Thursday, October 31, 2019

Historical english paper Research Example | Topics and Well Written Essays - 1250 words

Historical english - Research Paper Example Thou, as used in the play, has a meaning of the second person pronoun in the singular form. It is in its archaic form as it has been currently replaced by ‘you’. It is in the normative form. Its oblique or objective form is ‘thee,’ whereas the possessive form is ‘thine.’ The word following it in the sentence is ‘done,’ which begins with a consonant letter. ‘Thou’ was originally a singular counterpart of ‘ye’, a pronoun, which traces its origin in the Ancient Indo-Europe. Due to the language progress in the Indo-Europe, the word was later adapted and used in the expression of intimacy, disrespect, as well as familiarity. The word has been used in the inquisitive sentence by Horner to Quack. As stated, the word has been used in asking a question. It is preceded by the word, ‘hast’, which is also an archaic word. This is one of the common features of archaic words. In this case, Horner is using a commanding tone in asking the question to his colleague. This is a proof that the word is mainly used or applied in making interrogations, or in interrogating sentences. Using it in a sentence, especially in a play, implies direct approach of a particular character on the other. In general, the author of the play has used the word to succeed in the achievement of commanding tone in this section of the play. The tone is necessary for the smooth continuation or enhancement of the play’s plot. It is also a depiction of the relationship existing between the speaker, Horner and the addressee, Quack. Considering the general flow of the play and the character roles in the play, Horner is portrayed as a leader, a charismatic individual and a more aggressive person compared to many other characters in the play. Another instance where the word has been used is by Horner talking to Har. â€Å"But why shouldst thou be afraid†¦Ã¢â‚¬  (Wycherley 26). The second word in the

Tuesday, October 29, 2019

Should we mine this Ore Essay Example | Topics and Well Written Essays - 500 words

Should we mine this Ore - Essay Example The amount of light that passed through the solutions to the photocells is used to determine the absorbance of each solution (Reynolds & Thompson 26). The equation of the standard curve is given by y =mx + b. Plotting a graph of absorbance against concentration for the standard solutions produces a curve that has a direct relationship with the equation of the standard curve (Bartlett 159). The direct relationship between concentration and absorbance for a solution is referred to as Beer’s law. Concentration of unknown compound can be determined from the graph by measuring its absorbance. Its absorbance is located on the x-axis of the graph, and its corresponding concentration is determined on the y-axis. Concentration of the unknown solutions can also be established from the slope of the Beer’s law curve (Bartlett 159). A blank solution was then prepared by filling the cuvette with distilled water to a volume of  ¾ full. Care was taken not to contaminate the cuvette while filling it. Spectrometer was then calibrated by placing a blank cuvette into the cuvette grove of the spectrometer (Reynolds & Thompson 160). In order to determine optimal wavelength for plotting this standard curve, 0.4 M standard solution was placed in the cuvette slot. The cuvette was then rinsed twice with 1 mL solution in Test Tube 1, and then refilled to  ¾ of its volume. The outside was wiped with a tissue paper and placed into the cuvette, and absorbance of the solution was measured (Bartlett 159). This process was repeated for solution 2-5 until their absorbances were obtained. The absorbance of each solution was recorded in the data table. The data recorded was used to draw a graph of absorbance Vs concentration. The concentration of Copper (II) sulfate was obtained from the graph by determining its corresponding rea ding on the y-axis. Among all the acids

Sunday, October 27, 2019

What Caused The Korean War History Essay

What Caused The Korean War History Essay The North Korean leader, Kim Il Sung invaded South Korea on 25th June 1950, with about 89,000 of his troops and tanks achieving total tactical and strategic surprise against only 38,000 South Korean soldiers. They were fully armed with heavy weapons and equipment supplied by Stalin and the Soviet Union.  [1]   The war that started in 1950 which lasted for three years can be analysed under two aspects: political and ideological. Analysing ideologically, communist within the region of China, Soviet Union and North Korea, desired to secure the Korean Peninsula to be a part of communist bloc. Politically, the West and the USSR growing tensions and the emergence of the cold war intensified the stability that stemmed from a divided Korea. This essay will examine the causes of the Korean war including factors such as the historical, ideological differences and the primary causes of the war which are believed to be the division of Korea in 1945, the character of both leaders, kim II Sung and Sungman Rhee, as well as the influences of International actors, in particular capitalist West (namely the US) and the communist East (namely the Soviet Union but to a lesser degree, China), and the difference in policies of the United States and the Soviet Union toward North and South Korea. In order to understand the causes of the war in Korea, it is essential to look at the history of the country. When in the 1880s Korea opened its gates to the western world, pro-Chinese, pro-Japanese, pro-Russian and pro-American factions all emerged, It is also to be kept in mind that Japan ruled Korea for more than 40 years from 1904 to 1945 until the USA and Soviet Union agreed to expels the Japanese territory by the USA taking over the southern region of Korean to the 38th parallel whilst the Soviet Union would occupy the northern part.  [2]   In 1910, when Japanese ruled Korea and established a rough direct over its people, It was then that the elite class such as businessmen, landowners and manufacturers were not irritated but merely continued to do their jobs as the circumstances facilitated them. Conversely, the lower and workers class emerged in opposition and demanded urgent reforms in the country. The Japanese plan was to defend home islands by maintaining control of Korean Peninsula which resulted in political and cultural repression, there was also growth of Communism and Conservative nationalism at that time. As soon as World War II ended the tension was clear, one of the most important features of the post-world war was the appearance of a clear and obvious global competition for spheres of influence between the Soviet Union and the USA. The division of the country by 38th parallel by US and USSR had implicit the continuation of the civil tension as the people were divided politically and ideologically.  [3]  The Koreans were not trusted to rule Korea independently. The region being separated by the USA and USSR was the reason that the country had to remain separated into two halves as both super power countries had their own way to set up the legitimacy and execution of the political and economic issues of the country. These changes having being occurred in the region came to the situation that the regions could not be joined again as a single territory.  [4]   William Stueck argues convincingly;Soviet-US occupation of Korea, especially without precise agreements on its nature and duration, greatly reduced Koreas prospects for a smooth transition toward independence and unityà ¢Ã¢â€š ¬Ã‚ ¦[and furthermore] the division of the independence movement into Communist and anti-Communist groups compounded the potential problems in constructing a unified, indigenous government.  [5]   This division was possibly the most significant event in the history of Korea, as, if the country had not been separated by force by the outside powers, arguably there would not have been a Korean War. Of course, this is debateable as, when the Japanese surrendered, the possibility of a civil conflict due to those inequities and imbalances Koreans had suffered historically, was in fact defeated by the involvement of the Soviet Union and the USA.  [6]   The division had many consequences on the economy, one of the most pressing issues was the economic crisis between the two territories following a mass departure of around 2 million Koreans from the North to the South, today the South Korean population is double that of North Korea. This mass exodus was due to the fact that resources were also divided, the North gained in natural resources, whereas the South now had two-thirds of the workforce and the country was in crisis, Therefore, civil tension continued between varying ideologies in the two territories throughout. Furthermore, this division affected the cultures of both Koreas especially in regard to military, political, ideology and foreign alliances. On both sides the tension caused by division meant that the military became important.  [7]   The USA established a military government in South Korea whereas Soviet Union did so in North Korea. The region rule by the Americans was given to 24th corps US Army headed by General John R. Hudge whereas; the Soviet Union gave this responsibility to the 25th Army, the 1st Front of Soviet Far Eastern Front Forces (under Col. General Ivan M. Chistiakov). The masses of Korea opposed the military rule in their respective countries, which caused a high level of dissatisfaction, especially in the South. Furthermore, the US Army was unprepared for the mission to rule South Korea as compared to the Soviet Union.  [8]   The Moscow agreement was a great shock to the Korean people, who expected independence. They directly launched a nationwide movement opposing the trusteeship. The communist initially opposed trusteeship, but quickly changed their attitude later under a directive from the Russians. After Moscow conference divisions deepened between North and South, resulted in an economic, political and social unrest in South. The USA support was wavering and hesitate to support South who wanted a change in their political and economic position. However, the Soviet determination for North was to dominate through Communism. The USA still kept on safeguarding its own interest and tried every way in which Communist party could be stopped to come into power if Korea was reunited.  [9]   The United States policy toward Korea was non-ideological, at that time, the US considered Korea nothing more than a secondary objective to the security and defence of Japan. Korea continued to be a secondary objective because partly of the great distance between the two countries and partly because the US thinks that Korea is a minor strategic value.  [10]   On the other hand, the Soviet Union had a historical interest in Korea, North Korea was vital to the ideological interests, and strategic objectives of the Soviet Union to safeguard the rights obtained in Manchuria in return for the declaration of war against Japan in the final days of World War II, This was all the more so because of their need to cope with the American influence in South Korea, and the growing communist influence in China. Therefore the policy of the Soviet Union toward North Korea was constantly strong from the start.  [11]   With the rise of Marxism- Leninism in Russia in 1917 and the emergence of the struggle between Nationalists and Communists in China in the 1920s, Korean exiles inevitably took sides, with traditionalists of a Confucian stripe looking to the Nationalist Chinese, Liberals of a capitalist, democratic bent appealing to the Unites States, and radicals casting their eyes toward the Soviet Union and/or the communist Chinese.  [12]   Americans entered South Korea to keep Japan disarmed, but it was clear that they were unaware of the development they had to make in the region. The United Commission as forced by the USA voted for elections in Korea, the communist bloc of the region boycotted the elections and Syngman Rhee was declared as the President of South Korea.  [13]  It can be argued that the UN intervention is a fledging organisation which been forced into action. There was a little credibility due to alignment with the US. South Korea was not fully prepared for the war because the South Korean leader had not been much aware of the war issues as compared to North Korean leader Kim II Sung who appeared to be in power assisted by Colonel Alexandre Ignatiev and General Ternetiv Shytykov who were a part of the Soviet occupying force. Communism was quickly spread throughout the country by the police oppression, pressure and violence.  [14]   There was no attempt to examine closely the communist ideology of the leftists, to discover how far they were the creatures of Moscow, and how far they were merely vague socialists and nationalists who found traditional landlordism repugnant. No allowance was made for the prestige earned by the communists dominant role in armed resistance to the Japaneseà ¢Ã¢â€š ¬Ã‚ ¦ Given time and encouragement, [the KPR]..might have offered South Korea its best prospect of building a genuine democracy.  [15]   The failure then, ultimately of the US in Korea, was to side with reactionary, conservative factions who were inextricably linked to the period of Japanese colonial rule. In their view, they found it easier to deal with the ones that have had been for the same tasks and orders at the times when Japanese used to rule the nation, as opposed to helping to organise and mustering a viable future leadership from the many leftist factions, which though often divided among themselves nevertheless had the genuine support of a significantly large section of the Korean population. But if this was a US failure then it was also a failure of the Soviets as both countries chose to exclude the Korean leaders from any representation of the country, aimed at setting up a five-year trusteeship for the nation in question, prior to free elections being held. In the meantime, it was decided that the US and USSR, respectively, would take responsibility for governing the two halves of the country: in the s outh General Hodge led a US military government, and in the north the Soviets oversaw a communist-style rule.  [16]   It was decided in 1946, that the Democratic Peoples Republic of Korea (DPRK) would start to shape her military in order to protect her interdependence, this idea was urgently shaped into reality and at the end of that year they had created two divisions. North Korea kept on doing reforms in the army so that the South could find no way to harm it. By 1949, the military was equipped with a tank brigade, engineers, signals, anti-aircraft artillery, and one more infantry division. They were also on the initial stage to create their navy and air force, furthermore they sent two infantry divisions to fight in Manchuria against the Chinese Nationalists specifically in order to gain experience needed to be ready for any offensive attack against South Korea.  [17]   The main aim of the Democratic Peoples Republic of Korea was to safeguard the workers republic and the acts and the efforts of the Workers Party as well as the creation of forces was the reason why the government remained active. In the meantime, Kim II Sung kept on getting stronger and appeared as the Premier of DPRK in 1948 and was nominated as the Chairman of North Korean Workers Party in 1949.  [18]  He was Known as great leader in North Korea. Conversely, Rhee appeared as a leader of South Korea who was anti-communist. He wanted the China civil war to end in favour of the Nationalists. Among his concern was to wash away the Communist and demolish any Communist power or influence in Korea before the situation get worse and developed into a civil conflict. He, as with the Americans, believed that the Communists in Korea were a puppet of the Soviets; therefore, he believed that some kind of police intervention was needed to limit their influence. As his thoughts involved any actions that kept the communists away, he ideologically influenced the minds of people and made certain reforms to forcefully strengthen the country which drew an ideological line between North and South Korea.  [19]   The USA did not seem to back any actions or thoughts of Rhee as they were aware of the fact that Rhee attempts to attack the Northern part, the circumstances would not appear in favour of either. The USA could not be seen to be supporting any attack against the North as it would be regarded as an attack against the Soviet Union. South Korea was somehow in control of Rhee and he kept on using the force against the communists especially after 1946 elections.  [20]  South Korea was blamed for the start of the conflict. Rhee prompted border clashes prior to the invasion from the North such as that he executed some of the Northern civilian because they were spying and this was the ignition of the war. This idea that South Korea began the war was also insisted by Cummings who said that Rhee deliberately went for such actions so that the USA would support and intervene which will allow Rhee and his forces to invade North Korea.  [21]  On the other hand some argue that it was indeed North Korea who began the war and therefore had to plan the situation before hand and did such actions to initiate the war. Nonetheless this does not mean that Kim II Sung from North Korea was the one who necessarily caused the war. In May 1950, the strengths and weakness of North Korea and South Korea described as follows: It says that North Korea had organised areas with strong military and efficient divisions. North Korea had the potential that if guerrilla war started, it would be able to defeat the other side. Conversely, the South Korea did not have much potential to fight against the North as it was politically bent into conflicts and was equally losing its economic grip. Moreover, the military was far less efficient than that of the North. Tension along the 38th parallel had been serious since 1947 but was worse on some cases. It was assumed that any time the civil war could begin nevertheless the tactics that were to be used in the war were still unknown.  [22]   To understand the reasons for the escalating hostility between the super powers countries over Korea, related in developments in China. As the year 1949 was marked with the independence of Peoples Republic of China, it was then that the communist leader Mao Zedong appeared as victory over Nationalists forces on the country.  [23]  The Chinese were fully supporting the Communists in North Korea, Furthermore, tens of thousands of North Korea troops were receiving their military training and equipment from China. Mao Zedong also attempted to insist for a reunite of Korea in which communist will rule and the whole region will appear as a strong communist bloc of the region. South Korea and the USA were totally aware of the developments and were really concerned about the strong communist being spread in the area.  [24]  It worth mentioning here that North Korea assisted Maos communist during civil war. From UN perspective, UN refused to accept Legitimacy of communist rule and sus pended Chinas membership. As the communists gained strength in the region, the Americans and South Korea feared that this will end in a complete failure of the Nationalists. For this reason, Taiwan was used as a final weapon to weaken the communists. It is evident that the inhabitation and alteration in Taiwan were clearly tied to the Korean issue as the Nationalists could only be strengthened in that way. The Nationalists on Taiwan heartedly supported South Korea and showed full opposition to the emergence of communists strengths. The USA feared that having communists spread in the region means that the full control of region will be under the Soviet Union or China power, For the Americans, the advantage they feared which could be gained by Stalin in case the Taiwan was occupied or won by communist and therefore made them decide better defensive action for the stabilisation of South Korea.  [25]   In terms of President Truman involvement and the USA, it is obvious that they were awkward as they had not completely closed the chapter of World War II and still feared the Communist lobby to overrule them. As McCarthyism spread and communism kept on making its roots stronger across the world. This fear was also felt in Trumans government and they were afraid of the spread of communist around the world. As Mao Tse-tung gained power in China and the Soviet Union went for nuclear tests in 1949, the USA was even worried about communism and altered their foreign policy which was deeply dependent on the developments of Asia.  [26]   The Soviet Union did not cooperate with the USA and did not answer any attempts that the USA military governments in South Korea made. For this reason, the problem of solving the dispute between the North and South Korea was moved to the back row. The Americans tried to discuss and come up with an agreement to solve the economic and refugee problems and establish political measures for the future of Korea. The first priority of both super power governments was to have their own problems solved.  [27]   Developments in Asia were the reason that the USA feared the world to a large extent depended on the South Asia politics and the decisions that the countries in South Asia made. North Korean invasion made the USA redesign their thoughts about Asia. The American foreign experts thought that the Soviet Union has somehow lost some power in the region and it is China that gained power gradually and become a danger in South east Asia.  [28]   Americans at that point realised significance importance to remain in the scenario. It argued that Domino principle of Stalins communism had to be stopped in the region and if not urgently brought to a halt, communism will influence the Western Europe and therefore will be a great danger to invade Europe as well. Analysing all the circumstances, it was decided that the USA start aiding South Korea which was formally announced by President Truman on 27th of June 1950.  [29]   In Conclusion, it is illustrated that no one can ignore the differences in the ideology and political affiliation of North and South Korea; this was not necessarily the basis for the conflict in Korea. It is evident that the attempt of North Korea to invade the South ignited war, but the attempts of South before invasion could not be simply ignored. The situation that created instability from 1945 to 1950 was because of South Koreas attempts to stop communism from being spread at any cost. Before being invaded, Korea as a country had many social and political issues that needed to be dealt with sincerity. The activates and policies of the two super power are the reason that Korea could not be reunited afterwards. The United States did not wish to see South Korea incorporated within the communist sphere but would make the defence of South Korea a priority. It was the Soviet Union that supported Kim II Sung to act against South Korea from April 1950 to June 1950. It was perceived by Russia that it will result in support of North Korea from inside the Southern part and that the USA might not be able to handle the issue. China was involved deeply before June 1950 and Kim II Sung told Mao Tse-tung that it would be necessary for China to intervene. The Korean War was both a civil and an international war. The two Korean states failed to resolve the issue. 38th parallel kept on bearing tensions ignited by both North and South Korea for many years which finally made North Korea to start war against South in which the Soviet Union completely supported North Korea. Kim II Sung and Syngman Rhee equally heated the issue and remained the centre of wrong activities from 1948 to 1950.  [30]   The Korean issue could not be tied to just one actor; it had many actors that acted for their own benefit with non-playing role for the benefit of united Korea. It is understood that the international powers played their role as per the wishes of Kim and Rhee but more specifically all the super powers deep inside wanted their own interests to be safeguarded behind the curtains of Korea. The Soviet Union and the USA never purely identified that reunited Korea as the major cause but their failure to understand the issue and act accordingly brought the situation to such an extent where war continuously emerged. North and South Korea both are to be blamed for making matters worse as well as the super powers that did not understand the conflict from its soil. After Chinese military intervention, the USA was more concerned about communism being spread. Korea was a victim of her own leaders and of the mutual suspicions and hatreds of the superpowers in the Cold War. Finally, it is very vital that this essay has shown the international and historical context of the conflict. However, due to the conflicting ideas from revisionists and traditionalists it is difficult to establish a clear blame here. Although, North and South leaders were not passive in this war, they had a very strong military and political role to play. Both Kim and Rhee managed to use their international actors. James Matray argues that ultimately Soviet- American failure to co-operate prevented Koreas peaceful reunification  [31]  which is a major factor to cause the war.

