Saturday, August 31, 2019

Parents Have the Most Important and Lasting Impact on the Overall Development and Socialization of Their Child

â€Å"Parents have the most important and lasting impact on the overall development and socialization of their child. † As children grow up, there are many factors which influence their attitudes and behaviors. It is generally learned first from their parents, then the socialization. This statement shows us that correct form different parts, which are sociological theories, the role of parents and parenting styles, care by others and the influence of society. According to two of the sociological theories are functionalism and systems theory. Functionalism attempts to explain how a society is organized to perform its required functions effectively; it focuses on how the structures function within society. Parents have their own responsibility in the families, they add the concept of reproduction to their children, because a population growth can become wealthier; to take care of the children who cannot care for themselves; they are responsibility teaching the socializing to the them; and controlling the behavior of their children. It is very important and having deeply impact on the development of their children. Systems theory is the other sociological theory that attempts to explain how groups of individuals interact as a system, a set of different parts that work together and influence one another in a relatively stable way over time. Parents have different parts of responsibilities for their children before their children grow up. Mothers have to take care of them and teaching the socializing to them. Fathers have to add the concept of reproduction to their children. Over time, children absorb the concept form their parents, so that parents have a large parts of affect for them. A long time ago, human had divided by different small villages. Both of them are independence that has not been influenced by the others. They also are self-sufficiency. Everyone has their own talent, such as hunting, waving, farming and so on. In that time, family had to provide their economic needs, which are foods and clothes, for the younger and older members. Their responsibility is teaching their children the skills, knowledge, values, and attitudes of their society, children who learn these are able to work and relate to others within appropriate adult roles. In industrial revolution was bringing an unprecedented change in the human family system; children and women were particularly in roles. In that time, the economy shifted from self-sufficiency to commerce which is based on factory production in the city or town, and someone work outside the family home to earn a wage to provide for family. Fathers were the money-earners who worked to provide for their wives and children; mothers were nurturers who worked at home and supported financially by their husbands. Nowadays, family build a close relationship, they will give all of the support to the other member. In this century, fathers are still earning money; most of the mothers are working to share the responsibility of their husbands, some of them leave their work and look after their children. They have to instill the different concept about society and reproduction to their future. When children were grown up, they have to take the responsibility that look after their parents; however, parents will concern their children about their work, and help them to solve the problems. In this days and ages, parents are all playing in important roles for their parents. Parenting styles are one of the other important sides in helping parents develop positive impacts on their children. The commonly views of the family have a direct impact on parenting and parent-child relationships. Parents who have a high value of career and work success will focus on a different value on family time and time with their children than the less. Parents who value the goals and needs of individuals over the family will have a difficult time putting their personal needs on hold to care for family members. Parents who are busy fulfilling their individual needs may not take a lot of time to parent in a democratic or nurturing manner. Instead, they may use punishment to get their children to behave themselves. Parents who spend a great deal of time with their children get to know them better and become more sensitive to their needs. Three basic styles of parenting have been considered: authoritative, authoritarian and permissive. There has been a focus on authoritative parenting, which is characterized by warm, support, acceptance and indirect positive control of the children. It is compared to authoritarian parenting, which is distinguished by more parental control and use of punishment, as well as to permissive parenting, which is typified by few rules and by the children controlling the family situations. Children raised by authoritative parents are better adjustment of psychological and have a better self-concept. In contrast, authoritarian parents use more physical punishment, which has been shown to negatively affect the child’s adjustment, especially if it is severe and frequent. Children who experience this type of parenting feel rejected by their parents. They also tend to have more problems with psychological adjustment. Children raised by permissive parents who offer much warmth and encouragement tend to be more irresponsible, impulsive and immature, while children raised by permissive parents who are hostile and rejecting tend to be flighty, anxious, and emotionally impoverished. Hostile parenting practices, such as harsh discipline, unsuppressed anger, and use of negative comments, have been shown to lead to children with low scores in their ability to get along with others. Being raised by a hostile parent has a more negative influence on child’s ability to form positive relationships than any other aspect of a child’s family background. Positive parenting practices result in positive scores in social relationships, helping behavior, and motor and social development. Overall, the style of parenting is one of the most important and lasting impacts on the overall development and socialization of a child. In this day and age, there are a lot parents passed their children by nanny or child care centre, because of their jobs. There are a lot of cases of child abuse, most of it are not abused by their parents, is nanny or the teacher in child care centre. They will punish and corporal punishment them, because they are noisy. I have an experience on it. My friend had abused by her nanny when she was young. When she was 7, her parent is busy on their job, they are working to high value career, and they do not have any time to look after her. So they let the nanny to take care of my friend. The nanny did not look after her nicely, moreover hurt her. The nanny use the hanger to fetch her and punish her, the nanny put all the pressure on her. Did the nanny think that she just a 7 year-old girl, she might change the behavior because of this case. Finally, her parent known this case fired the nanny and compensation claims. However, my friend gets a big turning point on it. She does not trust anyone more and not contact with people. However, society also can impact on the overall development and socialization of the children. There are lots of attractive activities, such as drugs, alcohol, and cigarette and so on, in the society, children will feel curious. Children may be together with the bad guys who with affect their behavior. However, if parents discipline their children in the best ways, children cannot impacted by the other people. Therefore, parents are important and lasting impact on the overall development and socialization of their child.

Friday, August 30, 2019

An Application of Jean Watson’s Theory of Transpersonal Caring to Nursing Practice Essay

Introduction Essentially, the Caring theory of Jean Watson is oriented towards human science and focuses on the humanitarian aspect of caring processes, occurrences and experiences. It also grounded on a unitary perspective and interconnectedness with elements such as an individual with its community. The caring theory embraces one-sided, philosophical and interpretative as well as objective-empirical analysis and integrates several epistemological approaches that clinical and empirical but at the same time is open to other avenues of acquiring vital information.   (Watson, 1988, 1999). On the theoretical framework, the caring theory of 1979 was founded on the ten carative factors. These are essentially a formation of a Humanistic-altruistic system of values and cultivation of sensitivity to one’s self and to others. It has provisions for a supportive, protective, and/or corrective mental, physical, societal, and spiritual environment. Lastly the basic core is grounded on both caring philosophy and science (Watson, 1999). Some suggestions on original carative factors into clinical caritas processes include the formation of humanistic-altruistic value system becomes practice of loving-kindness, Instillation of faith-hope becomes authentically present. Cultivation of sensitivity between the communities becomes going beyond ego self, Development of a human caring relationship becomes helping-trusting an authentic caring relationship, and Promotion and acceptance of the expression of positive and negative feelings becomes being supportive of the expression of positive and negative feelings (Watson, 2006). Main Components Originally, Watson’s theory revolved around three major elements, namely the carative factors, the transpersonal caring relationship,   and the caring moment. She stated ten carative factors that served as guidelines for the nursing practice and basically centered on the principles of caring. The transpersonal caring relationship describes how the nurse goes beyond an objective assessment, showing concerns toward the person’s subjective and deeper meaning regarding their own health care situation, while the caring moment is defined as the moment (focal point in space and time) when the nurse and another person come together in such a way that an occasion for human caring is created (Cara, 2003). In this context, the four essential concepts of nursing – person, environment, health, and nursing – are encompassed in the theory. Being holistic in nature, the theory presents its framework as a congregation of all these concepts, centering on the person. Watson regards a person as an individual with unique qualities and unique needs. The person is recognized as a being capable of communicating with another beyond physical interaction. The person is viewed as whole and complete, regardless of illness of disease (Watson, 2006). The environment is regarded as a healing space, where the person’s awareness and consciousness can expand and promote mindbodyspirit wholeness and healing (Watson, 1999). Inevitably, the state of a patient’s environment can influence an individual’s state of health. The physical environment can affect how the person can connect and exist in the spiritual environment created by transpersonal caring relationships, and could affect the effectiveness of the science of caring. Health is referred to as the unity and harmony within the mind, body and soul. It is a state of complete physical, mental, and social well-being and functioning (Hagopian, 2007). The theory establishes that caring can promote a person’s health better than the curative means of conventional medicine. Through caring, the care giver recognizes the condition of the recipient at a deeper level, enabling him/her to sympathize as needed, and provide the appropriate care needed by the patient. With this means of understanding the patient better, there is greater chance of addressing the patient’s needs, creating the needed balance in his/her physical, mental, and social well-being (Watson, 1998). Influence in My Delivery of Care Watson defines nursing â€Å"as a human science of persons and human health – illness experiences that are mediated by professional, personal, scientific, esthetic, and ethical human care transactions† (Watson, 1988). The theory also emphasizes caring as central to nursing, and is essentially what the theory wishes to achieve. Nursing is not just about curing an illness or disease – it is beyond that. It is about the nurse being able to center consciousness on the entire being of the other in order to detect his/her inner condition, and impart genuine concern through caring moments communicated through â€Å"movements, gestures, facial expressions, procedures, information, touch, sound, verbal expressions and other scientific, technical, aesthetic, and human means of communication.† The role of consciousness is deemed greatly important, because then the nurse exhibits commitment and sincere intention to connect with the patient at a deeper level, thus becoming an effective aid in nursing the patient back to health, physically, emotionally, and spiritually (Watson, 2006). I remember having to give care to a patient who is suffering from a terminal disease and have been placed in ICU care. In this case, the patient was not capable of communicating because he was already in a coma – an application of Jean Watson’s theory in this case would require me to treat not just the patient but his loved ones, holistically. That is, I do not merely stop at trying to address the needs of the patient but also of those who surround him. Concretely, I tried to build a humanistic-altruistic value system which is the core of Watson’s theory. I have dealt with her family as real people who have real needs that have to be addressed. For them to be able to cope with the situation, I have tried to show them empathy, as they express their feelings towards the condition of the patient. It is very difficult to have a dying loved one, but it is a reality that we all must face at one point or the other. Having someone by your side during such a time of grief is very consoling and shall help you thresh out your feelings and cope with the situation. I have proven this many times in opportunities to care for patients placed in intensive care. The development of a caring relationship with the patient’s family helps them go through the ordeal with appropriate and well-expressed emotions, and even greater spiritual strength and maturity. I believe that the nurse has a critical role to play in such incidents. Applicability of Theory to Modern Nursing Practice The effectiveness of Watson’s theory has been validated with its use as a guide in several studies centering on caring science. It has been â€Å"recommended as a guide to nursing patients with hypertension, as one means of decreasing blood pressure and increase in quality of life,† in a study made on its effectiveness on the quality of life and blood pressure of patients with hypertension in Turkey (Erci, Sayan, Tortumluoglu, Kilic, Sahin, & Gungormus, 2003). In another study on caring for old adults, it was established that the theory was effective in improving the quality of life and peace of mind, body, and soul of the older people, just by caring and listening attentively to what they have to say (Bernick, 2004). The situation of caring for a patient in the intensive care unit has a more serious need for dedicated and focused care. Patients in intensive care in the intensive care unit (ICU) need more than mere treatment.   They need assistance for themselves and their family who want to hear good news and encouraging words about the patient’s recovery, information that is not always quick in coming, if at all. In ICU situations, the patient and, equally as important, the patient’s family wants to know the patient’s chances for survival; possibility of permanent disability; and answers to their queries on the patient’s condition (Rafael, 2000). . Although the attending doctor and nurses are the best sources for information to answer these questions, it is not always possible for them to accurately predict patient outcome, particularly in the first few hours or days of an ICU stay.   Like the patient and the patient’s family, the attending doctors and nurses are also awaiting the initial outcome. This means that everyone—attending physicians, attending nurses, family, friends and the patient him/herself are involved. All can and do contribute to the final outcome in one way or another. On my end, I try to answer all the questions that are posed to me by the patient’s loved ones to manage their expectations about the patient’s condition. And yet, I do this with caution, since it is still the physician who has the authority to inform them of these. The end goal was to try to assist the patient and his loved ones go through the ordeal, addressing their physical, emotional and spiritual needs in the context of a caring relationship. Conclusion Overall, Jean Watson’s theory of transpersonal caring has very high utility in modern nursing practice. It has been shown to be strongly oriented towards human science and focuses on the humanitarian aspect of caring processes, occurrences and experiences and has been able to effectively encapsulate the science of arts and humanities. Moreover, it has been grounded on a unitary perspective and interconnectedness with elements such as an individual with its community. However, one limitation may be its emphasis on being one-sided, philosophical and interpretative rather than on objective-empirical analysis. Moreover, it includes ontological, philosophical, ethical, historical inquiry and studies. Caring science is a new field that is evolving currently in the nursing industry and has truly evolved nursing theories and science and has contributed heavily to health, education, and human service fields and professions. References Bernick, L. (2004). Caring for older adults: practice guided by Watson’s caring-healing model. Nursing Science Quarterly, 17(2):128-34. Cara, C. (2003).   A pragmatic view of Jean Watson’s caring theory.   International Journal of Human Caring, 7(3), 51-61. Erci, B., Sayan, A.,Tortumluoglu, G., Kilic, D., Sahin, O., & Gungormus Z. (2003). The effectiveness of Watson’s Caring Model on the quality of life and blood pressure of patients with hypertension. Journal of Advanced Nursing, 41(2), 130–139. Hagopian, G. (2007).   Nursing theorists.   Retrieved February 8, 2007 from www.nipissingu.ca/faculty/arohap/aphome/NURS3006/Resources/theorists.ppt Rafael, AR. (2000). Watson’s philosophy, science, and theory of human caring as a conceptual framework for guiding community health nursing practice. ANS. Advances in Nursing Science, 23(2):34-49. Watson, J. (1988). Nursing: Human science and human care. A theory of nursing (2nd printing). New York: National League for Nursing. Watson, J. (1999). Postmodern nursing and beyond. Toronto, Canada: Churchill Livingstone. Watson, J. (2006).   Dr. Jean Watson’s Theory of Human Caring.   Retrieved February 8, 2007 from http://www2.uchsc.edu/son/caring/content/evolution.asp

