chocolates sold as gifts during Christmas (A new e-commerce platform for Rococo Chocolates, 2010). Further Rococo Chocolates has a huge product portfolio containing of gift boxes and hampers, confectionary products, art products of chocolates, gift bags and other chocolate products like bars and sweets to cater to the increasing needs of different customers (Products, 2009). The marketing policies for Rococo chocolates also reflect on the firm’s pricing strategies. Rococo Chocolates has devised products for different sets of customers by setting different prices, which ranges from below five pounds to more than fifty pounds. (Spend, 2009). External Factors for Rococo Chocolates With these internal factors in place, Rococo Chocolates aims to target a new market in United Arab Emirates. Thus the external marketing factors of the firm would be studied in that respect. The United Arab Emirates is presenting a widely encouraging market for the chocolate and confectionary producers. In times of economic unrest also the Middle East countries presented a demanding market for chocolate and confectionary products thus helping their manufacturers. During 2008 the market for such products in Arab Emirates increased

Sunday, October 27, 2019

Mobile Phone use: Reaction Times

Mobile Phone use: Reaction Times The purpose of this study was to determine the effects of divided attention upon response time. Participants consisted of 51 female and 10 male students from the University of Canberra, ranging in age from 19- 60 years (M = 24.95, SD = 7.99). Participants were asked to complete a spatial cueing task while using their mobile phone to either send text messages or make phone calls. Data was collected using the universities computers on the program Cog Lab 2.0. Results revealed that the text and talk conditions for all task types (neutral, valid, and invalid) had significantly slower reaction times than the control condition. The text group showed significantly slower reaction times than the talk group. Furthermore, the control group showed that the reaction times for the valid tasks was significantly faster than the neutral, and significantly faster for the valid than invalid tasks. These results do support previous research and literature in the area of mobile phone use while driving. The use of mobile phones has grown over the last five years, with over 21.26 million users in Australia alone (White, Hyde, Walsh Watson, 2010). Despite increasing evidence that mobile phone use while driving presents risks; drivers still engage in this behaviour. A self- report study on mobile phone use while driving in Australia, found that 43 percent of mobile phone owners use their phones while driving to answer their calls, followed by making calls 36 percent, reading text messages 27 percent, and sending text messages 18 percent. Approximately a third of these drivers used hand free units, indicating that most Australian drivers use hand held mobile phones while driving (White Watson, 2010). The impairment potential of mobile phone usage while driving has been the focus of various behavioural and experimental studies. Although these studies differ in the extent of behavioural changes found, most researchers agree that there is a significant negative effect on different aspects of driving performance. The most common aspects are the withdrawal of attention and slower reaction times (Reed Green, 1999). The impact of driving while using a mobile phone on reaction time is often explained with reference to a phenomenon commonly referred to as inattentional blindness or change blindness (Strayer, Drews Johnston, 2003), wherein a person who is focusing attention on one particular task will fail to notice an unexpected stimulus even while directly looking at it (Simons Chabris, 1999). Strayer and Johnston (2003), determined that drivers conversing on a hands free mobile phone were more likely than drivers not using mobile phones to fail to notice traffic signals and respond slower to brake lights. As a result drivers were more likely to cause rear end accidents and less likely to be able to recall detailed information about specific visual stimuli (Strayer et al., 2003). These researchers also found this behaviour in participants who fixated their vision, suggesting that mobile phone conversations may induce inattentional blindness in the context of driving. However, Strayer Johnston (2003) considered that because they used a high- fidelity driving simulator that these results were conclusive of real life driving. These results may not be accurate in real life scenarios were participants would be driving on real roads with real vehicles. Beede Kass, (2006) also used a driving simulator to measure the impact of a conversation task on a hands free mobile phone and a signal detection task while driving. Results suggested driving performance in terms of traffic violations, was significantly impaired while participants converse on the hands free unit and overall performance in the signal detection task were low. Finally they found an interaction between the mobile phone conversation and a signal detection task in measures of speed, speed variability, reaction time and attention lapses (Beede Kass, 