Friday, October 25, 2019

A Comparison of Satire in Catch-22 and Good as Gold :: comparison compare contrast essays

Satire in Catch-22 and Good as Gold    Joseph Heller who is perhaps one of the most famous writers of the 20th century writes on some emotional issues such as war. He does not deal with these issues in the normal fashion instead he criticizes them and the institutions that help carry these things out. Heller in fact goes beyond criticizing he satirizes. Throughout his two major novels Catch-22 and Good as Gold he satirizes almost all of America's respectful institutions.    Catch-22 is a satire on World War II. This novel takes place on the small island of Pianosa in the Mediterranean sea late in the war when Germany is no longer a threat. It is the struggle of one man, Yossarian, to survive the war. Throughout this novel Yossarian is trying to escape the war, and in order to do so he does many improper things. Good as Gold is about a Jewish man named Gold. It is about Gold's experiences with the government while being employed in the White House. It also deals in detail with Gold's family problems and Gold's struggle to write a book on the contemporary Jewish society. Throughout these two novels, Catch-22 and Good as Gold, Heller criticizes many institutions. In Good as Gold it is the White House and government as a whole, and in Catch-22 it is the military and medical institutions.    In Catch-22 the military is heavily satirized. Heller does this by criticizing it. Karl agrees with this statement by offering an example of the satire of both the military and civilian institutions in Catch-22:    The influence of mail clerk Wintergreen, the computer foul-up that promotes Major Major, and the petty rivalries among officers satirizes the communication failures and the cut-throat competition Heller saw within both the civilian and military bureaucracies of the 1950's. Even the Civil Rights movement, not yet widespread in the 1950's, is satirized in Colonel Cathcart attitudes toward enlisted men. (23)    Karl summarizes the satirazation of the military with this:    The enemy in Heller's book is not simply the chaos of war, but also the deadly inhuman bureaucracy of the military-economic establishment which clams to be a stay against chaos while it threatens human life more insidiously then battle itself.    Heller also questions the need for the death and carnage throughout the novel asking if it is really necessary.