Thursday, August 29, 2019

Christianity and Islam Research Paper Example | Topics and Well Written Essays - 750 words

Christianity and Islam - Research Paper Example The Catholic Church, the Coptic Church, the Orthodox Churches, the Protestant Churches, and other small denominations signify modern Christianity (Miner et al., 2014). The emergence of the Christianity on the Roman Empire was marked in Jerusalem during the 1st Century AD. The fall of the Empire resulted to the emergence of Christianity. The birth of Christianity in the Roman Empire is more often link to the conversion of the Constantine, which led to a different perception of Christianity. Word has it that, Christs vision appeared to the Constantine on the battle’s eve that eventually led to the Constantine winning the battle, hence made him convert the Empire to Christianity something that marked the emergence and spread of Christianity in the entire world by the time the Roman Empire fell. Therefore, since then the religion has spread globally and, it is believed it is one of the largest religions globally. Christianity appealed to many people after the fall of the Roman Empire because of the inequality that was exhibited by the Roman Empire (segregation); hence, Christianity offered mutual social support to its members, hence attracting many people. Therefore, many people adopted Christianity because they felt oppressed by the Roman Empire. In addition, many people from diverse backgrounds and regions viewed Christianity as a uniting religion and hence so the need to adopt Christianity (Mason.gmu.edu, n.d.). Islam came into existence in the 622 CE by Mohammed, a renowned prophet of the Medina. Muslims view Islam as something that has been there since the times of prophets such as David, Moses, Abraham, and Jesus (Levenson, 2012). The two main sacred texts used by Islam are Quran and Hadith. The five pillars of Islam are reciting of the Shahadah at least once a day, performing of the prayer five times a day while facing Mecca,

Wednesday, August 28, 2019

Karl Marx Aruments Essay Example | Topics and Well Written Essays - 250 words

Karl Marx Aruments - Essay Example Whereas the Capitalists believed on the private ownership of means of production, Communisms was for the public ownership of means of production. Secondly, these philosophers were against alienated labor and job specialization, which they viewed as betrayal to multiple human potential. Thirdly, they were against exploitation of workers, brought by capitalism. Here workers would be exploited in terms of payment. They claimed that Capitalism was primarily for making money rather than the common good for all. For instance, among the few rich, money would determine their relationship even in the institutions of marriage. Job instability is another factor that these scholars viewed as a brought by the industrial age. Here most workers would be rendered jobless as machines take up most jobs (Riggins 1). Some of these arguments are still seen to be relevant to date. For instance, in some of the most industrialized nations, machines tend to do most jobs, which human beings would have done. For example, in Britain, cotton gene replaced human labor. Secondly, the idea of job specialization has transformed most human beings to a machine like creature, preventing them of being dynamic and innovative (Caldwell 3). In conclusion, the ideologies of Marx and Engels can help in building economy that brings better relationship with nature and society. Moreover, there is no country in the world to date which practice communism or capitalism to the letter. In one ay or another, changes have been realized in countries that were first viewed as extremists. For instance, communist China now gives her citizens opportunity to keep some of their earnings. The same appears to have been adopted and adapted in USA that currently has social security systems and postal services owned by

Tuesday, August 27, 2019

Issues related to the establishment of the center brand Bank for Essay

Issues related to the establishment of the center brand Bank for Foreign Trade of Vietnam - Vietnam - Essay Example Creation of brand value and brand recognition has become equally important in the banking sector, even for established banks like the Bank for Foreign Trade in Vietnam. The Bank for Foreign Trade in Vietnam is an old bank which was established in 1963 by the Foreign Exchange Bureau of the State Bank of Vietnam. The Bank has been playing an important corporate role in the development and stability of the economy in Vietnam. Also, the bank has made several contributions in the local as well as global regional and financial communities during its years of operation as a leading bank for foreign trade. The bank provides a number of services including a wide array of financial services in both traditional as well as international services like credit, capital mobilization, capital trading, and project finance. Also, the bank offers other modern banking services like e-banking, international credit and debit card services, derivatives trading and Foreign exchange trading services. The bank has established itself as a leader bank in the banking sector in Vietnam and is an influential authority in the regional financial communities. Brand centre of an organization is a department of the organization which includes the branding activities and branding materials like production kits, templates, logos, photographs etc. Also, proper guidelines for the creation of value with respect to the brand are included in the brand centre. The Bank for Foreign Trade in Vietnam is a large organization with a vast network including more than 357 transaction offices and branches. The bank thus has a huge number of customers and constructs huge volumes of transactions every day. The Bank has always focused on efficiency in their operations, providing value to the customers and improves the quality of management and corporate governance practices (Jenkins, 2004, pp.13-28). Though the Bank for Foreign Trade in Vietnam is the largest bank in the

Monday, August 26, 2019

Using technology in class Essay Example | Topics and Well Written Essays - 500 words

Using technology in class - Essay Example Akhtar says that multitasking interferes with the accuracy and quality of work being done by students. For that matter, college students using laptops, tablets, phones and social media in class perform poorly (Akhtar, 33). Technology does not enhance the learning experience of students; instead, it interferes with the accuracy and quality of work that students do during classroom setting (Akhtar, 33). For that matter, technology makes students become less attentive and focused in class. There should be no certain cases in which only some certain technological devices should be allowed by professors. For example, there should no cases when a cell phone should be allowed in class by professors. A cell phone has several negative effects on the performance of a student. The major effect of using a cell phone in a class is distraction (Kiuhara, 101). When the phone rings while students are in a class, attention is distracted. Thus, students may miss the point that a teacher is passing across. Also, when students go with phones to classes, their attention is distracted when they start scrolling through the phone, listening to music while a class is on, looking at pictures and videos in the phone. All these things that students do with their cell phones in a classroom setting negatively affects their performance since they are pushed into multitasking. Students who are poor at multitasking, but use phones frequently, lose a lot since they do not understand anything their professors teach. Also, using cell phones in class distracts other students who may be curious to know what the phone has, how it looks like and the specifications of the phone. For that matter, there should be no cases when some technological devices should be allowed in class, in fact, the devices should be banned in class. As much as people argue that the success of college students is correlated with the usage and dependence on