2006). However, drivers that are not subjected to distracting tasks may also fail to notice important features of the traffic environment. That is, even when scanning different parts of the visual scene appropriately, there is a risk that important features will be missed in unattended areas (Simons Chabris, 1999). In considering the phenomena of inattentional blindness, it is worth reiterating a key modifier, unexpected events. Generally, the occurrence of these inattentional failures seems to be reduced when the observer anticipates the object. Therefore, the unexpected events seem to be the most problematic. In the context of traffic, these may be somewhat harder to define quantitatively because these events can take on many different forms (Simons Chabris, 1999). A study conducted by Posner, Snyder Davidson, (1980) using a spatial cueing task, looked into the theory of expected versus unexpected events. They believe that participants responses to cued targets are usually faster and sometimes more accurate than responses to uncued targets. Results from the study conducted by Posner et al., (1980) suggest that participants were faster when the cue appeared in the same location (valid) and slowest when the cue appeared opposite the indicated cue (invalid). Posner, Snyder and Davidson, (1980) interpreted these results as showing that participants shifted their attention to the location of the target prior to its appearance. Equally, when participants were expecting the cue to appear in the opposite area, participants shifted attention to the wrong location. However, it may be possible to describe these results as being due to participants anticipation of the target position, or even chance. Alternatively, Simons Chabris (1999) provided a review of experiments in which participants focusing on visual tasks fail to notice unexpected visual stimuli, and present their own seminal explanation of the phenomenon. Results suggest that the probability of noticing the unexpected object depended on the similarity of the particular object within the display and the difficulty of the task. Simons Chabris (1999) add that the spatial proximity of the object to attended location did not affect the detection, suggesting that participants attend to objects and events, not positions (Simons et al., 1999). However, this study did not explore whether individual differences in noticing, take place from differences in the ability to perform the primary task. Strayer, Drews Crouch (2006) compared drivers using mobile phones to drunk drivers, concludingthat when controlling for driving difficulty and time on task, mobile-phone drivers exhibited a greater impairment than intoxicated drivers. Results of this study found that the reaction time of drivers using a mobile phone were slower by 8.4 percent relative to drivers who neither had consumed alcohol nor were using phones. Also drivers using mobile phones were actually more likely to have a rear- end crash than drivers who had consumed alcohol (Strayer Crouch, 2003). The impact of using a hands free phone on driving performance was not found to differ from the impact of using a hand held phone, which researchers suggested was due to the withdrawal of attention from the processing of information in the driving environment while engaging in mobile phone conversation (Strayer et al., 2003). However, the measures used for the two impairments mentioned above, are quite unusual. Mobile phone i mpairment is associated with the diversion of attention and is temporary, while the impairment from alcohol persists for longer periods of time. Furthermore, while mobile phone users have some kind of control (e.g. pausing a conversation) drivers who are intoxicated cannot do much to control their performance. Studies that have looked at the effects of texting while driving have also suggested a negative impact on drivers performance (Drews, Yazdani, Celeste, Godfrey Cooper, 2009). Research by Drews Cooper (2009) found a lack of response time in participants who used their mobile phones to send text messages while driving on a simulator. They concluded the texters in the driving simulator had more crashes, responded more slowly to the brake lights of cars in front of them- and showed more impairment in forward and sideways control than drivers who talked on their mobile phones while driving. (Drews et al. also found that text messaging participants longest eyes off the road duration was over six seconds. At 55mph this equates to a driver travelling the length of a football field without looking at the roadway. In summary, the purpose of this study is to explore the effects of divided attention on response time. To achieve this purpose, this study aims to measure response times in the neutral, valid, and invalid conditions of a spatial cueing task, while participants use their mobile phones to talk or text. Based on both theory and past research, it is hypothesised that the control group will have significantly faster reaction times over all groups (text and talk). It was also hypothesised that the reaction times for the control group across all task types (valid, invalid, and neutral) would be significantly different. More specifically, it was