Saturday, December 28, 2019

Autobiography Of A Memoir Essay - 894 Words

ashVictor Garcia Mrs. Elliott English IV 25 August, 2017 Memoir As a child, my perception of the world was clear. I knew what was right and wrong, i knew what was good and bad, and i knew that once you lose something for whatever reason, you may never really recover from it. Though i understood that life isn t all sunshine and rainbows, losing everything never seemed possible to me. I grew up in a single wide trailer with my older sister and both of my parents. My father had always worked hard to provide a home for my family, and even though we didn t have the nicest home or the nicest possessions, we were all grateful for what we had. We lived a mostly regular life. My father would work everyday, my mother was a stay at home†¦show more content†¦After a few minutes I could hear the footsteps of my family desperately trying to escape the burning flames that was consuming my home. My father busted into my room, and his face was covered in sweat, and his eyes were watery as a cause of the smoke. I knew that at the moment he was filled with fear, but he still scooped me out of my bed and carried me out of my room and into our hallway. My father was running as fast as he could to carry me out of the house, but to me we were moving in slow motion. I began to look around, and i could see picture frames which contained memories of my family and i, burn up as if erasing those memories from our lives. Once we made it out, i could see my mother holding my sister outside in our driveway, and her cheeks were rosy red, and covered in tears. A fire truck pulled into our driveway and put out the fire in a matter of minutes. Though the fire that was burning in my home was put out, i felt like there was a fire in me, but a fire of anger. â€Å"Why did this happen to us!†, i yelled angrily. My mother tried to calm me down and tell me that everything would be okay, but i knew that it wouldn t be okay any time soon. When the fire was put out, i walked up to what was left after the fire and i could see that the fire had only burned part of my home. That night we went and slept at my uncles home, but i did not sleep. All i could think of was what had happened that day. I was no longer in my own bed, inShow MoreRelated Retrospectives1412 Words   |  6 PagesAutobiographical Comparison, which was a partially successful attempt to compare and contrast my beliefs with those of James Baldwin; Virginia Woolf: Assertive or Introspective, an analytical assessment of Virginia Woolfs motives while writing her memoir A Sketch of the Past; and The ideal Life, an autobiographical response to the fantasy life portrayed in Maxine Hong Kingstons White Tigers. I chose this layout because it sorts the papers by an increasing amou nt of time spent on each paper, whichRead MoreMarjane Satrapi s Persepolis 1646 Words   |  7 Pagesis an expressive memoir of her growing up in Iran during the Islamic Revolution, the fall of the Shah’s regime and the Iran-Iraq War. Unlike conventional memoirs, she uses the black-and-white comic book form to find her identity through politics and her personal experiences in Iran and it has become effective and relevant in today’s society because she is a normal person that has had to live through extreme circumstances. Marjane has contributed to a whole new way of writing memoirs that may last forRead MoreCriticism of Fordes Claim on Benjamin Franklins Autobiography1629 Words   |  7 PagesArgumentative Essay on Fordes claim on Benjamin Franklins autobiography Benjamin Franklins autobiography by Steven Fordes was compiled both as a template for the ancient Americans on how they should live and interact with one another in their society and a memoire to his son. The work was received and embraced by many around the world, Asians and Europeans inclusive. The work was also criticized for many reasons. In order to reach his aim or goal, Forde split the work into three distinct topics;Read MoreWriting and Personal Accounts2393 Words   |  10 Pagesnon-fiction, such as a memoir or an autobiography, has been exaggerated or embellished, it is no longer a work of non-fiction. - False An essay is a type of non-fiction writing that typically puts forth an argument about an issue. - True Both fiction and non-fiction stories ___________________. - Contain conflict Non-fiction writing is always written from an objective, unbiased point of view - False Skills Lesson: Expository: Nonfiction Creative nonfiction refers to a type of - Open-form essay _______________________Read MorePlace8569 Words   |  35 Pagesmemories of that kitchen were the memories of my mother. In his essay, Alfred Kazin remembers how her mother said, How sad it is! It grips me! though after a while, her mother has drawn him one single line of sentence, Alfred, see how beautiful! Article Source: http://EzineArticles.com/4722428 This sentence-combining exercise has been adapted from The Kitchen, an excerpt from Alfred Kazin s memoir A Walker in the City (published in 1951 and reprinted by Harvest BooksRead MoreThe Narrative Of Olaudah Equiano1123 Words   |  5 PagesBorn? The Interesting Narrative of the Life of Olaudah Equiano, or Gustavus Vassa, the African, by Olaudah Equiano, can be described as one of the most successful literary prose written by an African-American up to the start of the Civil War. Autobiographies were not considered a form genre in the literary field at the time it was published in 1789 and few books that had been produced in America gave such garish, solid and adventurous narratives. Equiano s narrative was well known because it containedRead MoreCan History Be Unbiased?770 Words   |  4 Pagesmore clearly, think about a history college student writing an essay about the American Revolutionary War. The college student might, for example, research primary and secondary sources from the American section in a library. One could argue that the essay will come out a hundred percent objective since the student who wrote it did not alter any facts nor invented a new reality to the Revolutionary War. Nonetheless, the material of the essay will still hold a subjective character to it; the AmericanRead MoreMaya Angelou : An Amazing Woman1155 Words   |  5 PagesClinton at his request. In 2000, she received the National Medal of Arts. In 2010, she was awarded the Presidential Medal of Freedom by President Barack Obama. She was also the first black woman director in Hollywood. Maya Angelou is known for her 1969 memoir, I Know Why the Caged Bird Sings, which was first nonfiction b est-seller by an African-American woman. Angelou received several honors throughout her career, including two NAACP Image Awards in the outstanding literary work (nonfiction) category,Read MoreAnalysis Of Show Tell 955 Words   |  4 PagesThe Power of Comics in Storytelling Scott McCloud’s graphic essay â€Å"Show Tell† demonstrates how the relationship between pictures and words can be used to convey a message efficiently. By showing many visual examples of the different ways images and words can be used together, McCloud establishes that information is easier to interpret when paired with visual aid. By also pointing out that people are naturally inclined to show something visually as means of explaining, McCloud demonstrates hisRead MoreThe Biology Building At The University Of North Florida1408 Words   |  6 Pagesabout my relationship with myself and others as well as my position within society. Autoethnographies combine elements of both autobiographies and ethnographies. Specifically, autoethnographies are academic essays that are introspective and narrative-oriented looks at the self, much like autobiographies and memoirs. However, autoethnographies are set apart from autobiographies and journals in that they join that introspection with ethnographic research methods concerned with connections between community