Thursday, October 24, 2019

Bipolar Disorder Essay

Over the years there have been many misconceptions about what bipolar disorder is, what the symptoms are, and how it is treated. Bipolar disorder, also known as manic-depressive illness, is a brain disorder that causes unusual shifts in mood, energy, activity levels, and the ability to carry out day-to-day tasks. A person who has â€Å"mood swings† does not automatically qualify them for a diagnosis of bipolar disorder. The characteristics of bipolar disorder are significant shifts in mood that go from manic episodes to deep depressive episodes in waves and valleys that never end. Nearly 2% of Americans have been diagnosed with bipolar disorder, more commonly known as manic depression. Scientists are constantly studying the possible causes of bipolar disorder. Most scientists agree that there is not one single cause, but is caused by a combination of biological and environmental factors. Even though it has not been proven that bipolar disorder is hereditary, it does tend to run in families. Children with a parent or sibling who has bipolar disorder are much more likely to develop the illness, compared with children who do not have a family history. Bipolar patients are more likely to use mind altering drugs to try and self-medicate therefore making diagnosis a harder process. â€Å"Doctors diagnose bipolar disorder using guidelines from the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV). To be diagnosed with bipolar disorder, the symptoms must be a major change from your normal mood or behavior† (Youngstrom, E., 2012, October 23). Below is a chart demonstrating the different mood changes and behavioral changes between a manic and depressive episode. It was once thought that there were only two types of bipolar disorder, but now the disease has been broken down even further into several different disorders. Bipolar I disorder is the most severe form of the illness with  extreme manic or mixed episodes that last at least a week. â€Å"Bipolar I disorder is characterized by at least one manic episode during your lifetime. Usually there are depressive episodes as well that last two weeks, however you do not need to have a history of depression to be diagnosed with bipolar I disorder. Bipolar II disorder is defined by experiencing both a hypo-manic and a depressive episode. To meet the criteria for bipolar II, a previous episode of depression is necessary, along with symptoms of less intense mania lasting at least four days† (Caponigro, J., Lee, E., Johnson, S., & Kring, A., 2012). Cyclothymia is defined by a pattern of chronic and frequent mood changes. These mood changes are not as extreme as those experienced in manic epi sodes. The diagnosis is based off of how much of the time some type of changed move is present. Most people diagnosed with Cyclothymia tend to feel very â€Å"up† or very â€Å"down† at least half of the time. This diagnosis is not considered until those mood fluctuations have continued for a very long time: generally one year for adolescents and over two years for adults. These episodes must last for at least two years without more than two months of a stable mood during that time to qualify for this diagnosis. Bipolar NOS or not otherwise specified is the diagnosis that covers forms of bipolar that don’t fall into any of the other categories. The mood episodes are extreme enough to be classified as manic, hypomanic, or depressive but do not meet the duration requirements for bipolar I, bipolar II, or cyclothymic diagnosis. Bipolar disorder cannot be cured, but it can be treated effectively long-term. Because it is a lifelong illness, long-term treatment is essential to control symptoms. It is essential to receive the correct diagnosis to receive the most effective treatment. Medication is the most effective treatment for managing symptoms of bipolar disorder and extending periods of mental and physical wellness. Most often, the first medicines used are called mood stabilizers. â€Å"Since the early 1960’s, lithium has been the most commonly used mood stabilizer† (Fink, C., & Kraynak, J., 2013). Some other medications that are prescribed for the treatment of bipolar are Trileptal, Topamax, and Neurontin. Because it is believed by some that bipolar disorder is caused by a chemical imbalance in the brain, these medications have been effective in treating bipolar disorder, but they are not considered effective treatments for bipolar symptoms. Antipsychotics  medications are used to reduce psychotic symptoms and lowering irritability, and they can be the fastest way to treat an acute manic episode. Antipsychotic medications are usually stated during an acute manic phase while the patient is in the hospital, and used as a maintenance treatment after the patient is released. The biggest hurdle in treatment of bipolar disorder is ongoing treatment. When patients are diagnosed correct ly and started on the correct medications it is vital for those medications to be continued by the patient. Many bipolar patients feel that once their mood has stabilized that they are â€Å"cured† therefore they stop taking the medication. In conclusion, receiving a bipolar diagnosis does not have to be the end of the world. Many brilliant and upstanding people have been diagnosed and effectively treated for bipolar disorder. It is important to have regular visits with a psychiatrists to discuss your medications and side effects. Blood tests are sometimes ordered to check the levels of your medications and the response of your body to these medications. It is important to stay on the prescribed medications and to try and keep a normal daily routine. A support group and supportive friends and family are vital in maintaining a good balance between the highs and lows. Even though there is not a cure, it is possible to live a happy and productive life. References Caponigro, J., Lee, E., Johnson, S., & Kring, A., (2012). Bipolar Disorder: A Guide for the Newly Diagnosed. Oakland, CA: New Harbinger Publications, Inc. Fink, C., & Kraynak, J., (2013). Bipolar Disorder for Dummies 2nd Edition. Hoboken, NJ: John Wiley & Sons, Inc. Youngstrom, E., (2012, October 23). Myths and Realities about Bipolar Disorders. Retrieved from http://www.apa.org/news/press/release/2012/10/bipolar-disorder.aspx

Wednesday, October 23, 2019

Duality in Psycho 1960 Essay

Psycho is a 1960 horror film directed by Alfred Hitchcock starring Anthony Perkins, Janet Leigh, Vera Miles and John Gavin. The film is based on the 1959 novel of the same name by Robert Bloch. The main theme that Hitchcock tries to express to the audience is dual or split personalities. Everyone has a subconscious battle with good and evil; he shows this in many different ways using lighting, different camera techniques, mise-en-scene and silence. Also he used a string orchestra to add tension and drama as well as setting the tone for impending violence. The movie starts with Marion Crane and her boyfriend Sam Loomis in an intimate scene, before she has to go back to work. When she returns to work she is instructed to bank $40000 for her employer but decides to steal it and skip town instead. Driving on a rainy night, she pulls into the Bates Motel where she meets Norman Bates. After being showed to her room the two have dinner and they talk about Norman’s ill mother. Later that night while Marion is in the shower a shadowy figure comes and stabs her to death. Norman bursts into the bathroom and finds Marion’s dead body so he wraps her in a shower curtain then dumps her body and car in a nearby swamp. Marion’s sister Lila and boyfriend Sam are concerned about her disappearance. A private detective named Arbogast is also looking for Marion. Arbogast finds the Bates Motel and notices Norman acting suspiciously. He mentions Marion meeting his mother, so Arbogast goes up to the house to find her but a figure emerges and murders him. When Arbogast doesn’t return Lila and Sam visit the sheriff who is puzzled about Arbogast’s claim that the mother died years ago. Sam and Lila rent a room at the Bates Motel and while Sam distracts Norman, Lila sneaks up to the house where she finds Norman’s mother’s corpse. Norman Bates then bursts in, wearing a dress and wig and tries to kill Lila but is stopped by Sam. After Norman is arrested the psychiatrist reveals that Norman murdered his mother and her lover and then developed a split personality to erase the memory of the crime. The movie ends with Marion’s car being pulled from the swamp. (Ebert,1998) One of the main techniques Hitchcock uses to express the theme of duality is  the use different lighting. This is evident in the parlour scene when Norman and Marion are talking about Norman’s mother. The light source in this scene is high on the wall and closer to Marion leaving Norman in the dark. The angle light behind Norman is very sharp and it draws the audience’s attention to the large dead birds that Norman has but leaves everything else behind him very dark and dull to make it seem almost like he’s lurking in the shadows. (Lamb,2013). Again in the parlour scene only half of Normans face is lit insinuating that he has a dark side but also that half of him is still good. This technique is used more than once throughout the film. In the same scene Marion is depicted as sweet and innocent with her full face being lit. She has a large round light behind her leaving no shadows and lighting the entire wall. It’s in this scene that Marion good side prev ails and she decides to go back to Phoenix and return the stolen money. Another technique Hitchcock uses well in the film is sound. The score was written for a string orchestra by Bernard Herrmann even though Hitchcock initially requested a jazz score. However, after the film’s success, Hitchcock said â€Å"thirty three percent of the effect of Psycho was due to the music† (Smith,1991, p.241). The title music which is a tense hurtling piece plays three times throughout the film adding tension to some of the earlier scenes. (Palmer,1990, p.275). He also uses silence to build suspense. For example, in the shower scene Marion gets undressed and begins showering with no background music; this implies that something bad will happen yet, when the shadowy figure appears the violins are used in a screeching and stabbing sound motion of extreme viciousness. (Palmer,1990, p.277). The mise-en-scene is extraordinarily influential throughout Psycho but the best example of this would be in the parlour scene. One of the main objects in this scene is the milk jug that Norman carries on the tray. The spout is like an arrow pointing to Marion, This shows the audience that Norman has chosen her as his prey. Another obvious technique used in this scene is the position and placement of the actors and also the body language used. When Norman and Marion are standing facing each other Norman is holding the tray with both arms making it look almost like he’s pointing at Marion reinforcing the idea that he has chosen her, while Marion stands with both  arms by her side making her seem unaware and innocent. (Quality Teacher Program,2002, p.14). Also, while Norman and Marion are standing outside the office Norman’s reflection can be seen in the window, which supports the idea of duality in the film. Camera angle and different camera movements are another fantastic technique that Hitchcock uses very well in Psycho to reinforce the theme of duality. This can be seen in the opening scene where the camera positions the viewer as a voyeur witnessing an illicit affair between Marion who is in her lunch break and Sam who is a divorcee. In the 1950’s this was seen as pushing the limits of what is socially and morally acceptable. The shower scene also uses an extreme close up of Marion eye which shows her guilt as well as her innocence. Her open eye suggests she didn’t deserve to be killed by Norman but also by dying she has been punished for letting her evil side take over and stealing the money. (Quality Teacher Program,2002, p.29) Hitchcock achieved his goal with Psycho by portraying his main theme of duality in human nature. He made the theme obvious to the audience and reinforced it in many different ways using a large range of techniques including camera angle and position, lighting, sound and mise-en-scene. From the thrilling and somewhat haunting music in the opening credits right up until the final scene where Marion’s car is pulled from the swamp the theme is very effective in a way that keeps the audience thinking long after the film is over. Bibliography A Thematic Analysis of Alfred Hitchcock’s Psycho. http://www.novelguide.com/reportessay/literature/novels/thematic-analysis-alfred-hitchcocks-psycho (Retrieved on 26/3/14) Ebert, R. 1998. Psycho Review. http://www.rogerebert.com/reviews/great-movie-psycho-1960(Retrieved on 26/3/14) Final Paper. http://www.docstoc.com/docs/147378225/Final-Paper (Retrieved on 25/3/14) Kato, M. n.d., Hitchcock’s Psycho Analysis, University of Kyoto, Kyoto. Lamb, B. 2013, Mise-en-scene. http://lessonbucket.com/vce-media/units-3-4/narrative/mise-en-scene/ (retrieved on 26/3/14) Nixon, R. n.d. Behind the Camera on PSYCHO. http://www.tcm.com/this-month/article/191164%7C0/Behind-the-Camera-Psycho.html (Retrieved on 26/3/14) Palmer, C.1990, The Composer in Hollywood, Marion Boyars, London Plot Synopsis. http://www.imdb.com/title/tt0054215/ (Retrieved on 25/3/14) Psycho (motion picture) 1960, Paramount Pictures, Los Angeles, Producer, Alfred Hitchcock. Quality Teacher Program, 2002, Critical Literacy in English Years 8-10, Quality Teacher Program, Sydney. Smith, S.C. 1991, A Heart at Fire’s Center; The Life and Music of Bernard Herrmann, University of California Press, Berkeley

Tuesday, October 22, 2019

Free Essays on Anywhere But Here

â€Å"ANYWHERE BUT HERE† For the third our assignment I had decided to read a book that relates very much to my personal life. The novel I had decided to read is called â€Å"Anywhere But Here† written by Mona Simpson. This particular book doesn’t have to deal to much with work issues, but enough to write a paper. â€Å"Anywhere but Here† is a great book that to me it seems that somebody had written my life story. This novel is about a single mother, Adele, and her daughter Ann August, that move from Bay City, Wisconsin, to California. Adele is an American dreamer that believes in a better life. On the other hand Ann is a young girl that likes her life in Wisconsin and hates her mother for wanting to move away. Ann hasn’t seen her father since she was very young and doesn’t even remember him anymore, but she keeps searching for him. Finally Ann and her mother Adele take off for their new beginning, their new life. Their trip was disaster. They fought all the way and Ann all she wanted was to go back home to her cousin and grandmother. Adele just wanted to continue her journey. Once they arrived in California life started to get a little rough. Money were scarce and for Adele it was hard to find a job in her field, as a teacher, that could support both of them. Ann soon started high school in a very rich neighborhood. She hated it. Everything was so different and she felt that she was a nobody. She didn’t want to make any new friends and her relation with her mother was getting worse every day. Ann wanted to go home, but her mother would not even think about it. Adele got a job as a teacher in high school in a very low neighborhood. They also got an apartment and try to survive this though life. Through all the problems Ann did not give up searching for her father. Soon even worse news arrived, her cousin, her best friend had died back home. She flew there and realized that the only... Free Essays on Anywhere But Here Free Essays on Anywhere But Here â€Å"ANYWHERE BUT HERE† For the third our assignment I had decided to read a book that relates very much to my personal life. The novel I had decided to read is called â€Å"Anywhere But Here† written by Mona Simpson. This particular book doesn’t have to deal to much with work issues, but enough to write a paper. â€Å"Anywhere but Here† is a great book that to me it seems that somebody had written my life story. This novel is about a single mother, Adele, and her daughter Ann August, that move from Bay City, Wisconsin, to California. Adele is an American dreamer that believes in a better life. On the other hand Ann is a young girl that likes her life in Wisconsin and hates her mother for wanting to move away. Ann hasn’t seen her father since she was very young and doesn’t even remember him anymore, but she keeps searching for him. Finally Ann and her mother Adele take off for their new beginning, their new life. Their trip was disaster. They fought all the way and Ann all she wanted was to go back home to her cousin and grandmother. Adele just wanted to continue her journey. Once they arrived in California life started to get a little rough. Money were scarce and for Adele it was hard to find a job in her field, as a teacher, that could support both of them. Ann soon started high school in a very rich neighborhood. She hated it. Everything was so different and she felt that she was a nobody. She didn’t want to make any new friends and her relation with her mother was getting worse every day. Ann wanted to go home, but her mother would not even think about it. Adele got a job as a teacher in high school in a very low neighborhood. They also got an apartment and try to survive this though life. Through all the problems Ann did not give up searching for her father. Soon even worse news arrived, her cousin, her best friend had died back home. She flew there and realized that the only...