Sunday, August 25, 2019

Response Journal 3 Essay Example | Topics and Well Written Essays - 250 words

Response Journal 3 - Essay Example However, an attempt to minimize the greenhouse effect may lead to new problems that will appear in the nearest future. For example, according to the information presented by the French bank Credit Agricole, the consumption of cement will increase in half. The invention of carbon negative cement is an ethical situation as it does not stick to major principles of engineering ethics. It is known that every engineer must do everything to contribute to the health, welfare and safety of the society he/she lives in. Another important principle is to act only in the sphere of competence. Engineers have no right to suggest inventions in any other sphere. That is why it is possible to criticize the above-mentioned invention as it has not been done together with ecologists, who seem to be the first group to handle the problem with greenhouse effect. The growing demand of cement will not contribute to people’s welfare. It is necessary to inform the public about the advantages and disadvan tages of cement utilization to act according to the principles of ethic engineering. The next step will be to cooperate with ecologists and inform the public in case of any other innovations in the field. Works Cited Alok Jha. Guardian News and Media Limited, Feb. 2008. Web. 31 Dec. 2010

Saturday, August 24, 2019

Business strstegy Essay Example | Topics and Well Written Essays - 2000 words

Business strstegy - Essay Example In such changing environment, it is must for the organizations and the institutions to have enough flexibility and adaptability within the policies and procedures of such bodies so that the changing terms can be easily inculcated. Such flexibility and adaptability has become the key for the sustainable growth and development of the organizations and institutions. Forestry Commission was established in England in the year of 1919 through the passing of the Forestry Act. The prime reason of the establishment of such Commission was aimed at supplying the much required timbers that were in scarcity in those years because of the industrial revolution and the First World War. The government of England speculated another war in the near future and thought it was necessary to have proper supply of timber. The secondary reason of the formation of such Commission was to ensure employment in the rural economy because of the changed political equations and also to provide employment to the soldiers those have just returned from the war. Therefore, to serve so many of the objectives the Forestry Commission was formulated which till recently was under the control of the ex-army men and more importantly followed the organizational structure similar to that of the military. The structure was essentially a top-down one with much emphasis on the features like chain of command and order from the top. With the changing times, the role of the Forestry Commission also experienced paradigm shift. The department of the government that came in to existence for the purpose of timber production and rural employment was pressed by the government in the 70s and 80s to inculcate organizational efficiency like other departments of the government. The Forestry Commission also had certain internal conflicts. There was a clear difference among the organizational hierarchy resulting in ‘them’ and ‘us’. Those who were the field

Segmentation and Targeting Term Paper Example | Topics and Well Written Essays - 1000 words

Segmentation and Targeting - Term Paper Example A Rolex customer is a person that is accustomed to buying luxury items. A lot of Rolex watches have target market of people that are millionaires (Rolexforums, 2011). (2) How does the choice of target market influence the company's pricing and promotion (from what you know so far)? The target market of Timex of targeting people of all ages is achieved by the firm’s pricing strategy of selling watches at the low end of the market. Most Timex watches are sold at a price point between $25 and $50. Timex utilizes various promotional strategies to increase the sales of the firm. Some of the stunts include the use of customized watches for incentive awards, sales incentives, corporate promotions, business gifts, safety programs, and recognition awards (Timex, 2011). The retailer that sell Timex watches on many occasions sell the watches on special since the target customer of Timex watches are price sensitive. The demand of products that are priced low goes up by further decreasing the price of the product. The Rolex uses different promotional strategies to attract customers. The use of celebrities sponsoring the product can help increase the appeal of the product. Rolex watches are sold at jewelry stores and in luxury department stores. There is a lot of competition in the luxury watch marketplace and many online vendors offer attractive discounts off the retail price to persuade people to buy Rolex products. For instance Melrose Jewelers is currently offering the Presidential Rolex at $9,825 (Melrose Jewelers, 2011). This price is 36% below retail price. (3) Now imagine one of the companies you chose wants to introduce a new target market. For instance, suppose Hilton or Four Seasons wanted to offer a budget option for the target market sought by Motel 6. How would this strategy affect consumer perceptions? Rolex could introduce a cheap version of its watches to attract the younger demographic between the ages of 18-25 years of age. The new product could att ract a lot of new customers and the sales of that product might be excellent. The problem with that strategy is that it can dilute the brand name of the company. The wealthy people that are accustomed to the prestige of owning a Rolex will not be very happy with the masses buying cheap Rolexes sold at hundreds of dollar a piece instead of thousands. The company could lose a lot of customers that are enabling the firm to make a nice profit margin from each unit sold. The second scenario involves Timex introducing an expensive model to target a different segment. A good way to achieve such a strategy is by including implicit value in the construction of the watch such building the watch with some or all its parts in gold. I think adding a line of luxury watches would be beneficial for the company. (4) Do you think these customers will be influenced by changes in the economy? Why or why not? Timex is better suited to accept negative changes in the economy than Rolex. Timex sells a chea p product. During bad economic times people look for bargains. Many users of mid level brands might switch to cheap brands such as Timex to serve their watch needs. During good economic times the Timex brand will do better, but the firm might lose a portion of its recurrent customers who might switch to more expensive brands because they can afford them now. The low price point of Timex makes the watch an excellent gift and during good economic times people are more generous. A Rolex is a luxury item. Luxury items do not have good sales during bad economic

Friday, August 23, 2019

Public administration Assignment Example | Topics and Well Written Essays - 750 words

Public administration - Assignment Example He further adds, should precaution measure be taken into place, disasters would not be so disastrous because preparedness would be the order of the day with leader being on the frontline championing for effective management of disasters. The writers use game theories and Schelling curves to look at distributed decision making and show their usefulness in many classes of problems and in shaping the understanding of payoff functions for the problem in question. The major concept illustrated in the book by Gerstein, (2008) through those theories is that rarely is a disaster accidental, rather, there is always signs way before it happens. Theories, that disasters are bound to happen, can only be argued by leaders who are not ready to take responsibility of their actions because they tend to flirt with disaster. Decision making processes must be guided by previous disasters and leaders should not live in assumptions, disasters can be controlled if leaders in public administration lived up to their billing. Chapter 1 examines the Columbia tragedy focusing on Rodney Rocha, a NASA engineer who tried to get the agency to determine the true risk to Columbia, but eventually giving up and later observing the tragedy occur. The second chapter explores hurricane Katrina and the question remains why so little was done when danger was imminent, according to Gerstein, (2008), if leaders were serious enough regarding their public duties, there would have been a damage control and the results would not have happened the way they happened. The space shuttle challenger and the chernobyl were next explored in the next chapters and again, warnings were ignored. Another case explored is the vioxx study that led to numerous deaths in Vietnam only because the company in charge did not inform the public on the dangers when they found out, rather they continued to do research. Â  In chapter 10 of the book,

Thursday, August 22, 2019

The Causes of Prohibition Essay Example for Free

The Causes of Prohibition Essay When federal prohibition was introduced in America with the 18th Amendment to the constitution in 1919 and the Volstead Act in 1920, it was often termed ‘The Nobel Experiment’. It didn’t take long for most people to recognise that the experiment had gone terribly wrong and that it was fostering what it was supposed to eradicate, crime, excess and corruption. But the question is why it was introduced in America in 1920 and to understand this issue, one has to look at the groups that campaigned against the American drinking culture, such as the Anti-Saloon League, as well as the general situation and the public opinion in America, including the fear of immigration. One of the groups that campaigned against alcoholic drinks in America were business executives. Including names as important as Ford and Rockefeller, they believed that alcohol undermined workers’ discipline and productivity and they even invested in scientific research in order to prove the negative effects of alcohol on the body’s health. Thus, they feared that drinks impeded profits and prosperity, which even led some employers to form the American Anti-Saloon League, which actively supported prohibition. Moreover other groups, such as soda manufacturers and tea merchants, tended to support prohibition as they hoped for increased sales as a result of people not being able to obtain alcohol. Therefore the business executives contributed to the federal prohibition by campaigning against it and they were heard as they were significant in order to keep the American economy going. Furthermore there was a great deal of political opposition to alcohol in America. The majority of supporters of the Republican Party were from rural small town America and they were traditionally anti-drink, which meant that the Republicans supported prohibition in order to keep their voters happy. But both Parties had members that saw alcohol as an obstacle to improving society. Moreover the Senate was biased towards rural America, which supported prohibition and from 1917 onwards all Senators had to be publically elected, which made them more inclined to follow public opinion. This helped prohibition as public opinion tended to support it. Thus the political opposition was the most significant reason for prohibition, especially as the Republican Party, which was in power at the time tended to support prohibition. Furthermore Protestants campaigned for prohibition and against drunkenness and violence. Particularly with the revival of protestant fundamentalism and extreme groups, like the Ku Klux Klan, in many areas particularly the rural and small town ones alcohol was blamed for morally corrupting the nation. They saw the drinking culture as the main reason for problems, such as crime, poverty and prostitution. These groups were large and often very influential, e. g. the Indiana Klan, which was a branch of the KKK, controlled large parts of the local government in Indiana. This meant that the revival and ideologies of protestant fundamentalism were a major reason for the federal prohibition. Additionally many women and feminists in particular blamed drinks for domestic abuse, family poverty and deprivation. They formed groups like the Women’s temperance league and the Women’s Christian Temperance Union, which campaigned against it and they were taken more seriously than ever after the female suffrage had been introduced in 1919. They also contributed to the establishment of prohibition by actually supporting pro-prohibition candidates. This makes them an important group to consider when looking at the reasons for the introduction of prohibition in 1920, however not as influential as other groups seeing that many women still opposed prohibition. Another reason for the introduction of prohibition was the issue of immigration and race. Many Americans and WASPs in particular associated immigrants with the drinking culture, especially the Irish and immigrants from the South, like Italians. This made them support prohibition as they feared that immigration would have negative economic effects and that immigrants would import revolutionary ideas, such as communism. Also Southern landowners wanted to prevent black labourers from getting distracted by drinks. And in addition eugenics became popular in US in the 1920s and their idea was that alcoholic genes could be passed down to the next generation, thus weakening the American race. Finally the situation after World War I created the perfect environment for such a radical change introduced on a federal level. Government interventionism and limiting the people’s freedom seemed more acceptable as there had been many restrictions. This meant that prohibition on a federal level would have probably been seen as too interventionist a measure, if it had been proposed at a different time making the First World War a necessary condition for the introduction of prohibition. Therefore the reason for the introduction of federal prohibition in America in 1920 was the fact that on the one hand there was a wide range of groups campaigning for temperance and against alcohol, the most important being business executives and politicians. On the other hand it being introduced directly after the First World War was also essential as it created the environment and the mindset necessary to introduce Federal Prohibition.