predicted that the task type for the valid condition would be faster than the neutral task, and significantly faster for the valid than the invalid task. It was hypothesised that there would be a significant difference between participants reaction times within the talk group across all three conditions (valid, invalid, and neutral) in contrast to th e text group. More specifically it was predicted that the reaction times for the talk group will be significantly faster overall compared to the text group. Method Participants The participants of this study consisted of 61 graduate and undergraduate students of the unit cognitive psychology, from the University of Canberra (51 female and 10 male). Ages ranged from 19 to 60 years (M = 24.95, SD = 7.99). Participants were allocated a condition based on their tutorial group. Tutorial one were allocated to the text condition, this group included 20 participants of which two performed the control condition due to non- availability of a mobile phone. Tutorial two participants were allocated to the talk condition, this group included 18 participants, of which one participant did the control condition. Tutorial three and four participants were allocated to the control condition, this group included 24 participants, of which three participants did the text condition. One participant was excluded from the study, as they did not record their mean response times. Materials All 61 participants were given a spatial cueing task on the universities computer during class tutorials. Participants used the computer program Cog Lab 2.0 to view and complete the cueing task. Each participant was given an instruction sheet as per his / her tutorial group. Participants within the text and talk condition used their own personal mobile phone. Procedure Student participants were divided into three groups as arranged by their tutorial time and group. These groups comprised of three conditions text, talk, and control. While in tutorials participants were given an instruction sheet and told to follow the instructions as per their group category (text, talk, or control). In order to maintain confidentiality participants were asked to select and record a code name. They were than asked to give their age, gender, and identify the group they had been assigned to. Each group of participants were given a set of instructions that were unique to their own group. The text group were told to complete the spatial cueing exercise while writing and sending three text messages. They were instructed not to answer their phone or talk to anyone else during the experiment. The talk group were instructed to make a series of short calls or one long call while taking part in the experiment. They were also told not to answer the phone or talk to any one else in the room. The control group were given instructions to focus only on the experiment and give it the same attention they would if driving a car on a busy road. They were told not to talk on the phone, message, or talk to anyone else in the room. Participants were then asked to complete the spatial cueing task on the computer (Cog Lab 2.0) per their assigned group. Design Variables: The independent variable in this study was the mobile phone = 3 levels, the dependant variable was response time. Results Effect of Condition on Reaction Time Mean reaction times for the Text group were slower than for the Talk group, and those for the Talk group were slower than the Control group. Mean reaction times for each condition on the Neutral, Valid and Invalid tasks are shown below in Figure 1. Figure 1. Mean reaction time for control, text and talk conditions across neutral, valid and invalid spatial cueing tasks. A Kruskal-Wallis ANOVA indicated a significant difference in reaction times across Control (Mean Rank = 15.0), Talk (Mean Rank = 31.3), and Text (Mean Rank = 48.3) conditions, H(2,61) = 38.60, p The significance level was reset to p = .02 using a Bonferroni correction. A Mann-Whitney U tests indicated that the Text group (Mean Rank = 33.48 for Neutral task, Mean Rank = 33.95 for Valid task, Mean Rank = 33.0 for Invalid task, n = 21) had significantly slower reaction times than the Control group (Mean Rank = 12.48 Neutral task, Mean Rank = 12.04 Valid task, Mean Rank = 12.91 Invalid task, n = 23), U = 11.0, z = -5.416;U = 1.0, z = -5.181; U = 21.0, z = -5.651; (corrected for ties), p Follow-up Mann-Whitney U tests indicated that the Talk group (Mean Rank = 28.59, Mean Rank = 29.24, Mean Rank = 28.18, n = 17) also had significantly slower reaction times than the Control group (Mean Rank = 14.52 Neutral task, Mean Rank = 14.04 Valid task, Mean Rank = 14.83 Invalid task, n = 23), U = 58.0, z = -3.762; U = 47.0, z = -4.063; U = 65.0, z = -3.57; (not corrected for ties) , p Follow-up Mann-Whitney U tests indicated the Text group (Mean Rank = 25.81, Mean Rank = 26.86, Mean Rank = 26.05, n = 21) had significantly slower reaction times than the Talk group (Mean Rank = 11.71 Neutral task, Mean Rank = 10.41 Valid task, Mean Rank = 11.41 Invalid task, n = 17), U = 46.0, z = -3.89; U = 24.0, z = -4.536; U = 41.0, z = -4.037; (not corrected for ties), p Effect of Task Type on Reaction Time A Friedman ANOVA showed there was a