Monday, October 21, 2019

Confronting and Affronting

Confronting and Affronting Confronting and Affronting Confronting and Affronting By Maeve Maddox The verbs confront and affront both derive from Latin frontem, forehead. Confront combines frontem with Latin com, together. To confront someone is literally to go forehead to forehead with. The English verb came into the language in the 1560s from French confronter and originally meant to stand in front of, The word confront usually implies a sense of boldness or hostility. A defendant confronts his accuser. A dishonest employee is confronted with proof of guilt. A courageous explorer confronts the elements. The noun for confront is confrontation. Gaza aid flotilla to set sail for confrontation with Israel As Confrontation Deepens, Irans Path Is Unclear Thai military seeks to avoid confrontation with protesters Confrontation is one of the hardest aspects of being a leader. Affront combines frontem with Latin ad, against. The English verb affront came into the language in the early 14th century, from Old French afronter, to face. Late Latin affrontare meant to strike on the forehead. To affront someone is to treat the person with indignity. To be affronted is to feel shame or humiliation. Examples: Politicians often go out of their way to affront their opponents. The six year old was affronted when his mother forced him to put on a bib. The noun for affront is affront. Police raid at JMU is an affront to the First Amendment An affront to British justice: How the dice were loaded against Gary McKinnon The MTA’s big bollards are an affront to Brooklyn New Arizona immigration law an affront to decency WBs reality shows an affront to female viewers Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:50 Idioms About TalkingHow to Pronounce MobileStarting a Business Letter with Dear Mr.

Sunday, October 20, 2019

A Full-Time Income on Part-Time Hours

A Full-Time Income on Part-Time Hours A couple of years ago, after Id returned form maternity leave and decided that I quite enjoyed spending time with my son, I went part-time as a writer. Yet, despite having cut down my hours, I was able to maintain my yearly income. Wait, thats not true. I increased it. If youre a writer with a day job or a work-at-home parent in charge of noisy kids looking to make a nice income on part-time hours, you need to maximize the work you can do in those limited hours. How? Read on. 1. Take on only high-paying work. I only worked 20 hours a week during that first year as a writing parent, and so I knew that I no longer had time for $50 blog posts or articles that paid $100 for 1,000 words. Instead, I focused exclusively on $1-a-word markets and $100-per-hour projects. That meant that even if I did actual write for only 10 hours a week (the rest of the time devoted to marketing and admin), I could, in the weeks that I filled up those hours, be making $1,000 a week. Not bad! 2. Take on easier work. Before motherhood, my biggest joy was being a journalist, going out and finding untold stories from places no one had ever looked. I wrote about the environment, womens issues, politics, and business from my home in India. I won awards for my work. But this was difficult, time-consuming work, and once the ba 3. Make the most of every bit of research. I have a rule for myself: Every interview I do should lead to at least two more ideas for stories. So when I interviewed a well-known food scientist for a story about genetic modification, I ended our conversation 4. Come up with ideas in multiples of three. I rarely come up with a single idea. I come up with the idea in multiples of three. Thats because I take the initial spark of an idea and try to transform it into something that would fit into a number of different publications. So my query on how busy women can keep fit wont just be sent to a womans magazine but a magazine for working women (The Five-Minute Fitness Program for Executives), a parenting magazine (Fitness Tips for the Time-Crunched Mummy) and maybe even a general interest publication (Fitness on a Stopwatch). 5. Have a goal for every hour. Its so easy to open up your computer in the morning and waste two hours on Twitter. This happens when you dont have a plan of action. Make a to-do list for the week and then each day before bed, take the top three things you know you must do tomorrow and put them on a separate list. When you sit down to work in the morning (or during afternoon nap time), you know exactly what you need to get done. The more productive you are in the hours that youre actually working, the more youll be able to earn. Finally, remember, when people work 80 hours a week, theyre not actually working those 80 hours. Theyre working a productive 20, a not-so-productive 20, and a completely wasteful 40. So maximize your own productivity for your first 20 hours and youll be earning a full-time income in no time.

Saturday, October 19, 2019

Ethical Issues of Lay Offs Essay Example | Topics and Well Written Essays - 1250 words

Ethical Issues of Lay Offs - Essay Example Lay-offs are defined as â€Å"suspension or termination of employment (with or without notice) by the employer or management.† (Business Dictionary 2009) Layoffs are management’s option when faced with situations such as financial difficulties, positions are no longer required, business slow-down, or work interruption. This could be categorized as follows: to save the company, to change, and to improve the company. Regardless of the rationale, layoffs cause undue stress, emotional pain, anguish and suffering for the terminated employees. On the other hand, the managers who are assigned to deliver the blow are also faced with sorrow or guilt, as the case may be. It is in this regard that layoffs are closely evaluated in terms of ethical issues which arise due to the critical consequences that arise. Due to these consequences, layoffs become controversial ethical issues. Velasquez & Rostankowski (1982) averred that â€Å"an act with ethical or moral consequences is that such an act involves decisions freely taken that will have positive or negative consequences for others†. According to Gilbert (2000), â€Å"in some circumstances, laying off some employees is the ethical thing to do, and managers who fail to do so are guilty of unethical conduct. In other circumstances, no ethical defense of layoffs can be found, and managers who decide on layoffs in these circumstances are guilty of unethical acts. In a wide range of circumstances in between, there are ethical arguments for and against layoffs.† To determine the morality of a decision or an action, one approach is that of utilitarianism which holds that a moral decision or action is one that results in the greatest good for the greatest number of people. (ibid.) Using this approach, management justifies that it is common to layoff on the basis that terminating 1000 personnel if this move will save the organization from bankruptcy and hence preserve the jobs of 5000 others.   

Friday, October 18, 2019

Realistic in nursing Essay Example | Topics and Well Written Essays - 250 words

Realistic in nursing - Essay Example However, it is worth noting that nurses are also humans and are prone to common problems that affect humans. The only difference is that nurses have information. It can be argued that practicing what they teach is the problem due to extraneous factors. For example, nurses may advice diabetes patients on diet. However, they themselves may be unable to follow the diet they prescribe to patient and hence, they become diabetic. Physical and mental situation can be a genetic condition. It follows that a nurse may be unable to control it despite having information. In such situations, it becomes an irony or sarcastic for such a nurse to advice a patient who has the same condition. Such situations may demoralize a nurse to start doubting his or her importance. As such, patients should first consider nurses as human beings who are prone to health problems instead of expecting them to be perfect in terms of

Recruiting and Selection Essay Example | Topics and Well Written Essays - 500 words

Recruiting and Selection - Essay Example Also, a good time manager is a measure often required when recruiting a right applicant in the executive director position. In past years, nonprofit making organizations started using interim directors as an approach of avoiding non-qualified applicants in the field. The employers use the approach since there is a small, but growing body of knowledge around the executive director position. Also, employers look at the experience of the applicant in order to assist in the transition development of the organization. Legality, reliability, and validity are my best standards that meet the requirements and measurement of being a right executive director. In order to be hired as an executive director in an organization, legal documents play an important role as a ticket to be given the job. Legal documents such as curriculum vitae will help me in identifying my skills and experiences as an executive director. The legality of being an executive director will depend not only on the legal documents, but also the skills and experience I have learnt from the previous job position. Also, the validity of my documents will help me in securing the executive director position. Employers consider valid documents and claims before recruiting new applicants into their organizations. This implies that without a valid claim of being an executive director, a panel can automatically disqualify an application. In addition, reliability is an important standard, which work hand in hand with the experience, skills, str ength, and capability measures. An executive director is supposed to be reliable. A theme in the performance appraisal focus on the attitude of an employee is integrity, dependability, and reliability. Reliability of an employee improves the performance of an organization (Monroy & Zwerling, p. 421-422). I have learnt that legality is an important standard to be considered in any selection process of being an executive director in an organization. In his case, a

Cold War and Decolonization Annotated Bibliography

Cold War and Decolonization - Annotated Bibliography Example The friendship was created through various supports in terms of manpower, materials, and aids. However, such countries are said to have received no return for their support. In fact, as noted in the article, communist expansion to third world countries was a problem as acted as an impediment to the democratization process. On the other hand, there is argument that communist association with third world countries was as a result of competition with America and West European Liberal Capitalist. Also, America is said to have dominated in the international realm during this period. Therefore, the decolonization process was seen as a better way of controlling America dominance. The author also notes that rivalry that existed between communist and America was based on political economy. Also, the rivalry is noted to have affected the new emerging states. The states were faced with a dilemma on which side to support. This is seen to have created a chance for social awakening in post-war

Thursday, October 17, 2019

The impact of out of stock in convenience sector( retail) Literature review

The impact of out of stock in convenience sector( retail) - Literature review Example They can be categorized as discount store, super market, convenience store, hyper market or departmental store. In the literature based on supply chains and logistics, when a customer is unable to find an item of his choice the retail store is considered to be out of stock. Actually, it is not difficult to say â€Å"out of stock†, but like many other issues taken under research; this issue has its own implications which can only be clarified through research (Charlton and Ehrenberg 1976). â€Å"Out of stock can be classified into two types: item and brand† (Fitzsimons 2000). Firstly, a stock keeping unit (SKU) of a particular brand may be out of stock and secondly all options of a particular brand in a single product can be out of stock. Out of Stock (OOS) has been defined differently by different researchers. Gruen and Corsten (2002) define OOS as â€Å"the percentage of SKUs that are OOS on the retail store shelf at a particular moment in time†. This means that the customer perceives that the item he wants will be available but it is not. Alternatively, from a consumer point of view, OOS is â€Å"the number of times a customer looks for the SKU and does not find it† (Corsten and Gruen 2003). ... First, retailers are battled with more charges in providing string of connections, due to high inventory, procurement, management, and warehouse costs. Second, it furthermore raises the likelihood that out-of-stocks (OOS) may happen, which may lead to clientele displeasure and shop disloyalty. As retailers strive to contend with discounters on service, OOS can harshly jeopardize their comparable place in the buyers’ mind. According to Campo et al. (2000), out of supply position not only decreases revenue but furthermore decrease of clients as well. In 20% situations shop swapping is due to out of supply situations. Presently, there have been a vast number of studies carried out by Emmelhainz et al. (1991), Verbeke et al. (1998), Campo et al. (2000), Gruen et al. (2002), Corsten and Gruen (2003) and Sloot et al. (2005). They were responsible for formation of factors which encourage buyer reactions, such as the category of inventory, the extent of brand devotion, type of consume r and the urgency of the requirement for the item. So all of these investigations were rather associated to assess buyer answer as an outcome of OOS position at retail- OOS position is too exorbitant for retailers, as it can originate a decrease in revenue; the study performed in 1968 for Progressive Grocer assessed more than eleven percent decrease in sales. Emmelhainz et al (1991) study outcomes display, for example, that a stock-out can make a constructor misplace more than fifty percent of his clients to competitors, alternatively retailers countenance the decrease of up to fourteen percent of the purchasers of the missing product. This income decrease does not only owe to lost sales all the way through the OOS experience, but can