Wednesday, August 21, 2019

Strategies to Protect Sensitive Corporate Data

Strategies to Protect Sensitive Corporate Data Jasjeet Singh What are the steps project managers must incorporate to uphold the security, privacy and disaster recovery policies to prevent Companies sensitive and vital corporate Data? Abstract Security, disasters and privacy are risks to a project and to a project manager. But project managers are trained to deal with risks. These risks are best addressed when the project manager fully understands them. In a nutshell, we can say its all about protection of vital data and its critical element CIA(confidentiality, integrity, and availability) including the machines and process that use, store, and transmit that data. Security is a risk to project managers for both implementing a project and perhaps the project itself if it is IT or telecom related. In this paper, I will include the data security risks facing a project manager, How to protect the CIA Triad using various security policies, standards, and procedures. And I will try to touch some more information security related aspects like Security Awareness and privacy protection, etc. Keywords-Project management; Project Manager; Data Security; Privacy; Security Policies; Confidentiality; Security Awareness. Almost every project generate or use, some form of information and information technology. Mostly, this information needs to be preserved or isolated by some form of security. Security planning and implementation is an integral part of the overall project life cycle which also include many different issues to be considered when planning a project. Whereas finally what is being safeguarded is the data produced by the machines, the information that data is used to create, and in some manner, the conclusions made based upon that vital data. A security threat is something that jeopardizes any of the CIA Triad (availability, confidentiality, and integrity) of a machines data. Security flaws and risks emerge from such threats. Solutions and planning to manage such items begins in the very initiation stages of a projects life with the identification of any of these security related flaws, risks, and threats. In parallel with each phase, efforts work towards constantly identifying new threats and reducing the identified security risks through the diligent planning and proper implementation of risk mitigation strategies specifically developed to resolve each unique threat specifically. Security of vital data and associated technology systems must be considered when planning projects, developing applications, implementing systems, or framework etc. So as to be effective and efficient, security must be organized for and embedded into the systems from the very starting, and monitored periodically throughout the life of the proje ct, and be maintained all along the life of the system. Thereby the result is planning as soon as possible in early stages and embedding security into all phases of a projects life cycle is usually considerably easier and much less cost consuming than waiting till the later project phases to consider it. On the moment when addressing the security for the majority of the data frameworks, it might be a chance to be decayed under three principal segments that are; communications, hardware, and software. Arranging how every from claiming these zones may be ensured includes not the main attention by the people, policy, practice etc. and also, financial considerations with furnish for those Audit from claiming the framework, asset procurement, execution of security solutions, progressing security maintenance and so on. Figure 1: CIA Triad The image shows the main goal of such efforts which are to maintain the availability, confidentiality, and integrity of vital information. All information system must maintain: Confidentiality disclosure or exposure to unauthorized individuals or systems is prevented Integrity data cannot be created, changed, or deleted without proper authorization. Availability information and the security controls used to protect it are functioning correctly when the information is needed.   Ã‚   An ordinary Project Management technique doesnt incorporate subtle elements regarding guaranteeing integrity, confidentiality, Furthermore availability for the majority of the data or those protections about particular data. Background need to be demonstrated that mostly the information security or privacy experts would not consult regarding the undertaking until those test phase, alternately much more terrible The point when the project needs with be marked off or executed Also about to go live. These conditions will feel thick, as commonplace on the majority of the data security experts Also privacy officers indistinguishable. This cautiously might prompt postponements previously, sign-off Whats more go-live alternately significantly more repulsive another information skeleton being moved under preparing without expanding security Also security controls completed. This means exploitation of risks such as: Breaches of legal requirements, for example, the Privacy Act, Unauthorized access to systems and information, Disclosure of information Moreover bolting on security instruments controls alternately privacy controls toward those end of the development, for example, another provision or the usage of a new data framework is really unreasonable Furthermore drawn out. Data information and framework security Whats more security methods oughta chance to be inserted under the organizations venture administration procedure. This ensures that majority of the data security Also security dangers would identify, assessed, figured out how Whats more tended to ask and only an undertaking. This approach Might make associated for during whatever endeavor regardless to its character, e.g. an endeavor for focus profits of those business process, IT, office organization Moreover different supporting manifestations. Venture supervisors would continuously set under a considerable measure from claiming weight to guarantee they convey on time Whats more inside plan. On accomplish execution of a secure Also industry consistent legitimate a dministrative necessities data system, it may be vital to take part for the majority of the data security and security topic masters from those minute a feasible ticket may be recognized to Creating. The two main approaches to project management are: The waterfall approach (delivery is all-in-one-go, for example, Prince 2 and PMP); and A release-based iterative approach (delivery is in bursts of functionality spread over time, for example, Agile Scrum/Sprint methodology). Both methodologies need pros Furthermore cons Furthermore, we wont talk about whatever points of these two approaches, rather it takes a gander during the place whats more entryway data security Also privacy ought to a chance to be joined under those project management cycle, in any case about which methodology is picked. Process Steps Everyone dares organization methodologies to take after a tantamount high-cap convert starting with asserting 4 alternately 5 steps, in the passages underneath those steps to that Agile technique would previously, (brackets). Every for these steps needs their goal/objective, in addition, an arranged starting with guaranteeing deliverables to that step. For every to these steps, those one assignment director ought to should incorporate a security proficient. Incorporating security under exercises beginning with that start will Abstain starting with each moment abstain? In addition (often very) irrationally additions later on in the project. The individuals taking then afterward slug concentrates give to an Audit of the lions share of the information security Also privacy-related considerations for each phase. More details on this topic can be studied on the internet. Scope/Initiation/Discovery (Stage 1 Vision) Might be specific information included in this project alternately converted at that passed on information system? Assuming that something like that the individuals or security officers necessities around an opportunity to be contacted at this stage. What is the order alternately affect the ability of the data processed? Ensure that the Information Security Officer (or equivalent role such as ICT security, CISO, ITSM) is involved in communicating security requirements; these must be an important part of the business needs. Is there a requirement for compliance with legal or regulatory needs, national or international standards (ISO27001) or contractual security and privacy obligations? Business Case/Planning (Stage 2 Product Roadmap and stage 3 Release Planning) Indulge with the respective subject matter professionals to discuss in detail the security and privacy needs, so they can be implemented during the design of the project. Pre-define the acceptance methodology for all the business needs, including security and privacy protection. Identify security and privacy risks and perform risk and privacy impact assessments. Depending upon the results of these assessments, identify security and privacy countermeasures and techniques which need to be included in the design. Development/Execution (Stage 4 Sprint Planning and Stage 5 Daily Scrum) During the design implementation the identified security and privacy controls? Perform compliance checks and security reviews against requirements and selected controls, against existing policies and standards. communicate with external security experts such as penetration testers, code reviewers, and auditors, etc Plan for performing vulnerability scans (internally) and checking of the patch fixing status. Consider meeting the Operations team that will handle the solution from a security perspective after moving on to production. Test Evaluation/Control Validation (Stage 6 Sprint Review) Indulge with security and privacy subject concern experts to assist with communicating and understanding the resulting reports (test). Execute all security testing: penetration test, code review and/or ISO audit. Have Security operations team go through with the operational documentation? Regularly check the risk register and review all risks, based on the solution as it has been formulated. Launch/Close (Stage 7) Pass on the formulated security and privacy treatment plans, which have been accepted and agreed by the business owner. Start the business normally with security operations, monitoring of risks and compliance. Milestones or gated Approach The waterfall project management techniques discuss that for managing Also controlling the one project phases, An amount from claiming checkpoints, turning points or gateways ought further bolstering be presented. Figure 2: Gated approach The main motive of these gateways is to make sure that all criteria or needs are fulfilled or not, all required deliverables for that phase are done or not, and to review if the project is still on time/within budget. These gateways are the instances in time during a project where security and compliance milestones can be introduced to safeguard that the project in compliance with all agreed business needs, including security and privacy formulations. Underneath are some checks, decisions, and lists that should be implemented from an information security and privacy point of view: Scope gate High-level business, information security, and privacy needs identified. The seriousness of information assessed and considered. Business case sign-off gate By in-depth study on the risks assessment, note down all security and privacy controls and procedures. In-depth security and privacy requirements formulated and acceptance criteria accepted upon. Indulge with IT design architects and information security subject matter professionals to compose a Risk management Plan (which will include a resource plan/budget). Maintain a risk register that lists down all privacy risks, security risks, and initial level of risk (gross risk). Design sign-off gate Assessment of privacy, security and reviews and compliance points against agreed sign-off criteria. Go through the project risk register that lists down all security risks, privacy risks, and potential residual risk. Communicate with 3rd parties to agree on the scope of a penetration test, Certification Accreditation audits, code review or other security tests that are been outsourced. Communicate with the operational security team to put forward the solution and manage if the document set is complete, acceptable and up-to-date. Final business sign-off gate Check weather all formulated security and privacy controls and procedure implemented as designed? The job of Information Security is primarily to ensure CIA in place but there is a common misconception that only IT is responsible for it. But theyre not!! Then who is responsible for Information Security in your organization or say for the project youre managing? Lets think of below: Who is the information owner in the organization for this project? Its senior management or business heads (on behalf of the customer). Remember IT is the custodian of information while the owner will decide about classification and protection/access requirement. Who is to understand and conduct impact assessment? The owner should be the one who is gonna tell us how important ( or say risk level) the information is and assess what will happen if we fail to protect. How to secure information flow/process in your project? Once you understand