Friday, December 20, 2019

Deep Rooted Work On A Hard Man - 1427 Words

Research Paper: Deep Rooted Work on a Hard Man Flannery O’Connor was born March 25, 1925, in Savanah, Georgia. She went to what is, now Iowa University and majored in literature. She’s primarily known for her short stories but was a novelist. Flannery O’Connor passed away in 1964 after losing a battle with lupus. The piece of writing that I will be discussing is titled: â€Å"A Good Man is Hard to Find,† she wrote this work in 1953 along with several other short stories (Biography.com Editors). To summarize an individual’s life is not what is being established in this writing. What will be discussed, however, is the titled piece: â€Å"A Good Man is Hard to Find.† Analyzing the writing, looking with a critical eye about what the writing†¦show more content†¦The reader starts to realize that the grandmother is someone that tends to get their way. Or, that they will continue to be a nuisance. What occurs is not what the grandmo ther intended so she begrudgingly goes about her business making it a point not to be left behind also be dressed to the nine’s. She takes pride in her appearance and Flannery lets the readers know this by stating, â€Å"anybody seeing her dead on the highway would know that she was a lady. (O Connor). Still the foreshadowing of death and turmoil looms but this was also a lot of writing styles during this time. Their trip continues as planned with the grandmother telling stories to the family, unsuccessfully communicating with the other adults in the vehicle. The children seem to be the only participants in the grandmother’s tales. The readers are introduced to another glimpse of turmoil when O’Connor writes, the trees were full of silver-white sunlight, and the meanest of them sparkled. (O Connor) The illusion demonstrates the battle between good and evil and how sometimes even the darker side seems to be more pleasant with a taste of charm and falsehood. Again, O’Connor always wrote about her belief in God, and this demonstrates to the reader again how she works her beliefs into her work. As the grandmother continues to shareShow MoreRelatedWhy Slavery Is Deeply Rooted Within The South Essay1715 Words   |  7 Pages To President, James Buchanan, I ask you, â€Å"Why fix something that’s not broken?† As your advisor, I understanding that you are coming up on your re-election; however, since you are a Northerner you might not know why slavery is deeply rooted within the South. There are many reasons for this, down south, slavery is a way of life for economic standards and has been a way of life for many generations that are on the plantations and farms. Since it is one of the main sources of income, alongside exportingRead MoreExamples Of Racism In To Kill A Mockingbird741 Words   |  3 Pagesplace during the 1930s, a period shortly after the American civil war in Maycomb County, Alabama, the deep south where black people suffered from racism and discrimination. In this book, Tom Robinson was accused of raping a white woman, which was something that he’s never done, even though all the evidence proved that he did not violate that white woman, Tom was judged guilty because he was a black man. Racism is presented throughout the entire book especially when Scout got teased by her family aboutRead MoreThe Testament Of The Ephesians1578 Words   |  7 Pagesis abolished, the words can still be applied through our system of working. Americans tend to view the higher up in position or the more one gets paid, the more successful they are. Many parts of Ephesians specifically point out that it is not any work we can do here on earth that will get us to heaven. Context Literary: Most of Paul’s letters are written as expositions which are carefully reasoned explanations of his letter and well thought out words that are crucially placed to buildRead MoreThe Role Of Women During The Society969 Words   |  4 Pagestimes, especially in family settings. In patriarchal societies, women