significant difference in reaction times across task type for the control group, à Ã¢â‚¬ ¡2(2) = 24.09, p Discussion This study explored the effects of divided attention on response time. The results of the Kruskal-Wallis ANOVA did show a significant difference between reaction times across all three conditions (control, talk and text). However this analysis leaves the ambiguous situation of not knowing which condition/s differed more so than others. A second analysis was performed, this revealed that response times for the text group across all task types (valid, invalid, and neutral) were significantly slower than the control group, the effect was large. Results also revealed that the response times for the talk group across all task types were significantly slower than the control group; the effect was medium to large. These results are consistent with the first hypothesis. Previous studies much more scientific than ours, conducted in vehicle simulators have also found a significant relationship between similar aspects of texting, talking, and driving. However, drawing comparisons between this s tudies results and past studies results, issues arise over the current studies methods. This study was not employed in a driving simulator, nor was the task undertaken in a real driving environment or vehicle. Participant simply sat in front of a computer in a class room where they were told to imagine driving a car on a busy road. There is no possible way this would accurately represent actual driver duties or a real driving environment. The sample size is also quite questionable and would not represent the current driving population. A future benefit for this study would be to create a more legitimate driving environment and increase the sample size. The results of the fourth analysis also supported the hypothesis; these results showed the text group to have significantly slower reaction times than the talk group across all task types, the effect was large. Results are also consistent with past research on texting, driving and mobile phone use. Although, this study was not performed in a real or simulated driving environment these results were expected because texting required the participants to remove their eyes and attention away from the computer screen. However, these results only indicated a difference between reaction times, they do not suggest where the difference lies or how much interference can be attributed to the manual manipulation of the phone (e.g. texting), or how much can be attributed to the demands placed on attention by the phone conversation. A benefit to future studies would be to measure each one of these underlining factors separately and then compare those with other activities commonly engaged during dr iving. The last analysis showed there was a significant difference in reaction times across task type for the control group. More specifically results showed reaction time for valid tasks to be significantly faster than for neutral tasks, and significantly faster for the valid than the invalid. These effects were described as large. This result also supports the hypothesis and the previous study conducted by Posner and Davidson, (1980). However, most spatial cueing experiments including this one have been concerned with the effect of directing attention on the detection of stimuli. Little has been done on the influence of visual attention on higher-level cognitive tasks, i.e., where a response would involve making a decision between two or more alternatives (Johnston, McCann Remington, 1995). According to Johnston et al. (1995) responding to a higher-level cognitive task and detecting a stimulus may only be the first stage or a single process in a series of mental procedures involved in th e response. Directing attention to the location of the stimulus might result in faster detection of the stimulus. It may be beneficial for this study and others like it to explore this theory more comprehensively. References Beede, K. E., Kass, S. T. (2006). Engrossed in conversation: The impact of cell phones on simulated driving performance. Accident Analysis Prevention, 38, 415-421. Retrieved from http://www.Canberra.edu.au/library Drews, F. A., Yazdani, H., Celeste, N., Godfrey, Cooper, J. M., Strayer, D. L. (2009). Text Messaging during simulated driving. Journal of Human Factors and Ergonomics Society, 51, 762-770. Johnston, J. C., McCann, R. S., Remington, R. W. (1995). Chronometric evidence for two types of attention. Journal of Psychological Sciences, 6, 365-386. Posner, M. I., Snyder, R. R., Davidson, B. J. (1980). Attention and the detection of signals, Journal of Experimental Psychology, 109, 160-174. Reed, M. P., Green, P. A. (1999). Comparison of driving performance on-road and in a low-cost simulator using a concurrent telephone dialling task. Ergonomics, 42, 1015-1037. Simons, D. J., Chabris, C. F. (1999). Gorillas in our midst: Sustained inattentional blindness for dynamic events. Perception, 28, 1059-1074. Strayer, D. L., Drews, F. A., Crouch, D. J. (1999). A comparison of the cell phone driver and the drunk driver. Journal of Human Factors and Ergonomics Society, 48, 381-391. Strayer, D. L., Drews, F. A., Johnston, W. A. (2003). Cell