Wednesday, October 16, 2019

Theories of Just War Essay Example | Topics and Well Written Essays - 2000 words

Theories of Just War - Essay Example Keeping this in mind, people of this century need to look at the theories that have been recorded in history that regulate the forms of war that states are allowed to wage against any other state or community. The importance of this lies in the fact that it may be able to reduce or eliminate the casualties that occur in today’s world as a result of the wars that have become a regular feature of the political landscape of every continent on the world. It is ironic that even Antarctica is not exempt from being a site of war. The theories of war that exist in contemporary times have to be juxtaposed with those that were proposed by religious thinkers like Thomas Aquinas and St. Augustine. Any theory of war that needs to stand the test of time needs to fulfil the basic purpose of its establishment- the meting out of justice. In this context, it would be useful to look at the theories of justice that have been a part of human historical records. Prominent among these are the ones o f Plato and Aristotle. These two thinkers have had a profound effect upon the theories of justice that have come after them. ... The criteria that the state must follow to decide which person upon which it can confer citizenship and which one it cannot is one that may seem unjust to some at present. These were based on laws that were created during the times of Ancient Greece and they were done when Greece was one of the greatest powers in the earth. To restrict foreigners from entering the land and establishing their rights was one of the main concerns of the state. Aristotle’s arguments need to be seen in this light. When viewed in the light of the democratic societies that present observers are used to, Aristotle’s arguments that have a profound impact on the development of present conceptions of the sovereignty of a state may appear to be unjust to certain sections of the society. Seemingly unjust powers are granted to the state that would enable it to treat its citizens in an arbitrary manner. The state is also shown to be the ultimate reason for the existence of the citizen. This can be see n from the fact that Aristotle considers it to be of more importance for a person t be a good citizen than a good person. The goodness of a person is determined by the utility of his self to the state (Clayton). These theories of citizenship and justice can be extended to understand the powers that Aristotle may have envisaged for the state in relation to other states. The sovereignty of other states too, thus is not important, in the same way that the sovereignty of an individual is unimportant. In this context, all the actions of the state, including an unjust war may be justified and the arbitrary nature of the decisions of the state would ensure that dissent is not a part of the solutions that the citizens of a particular state may

The impact of out of stock in convenience sector( retail) Literature review

The impact of out of stock in convenience sector( retail) - Literature review Example They can be categorized as discount store, super market, convenience store, hyper market or departmental store. In the literature based on supply chains and logistics, when a customer is unable to find an item of his choice the retail store is considered to be out of stock. Actually, it is not difficult to say â€Å"out of stock†, but like many other issues taken under research; this issue has its own implications which can only be clarified through research (Charlton and Ehrenberg 1976). â€Å"Out of stock can be classified into two types: item and brand† (Fitzsimons 2000). Firstly, a stock keeping unit (SKU) of a particular brand may be out of stock and secondly all options of a particular brand in a single product can be out of stock. Out of Stock (OOS) has been defined differently by different researchers. Gruen and Corsten (2002) define OOS as â€Å"the percentage of SKUs that are OOS on the retail store shelf at a particular moment in time†. This means that the customer perceives that the item he wants will be available but it is not. Alternatively, from a consumer point of view, OOS is â€Å"the number of times a customer looks for the SKU and does not find it† (Corsten and Gruen 2003). ... First, retailers are battled with more charges in providing string of connections, due to high inventory, procurement, management, and warehouse costs. Second, it furthermore raises the likelihood that out-of-stocks (OOS) may happen, which may lead to clientele displeasure and shop disloyalty. As retailers strive to contend with discounters on service, OOS can harshly jeopardize their comparable place in the buyers’ mind. According to Campo et al. (2000), out of supply position not only decreases revenue but furthermore decrease of clients as well. In 20% situations shop swapping is due to out of supply situations. Presently, there have been a vast number of studies carried out by Emmelhainz et al. (1991), Verbeke et al. (1998), Campo et al. (2000), Gruen et al. (2002), Corsten and Gruen (2003) and Sloot et al. (2005). They were responsible for formation of factors which encourage buyer reactions, such as the category of inventory, the extent of brand devotion, type of consume r and the urgency of the requirement for the item. So all of these investigations were rather associated to assess buyer answer as an outcome of OOS position at retail- OOS position is too exorbitant for retailers, as it can originate a decrease in revenue; the study performed in 1968 for Progressive Grocer assessed more than eleven percent decrease in sales. Emmelhainz et al (1991) study outcomes display, for example, that a stock-out can make a constructor misplace more than fifty percent of his clients to competitors, alternatively retailers countenance the decrease of up to fourteen percent of the purchasers of the missing product. This income decrease does not only owe to lost sales all the way through the OOS experience, but can

Tuesday, October 15, 2019

Analysis of “High Court Curbs Claim on Privacy in a Home Essay Example for Free

Analysis of â€Å"High Court Curbs Claim on Privacy in a Home Essay The article â€Å"High Court Curbs Claim on Privacy in a Home,† by Linda Greenhouse was a New York Times article about a Supreme Court case. The legal issue that the Supreme Court examined was a case where the court overturned a 1997 Minnesota Supreme Court ruling. The Minnesota ruling protected the rights of men doing business in a private home from illegal searches and seizures. The Supreme Court however overturned the Minnesota ruling, stating that people who were doing business in a home did not have the right to invoke their 4th Amendment right. The Supreme Court voted 5 to 4 in the case, which led to majority, dissenting, and concurring opinions.   Ã‚  Ã‚  Ã‚   Chief Justice William H. Rehnquist, Justices Clarence Thomas, Sandra Day O’Connor, Anthony M. Kennedy, and Antonin Scalia all formed the majority opinion, with Justice Scalia and Justice Thomas forming concurring opinions. Chief Justice Rehnquist’s majority opinion was used in the article, in which Rehnquist argued that since the men in the Minnesota case were conducting business in a private home their 4th amendment right against unreasonable searchers and privacy could not be invoked. Rehnquist’s opinion was a strict construction of the constitution because his opinion reflected the intention of the original framers. Philosophically Rehnquist stuck to the original framers’ intentions because he found no fault in the officer’s actions who witnessed the men committing a crime through venetian blinds. Rehnquist argued that the officer was within his rights to watch and subsequently arrest the men because they had no rights to privacy, which was the goal of the original framers of the constitution because they did not grant any protections to invited guests in a person’s home.   Ã‚  Ã‚  Ã‚   Disagreeing with the majority, Justice Ruth Bader Ginsburg and Justice Stephen G. Breyer both had dissenting opinions. Justice Ginsburg’s dissenting opinion was a loose construction of the constitution. Ginsburg’s philosophical view in the case was that the majority overlooked the rights of the invited guests because although they did not live in the home guests still had a right to privacy. However, the framers of the constitution gave no such protections. The 4th amendment states that it protects the right of the people to be secure in their person, houses, paper and effects, it made no mention of invited guest.   Ã‚  Ã‚  Ã‚   Justice Breyer also had a dissenting opinion, but he also agreed with part of the majority’s reasoning. Breyer’s opinion was both a loose and strict construction of the constitution because on one hand he believed that the Minnesota men were protected by the 4th amendment’s privacy right. While on the other hand he agreed with the majority and argued that the officer’s actions did not violate any 4th amendment rights.   Ã‚  Ã‚  Ã‚   Finally, Justices Scalia, Thomas, and Kennedy all had concurring opinions. Kennedy’s views differed from Scalia and Thomas’s opinions and he took a loose construction of the constitution. Philosophically Kennedy believed that social guest have a right to expect privacy while visiting a person’s home, which is a loose construction of the constitution because the constitution’s framers make no mention of a guest’s right to privacy. On the other hand Scalia and Thomas took strict constructions of the constitution. Scalia and Thomas believed that the right of the people to be secure in their person, houses, paper and effects, as stated in the 4th amendment did not include the right’s of visitors in someone’s home, thus they stuck to the literal interpretation the constitution.   Ã‚  Ã‚  Ã‚   Although the Justices came to different reasoning and judgments in this case, the court ultimately made the correct decision and the Justices all made logical arguments. Reference: Greenhouse, Linda. â€Å"High Court Curbs Claim on Privacy in a Home. New York Times Archives 2 December 1998.   http://query.nytimes.com/gst/fullpage.html?res=9A07E1DB143BF931A35751C1A96E958260