customer or owners requirement and the impact, now Project Manager has to play the role. However, PMs are not expected to be security experts but be fully aware of it. PM is the one who: Should understand what are information risk concerning his/her project Interpret impact to senior management and customer for security issues Need to be able to decide on appropriate mitigating action Minimize the risk associated with information security threats/breaches. Include security considerations is integrated into every phase and process of a projectà Ã‚ ¾ and Ensure adherence to policy and standard/compliance So need to include Information Security within the project process right from the Initiation. We can fit it in when developing Project Charter Business Case  ­ Consider Impact Assessment on proposed product service from information risk perspective and also must include information security safeguard and issue during cost benefit analysis. Discuss and identify security features/requirements to be added. Project Statement of Work  ­ Review product scope to identify info. sec requirement and incorporate any additional Customer requirement for specific info ­sec standard compliance Organizational Process Asset  ­ Internal Information Security Policy, Standard and Procedure and also security control and audit requirement for process systems including a stipulated in RFP. Enterprise Environmental Factors  ­ In addition to Legal Regulatory requirement may need to consider industry standard practice on Information Security. Formulated security testing reviewing the results and make a decision if things are acceptable or not. Project Plan integrate information security Scope Management Collect Requirements Legislation, regulation and customer expectations on information security and make sure you know how you will be able to measure whether above requirements are met? Change Control process should always consider IS impact during approval/review. Data Classification should be approved by management and customer and also define control requirements in the system, 3rd party and operational process for the data type. Identify all requirements on data storage, record management and destruction for the internal and external party and then prepare data governance/ handling policy and procedure for your project based on the above. Figure 3: Threat Activity model Procurement Identify critical supplier who can have a significant impact on project deliverable and responsible for handling restricted data. Do we need sign NDA? Require Audit right to review their process and controls? Have to safeguard from relevant security flaws appropriately resolved in all your third party contracts. Quality Control Quality will include security compliance on process and record management. Quality Assurance will perform security audit and review privilege (system +operational) to review data disposal and backup process. For effective measurement, need to identify appropriate PI for security control. Next, integrate within your Project Plan. Cost Time Ensure budget and schedule covered security related activities and controls. Stakeholder Management Cross-border data transfer and data privacy issue applicable? Regulatory compliance and approval required? Engage early with concerned parties to properly plan ahead. Monitor change in regulatory and statutory policy. How to maintain requests for information from government agencies and those results from legal process? Example: Regulators response and deadline may challenge project outcome. Project Risk Management Information Risk Assessment Lets review the basics once again: Define Information Risk  ­ Risk is a factor of the likelihood of a given threat sources exploiting a particular potential vulnerability and the resulting effect of that adverse event on the organization. Qualitative Risk Assessment A method can be Overall Risk Score = Likelihood X Impact. The likelihood is a chance of this event occurring in the scale of 1 ­5 or Very Likely, Likely, Maybe, Unlikely, Highly Unlikely etc. For example, whats the chance vendor the system will compromise our data during the project? The impact is how much effect once the risk (no control in place) in the scale of 1 ­5 or Critical, High, Medium, Low, Minimal. For example, what will happen to us once the data is compromised? Define overall rating for risk, For example, can be High if > 15, Medium for 10- ­15, and Low if When required should engage information owner, customer, and security function wherever possible and then assign monitoring responsibility and activities within a risk response plan. Quantitative Risk Assessment Annualized Loss Expectancy (ALE) is the expected monetary loss that can be expected for an asset due to a risk being realized over a one year period. ALE = SLE * ARO ­SLE (Single Loss Expectancy) is the value of a single event loss of the asset [impact] ­SLE = Asset Value x Exposure factor. [EF is what % of the asset will be damaged] ­ARO (Annualized Rate of Occurrence) is how often the incident can occur in a year [likelihood]. A risk occurring once in 5 years has an ARO of 0.05à Ã‚ ¾ while if occurring 10 times in a year then ARO = 10 Could use average = (Worst + 4*Average + Best) / 6. The above is kept simple and not perfect but better than nothing. Risk Response Cost Benefit analysis of feasible Safeguard/Control Compare ALE considering with and without safeguard control in place. Value = ALE (with NO safeguard) (ALE after implementing safeguard) (annual the cost of safeguard). Select Mitigation, Transfer, Acceptance, and Avoidance based on above. Note: SIME: Security Information and Event Management  ­ DLP: Data Leakage Protection  ­ DRM: Digital Rights Management. HR/People Manage Security with People Security Skills Assessment What are the resources and skill requirement for information security in your project? Does your security function have sufficient trained resources? Assign security management and appropriate level of authority to carry out this role. Security Awareness Security is not police job, rather we are protecting corporate information to safeguard our customer, our business and to comply with statutory requirements. All team members know their responsibilities to help establish security and comply with the policy. Set up ground rules on acceptable and unacceptable activities, for example, usage of social media, official email monitoring etc as per organizational procedure. Clearly, understand data classification policy and how to handle each type of data. Figure 4: Security Awareness Training Promote awareness campaign to motivate team members to be the safeguard of corporate information. Security breach/issue reporting and handling procedure should be clearly communicated. Discuss why we focus on information security and clarify concern during team building. Project Communication Secure what you communicate Comply with the security policies Comply with the policy from both client organization and project organization. In cases where policies overlap, the more restrictive policy will apply. Check whether supplier/vendor/outsource Company meets the same standard. Checkpoint for data transfers and storage Consider using method in which password protect the meetings and/or use the roll call system of the conferencing. Prefer to encrypt data during the distribution of meeting proceedings and another project documents via email. Select Instant messaging, desktop or application sharing/video conferencing via secured provider or channel. Check what information is acceptable to be left in auto responders and in voice mailboxes. Establish administrative controls Prepare Guidelines for use of social media and how to share project information. There should be guidelines or ground rules regarding forwarding work related email to personal or transfer to smart phones ­ Consequence of a security breach and data leakage should be clearly communicated. Project Execution Implement effective control Direct and Manage Project Work Segregation of Duties execution, and supervision of any process should not be performed by a single person and establish dual control or Maker Checker process on activity involving risk. Strictly follow approval and authorization limit for layered control on requesting a change. Reviewed authority and access right upon during staff transfer or exit from the project. Ensure appropriate labeling and storage of documents resulted from project activities. Remind importance of security awareness and to notify breach/incidents immediately. Engage with the supplier to increase security awareness with their employee as per your standard. Data backup and restoration should be periodically tested for project related system(s). Manage Communication When information requested by the supplier, check against requirement and policy before sharing. Maintain the record of send and receipt when documents are shared/sent to the 3rd party. Figure 5: Communication Management Discuss information security issue in the regular review meeting and notify formally when appropriate. Monitor Control Pro-active check and act Control Scope Risks Ensure security verification upon milestone achievement. Reviewed system logs, alert and process audit output to identify the potential incident. Monitor change in regulatory and other critical factors that may force information risk re ­assessment. Security Incident Management Assess impact Internal, Financial, Legal, Regulatory, Customer, and Media/Reputation. Do NOT underestimate any impact often serious consequence happens from simple case. Invoke organizational incident management process and escalate to senior management if required. Manage 3rd Party Risk Conduct an audit to see how Vendor/Outsourced company process, store and destroy your information. Review what formal information ( and their type) are being shared with external parties. Check with the critical supplier for Business Continuity drill as it may impact your project during any disaster. Project Closure -Secure disposal Formal Sign Off Conduct security audit with supplier and customer (if required) and document formal sign off. Ensure all project documents and necessary records are properly achieved. Document lesson learned from security issue and incident handling. Operational Handover Document to enforce security controls as recommended for regular operation. Revoke access rights from the system before dissolving project team. Formal handover production system, customer/business documents, manual or other records including backup data and electronic equipment containing information. Data Disposal Formally confirm with all project team members on secure destruction either stored in electronic format or paper-based document which no longer required. Confirm destruction from a supplier who may retain information belong to your company/customer. Conclusion Information Security plays a very important role in the development of every project irrespective of projects magnitude. So the project manager has to be very much alert and attentive to check and to meet the protocols so as to preserve the vital corporate data of the organizations during each phase of the project development. Figure 6: Template for Questionnaire to review security of project The project manager must use various new techniques to embed the security into the project from the very initiation phase one of such technique is to use Questionnaire to review the security of the project. Project Managers can also look for a new secured Software development life cycle model which incorporates all major aspects of the data security, privacy, and recovery for a software development. Figure 7: Secure SDLC Model Those A large cost savvy approach to managing security under products or techniques is to actualize all the security Furthermore privacy controls and mechanisms under the configuration, Including them later alternately. After the project needs to be run live, will be significantly a greater amount exorbitant and might diminish those Return-on-Investment of the project altogether. References [1] Security Issues that Project Managers at CDC Need to Address, CDC Unified Process Project Management, vol. 2, no. 6, June 2008. [2] M. Dean, A risk ­based approach to planning and implementing an information security program, in PMI, 2008. [3] B. Egeland, Learn 3 Ways to Ensure Your Project Data is Secure., Is Project Security that Important?, July 2, 2015. [4] R. J. Ellison, Security and Project Management, Security and Project Management | US ­CERT, February 06, 2006. [5] D. E. Essex, government database project outsourcing, A matter of public record, August 2003. [6] S. Fister Gale, Safeguarding the data treasure, February 2011. [7] S. Hendershot, Security guards ­ data ­security initiatives for Project Managers, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control), Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), September 2014. [8] C. Klingler, Security, privacy and disaster recovery for the project manager, in Cost Control (http://www.pmi.org/learning/library?topics=Cost+Control) , Sustainability (http://www.pmi.org/learning/library?topics=Sustainability), 2002. [9] Monique, Information Security Privacy as part of Project Management, 18 March, 2015. [10] M. Pruitt, Security Best Practices for IT Project Managers, SANS Institute, June 18, 2013. Table of Figures Figure 1: CIA Triad: https://www.checkmarx.com/wp-content/uploads/2016/06/Data-Securi