phone- induced failures of visual attention during simulated driving. Journal of Experimental Psychology, 9, 23-32. White, K. M., Hyde, M. K., Walsh, S. P., Watson, B. (2010). Mobile phone use while driving: An investigation of the beliefs influencing drivers hands- free and hand- held mobile phone use. Journal of Traffic Psychology and Behaviour, 13, 9-20. Retrieved from http://www. canberra.edu.au/library Self-evaluation Form for Cognitive Psychology 2010 Lab Report For each item in the table, highlight or bold the description that fits your work for that component of the lab report. HD D CR P F Title n/a n/a n/a > 12 words Abstract concise, accurate and elegant description of problem, participants, experimental conditions, method, results, and conclusion. concise and accurate description of problem, participants, experimental conditions, method, results, and conclusion. D accurate description of problem, participants, experimental conditions, method, results, and conclusion (one omitted) generally accurate description of problem, participants, experimental conditions, method, results, and conclusion (up to two omitted) poor description of participants, problem, participants, experimental conditions, method, results, and conclusion (three of more omitted) Introduction concise, accurate and elegant introduction of the topic concise and accurate introduction of the topic accurate introduction of the topic CR generally accurate introduction of the topic, some minor errors of understanding less than accurate introduction of the topic comprehensive coverage of literature and substantial critical thought and analysis establishing importance, relevance and context of the issue comprehensive coverage of literature and sound critical thought and analysis establishing importance, relevance and context of the issue good understanding of the literature but limited critical analysis establishing importance, relevance and context of the issue CR good understanding of the literature but little or no critical analysis establishing importance, relevance and context of the issue little or no understanding of the literature or critical analysis establishing importance, relevance and context of the issue developed and justified argument for experiment using own ideas based on a wide range of sources which are thoroughly analysed, applied and discussed critical appraisal of the literature and theory from a variety of appropriate sources and developed own ideas in the process D clear evidence and application of readings relevant to topic and use of appropriate sources lit review is less complete than for D and HD literature is presented in a purely descriptive way (no critical thought); there may be limitations in understanding of the material literature is presented in a disjointed way with no critical thought and major limitations in understanding of the material exceptional understanding of problem and theoretical framework, and integration and innovative selection and handling of theories clear understanding of the general problem and theoretical framework and insightful and appropriate selection of theories good understanding of general problem and theoretical framework and most key theories are included in a straightforward manner CR adequate understanding of general problem and theoretical framework and selection of theory is appropriate but some aspects have been missed or misconstructed little or no understanding of the general problem and/or the theoretical framework concise, clear and accurate argument leading to a statement of hypotheses clear and accurate argument leading to a statement of hypotheses accurate argument leading to a statement of hypotheses CR generally accurate argument leading to a statement of hypotheses; hypotheses incomplete/inaccurate inaccurate or missing argument or statement of hypotheses Method concise, accurate and elegant description of participants, materials, design and procedures concise and accurate description of participants, materials, design and procedures accurate description of participants, materials, design and procedures CR generally accurate description of participants, materials, design and procedures (one may be missing) poor description of participants, materials, design and procedures; one or more of these may be missing experiment is completely and easily replicable from the information in the method experiment is completely replicable from the information in the method D experiment can be almost replicated from the information in the method errors are more noticeable and may be more serious experiment can be replicated with moderate accuracy from the information in the method one or two major errors experiment cannot be replicated with a satisfactory level of accuracy from the information in the method major and serious errors Results results from Moodle are included and correctly placed HD n/a n/a results from Moodle are included but incorrect placement or they have been altered results from Moodle are not included and/or correctly placed, or are not those provided via Moodle Discussion concise, accurate and elegant summary and interpretation of results related back to the hypotheses concise and accurate summary and