Monday, October 14, 2019

Humour in Don Quixote

Humour in Don Quixote Don Quixotes initial reception in the Seventeenth Century was as a work of humour; Cervantes ability to reflect and imitate reality through the ironic juxtaposition of his two main characters played a focal role in both driving the plot and attracting the attention of his readers in the Golden Age. The existence of humour is undeniable throughout the novel, and Henry Fieldings attempts to attract readers to his comic romance Joseph Andrews by linking it to Don Quixote, claiming that he had written it in imitation of the manner of Cervantes places the work as an exemplary novel, from which humour can not only be taken, but utilised to inspire and promote other works. However, humours level of importance becomes clouded with time, as the novels distinct link to the circumstances in which it was created and the effects of cultural change could perhaps affect its level of significance in the modern mind. Daniel Eisenburgs claim that The humour of Don Quixote is the most understudied topi c of the work can be seen throughout the novels later reception, as the emergence of Romanticism in Europe saw a radical reconsideration of the traditional view of Don Quixote as merely a humorous book. The romantics recognised the straightforward amusement that drove the plot, but viewed humour as less important than the moral values and literary instruction offered and humour was conceived as a vehicle through which Cervantes was able to satirise the overstated chivalric romances of the time and engage with topics of importance. The use of parody in Don Quixote becomes a literary technique that pervades the adventures and experiences of the characters, amplifying the importance of humour in the novel. Russells assertion that Any serious study of Cervantes book†¦must start from the fact that it was conceived by its author as an extended parody of romances of chivalry illustrates the importance of the humour of parody in the novel. Cervantes uses the inherently humorous picaresque form as a basis from which he can explore the quest of a man of a low social class in a fraudulent society; satirising the artificial chivalric age in which he was writing. Don Quixote transforms his view of Maritornes, following the language and customs of chivalric romance, her hair was like a horses mane, but he saw it as strands of gleaming Arabian gold to which Cervantes narrates, Neither touch nor smell nor any of the good maidens other attributes could make him notice his mistake, even though theyd have made anyone but a muleteer vomit. Similarly, the ironic use of archaic language, an elevated style often used to dignify the hero in chivalric romance, is evident when addressing his Dulcinea, O princess Dulcinea, mistress of this hapless heart! Great injury have you done me in reproaching and dismissing me, with the cruel command not to appear in the presence of your wondrous beauty. Vouchsafe, my lady, to be mindful of this your subject heart, which suffers each sorrow for love of you. Literary voice is key to humour and Cervantes employment of numerous voices, both depicted and defined the importance of social classes, allowing the audience to derive much of their enjoyment from the way in which the author disclosed the different voices. Sanchos colloquial and informal speech is important in emphasising his difference from Don Quixote; his use of contractions youll, wont and Ill in the line, Youll be sure, wont you, sir knight, not to forget what you promised me, about the island. Ill be up to governing it all right, however big it is is set in complete contrast to Don Quixotes high styled, formal response, I would have you know, my good friend Sancho Panza, that it was a custom much in use among the knights errant of old to make their squires the governors of the islands or kingdoms that they conquered, and I have determined that such an ancient usage shall not lapse through my fault. However, the depth of Cervantes humouring of chivalric romance could be conside red a moot point, and thus the importance of humour as a faà §ade through which real topics may be discussed, is strengthened, as the allusion to one of the original chivalric epics, the Valencian novel Tirant Lo Blanch, is one of admiration, in which it is claimed that As far as style is concerning this is the best book in the world. In addition, Cervantes uses his novel in a more negative way, to explore his frustration at literature in society; the highly ironic allusion to the works of one of the most successful playwrights of the time, Lope de Vega, infers that there is further depth to Cervantes discussion in the book, as he uses the priest as an outlet to explore the critical view that these modern plays are just mirrors of absurdity, exemplars of folly and images of lewdness. Cervantes intentions for humour in Don Quixote are illustrated in his Prologue, in which his friend reveals the books comedic objectives: Ensure that the melancholy man is moved to laughter when he reads your story, the jovial man laughs even more. However, one must consider that the role of humour becomes of greater significance than a mere stimulus endeavouring to invoke a humorous response; it is through the medium of humour and comedy that Cervantes is able to reveal himself as an illustrious author, through his exploration of genuine views of society and culture; Schmidt explains that Cervantes has created †¦characters who, although funny, transcend humour in their nobler qualities. The elevation of the character Don Quixote is necessary for the ennoblement of the author Cervantes. The basic allegory of Don Quixote is central to Cervantes exploration of society through humour. Cervantes attacks the conventional notion that those in high society were respectable and noble an d creates disparities between worth and class. In comparison to medieval comedy, humour in Don Quixote has a significant intention to explore social function, suggesting that through the means of humorous self-imposed madness, the characters can response to the institutionalised madness of their society at the time. This seems to be a theme that Cervantes wished to discuss thoroughly through literature, as it is also explored in his novel The Glass Graduate; many parallels can be drawn between the two works, as both novels encounter men who are thought to be mad and who serve, unintentionally, as some means of entertainment. Whilst The Glass Graduates lunacy originates from the unfortunate ingestion of a toxic quince, Don Quixotes madness is rooted in his literary interest in chivalric romances, a more realistic and solid source. Similarly, Umberto Ecos later novel The Island of the Day before is reminiscent of Don Quixotes immersion within literary works, as the protagonist Roberto becomes so captivated with fiction that he becomes unable to separate his written words from the external reality. The methods of humour used by Cervantes in Don Quixote are vital in reflecting, summarising and exploring the ordinary, yet inverted, world of the novel. The comedic inversion and transformations of chivalric codes are fruitful throughout the novel and Don Quixotes imagination is expounded in ordinary terms by Sancho, who provides a second perspective on his masters wild claims, What you were attacking wasnt armies, it was flocks of sheep. The appearance of the characters provides the first notion of humour, as the old and physically unattractive Don Quixote provides direct contrast to the young, handsome and strong knight to which Cervantes audience would be accustomed. Similarly, Sanchos role as the young assistant sees him as a middle aged man on a donkey, which is far removed from the original picture of a knights young aspirant. The two characters are juxtaposed in physicality; one being long and weak, and the other plump and unhealthy, yet the mental contrast is more severe, as Sanchos traditional materialism, practically enquiring about monetary support (QUOTE) is set against Don Quixotes idealism and imagination, Consider, ladies and gentleman, the sheer impudence of this squire claiming that this is a basin and not the helmet I have specified. Cervantes use of bawdy humour is reminiscent of Chaucers Canterbury Tales, in which the humour descends to the exploration of bodily functions and nudity; for example, scenes such as Absolons kissing a naked ers in a practical joke in The Millers Tale are reinvented in Sanchos efforts to thrust two ample buttocks in the air in an attempt to relieve himself in silence without waking Don Quixote, who humorously later asked What murmuring is that, Sancho?. Similarly, the bawdy humour is later evident in Sanchos experience with the precious balsam, which Don Quixote later reveals it seems to me that this liquor does not benefit those who are not knight†¦.the poor squire began to gush at both ends. Cervantes also employs an element of slapstick humour, which is not only scripted blatantly in the sub text of a title, Which related to the amusing way in which Don Quixote had himself knighted, but through the mockery of individual characters and creation of ridiculous scenes; the description of the proud Don Quixote in battle as attacking them, chased around in circles and achieved nothing is evidence of the former and the scene in which The barbed made a long beard from a pale oxtail certainly encompasses that of a absurd incident. Nevertheless, each scene does not simply serve as an effort to provide hilarity; scenes of equal absurdity such as his MONK QUOTE, could be examined as exposing Cervantes own biases against important topical issues, such as the mistrust of foreigners following the present of the Algerian pirates on the Spanish coast in the early Seventeenth Century. However, despite the outrageous situations in which the characters are involved, it could be argued that the common interpretation of Don Quixote as a tender satire is mistaken and that the work is in fact an attack of viciousness on a man who is entirely without malice and trustful as a child. Byron supports this claim in Don Juan, claiming that, Of all tales tis the saddest and more sad, because it makes us smile. It is evident that Don Quixote is a parody of the romances of Cervantes time, yet the code of honour that both Don Quixote and Sancho follow is one that was once admired, and is perhaps an historical suggestion that could serve as an example for Spain. At a time in which the country was caught in the disorder of a new age, this could be viewed as Cervantes effort to place sturdy values in an ever-shifting society. Don Quixotes naivety, believing the convicts would obey his wishes to be grateful for benefits received†¦present yourselves before the Lady Dulcinea is pe rhaps a characteristic that Cervantes hoped would stimulate empathy, which was certainly the stance occupied by Nabokov, His blazon is pity, his banner is beauty. He stands for everything that is gentle, forlorn, pure, unselfish and gallant. The Parody has becomes a paragon. David Quint responded to this claim directly, maintaining that The deficiency may partially explain Nabokovs contempt for Don Quixote as an unfunny work of fiction, since his preferred English translation was Putnams, a translation that is plain and readable, but (perhaps consciously) hardly very funny. It is possible that as a result of its conversion to English, much of the humour Cervantes intended has been misplaced in translation; thus, our conception of the importance of humour in England could differ greatly from that of the indigenous reader. John Ormsby supports this concept in his claim that, the sententious terseness to which the humour of the book owes its flavour is particular to Spanish, and can at best be only distantly imitated in any other tongue. In conclusion, Nabokovs reflection that Don Quixote has ridden for three hundred and fifty years through the jungles and tundras of human thought is of great significance when considering the importance of humour in the novel, as it is perhaps due to inconclusive translations and cultural change that all of Cervantes intended humour was not fully recognised. Cervantes exploration of humour through situation, action and description are all perfectly interwoven to produce a novel that stands in a exclusive position between the chivalric romance and the modern novel. It is undeniable that humour (however present) plays a significant role in Don Quixote, as it not only entertains, but holds a profound and liberating importance as a means of communicating issues of great social and literary significance.

Sunday, October 13, 2019

The Dairy Science Department at Cal Poly :: Agriculture

The Dairy Science Department at Cal Poly The Eugene and Rachel Boone Dairy Science Complex at Cal Poly, San Luis Obispo contains a fully-operational dairy and research facilities for students in the Dairy Science department. This complex is located on Mt. Bishop Road, past the Crops Unit and Veterinary Hospital, and sits in the scenic foothills of Bishop’s Peak. Cal Poly has one of the largest Dairy Science departments in the country and it is the only university on the west coast to offer a specific Dairy Science major. The first-rate facilities at Cal Poly allow students to learn about feeding, milking, calf raising, artificial insemination, and the management of dairies in the classroom and then practice what they have learned on the purebred Jerseys and Holsteins. The Dairy Cattle Instructional Unit was built in 1992 and is used for a wide range of instructional activities. The first floor of this unit contains two classrooms, a computer room, a nutrition and physiology laboratory, and a microbiology laboratory. Numerous plaques and awards from local cattle shows dot the white walls. Cal Poly has bred some of the top-rated cows in the nation for type and production and individual cows have won many awards for the rich content and amount of milk produced. Industrial-like stairs along one wall lead up to the second floor where visitors can view the milking process. Cows are milked at the milking parlor daily from 4 to 6 am and 4 to 6 pm. This immaculate parlor can milk 16 cows at one time and contains state of the art milking equipment including an energy-efficient pre-cooling system, which the milk passes through before being stored in two 3,000-gallon bulk tanks. The physiology laboratory is used for artificial insemination, feed a nalysis, and dairy biotechnology courses. Students perform experiments such as embryo manipulations and transfer techniques in this laboratory. Beyond the Instructional Unit are the barns where all the cows reside.

Saturday, October 12, 2019

Political Morality Essay -- essays research papers

In Webster's dictionary, morality is defined as "principles of right and wrong in conduct; ethics." The principles of morality have countless times evolved over the ages. In earlier times, death was an easy penalty for many crimes. These crimes today are considered minor and are penalized with a slap on the hand. Is this considered wrong? Who is the correct authority to consult on what is right or wrong? In today's society, two major factors concern how the way members of society act and behave. The first is our national government. Members of our government in positions of authority decide everything in our lives in the form of laws which determine our behavior. One of the most important documents written by our government is the Declaration of Independence. The monarchy was taking away power from the colonists and putting more demands on. In return, the colonists declared their freedom from their tyrant. In this document, it states, "All men are created equal; that they are endowed by their creator with certain unalienable rights; that among these are life, liberty, and the pursuit of happiness." The great men who wrote this down had a strong sense of morals. They believed that men were given rights by God that no one could take away. This is essential to the issue of morality because it determines the rights- that are agreed upon all- are wrong. This brings us to religion. Religion is a major contributor ...