Tuesday, August 20, 2019

Skills Required in Phlebotomy

Skills Required in Phlebotomy Objectives To acquire the knowledge and skills to perform phlebotomy and finger prick. To learn the order of draw and its significance. To learn various devices and preparation techniques before phlebotomy. Introduction Phlebotomy is referred to the cutting of a vein. It is a procedure often involving invasion that invades the body through cutting or puncture normally carried out by professionals called phlebotomists. Among the major roles involving a phlebotomist is to obtain blood specimens for diagnostic testing. This can be done either by dermal puncture which is done by puncturing the skin or venepuncture which is done by puncturing the veins. Other than that, a phlebotomist is also responsible in redrawing blood from donors during blood transfusion of from any patients having polycythemia which is known for overproduction of blood cells. Phlebotomist are also responsible for collecting and properly packaging urine specimens, accepting incoming specimens (blood and body fluids, etc.), and routing specimens to the proper departments to be tested and analysed. In order for a phlebotomist to withdraw blood from a patient, he should make sure that the tubes are labelled and all the materials are pr epared before carrying out the procedure. The best sites for venipunture are normally the superficial veins of the upper limbs. The superficial vein most commonly used for venipuncture is the median Cubital Vein which lies over the cubital fossa and serves as an anastomosis between the basilica veins and the cephalic veins. The next most common vein is the cephalic vein where it can be followed proximally where it empties into the axillary vein. The basilic vein is also a location for venipunture as it divides to join the brachial vein. The usual sites for capillary puncture or finer prick in adults and children are the fingertip. In adults, the ring finger is often selected because it usually is not calloused. Capillary blood can be obtained from the great toe in infants and babies. In new-borns, the lateral or side portion of the end of the heel pas is used. The BD Discussion Among the inappropriate sites for venipuncture are the site affected by a mastectomy. This is because mastectomy causes lymphostasis which means stoppage of lymph flow where the bodys ability to fight infection is compromised if lymph nodes are removed therefore patients are more prone to infections. Edematous sites, an abnormal accumulation of fluid on the intracellular space of the tissue must also be avoided as it can cause difficulty in palpating the veins due to the excess fluid. The specimen can also be contaminated with the fluid. Venipuncture performed at sites of scars and burns are also inappropriate as it causes unusual pain for the patients. This is caused by the veins that are very difficult to palpate and also susceptible to infections as the protective barrier (epidermal layer) has been disrupted. Other than that, patients who have IV running in their arm should not be used for venepuncture as it may be a contaminant to the blood collected. Lastly, dermal punctures mus t never be performed on the fingers of a new-born or very young infant. This is because there is very little distance between the skin and the bone. Therefore, the bone could be easily pierced during the puncture, causing injury to the bone, infection, or gangrene. The order of draw is as follows, Blood Cultures Coagulation Tube (light blue top) Plain red AND/OR Serum Separator Tube (red gel/SST) Heparin Tube (green top) Plain Sodium Heparin Plain Lithium Heparin Lithium Heparin Gel EDTA Tube (purple and pink top) Fluoride/ Oxalate Tube (grey top) Miscellaneous tubes (these are drawn in no specific order) Heavy metal dark blue top (EDTA and plain red) b. ACD yellow top The purpose of the order of draw is to avoid possible test result error due to cross contamination from tube additives. Potassium results can be falsely elevated as EDTA is rich in potassium. Therefore test for potassium must be collected before tubes containing EDTA. Other than that, the microscopic appearance of the red blood cells on a WBC differential test will be distorted due to the additives in the Fluoride/ Oxalate tube as oxalate interferes the red blood cell membrane and fluoride alter its morphology. Moreover, coagulation tests such as Activated partial thromboplastic time (aPTT) and prothrombin (PT) can be affected with the presence of clot activators by shortened test results. Bacteria from non-sterile tube stoppers/shields can contaminate blood collected into bottles/tubes used for blood cultures, resulting in the growth of bacteria erroneously leading a physician to think his/her patient has a blood infection. A hematoma is a collection of blood beneath the skin. Hematomas are the most common adverse reaction to venipuncture. Precautions that can be taken to prevent hematoma in phlebotomy are by puncturing only the uppermost wall of the vein. Other than that, the phlebotomist can also remove the tourniquet before removing the needle. The needle should fully penetrate the upper-most wall of the vein as partial penetration may allow blood to leak into the tissue surrounding the vein. Lastly, adequate pressure should be applied to stop the bleeding once the phlebotomy is complete. Haemolysed blood specimens are not be acceptable for testing. Hemolysis occurs when the red cells rupture and haemoglobin and other intracellular components spill into the serum. Hemolyzed serum or plasma is pink or red, rather than the normal clear straw or pale yellow colour. Steps that can prevent haemolysis are by mixing tubes gently or about 5 – 10 times after collection. The tubes should not be shaken too vigorously and drawing blood should be performed on hematoma individuals. Other than that, when using a needle or syringe, avoid drawing back the plunger to forcefully. Moreover, if a blood transfer device is used to fill vacutainer tubes, always allow the vacuum to pull the blood into the tubes. Do not use he plunger or syringe to force the blood into the tubes quickly. References Akron Childrens Hospital, 2015, Lab Test Procedure : Performing A Venipuncture. [Online]. Available at : https://www.akronchildrens.org/cms/lab_procedures/9179c8cb8f877ee3/ [ Accessed 29/01/2015]. Johnson. L, 2013, National Center for Competency Testing : Phlebotomy order of draw, [Online]. Available at : https://www.ncctinc.com/documents/Phlebotomy%20Order%20of%20Draw.pdf [Accessed 29/01/2015]. MediaLab incorporated, 2015, Hematoma, [Online]. Available at : https://www.medialabinc.net/spg549505/hematoma.aspx, [ Accessed 29/01/2015]. Turgeon., M,. L, 2005, Clinical Hematology: Theory and Procedures, Volume 936, [Online], Available at : https://books.google.com.my/books?id=cHAjsUgegpQCpg=PA26lpg=PA26dq=edematous+site+venipuncturesource=blots=qxLCqzHsO2sig=OaKkj33lflGKFvorZweYFnb4RHUhl=ensa=Xei=n1bHVI-VM4yD8gW29IKoBgved=0CDIQ6AEwAw#v=onepageq=edematous%20site%20venipuncturef=false , [Accessed 29/01/2015]

Monday, August 19, 2019

Nelson on Descartess Theory of Perception and Judgment Essay -- Desca

Nelson on Descartes?s Theory of Perception and Judgment ABSTRACT: One tension in Descartes?s account of human error stems from the idea that we may be faulted for our acts of will, despite the fact that God is our omnipotent and omniscient creator. In the present essay, I describe a second tension in Descartes?s account of human error. After describing the tension, I consider Alan Nelson?s characterization of the means by which Descartes?s intended to relieve it. Although Nelson's interpretation is almost correct, I think that it obscures some of the interesting details of Descartes?s theory of perception and judgment. These details are revealed by the taxonomy of sensory responses that Descartes articulates in the Sixth Set of Replies to the Meditations. I. In the Fourth Meditation, Descartes is confronted with the problem of reconciling his conclusion that God exists and is no deceiver with apparent instances of human error. Described generally, Descartes attempts to square his assertions regarding God, with the fact that humans are subject to error, by claiming that any error made by a human being originates in a free act of will for which God should not be attributed fault. There is, of course, enormous tension between Descartes?s claim that human beings may be faulted for their acts of will, and his claim that God is our omnipotent and omniscient creator. In what respect is it appropriate to regard us as culpable for our acts, assuming that God is antecedently the author of these acts through his creation of the Universe? This is a difficult question to answer. However, even if we set this question aside (as I will), we find that considerable tension remains in Descartes?s account of the etiology of perceptual error. .. ...escartes, Volume II, pp. 295. 21 The same sort of confusion is also described in the last sentence of both principle 70 and 71, in Book One of the Principles. 22 In fact, the categories of the objects of confusion mentioned in principle 46 (perceptions and judgments) are precisely the constituents of the second and third categories of sensory response described in the Sixth Set of Replies. 23 The Philosophical Writings of Descartes, Volume I, pp. 208. References Descartes, Renï ¿ ½: 1985, The Philosophical Writings of Descartes (Vol. 1,2, and 3), Cambridge University Press, New York. Hare, R.M.: 1952, The Language of Morals, Clarendon Press, Oxford. Locke, John: 1975, An Essay Concerning Human Understanding, Clarendon Press, Oxford. Nelson, Alan: 1997, ?Descartes?s Ontology of Thought?, Topoi 16, 163-178. DESCARTES?S THEORY OF PERCEPTION AND JUDGMENT 11

Sunday, August 18, 2019

Radioactive Frequency Identification: A Threat to Privacy :: Argumentative Persuasive Argument

Radioactive Frequency Identification: A Threat to Privacy As technology advances and the government continues to attempt to control us, an idea that was once thought ridiculous is now coming back with full force. The idea of RFID chips (Radioactive Frequency Identification) has already been put into place by many large companies and businesses however most civilians don’t even know they probably own products or clothing with RFID chip implanted in them. The government has not effectively publicized and made the information as available as they should have to educate people about this new technology. Radioactive frequency identification tags are very similar to barcodes in that they both scan onto computers to read information about a specific product. Experts say that eventually RFID chips will take over barcodes and be used in every store worldwide. RFID chips are also manufactured to use a certain frequency range. â€Å"Early RFID pilots have shown that other radio-frequency-based technologies often clash with RFID readers when frequency ranges overlap. As a result, companies have experienced difficulties during RFID pilots with bar-code scanners, cordless phones, push-to-talk devices, wireless networks, security systems, and other RF-based technologies† (Smart 4). As technology advances, we will see how RFID chips will take control of the market take the place of bar codes. Since the idea of RFID chips are new and haven’t been explored much, we have limited examples and uses available to us. However, we have to accept that RFID is going to take effect because large companies have already begun putting them to use in the products they sell. Eventually almost every product you own, wear or see will be implanted with an RFID chip. Sounds easy and helpful right? It is only going allow the government and monopolies to control customers and take away the little privacy we have. Granneman agrees that †by implanting RFID chips into everything we buy, the government will be able to track everything we do from which products we bought to where we went and what we did with them† (17) The concern here is that. â€Å"Whatever direction the industry at large takes, your business must operate on the Spider-Man principle: With great power comes great responsibility. Where privacy and data collection are concerned, privacy professionals understand that with more data comes greater responsibility and legal risks. If the industry reaches a point where it can somehow use RFID tags to track a product all the way into consumers' homes and beyond, the industry also must ensure that it's protecting the privacy rights of the individuals who buy that product.