interpretation of results related back to the hypotheses (only very minor errors) accurate summary and interpretation of results related back to the hypotheses (only minor errors) generally accurate summary and interpretation of results related back to the hypotheses (one or two more major errors) poor or inaccurate summary and interpretation of results related back to the hypotheses (major errors) comprehensive discussion of the results in relation to previous literature and theory, and substantial critical thought and analysis of where the current findings belong in the literature comprehensive discussion of the results of the results in relation to previous literature and theory and considerable critical thought and analysis of where the current findings belong in the literature sound discussion of the results in relation to previous literature and theory, and some critical thought and analysis of where the current findings belong in the literature CR reasonable discussion of the results in relation to previous literature and theory, but no critical thought or analysis of where the current findings belong in the literature poor discussion of the results in relation to previous literature and theory critically evaluation of evidence supporting conclusions including reliability, validity and significance comprehensive evaluation of the relevance and significance of results including reliability, validity and significance sound evaluation of the relevance and significance of the results including reliability, validity and significance CR satisfactory evaluation of the relevance and significance of the results including reliability, validity and significance little or no evaluation of the relevance and significance of the results including reliability, validity and significance exceptional interpretation of any unexpected results and discussion of alternative interpretations of findings clear interpretation of any unexpected results and discussion of alternative interpretations of findings good interpretation of any unexpected results and discussion of alternative interpretations of findings CR satisfactory interpretation of any unexpected results and discussion of alternative interpretations of findings little or no interpretation of any unexpected results or discussion of alternative interpretations of findings concise, clear and thoughtful discussion of problems, limitations and generalisability of the study, and implications for future research projects clear, accurate and thoughtful discussion of problems, limitations and generalisability of the study, and implications for future research projects D accurate and competent discussion of problems, limitations and generalisability of the study, and implications for future research projects discussion of problems, limitations and generalisability of the study, and implications for future research projects little or no discussion of problems, limitations or generalisability of the study, or implications for future research projects Norovirus: Causes and Solutions Norovirus: Causes and Solutions Contents Origin and spread of the Norovirus: Symptoms: Transmission in health care facility: Prevention of Norovirus: Preventive measures for spread of virus in health care facility: Early (or primary) control actions: Control of transmission at the ward level: Specific Nursing care for patients: Personal care: Proper hand hygiene: Extra care: Bibliography Essay Origin and spread of the Norovirus: Norovirus, occasionally acknowledged as the winter vomiting bug in the United Kingdom, is the utmost common reason of viral gastroenteritisin human beings. It affects individuals of all ages. The virus is transferred byfecally polluted water or food, by person-to-person interaction and through aerosolization of the disease and following adulteration of surfaces.The virus affects about 267 million individuals and reasons above 200,000 deceases every year; these deaths are frequently in less advanced republics and in the very young, aged and immunosuppressed. Norovirus infection is categorized by watery diarrhoea, forceful vomiting, nausea, abdominal pain, and in several cases, general lethargy, muscle aches, loss of taste, headache, weakness and low-grade fever may arise. The illness is typically self-limiting, and severe sickness is rare. Though having norovirus can be spiteful, it is not generally hazardous and most that contact it make a full retrieval in a couple of days. Norovirus is speedily disabled by either adequate heating or by chlorine based disinfection, but the virus is less vulnerable to alcohols and cleaners. (Ben Lopman, 2011) Aftercontamination,resistanceto norovirus is usually partial and momentarywith one publication drawing the deduction that defensive immunity to the similar pressure of norovirus continues for six months, but that all such resistance is disappeared after two years. Outbursts of norovirus contagion often happen in closed or semi closed societies, such as long-term care amenities, overnight campsites, clinics, schools, dormitories, prisons, and cruise ships, where the contamination spreads very speedily either by person-to-person spread or through polluted food. Numerous norovirus outbursts have been outlined to food that was controlled by one infected individual. (Sears, 2008) The species name  Norovirusis derivative of Norwalk virus, the only kind of the genus. The species causes about 90% of epidemicnonbacterial outbursts of gastroenteritisround the domain,and may be accountable for 50% of all foodborne outbursts of gastroenteritis in the USA. Symptoms: Symptoms recorded by the Centres for Disease Control and Prevention (2011) contain vomiting, non-bloody diarrhoea with stomach cramps and biliousness. These seem following a development period of 24-48 hours, though there are examples where signs present after only 12 hours succeeding disclosure to the virus.