took subordination and secondary roles in heterosexual marriages (day 35 family.) The man of the household was the breadwinner and in charge of everything. Women, who in ancient societies and historically were, and are still considered in some countries, the property of the man, on the other hand, were to do all the labor in the home and take care of the children if there was any. This has been in many ways the standard for a familyRead MoreSocial Stratification in MLK’s â€Å"Letters from Birmingham Jail† 1427 Words   |  6 Pageswell. Dr. Martin Luther King Jr. illustrates the severity of the deep rooted social stratification during the civil righ ts era and it’s detriment to the forward progression of the final freedoms for African-Americans. One part of King’s intent was to express his deep concern with his fellow clergymen, whom were not at all sympathetic to the movement, yet practiced the word of God. Dr. King establishes himself as an authoritative man of God, in order to identify himself as an equal to the clergymenRead MoreLiterary Criticism On Hemingway s The Three Day Blow And Indian Camp 746 Words   |  3 Pagesone lens that focuses on the social classes and the whom the work is benefiting. Another lens, the psychoanalytic len, is based on the subconscious’ craving inspired by Sigmund Freud. These lenses are both present in Hemingway’s short stories. Thus, the underlying messages in Ernest Hemingway’s literature shows the meaning behind the subconscious desires and the struggle between social classes. The desire behind all actions is lying deep within the subconscious. In Hemingway’s short story, â€Å"The ThreeRead MoreShort Story : Tell Me About It 963 Words   |  4 Pagesâ€Å"Jada? What’s going on?† Laughing nervously, â€Å"What are you talking about, mom?† â€Å"You seem preoccupied.† Jada looked down at her salad for a moment. Realizing she wasn’t very hungry. She responded on a sigh, â€Å"Mom, I’m just trying to work things with Maxwell. It’s so hard.† Rebecca nodded, â€Å"Tell me about it.† Jada explained to her mother the details of what was going on with her and Maxwell. Rebecca took note. â€Å"Jada, have you really thought about what leaving him would do? What would you reallyRead MoreAn Extension Of White Washed Americ Black History Month1039 Words   |  5 Pagesfathers, and grandparents who march for us just so we could go to the same schools as white men. And our unarmed brothers and sisters who are being shot without a cause or a reason any more than because a white man with a gun felt â€Å"threatened†. Now I ask you, can a history that abundant and deep be honored in 28 days? Dr. Carter Godwin Woodson was born in 1875 New Canton Virginia. He grew up to become one of the first African American Harvard Graduates and â€Å"The Father of Black History Month†. WoodsonRead More Bonds between Mothers and Daughters in Breath, Eyes, Memory and the Joy Luck Club1609 Words   |  7 Pageslargely influenced by a foreign culture conflicting with the American culture. However, that is where the similarities end for the two novels. After reading the Joy Luck Club, my interest in Chinese culture was increased due to the fact that it is a deep-rooted culture very old and with a powerful philosophy. After reading Breath, Eyes, Memory, I have no interest in learning more about Haiti. The culture seems very dark, depressing and void of intelligent thought. For many immirgrants, leaving homeRead MoreTolerance As Defined By Merriam Webster1248 Words   |  5 Pages On Tolerance Tolerance, as defined by Merriam-Webster, is willingness to accept feelings, habits, or beliefs that are different from your own. Tolerance is something one must work at to maintain for acceptance of others is not inherent to human nature or at least it does not seem to be, for the most part. It is, however, human nature to see anyone unfamiliar and different as â€Å"other†. Due to human nature, I am rarely, if ever, surprised by some of the remarks I come across in my daily life, especially