Separation of Church and State is Necessary for Freedom of Choice Essay

Separation of Church and State is Necessary for Freedom of Choice We in America have the right to be free, so why not listen to the words of Thomas Jefferson and build a â€Å"wall of separation between church and state?†Ã‚   The wall of separation was Jefferson’s interpretation of the first amendment; however, the idea was actually founder of Rhode Island Roger Williams’.   Jefferson’s belief was that religion was a personal relationship strictly between a man and his God and the government should not be allowed to restrict anyone from practicing their religion. With so many different religions in the United States, church and state must be separated to a certain extent because a close relationship between church and state puts constraints on the freedom of other religions. To begin with, creationism is a great example of an ongoing religious conflict which has caused a lot of discussion.   It is a lesson that all students should learn, whether in public school or private. The main concern is how teachers can teach creationism without crossing religious boundaries. Anderson addresses the importance of teaching creationism: Considerable care and effort are needed to help students understand the difference between the methodology of science, with its naturalistic operational assumptions, and the naturalism as a worldview. (Anderson 89)Schools should not neglect teaching creationism when students are able to benefit from being informed about both beliefs of evolution and creationism.   It is relevant as long as religious views are not infringed upon them.   Furthermore, school vouchers are unconstitutional and public funds should not be used to fund any kind of religious organization. Back in 1971 was the first time that the Sup... ...igious beliefs do affect the opinion of many voters. In conclusion, the separation of church and state remains a controversial issue. It is evident that church and state should be separate in some cases, such as in public schools and politics. Public schools are responsible for exposing students to diversity. Without the separation of church and state it would be practically impossible. Separation of church and state guarantees choice. Works Cited * Anderson, Ronald D. â€Å"Religion and Spirituality in the Public School Curriculum.† New York. Peter Lang Publishing. 2004. * Davis, Derek H. â€Å"The Separation of Church and State Defended.† Texas. 1995. * Doerr, Edd. â€Å"Gathering Storms.† The Humanist. Volume 64, number 6. Washington.American Humanist Association. November/December. 34-35. * Maddox, Robert L. â€Å"Separation of Church and State.† New York. 1987.

Saturday, August 17, 2019

New and Significant Management Insights from Recomputed Baldrige Scores

Baldrige Criteria raw scores were statistically analyzed carrying out correlation test, t-test, and regression analyses tests on two (2) groups designated as Leaders and on another group as Others. From an earlier examination of the respondents that the Leaders were actually Senior Leaders and that the Others were actually Junior Leaders, the tests consistently showed that the Senior Leaders were more concerned with external factors, such as satisfying Customer and Market Focus and delivering Business Results.Expectedly, as Junior Leaders, they showed total balanced concern for all the categories of the Baldrige Criteria.Results of both groups descriptively (Commerce, 2007b) fell into the Baldrige Leadership and Results Triads, pages 4 and 5 (Commerce, 2007b). Other possible uses of already available Baldrige Criteria raw scores must be further explored especially in the feasibility of predicting favorable leadership qualities towards successful organizations. Introduction What a bet ter way to define leadership than through differentiating it with management by these 2 very self-explanatory popular business amorphisms: Management guru Peter Drucker and Bennis jumbled words, in that:â€Å"Management is doing things right; Leadership is doing the right things† (Warren Bennis, 1995). Thus, Bennis, then has more to say, in that: â€Å"Managers want to be efficient. Leaders want to be effective†(Warren Bennis, 1995). Through the centuries, man has always been awed by outstanding leaders. Hence, through the years, continuing search has been made of the unmistakable character traits of leadership, obviously found in leaders. There have even been attempts at possibly measuring leadership, or if not, trying to segregate those people who are leaders from those who are not leaders by applying some pre-set leadership criteria on them.Review of Related Literature The Value of Leadership Qualities of leadership, specifically military leadership are found not on ly under the subject heading Military Leadership in the earlier August 1999 US Army Field Manual (FM) 22-100 Army Leadership Be, Know, Do version (Army, 1999) but also in just the latest October 2006 US Army FM 6-22 Army Leadership Competent, Confident, Agile version (Army, 2006). From the 1999 US FM 22-100, Napoleon Bonaparte, a most famous military leader boasted (more, later) that: â€Å"A man does not have himself killed for a few halfpence a day or for a petty distinction.You must speak to the soul in order to electrify the man† (Army, 1999). Moreover, according to the same 1999 US FM 22-100, it would be safe to declare then that with those good qualities of leadership, former US Army Sergeant Major Richard A. Kidd had this to say (more, later), that: â€Å"Soldiers learn to be good leaders from good leaders† (Army, 1999). It will be at best a very highly debatable issue (Frances Hesselbein, 2004; Jason A. Santamaria, 2003), the importance of military leadership o ver civilian leadership, as just fitting and right.Over 228 years of US Military fighting history and existence, only in the past 8 years, already two military volumes of the US Army on Military Leadership had been printed, as we have seen above: the year 1999 FM 22-10 and the year 2006 FM 6-22, representing the US’ foremost military leadership literature. Why and how the US became a military power may also be attributed to those two manuals which encapsulated especially the US Marines’ superior rigorous and highly-proven training methods over 228 years to produce the US Military’s effective and successful military leaders/officers and soldiers (women from all ranks included).Without deliberately and unnecessarily comparing and contrasting (though debatable) military leadership and civilian leadership, it just cannot be helped; however, to sufficiently point out only two major differences between them. Obviously, first, the highest stakes are over human life-and -death situations and possible widespread public infrastructure damage by which military leaders could legitimately under military leadership give the orders for the go-ahead, as in â€Å"to seek and destroy (with impunity and without prejudice! )†.Such situation cannot be compared with any other civilian leader, except for the lone duly-elected civilian President also deciding as Commander-in-Chief of the nation under a democratic country where civilian authority is supreme over the military. In other words, hands down, each individual military leader or officer is tasked to the extremes: physically, mentally, emotionally, spiritually, psychologically, socially, and so on–more than any of his civilian counterpart under any same given conditions (Frances Hesselbein, 2004; Jason A. Santamaria, 2003).Second, it could be generally inferred that it would be much easier to make the transition by a military leader to become a civilian leader (to be discussed later); than for a civilian leader to become a military one—simply because of more demanding requirements of the civilian individual (or leader) by the military life (Frances Hesselbein, 2004; Jason A. Santamaria, 2003). Civilian leadership may be further subdivided into spiritual leadership in origin or in nature (Greenleaf, 2002), political leadership (Gardner, 1990; Warren Bennis, 1995; Yukl, 2001), and business leadership (Covey, 1900, , 1992, , 2006; Jason A.Santamaria, 2003; Yukl, 2001). For leaders who are successful in their own fields, yet surprisingly, they still feel themselves very melancholy and unexplainably â€Å"unfulfilled†, the most plausible search for their fulfillment, obviously with very strong spiritual undertones, may come from imbibing that concept of servant-leadership, a term coined by Robert K. Greenleaf who wrote Servant Leadership: A Journey into the Nature of Legitimate Power and Greatness, 25th Anniversary Edition as a hardcover (Covey, 2006; Greenleaf, 2002).Naturally, proponents, advocates, practitioners, and â€Å"fanatics† of this â€Å"Greenleaf culture† or those practicing spiritual leadership should be, just to give examples, are the so-called Roman Catholic religious orders with lifetime vocations of daily self-denial comprising the monks, missionaries, contemplatives, and so on. Tao Te Ching, ca. 6th century BCE as described in chapter 17, on â€Å"servant-leadership† remains to be a timeless ideal (Greenleaf, 2002). Following closely at his heels, Jesus Christ ca. 33 AD sought to teach his disciples that in order to be first they must â€Å"wash each other's feet†.In other words, taken directly from the Online 1611 King James Version (K. J. V. , 2007) from the gospel evangelists’ accounts, the disciples must seek to serve each other in order to be true leaders from Chapter 13 of the Gospel of John (K. J. V. , 2007). And again, Jesus said that â€Å"many who are first will be last, and many who are last will be first† meaning that true leadership, according to Jesus, was leadership based on servanthood from Chapter 19 according to the Gospel of Matthew (Covey, 1900, , 1992, , 2006; Gardner, 1990; K. J. V. , 2007).Thus, now many years later if analyzed, notice Bonaparte’s speaking to man’s soul to electrify man (Army, 1999) for man to join his Army, with the certainty that that man will get killed–can be found in the servant-leader concept during World War II as exquisitely applied by the German people and the German Army in their allegiance to their Fuehrer (Adolf Hitler) of the Fatherland (nation Germany) and by the Japanese people and the Japanese Army in their allegiance to their considered demi-god Emperor (Emperor Hirohito) of their beloved nation Japan.It really is noteworthy that Larry C. Spears, President and Chief Executive Officer (CEO) of the Robert K. Greenleaf Center for Servant-Leadership since 1990, summarized Greenleafâ⠂¬â„¢s works by listing down the servant-leaders’ ten (10) characteristics which because of the concept/principle of the servant-leaders’ deep spiritual underpinnings, all the other mentioned habits or values of civilian leadership literature can be included in any one of these ten items. The following list can be considered a veritable â€Å"How To’s in Leadership†:Hence, those other leadership habits or values, also cited accordingly alongside each of these characteristics mentioned are from Stephen R. Covey’s The 7 Habits of Highly Effective People (Covey, 1900), Principle-Centered Leadership (Covey, 1992), and The 8th Habit from Effectiveness to Greatness (Covey, 2006); John W. Gardner’s On Leadership (Gardner, 1990); Warren Bennis and Joan Goldsmith’s Learning to Lead (Warren Bennis, 1995); and from Gary Yukl’s Leadership in Organizations (Yukl, 2001). 1. Listening (Greenleaf, 2002):While other leaders are expected to be e xcellent communicators and decision-makers, servant-leaders, rather than to be listened to, are now more than ever, expected to listen intently to the others (Greenleaf, 2002). Habit 6, Synergize (of 7 or of 8), that the would-be-leader, believing that the whole is bigger than the sum of the parts, through mutual trust in attentively listening to the other person they could both arrive at the best solution because they listened to one another, better than either’s (Covey, 1900). Same as Characteristic 7, They Are Synergistic (Covey, 1992). 2. Empathy (Greenleaf, 2002):Servant-leaders try very hard to understand and empathize with others, accepting them as they are, and as they come and go (Greenleaf, 2002). Habit 5, Seek First to Understand, Then to Be Understood, that the would-be-leader must try his best first to identify with the other person before he himself expects to be understood by that person (Covey, 1900). 3. Healing (Greenleaf, 2002): An on-going phenomenon betwee n serving and being served is not only the potential but the actuality that both serving and being served are â€Å"healed† or â€Å"made whole† again by their shared experiences (Greenleaf, 2002).Habit 4 (of 7 or of 8), Think Win/Win, that the would-be-leader makes sure that his counterpart and he are both benefited by any arrangement or agreement they have arrived at (Covey, 1900). Habit 7 (of 7 or of 8), Sharpening the Saw, that the would-be-leader voluntarily and regularly maintains a balanced personal renewal of his physical, mental, social/emotional, and spiritual dimensions (Covey, 1900) and very similar, if not the same as Characteristic 5, They Lead Balanced Lives (Covey, 1992) and Characteristic 8, They Exercise For Self-Renewal (Covey, 1992).Bennis was able to grasp this truth, in that: â€Å"As Sophocles observes in Antigone, ‘’But hard it is to learn the mind of any mortal, or the heart, 'til he be tried in chief authority. Power shows the ma n’’’† (Warren Bennis, 1995). 4. Awareness (Greenleaf, 2002): Able servant-leaders are usually sharply awake and reasonably disturbed from integrated holistic perspectives, yet with inner serenity (Greenleaf, 2002). Habit 1 (of 7 or of 8), Being Proactive or the concept of Inside-Out, that any significant type of change in the would-be-leader must first come from within himself (Covey, 1900).