(Mcgeary, 2012) Blacklow (1996) found grown-up volunteers injected with the virus established a momentary mucosal laceration of the proximal minor intestine but had no colon association; this proposes norovirus infection frees the large intestine; hereafter faecal leucocytes do not exist in stool testers. This feature has been used to aid distinguish the contamination from others such as salmonellosis, C difficile infection orshigellosis. Transmission in health care facility: Noroviruses are found in the faeces and vomitus of infected individuals. This virus is very spreadable and can feast rapidly through healthcare amenities. People can become infested with the virus in numerous ways: Having straight contact with another individual who is infested (a healthcare employee, guest, or another patient) Ingestion food or drinking fluids that are polluted with norovirus. Touching tops or objects polluted with norovirus, and then touching your face or other food items. (HAIs, 2013) Prevention of Norovirus: In a healthcare capacity, patients with supposed norovirus may be located in isolated rooms or share accommodations with other patients with the identical infection. Extra prevention actions in healthcare amenities can reduce the chance of interacting with noroviruses: Follow hand-hygiene rules, and cautiously washing of hands with cleanser and water after interaction with patients with norovirus contagion. Use robes and gloves when in connection with, or caring for patients who are indicative of norovirus. Regularly clean and sterilize high touch patient exteriors and apparatus with an Environmental Protection Agency-approved produce with a tag claim for norovirus Eliminate and wash polluted clothing or linens Healthcare employees who have signs consistent with norovirus should be barred from work. Preventive measures for spread of virus in health care facility: The virus is characteristically conveyed to persons by the faecal-oral path from fecally polluted foodstuff or water, person-to-person interaction or interaction with polluted fomites. In current institutional outbreaks, airborne spread via vomiting has been suggested as expediting rapid spread of contagion. Once noroviruses are presented onto a region or floor, the contamination may spread speedily through the facility in spite of cohorting and actions to limit the feast of the contaminations. To support in the decision-making procedure for infirmaries and nursing homes when these contaminations happen, the Bureau of Communicable Diseases, Division of Public Health has collected a list of recommended, but not required control actions established from knowledge with organization of earlier hospital eruptions. The movements taken by diverse hospitals or nurturing homes may vary with the sum of cases and degree of spread within the facility. (health protection agency) Early (or primary) control actions: †¢ Once a catalogue case presents within an area, immediate separation of the patient and the instant area is necessary. †¢ Patients inflowing the hospital with indications evocative of norovirus contagions should be admitted straight to a private area until another cause of disease are recognized. †¢ The contamination control staff should be instantly notified about the beginning of the first case. †¢ Infection control run should meet every day to screen the outbreak and assess control actions. †¢ Support enteric defences and strategies to all staff associates. †¢ Staff should be repeated that good hand washing after all patient interaction (washing with warm running water and cleanser for at least 10 seconds) is the utmost operational way of dropping person-to-person feast of contamination. In the absenteeism of running water, alcohol emollient may be used except hands are totally soiled. †¢ The native health officer should be instantly notified once an outburst is alleged. †¢ Indicative patients or inhabitants should be cohorted. †¢ If an outburst lasts consider closing the facility to new admittances. †¢ Pretentious staff must be controlled from patient interaction for 48 hours after termination of signs. (management of norovirus, 2004) Control of transmission at the ward level: †¢ Unluckily, by the time the outburst has been documented on a ward, it is probable the majority of vulnerable patients and employee on duty may have been exposed to the infested agent, mainly if vomiting is an extensive symptom. †¢ Gowns, gloves and masks should be worn every time contact with a diseased patient or polluted atmosphere is expected. †¢ Affected