Wednesday, December 11, 2019

Mice and Men free essay sample

We are first introduced to the characters George and Lennie in chapter 1 Of Mice and Men our first meeting of the characters automatically give away key themes and ideas of what is to come later in the book. They had walked in single file down the path, and even in the opening one stayed behind the other. Even early on in the book we see that one follows the other, as even in the open, one leads the way and the other follows. Steinbeck then moves onto tells us of the two characters appearances, again this gives detail of the lives he characters live and the cultural context that the book has, Both were dressed in denim trousers and in denim coats with brass buttons. Both wore black, shapeless hats and both carried tight blanket rolls slung over their shoulders This is significant as during the time of the Depression, denim was only worn by men who worked with their hands, so instantly we can detriment that they are workers with hardly any possessions as they carry bindles which suggest that they are traveling to work on a ranch. We will write a custom essay sample on Mice and Men or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Both were dressed in denim trousers and Both wore black shapeless hats in order o make the contrasts of their personalities and physical appearances even more distinct. To further emphasize their differences Steinbeck Juxtaposes his illustration of George small and quick sharp strong features with Lennies shapeless face with sloping shoulders. The descriptions suggests while George is shrewd and quick Lennie is clumsy. Steinbeck creates animal imagery of Lennie by comparing him to a bear dragging his feet a little the way a bear drags his paws Steinbeck uses another animal comparison when he uses a simile to compare Lennie o a horse, Lennie drank with long gulps, snorting the water like a horse Lennie seems to be very childlike and constantly needs telling what to do by George. It is clear that Lennie has no sense at all and George has to watch over him constantly. He scolds him for drinking stagnant water and tells lennie off. The novel, Of Mice of Men portrays the deep relationship of George and Lennie. As the book progresses, the reader plunges deeper into their relationship. The curiosity of George and Lennie friendship is intriguing for the reader and is very thought- rovoking for the reader as it very complex and full of twists and turns. Undoubtedly, George has come to like Lennie and feels a sense of duty and responsibility towards him. Lennie needs George, but it is equally true that George needs Lennie as well. George was also a harsh, mean and derogatory to Lennie, however, it is also very evident that George never left Lennie despite his life would have mean much easier without him. Lennie is Georges hardship, but George loves him regardless. Since the death of Lennies Aunt Clara, George took it upon himself to take responsibility of him nd his special needs by finding him Jobs, feeding him, and making sure he is safe. Their mutual dependence on one another is what keeps George and Lennie In the novel Of Mice and Men, the part of the plot where George and Lennie run away from Weed is very important. This is because it shows the beginning or continuation of a behavioural pattern. It also shows that George is beginning to cotton on to that fact and that it is beginning to cause him anxiety. Indeed, the lines All the time something like that, all the time. are foreshadowing the events that are to come. George does his best to shelter himself and Lennie from the consequences of the unusual behaviour, but will soon realise that they are going to occur again and again, over and over, because learning-challenged Lennie has difficulty learning and remembering the lesson of past experiences. When the end finally comes, we may speculate that these thoughts are in his mind when he makes his tragic and terrible decision. George and lennie are two travelling farm hands; theyre camping beside a pool in a valley. The next day they are due to begin work on a ranch. It is clear that George small and quick witted is the one in charge. He looks after lennie who is huge and childlike. We learn that the two men had to leave the town of weed because lennie frightened a girl there. George gets angry because he always has to get lennie out of trouble. When lennie offers to leave him and go away George is sorry for being mean. We found out that lennie loves to pet soft things, especially small animals. He does not understand how great his strength and likes to play with them he often ends up accidentally killing them. Mice and men free essay sample Loneliness and companionship is imminent throughout the book. It starts from the beginning when George sets the tone by repeating to Lennie that life on a ranch is the loneliest life there is, for example Steinbeck states â€Å"Guys like us that work on ranches are the loneliest guys in the world’. This shows us that men on a ranch rarely have any companionship or safety however George and Lennie have each other and this contradicts the idea that ranch men are always lonely. As the story develops we see that there are other characters that experience loneliness one point in the story like Candy, Crooks and Curley’s wife all confess to it. Crooks and Curley’s wife find a companion within Lennie and share their fears for example with Crooks, Steinbeck states ‘don’t make no difference who the guy is, longs hes with you. I tell ya, I tell ya a guy gets too lonely an he gets sick. We will write a custom essay sample on Mice and men or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page This shows the effects that loneliness can have on a person and Crooks admits that he is extremely lonely and companionship of his kind is impossible. Also another lonely character is Curley’s wife, she is forbidden to talk to anyone but Curley however instead she approaches the ranch hands by looking for Curley as an excuse to talk to them. Only result of this is that she becomes more disliked and Curley gets more jealous. Unfortunately her loneliness leads to her untimely death by making the error of confiding in Lennie and teasing him. This all leads up to George’s decision to shoot Lennie as he knows that the hope of such companionship with Lennie dies as the cycle will be repeated and it seems that George’s original belief becomes true as he shall now walk through life alone.