Friday, August 16, 2019

Wolfgang Keller at Konigsbrau

Individual Case Analysis Assignment II: â€Å"Wolfgang Keller at Konigsbrau-TAK† MGT 400- Monday 6-8:45 Chelsea Glovis a. What is your assessment of Brodsky’s performance? Please be specific. In my opinion, I believe that Brodsky is one of those individuals who is so intelligent his personality and social interactions suffer. Keller and Brodsky have very different approaches to problems, in addition to being different nationalities, this creates many of the problems that they face.Keller looks at problems and goes above and beyond to try and solve them, whereas Brodsky attacks problems with the textbook methodology (analytical) that is not always the best approach, and isn’t sure how to do anything else. For instance, half of their distributers were not attending the annual distributors’ meeting. Brodsky was already gone for the weekend and unreachable at home. Keller and his staff spent the majority of their weekend personally inviting the distributors, j umping through hoops to ensure they felt appreciated by meeting them at airports or railroad stations.After all of their hard work, the attendance was more than doubled, which was critical for the businesses success. Lastly, Brodsky was dealing with a distributor who he had written off as bad debt of 87,000 euro. Keller was encouraging him to meet with the customer and demand the money. Brodsky resisted at first, then finally called the customer and concluded that nothing could be done. Meanwhile Keller took matters into his own hands and drove to meet with the distributor in person and was able to get a check for the whole amount.It seems to me that Brodsky is making the least effort in regards to personal relations, while at the same time thoroughly completing the tasks he was assigned for sales and marketing purposes. Brodsky is failing to see the larger picture and taking into consideration how relationships directly affect business cohesiveness. I think that he may feel threate ned by Keller seeing his recent success and feels that since he is older he knows what is best for the company, although that is clearly not the case. Seeing that Brodsky is so analytical by nature, it provided reasoning behind the way he looked at the tasks at hand.I think that Brodsky could have made a much greater effort in resolving problems with distributors/customers, implementing his sales plan, developing a decent relationship with others, and acting as a manager not just an employee. It is crucial for employees below managers to feel comfortable discussing their thoughts and ideas, not scared and nervous. Brodsky does the least amount of work that meets minimum expectations on most areas of work and tasks that are assigned to him. For example, there was a very serious distributors lawsuit filed by one of the firm’s largest distributors that Brodsky was in charge of handling.In dealing with this issue, Brodsky sent a sales representative to work out the problem. Only after the sales representative failed did Brodsky make an effort to personally contact the distributor. Following their discussion, Brodsky determined that the distributors position was unchangeable. Keller knew this would be a huge deficit to the company if they lost this customer and arranged to have a seat next to them on the plane to work things out. After the plane ride the distributor agreed to drop the suit completely, if Brodsky had made more of an effort initially he could have been much more successful.While he does come up with new innovative methods for increasing sales and completing very thorough analysis, he doesn’t work within a realistic deadline. It is imperative to the success of the company to work in a timely manner so that sales can have a quick turnaround and begin to grow. Managers should be motivating to their employees to work hard and do their best, whereas Brodsky hardly communicates with his subordinates and coworkers thus diminishing any chance w hatsoever for good, working relationships to be formed.In order to grow as an individual Brodsky needs to use this constructive criticism and feedback to heart instead of arguing each critique, making excuses and blaming others. b. How effective has Keller been as a coach to Brodsky? Why? Could you have done better? Why and How? I feel the Keller has done almost everything he can think of to try and alleviate the current situation with Brodsky. I think that the two men have such differing approaches in solving problems; a lot of tension is created in the office as well as one on one.The majority of the time, Keller takes problems into his own hands and tries to solve them, I would like to have seen him ask Brodsky to go above and beyond. Such as, arranging seats next to a distributor to discuss the lawsuit, personally invite distributors to the convention, and make a home visit to demand payment from a client. While Keller did allow Brodsky to make an effort, I feel that he could ha ve been more successful if he provided Brodsky with ideas to solve these problems. Because Brodsky is so analytical, it is hard for him to think outside of the box.He is so used to strictly going by the rules and regulations he thinks once he has done those methods there is nothing else he can do. Keller needs to take into consideration Brodsky’s personality, problem solving skills, and relationships with others and in the end he will realize why Brodsky is the way he is. He continues to feel like he is never good enough because of the constant negative feedback that he is given. In my opinion critical feedback should be backed with the same amount of positive feedback as to ensure employees don’t feel inadequate and not valued.In some aspects, Keller and Brodsky share similar personality traits. It is a challenge for both of them to see others perspectives and personalities differences. They are both problem solvers; however attack their problems differently. In my op inion Keller has done all he can think of to help motivate Brodsky and for that I think he has been mostly effective. On the other hand, I wish he would understand their differences and realize why Brodsky does things the way he does. I wouldn’t necessarily say that I could do a better job; I would just approach the situation much differently.I have a way of providing critical feedback intermixed with positive feedback, as well as a course of action to fix the problem all in the same sentence. On top of the feedback, I would also include peer feedback as well as voice the concerns that other employees have expressed. I feel it is necessary to break down the feedback and explain why it is important and beneficial to fix these problems and how it will affect the business as a whole. I feel that this would be beneficial to Brodsky so he can take these specific steps to get better and learn from his shortcomings.Also, I would be more understanding of the way Brodsky operates as a whole and determine the best way to help him start to think outside the box to solve problems. I would also provide definite deadlines for tasks that he is assigned to in order to avoid missing deadlines, taking too long, and falling even more behind. I would give him words of advice and encouragement to make him feel appreciated and determined. Instead of immediately taking matters into my own hands as Keller did, I would allow Brodsky the opportunity to use my methods of completing tasks that were tough situations (i. . telling him to make a house call to discuss getting a payment check from a soon to be bankrupt company). Lastly, I would outline specific goals to accomplish for the next few months or until the next review to motivate him, as well as discuss company procedures that must be followed. These procedures would include mannerisms at work (open communication, proper etiquette, a minimum number of social outings that must be attended, etc. ) With clearly established rule s, goals and courses of action, there is little room for him to argue his side. c.What are the underlying causes of Brodsky’s performance problems? What actions should Keller take upon returning to Kiev? Be specific. The majority of Brodsky’s performance problems have to do with two different personalities, traits, management styles, ethnicity, and outlook. Keller is a very hands-on, action-oriented guy who takes matters into his own hands when they are not completed exactly as he would have done it. Although he is very personable and loves to share a lot of his personal life with co-workers he has a difficult time putting himself in others’ shoes.Brodsky on the other hand is a very analytical introvert who completes tasks by the tried and true textbook approaches. He has a hard time thinking outside of the box when it comes to personal interactions and relating with others, in addition he doesn’t like to spend a lot of time bonding with co-workers and ke eps the vast majority of his personal life to himself. These two completely different, night and day personalities are bound to clash and create bumps in the road that cause discrepancies.On top of all of that, I think that Keller is so concerned with making sure Brodsky understands where he needs improvement that he forgets to provide positive feedback with a plan of action that Brodsky can follow. In addition, their differences in age and methods to solving problems are completely contradicting as well, especially when Brodsky has shared little information about the way he operates. Brodsky has a hard time taking Keller’s feedback because he doesn’t understand what he did wrong and what he was supposed to do instead.Brodsky is very thorough and will take his time to ensure a task is completed to the best of his ability, while Keller is action oriented and wants to see fast results. Brodsky addresses co-workers in a formal demeanor with a distant management style and minimal personal life sharing, which damaged his overall management style. All in all, their overall management styles were to blame for clashing so drastically. I believe if Keller and Brodsky shared the same viewpoints on management styles and approaching tasks Brodsky’s performance report would have very high reviews.Keller should have clearly established due dates for tasks so as to avoid problems with Brodsky taking too long to complete them, explain what business etiquette the company promotes, provide well-defined expectations, goals, and methods to accomplish, and try to see the world from a different light. He must understand that not every individual functions on the same level, manages and accomplishes tasks in the same manner, and remember how different each person is in this world.Developing a friendlier relationship with Brodsky would make it easier for Keller to share how he feels and hopefully he will be able to provide feedback more than just during a perform ance review. d. What are the implications for Keller’s own development as a leader? Although Keller has had great success at such a young age thus far in his life, he still has a lot of room to grow as a leader. A great leader needs to be sympathetic with their employees and co-workers and do whatever they can to help them grow as individuals and flourish in the world of business.He must remember that each individual is different and not everyone manages with the same style. These differences are what creates diversity in teams and allows for innovative ideas and thorough discussions. Having faith in your employees is a huge part in being a successful manager. When at first they don’t succeed, provide insight, thoughts, ideas, solutions, etc. to continue to show them how to think outside the box. Keller is so concerned with fast results and finishing tasks on his own that he doesn’t give his employees the chance to learn from his methods.In his mind he is being the best leader he can be, meanwhile Brodsky is under the impression that he is being the best employee he can be. Both of them need to reevaluate their situations and how to work more cohesively together with such differing styles and traits. It is imperative that Keller works on giving positive as well as critical feedback, a defined set of goals and deadlines, an action plan to fix areas where his subordinates aren’t performing up to par, and provide constant feedback so his employees don’t go sixth months thinking they are doing an incredible job when in reality he thinks they are slacking.