areas or floors should be sealed to new admittances and companions to avoid the introduction of other vulnerable individuals. †¢ Airborne spread may be a noteworthy contributor to the sum of cases since projectile retching could possibly create infectious sprays. Air flows created by open spaces or air conditioning could scatter aerosols extensively. Air streams should be reduced. †¢ Affected areas should persist closed until a 48-hour period has passed with no fresh cases amongst patients or staff. †¢ Non-essential employee should be excluded from pretentious clinical zones. †¢ Reducing the risk of communication from sickness may be problematic. (HPS norovirus outbreak, 2013) The following actions may be valuable and are suggested: †¢ Removal of exposed foodstuffs such as plates of fruit †¢ Rapid washing and fumigation of parts where vomiting has happened with a 0.1% hypochlorite solution (made fresh everyday) †¢ Administration of anti-emetics drugs †¢ Full cleaning routine on all pretentious wards. (Norovirus outbreak prevention toolkit, 2012) Specific Nursing care for patients: Personal care: Patients with Norovirus infestation are very sensitive because this disease is very irritating due to its unbearable symptoms. Nurses should provide such patients great personal care. Nurses must give attention to individual patient for hygiene. Symptomatic treatment is provided to such patients so nurses must provide extra care to patients. Nurses should wear Gowns, gloves and masks all the time and should not move outside of ward frequently to prevent spread of the disease. (Caballero, 2014) Proper hand hygiene: Staff should rinse their hands (or use alcohol-based hand disinfectant) whenever they go in and leave a patient/resident area. Staff may be more directed to achieve hand hygiene at the following intervals: †¢ Particular intermissions (e.g., once per hour) †¢ Upon ingoing to a kitchen †¢ After using the washroom †¢ After shaking hands or other bodily contact with colleagues or visitors †¢ After sneezing †¢ After touching the face of patient †¢ After puffing the nose †¢ After rubbing hands on dress and similar actions †¢ After treating raw foods †¢ After usage of dirty kitchen gears and kitchenware †¢ After sweeping, cleaning, or mopping †¢ After a discontinuity †¢ After eating, smoking, or drinking †¢ Before and afterward using PPE e.g. gloves †¢ Before treating the food, particularly ready-to-eat foods and frost. Though, detailed hand-washing is also significant in keeping gloves or other gears from flattering vehicles for transporting microorganisms to the food. †¢ Preceding to handling or administering any oral medicines †¢ After changing diapers †¢ After handling other possibly polluted objects. (norovirus management toolkit) Extra care: Extra assistance is a need of these patients. Patients of Norovirus are disturbed psychologically due to its irritating symptoms so these patients require extra care and time. Vomits should be cleaned immediately and properly to prevent the airborne spread of this disease. Nurse should be present in ward all the time to provide extra care to these patients. Nurses have very significant role in patient care because they are the only staff in the health care facility that takes care of the medications, hygiene and moods of patients and patients with Norovirus require extra care due to their conditions. Bibliography management of norovirus. (2004, feburary). Retrieved from public health: http://www.publichealthmdc.com/environmental/food/documents/ManagementofNorovirusInfectionOutbreaksinHospitalsandNursingHomes.pdf Norovirus outbreak prevention toolkit. (2012, october). Retrieved from public health country of los angeles: http://publichealth.lacounty.gov/acd/docs/Norovirus/NoroToolkit2012.pdf HAIs. (2013, feburary 25). Retrieved from Centres for disease control and prevention: http://www.cdc.gov/HAI/organisms/norovirus.html HPS norovirus outbreak. (2013, september). Retrieved from national services scotland: http://www.documents.hps.scot.nhs.uk/hai/infection-control/toolkits/norovirus-control-measures-2013-09.pdf Ben Lopman, P. G. (2011, december 11). Environmental transmission of norovirus gastroenteritis §. Retrieved from http://uepa.br/portal/downloads/Lopman2012.pdf Caballero, v. (2014, november 15). role nursing in norovirus outbreak. Retrieved from American public health association: https://apha.confex.com/apha/142am/webprogram/Paper298230.html health protection agency. (n.d.). Retrieved from british infection association: http://www.his.org.uk/files/9113/7398/0999/Guidelines_for_the_management_of_norovirus_outbreaks_in_acute_and_community_health_and_social_care_settings.pdf Mcgeary, t. (2012, feburary 3). how to prevent the spread of norovirus. Retrieved from nursing times: www.nursingtimes.net/how-to-prevent-the-spread-of-norovirus/5040972.article norovirus management toolkit. (n.d.). Retrieved from nevada state health division: http://www.health.nv.gov/PDFs/HSPER/NorovirusManagementToolkitResponsePlan_Version1-1.pdf Sears, T. M. (2008, july 8). Gastrointestinal Flu: Norovirus in Health Care and Long-Term Care Facilities. Retrieved from clinical infectious diseases: http://cid.oxfordjournals.org/content/47/9/1202.long