Friday, October 11, 2019

Kudler Security Report

Kudler Fine Foods IT Security Report and Presentation Security Considerations CMGT/400 Kudler Fine Foods IT Security Report and Presentation Security Considerations According to Whitman and Mattord  (2010),  The ISO 27000 series is one of the most widely referenced security models.Referencing ISO/IEC 27002 (17799:2005), the major process steps include: risk assessment and treatment, security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development, and maintenance, information security incident management, business continuity management, and compliance (Chapter 10, Security Management Models). 1.Risk assessment and treatment 2. Security policy: Focuses mainly on information security policy 3. Organization of information security: For both the internal organization and external parties 4. Asset management: Incl udes responsibility for assets and information classification 5. Human resources security: Ranges from controls prior to employment and during employment to termination or change of employment 6. Physical and environmental security: Includes secure areas and equipment security 7.Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring 8. Access control: Focuses on business requirement for access control, user access management, user responsibilities, network access control, operating system access control, application and information access control, and mobile computing and teleworking 9.Information systems acquisition, development, and maintenance: Includes security requirements of information systems, correct processing in applications, cryptographic controls, security of system files, security in development and support processes, and technical vulnerability management 10. Information security incident management: Addresses reporting information security events and weaknesses and management of information security incidents and improvements 11.Business continuity management: Information security aspects of business continuity management 12. Compliance: Includes compliance with legal requirements, compliance with security policies and standards, and technical compliance and information systems audit considerations The â€Å"SANS: SCORE† (2012) website provides a free audit checklist for organizations to verify if they comply with the ISO 27002. The following table represents the SANS audit checklist as it relates to Kudler Fine Food’s frequent buyer program. Security policy: Focuses mainly on information security policy | |Section |Audit Question |Security Consider ations |Security concern if |Mitigation | | | | |removed | | |Information security policy|Whether there exists an Information |A security policy is |Without a security policy |Define what needs to be | |document |security policy, which is approved by the |necessary to guide all |in place the restriction |protected in order to | | |management, published and communicated as |access or to block |of information would be |develop a security policy. | | |appropriate to all employees. |access to information. |lost.Uncontrolled access|The importance of the | | | | |will result in the loss of|information should | | |Whether the policy states management | |company information. |determine the severity of | | |commitment and sets out the organizational| | |the security. | | |approach to managing information security. | | | | |Review of Informational |Whether theInformation Security Policy is|The security policy |Without the review of |Each policy should be | |Security Policy |reviewed at planne d intervals, or if |should be reviewed as |security policies they |reviewed periodically to | | |significant changes occur to ensure its |business practices, |will most likely become |ensure its effectiveness. | | |continuing suitability, adequacy and |hardware, software, and |out dated and lose | | | |effectiveness. |the way in which |usefulness. Each policy owner will be | | | |information is shared | |responsible for the review | | |Whether the Information Security policy |change. |Without giving each |of the policy. | | |has an owner, who has approved management | |section of the policy an | | | |responsibility for development, review and|Each part of the policy |owner the policy will have|Each change will be brought| | |evaluation of the security policy. should have an owner who|no one responsible for its|before management before | | | |is responsible for |maintenance. |being brought into action. | | |Whether any defined Information Security |keeping it up to date. | | | | |Pol icy review procedures exist and do they| |A policy to review new | | | |include requirements for the management |A review procedure |policies or changes made | | | |review. should be in place, each|to current policies should| | | | |change made should be |be in place to discourage | | | |Whether the results of the management |reviewed by management. |unauthorized changes. | | | |review are | | | | | |taken into account. | | | | | |Whether management approval is obtained | | | | | |for the revised policy. | | | |Organization of Information Security | |Section |Audit Question |Security |Security concern if |Mitigation | | | |Considerations |removed | | |Management commitment to|Whether management demonstrates active support for |An active role |Without the active support|A definition of the role | |information security |security measures within the organization.This can be|by management |of management the security|management should play in | | |done via clear direction, demonstrated commitment, |is needed to |policy will lose its |the commitment to the | | |explicit assignment and acknowledgement of information|ensure the |effectiveness. |security policy should be | | |security responsibilities. |effectiveness | |stated in the security | | | |of the security| |policy. | | | |policy. | | |Information security |Whether information security activities are |Security |Information security |Ensure that the owner of | |coordination |coordinated by representatives from diverse parts of |activities need|activities need to be |each policy is responsible | | |the organization, with pertinent roles and |to be |organized by employees |for all activities | | |responsibilities. |coordinated by |with higher roles and |associated with the | | | |representatives|responsibilities. The |policies. | | |that carry |security policies protect | | | | |pertinent roles|the information and all | | | | |and |activities associated with| | | | |responsibilitie|the security policy should| | | | |s. |be made by responsible | | | | | |parties. | |Allocation of |Whether responsibilities for the protection of |The business |Without a clear set of |A clear set of instructions| |information security |individual assets, and for carrying out specific |will suffer a |rules governing the |will be provided to ensure | |responsibilities |security processes, were clearly identified and |great many |protection of individual |that each individual asset | | |defined. |losses due to |assets and security |and each security process | | | |unclear |processes the business |is clearly defined. | | |detentions of |will surely suffer a loss. | | | | |procedures. | | | |Authorization process |Whether management authorization process is defined |Authorization |Without the use of an |Any and all information | |for information |and implemented for any new information processing |processes need |authorization system a new|processing facilities need | |processing facilities |facility within the org anization. to be clearly |information processing |to be given ownership to a | | | |stated in the |facility would be left |member of management. This| | | |security |vulnerable for attack. |member needs to ensure the | | | |policy. Any | |security policy is | | | |new information| |followed.Using the proper| | | |processing | |authorization system is | | | |facility needs | |critical to securing the | | | |to have an | |information contained | | | |authorization | |within. | | | |process | | | | | |implemented. | | |Confidentiality |Whether the organization’s need for Confidentiality or|The NDA should |Without the use of an NDA |The NDA needs to be | |agreements |Non-Disclosure Agreement (NDA) for protection of |be clearly |the legal ramifications |reviewed periodically to | | |information is clearly defined and regularly reviewed. |defined. This |are greatly lessened. A |ensure that any changes in | | | |will help to |business needs to protect |the business are reflected | | |Does this address the requirement to protect the |ensure the |its data to the fullest |in it. | | |confidential information using legal enforceable terms|information is |extent of the law. | | | |not | | | | | |compromised. | | | |Contact with authorities|Whether there exists a procedure that describes when, |This is |The time it takes to act |A plan must be in place for| | |and by whom: relevant authorities such as Law |important to |in an emergency is crucial|different types of | | |enforcement, fire department etc. should be |the physical |to keeping employees and |emergencies involving any | | |contacted, and how the incident should be reported. |security of the|the business safe. A plan|outside authorities. This | | | |business and |must be in place to avoid |can help to prevent | | | |the employee |potential losses due to |injuries and harm done to | | | |within. |unforeseen events. |employees and the business. |Contact with special |Whether appropriate contacts with special interest |Contacts with |Allowing a third party |A policy needs to define | |interest groups |groups or other specialist security forums, and |third party |group access to any |the steps needed to apply | | |professional associations are maintained |groups need to |information can be a risk |for special interest groups| | | |be approved my |to the business. All |and how the relationship is| | | |management. third party associations |maintained. | | | | |should be approved in | | | | | |advance by management. | | |Independent review of |Whether the organization’s approach to managing |Security |The loss of strength to |To ensure the highest level| |information security |information security, and its implementation, is |management |the security of |of security a review should| |reviewed independently at planned intervals, or when |should be |information can occur |be implemented periodically| | |major changes to security implementation occur. |reviewed at |through time (small |and whenever a major change| | | |planned |changes) or when a major |takes place. | | | |intervals and |change has taken place. | | | | |when major | | | | | |changes occur. | | |Identification of risks |Whether risks to the organization’s information and |Allowing third |Allowing third parties |Strict rules and an access | |related to external |information processing facility, from a process |parties access |access to the business |policy must be implemented | |parties |involving external party access, is identified and |to the network |network and the contents |to allow a third party | | |appropriate control measures implemented before |poses serious |of the business systems |access to any information | | |granting access. |risks to the |poses a serious threat to |in the business. | | | |integrity of |the integrity of the | | | | |the |system. | | | |information. | | | |Addressing security when|Whether all identified security requirements are |Allowing |Allowing customers access |Access to information by | |dealing with customers |fulfilled before granting customer access to the |customers with |to information in the |customers should be stated | | |organization’s information or assets. |the access to |business system poses a |in the security policy. | | | |certain |threat. Customers should only be | | | |information can| |allowed access to minimal | | | |help to | |information, a separate | | | |increase | |website or informational | | | |customer base | |address. | | | |and customer | | | | | |awareness. | | |Addressing Security in |Whether the agreement with third parties, involving |All third party|Agreeing with a third |Any third party contract | |third party agreements |accessing, processing, communicating or managing the |agreements |party contract can hold |should be reviewed by the | | |organization’s information or information processing |should be |some legal ramifications. |legal department to ensure | | |facility, or introd ucing products or services to |reviewed before| |the contract agrees with | | |information processing facility, complies with all |implementation. | |all of the businesses | | |appropriate security requirements | | |security requirements. |Asset Management | | | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Inventory of Assets |Whether all assets are identified and an |The businesses assets |Without a clear definition|Each new asset will be | | |inventory or register is maintained with |need to be registered to|of assets the business |registered and assigned an | | |all the important assets. |ensure their safety. |could suffer a loss or |owner. | | | |theft of assets. | | |Ownership of Assets |Whether each asset identified has an |The security policy must|The business could suffer |Each new asset should have | | |owner, a defined and agreed-upon security |include clearly defined |a loss without giving the |an owner and restr ictions | | |classification, and access restrictions |parameters for |asset an owner and |to its access. | | |that are periodically reviewed. |registering assets. defining access | | | | | |restrictions. | | |Acceptable use of Assets |Whether regulations for acceptable use of |Legal issues and profits|Without regulations on the|Defineing all acceptable | | |information and assets associated with an |losses could occur from |use of assets the company |uses of business assets is | | |information processing facility were |the misuse of assets. |could suffer losses and |crucial. | | |identified, documented and implemented | |legal issues. | |Classification guidelines |Whether the information is classified in |Classification of |By classifying information|All information should be | | |terms of its value, legal requirements, |information is crucial |is can be easier to |classified in terms of its | | |sensitivity and criticality to the |to the business. This |determine who has access |va lue, legal requirements, | | |organization. |will determine who has |to it. |and sensitivity to ensure | | | |access to the | |it is only accessible to | | | |information. |authorized users. | |Information Labeling and |Whether an appropriate set of procedures |A set of organizational |Unorganized information |All information should be | |handling |are defined for information labeling and |parameters should be |can result in the loss of |organized within a set of | | |handling, in accordance with the |devised to create a |the information. |parameters defined in the | | |classification scheme adopted by the |classification scheme. | |classification scheme. | | |organization. | | | |Human Resources Security | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Roles and responsibilities |Whether employee security roles and |All personnel authorized|Unauthorized access of |All confidential | | |responsibilities, contractors and third |to access confidential |this information could |information should be | | |party users were defined and documented in|information needs to be |result in identity theft. |handled by authorized | | |accordance with the organization’s |identified by management| |personnel only. | |information security policy. |team. | | | | | | | | | | |Were the roles and responsibilities | | | | | |defined and clearly communicated to job | | | | | |candidates during the pre-employment | | | | |process | | | | |Screening |Whether background verification checks for|All applicants |If not performed, persons |All employees should be | | |all candidates for employment, |considered for |with a history of theft |free of any criminal | | |contractors, and third party users were |employment have to |could be hired. |history that may cause | | |carried out in accordance to the relevant |undergo a criminal | |concern to the company. | | |regulations. |background check prior | | | | | |to a job offer bei ng | | | | |Does the check include character |made. | | | |reference, confirmation of claimed | | | | | |academic and professional qualifications | | | | | |and independent identity checks | | | | |Terms and conditions of |Whether employee, contractors and third |Management must define |Unauthorized access of |To prevent confidential | |employment |party users are asked to sign |what information is |this information could be |information to be disclosed| | |confidentiality or non-disclosure |confidential in |used for personal use. |to unauthorized persons. | | |agreement as a part of their initial terms|accordance to existing | | | | |and conditions of the employment contract. |laws and company policy. | | | | | | | | | | |Whether this agreement overs the | | | | | |information security responsibility of the| | | | | |organization and the employee, third party| | | | | |users and contractors. | | | | |Management responsibilities|Whether the management requires employees,|Management must define |Unauthorized access could |To prevent confidential | | |contractors and third party users to apply|which users have to have|be used for personal gain. |information to be disclosed| | |security in accordance with the |this access. | |to unauthorized persons. | |established policies and procedures of the| | | | | |organization. | | | | |Information security |Whether all employees in the organization,|Management and Loss |Private information could |To educate all personal | |awareness, education and |and where relevant, contractors and third |Prevention must develop |be disclosed to |about privacy policy. | |training |party users, receive appropriate security |a training program and |unauthorized persons for | | | |awareness training and regular updates in |establish how often it |personal use. | | |organizational policies and procedures as |needs to be | | | | |it pertains to their job function. |administered. | | | |Disciplinary process |Whether there is a formal discipl inary |Management must |Private information could |To advise employees what | | |process for the employees who have |establish corrective |be disclosed to |recourse their actions will| | |committed a security breach. |action measures if there|unauthorized persons for |have. | | | |is a security breach. |personal use. | |Termination |Whether responsibilities for performing |Management must advise |If an employee was not |To define the procedures of| |responsibilities |employment termination, or change of |what actions will |properly terminated could |terminating employment. | | |employment, are clearly defined and |terminate employment and|result in a lawsuit. | | | |assigned |what procedures are | | | | | |involved in the | | | | | |termination process. | | |Return of assets |Whether there is a process in place that |Management must define |If not returned, certain |To ensure that all | | |ensures all employees, contractors and |what materials employees|company items could be |appro priate company | | |third party users surrender all of the |must return upon |used for personal use. |materials are returned. | | |organization’s assets in their possession |employment. | | | | |upon termination of their employment, | | | | | |contract or agreement. | | | |Removal of access rights |Whether access rights of all employees, |Management will define a|If not defined, it is |To prevent unauthorized | | |contractors and third party users, to |timeframe in which a |possible that a terminated|personnel from accessing | | |information and information processing |terminate employee |employee could still |company information. | | |facilities, will be removed upon |access is removed |access company | | | |termination of their employment, contract | |information. | | | |or agreement, or will be adjusted upon | | | | | |change. | | | |Physical and Environmental Security | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |removed | | |Physical security perimeter|Whether a physical border security | | | | | |facility has been implemented to protect | | | | | |the information processing service. | | | | | | | | | | | |Some examples of such security facilities | | | | | |are card control entry gates, walls, | | | | | |manned reception, etc. | | | |Physical entry controls |Whether entry controls are in place to |Physical access to |potential for security |server room should be | | |allow only authorized personnel into |system |breach through |locked with access | | |various areas within the organization. | |unauthorized access to |restricted to authorized | | | | |physical equipment. |personnel.Sophistication | | | | | |of restraint would be | | | | | |dependent upon importance | | | | | |of information and budget. | |Securing offices, rooms, |Whether the rooms, which have the | | | | |and facilities |information processing service, are locked| | | | | |or have lockable cabinets or safes. | | | |Protecting against external|Whether the physical protection against |corruption and/or loss |loss of critical data. |Data and system redundancy,| |and environmental threats |damage from fire, flood, earthquake, |of information due to | |off-site storage and/or | | |explosion, civil unrest and other forms of|environmental conditions| |multiple servers at | | |natural or man-made disaster should be | | |different locations. | | |designed and applied. | | | | | | | | | | |Whether there is any potential threat from| | | | | |neighboring premises. | | | | |Working in secure areas |Whether physical protection and guidelines| | | | | |for working in secure areas is designed | | | | | |and implemented. | | | | |Public access delivery and Whether the delivery, loading, and other | | | | |loading areas |areas where unauthorized persons may enter| | | | | |the premises are controlled, and | | | | | |information processing facilities are | | | | | |isolated, to avoid unauthorized access | | | | |Equipment sittin g |Whether the equipment is protected to | | | | |protection |reduce the risks from environmental | | | | | |threats and hazards, and opportunities for| | | | | |unauthorized access | | | | |Supporting utilities |Whether the equipment is protected from | | | | | |power failures and other disruptions | | | | | |caused by failures in supporting | | | | | |utilities. | | | | | | | | | | |Whether permanence of power supplies, such| | | | | |as a multiple feed, an Uninterruptible | | | | | |Power Supply (ups), a backup generator, | | | | | |etc. are being utilized. | | | | |Cabling security |Whether the power and telecommunications | | | | | |cable, carrying data or supporting | | | | | |information services, is protected from | | | | | |interception or damage. | | | | | | | | | | |Whether there are any additional security | | | | | |controls in place for sensitive or | | | | | |critical information. | | | | |Equipment Maintenance |Whether the equipment is correctly | | | | | |maintained to ensure its continued | | | | | |availability and integrity. | | | | | | | | | | |Whether the equipment is maintained, as | | | | | |per the supplier’s recommended service | | | | | |intervals and specifications. | | | | | | | | | | | |Whether the maintenance is carried out | | | | | |only by authorized personnel. | | | | | | | | | | |Whether logs are maintained with all | | | | | |suspected or actual faults and all | | | | | |preventive and corrective measures. | | | | | | | | | | | |Whether appropriate controls are | | | | | |implemented while sending equipment off | | | | | |premises. | | | | | | | | | | |Are the equipment covered by insurance and| | | | | |the insurance requirements satisfied | | | | |Securing of equipment |Whether risks were assessed with regards |off-site data storage |off-site data may be |proper security measures in| |off-premises |to any equipment usage outside an |centers provide a level |compromised or otherwise |place to ensure integrity | | |o rganization’s premises, and mitigation |of redundancy to |corrupted due to |of data. | | |controls implemented. maintain integrity in |insufficient security | | | | |the event of a local |measures | | | |Whether the usage of an information |breach | | | | |processing facility outside the | | | | | |organization has been authorized by the | | | | | |management. | | | |Secure disposal or re-use |Whether all equipment, containing storage | | | | |of equipment |media, is checked to ensure that any | | | | | |sensitive information or licensed software| | | | | |is physically destroyed, or securely | | | | | |over-written, prior to disposal or reuse. | | | | |Removal of property |Whether any controls are in place so that | | | | | |equipment, information and software is not| | | | | |taken off-site without prior | | | | | |authorization. | | | |Communications and Operations Management | |Section |Audit Question |Security Considerations |Security concern if |Mitigation | | | | |rem oved | | |Documented Operation |Whether the operating procedure is |Management should set |Without direction, |To establish how the | |Procedures |documented, maintained and available to |guideline about how each|employees would not know |company is to operate on a | | |all users who need it. |function should operate |what to do throughout the |daily basis. | | | |in the company. |day. | | |Whether such procedures are treated as | | | | | |formal documents, and therefore any | | | | | |changes made need management | | | | | |authorization. | | | | |Change Management |Whether all changes to information | | | | | |processing facilities and systems are | | | | | |controlled. | | | |Segregation of duties |Whether duties and areas of responsibility|Management is |No one would be |To establish accountability| | |are separated, in order to reduce |responsible for |responsible for ensuring |for task performed in each | | |opportunities for unauthorized |assigning area of |tasks are complete d. |area. | | |modification or misuse of information, or |responsibility. | | | | |services. | | | |Separation of development, |Whether the development and testing |Management needs to |Incorrect information |To prevent incorrect | |test, and operational |facilities are isolated from operational |establish a separate |could cause a delay in |information is not given to| |facilities |facilities. For example, development and |network. |production or development. |incorrect personnel. | | |production software should be run on | | | | | |different computers.Where necessary, | | | | | |development and production networks should| | | | | |be kept separate from each other. | | | | |Service delivery |Whether measures are taken to ensure that |Define what measures are|Goods and services will |To ensure that service | | |the security controls, service definitions|needed and establish who|not be done in a timely |level is established and | | |and delivery levels, included in the third|to monit or. |manner. |maintained. | |party service delivery agreement, are | | | | | |implemented, operated and maintained by a | | | | | |third party | | | | |Monitoring and review of |Whether the services, reports and records |Define what measures are|Goods and services will |To ensure that service | |third party services |provided by third party are regularly |needed and establish who|not be done in a timely |level is established and | | |monitored and reviewed. |to monitor. |manner. |maintained. | | | | | | | |Whether audits are conducted on the above | | | | | |third party services, reports and records,| | | | | |on regular interval. | | | | |Managing changes to third |Whether changes to provision of services, |Define what measures are|Goods and services will |To ensure that service | |party services |including maintaining and improving |needed and establish who|not be done in a timely |level is established and | | |existing information security policies, |to monitor. |manner. |maintai ned. | | |procedures and controls, are managed. | | | | | | | | | | |Does this take into account criticality of| | | | | |business systems, processes involved and | | | | | |re-assessment of risks | | | | |Capacity management |Whether the capacity demands are monitored|Management must decide |Systems will not be able |To establish who will | | |and projections of future capacity |if a third party will be|to process information |monitor computer systems. | | |requirements are made, to ensure that |needed to assist with |needed in a timely manner. | | | |adequate processing power and storage are |their IT needs. | | | | |available. | | | | | | | | | | |Example: Monitoring hard disk space, RAM | | | | | |and CPU on critical servers. | | | | |System acceptance |Whether system acceptance criteria are |Management must decide |Systems will not be able |To establish who will | | |established for new information systems, |if a third party will be|to process information |monitor computer syst ems. | | |upgrades and new versions. |needed to assist with |needed in a timely manner. | | | | |their IT needs. | | | |Whether suitable tests were carried out | | | | | |prior to acceptance | | | | |Controls against malicious |Whether detection, prevention and recovery|IT personnel must ensure|Unauthorized access could |Establish measures to | |code |controls, to protect against malicious |proper measures are in |lead to system shut down. |protect from virus and | | |code and appropriate user awareness |place. | |malware. | | |procedures, were developed and | | | | | |implemented. | | | | |Controls against mobile |Whether only authorized mobile code is | | | | |code |used. | | | | | | | | | | |Whether the configuration ensures that | | | | | |authorized mobile code operates according | | | | | |to security policy. | | | | | | | | | | | |Whether execution of unauthorized mobile | | | | | |code is prevented. | | | | | | | | | | |(Mobile code is software code that | | | | | |transfers from one computer to another | | | | | |computer and then executes automatically. | | | | | |It performs a specific function with | | | | | |little or no user intervention. Mobile | | | | | |code is associated with a number of | | | | | |middleware services. | | | | |Information backup |Whether back-ups of information and |IT personnel will ensure|If not properly manage |To establish back up and | | |software is taken and tested regularly in |that system is properly |could result in loss of |recover of data procedures. | | |accordance with the agreed backup policy. |working. |data. | | | | | | | | | |Whether all essential information and | | | | | |software can be recovered following a | | | | | |disaster or media failure. | | | |Network Controls |Whether the network is adequately managed |IT personnel must ensure|Unauthorized access could |Establish measures to | | |and controlled, to protect from threats, |proper measures are in |lead to system shut down. |protect from virus and | | |and to maintain security for the systems |place. | |malware. | | |and applications using the network, | | | | | |including the information in transit. | | | | | | | | | | |Whether controls were implemented to | | | | | |ensure the security of the information in | | | | | |networks, and the protection of the | | | | | |connected services from threats, such as | | | | | |unauthorized access. | | | |Security of network |Whether security features, service levels |IT/Third party will |The company may not be |To establish what security | |services |and management requirements, of all |advise management the |aware of what is needed to|features of needed to | | |network services, are identified and |necessary requirements |secure the network and the|maintain the network. | | |included in any network services |needed for the network. |system is broken into | | | |agreement. | |compromising information. | | | | | | | | |Whether the ability of the network service|