Wednesday, December 4, 2019

Safe Sex Essay Example For Students

Safe Sex Essay Many theories and much research has been conducted on contraception in general,and more recently on condoms in particular, as a result of the AIDS epidemic(Lear, 1995). Condom usage and AIDS education are essential tools for reducingthe impact of the disease, yet fewer than one third of sexually active collegestudents report consistent condom use (Seal Palmer-Seal, 1996). It seemsthat sexually active individuals rarely discuss safer sex or ask about theirpartner`s sexual activity before engaging in sexual activity (Seal Palmer-Seal, 1996). This raises some questions as to the origin of the avoidanceof safer sex discussion. It has been found that the interpersonal reactions ofsexual partners, rather than the less direct thoughts of AIDS risk, influenceattitudes towards condoms and condom usage (Casteneda Collins, 1995). These personal interactions among partners in a sexual relationship are a resultof attitudes each partner carries about sex, contraception and a sexualrelationship itself. Attitudes can be ascertained by means of person perceptionevaluations, which present the behaviors of a target person (e.g., introducing acondom) and categorize the social meanings imposed on the actor within thesituation (Castenada Collins, 1995). In order to accurately evaluate thesocial meanings within a sexual relationship using a person perception paradigm,the paradigm itself, as well as the communication patterns about therelationship and condom usage must be assessed. Person Perception Paradigm andThis Study The efficacy of the person perception paradigm for accuratelygathering the social meanings implied by certain actions has been proven in pastresearch (Collins Brief, 1995). It has been ascertained that targetsubject`s behaviors within a vignette are the foundation for impressions theparticipants form a bout the social meanings of actions. Collins and Brief havegone on to argue that the vignette methodology is better able to collect thesocial meanings derived from actions than interview questions, because oftenimpressions that are formed about another`s actions are not conscious attitudeformations. Behavior interpretation often occur through automatic and intuitivemeans (Collins, 1997; lecture). While most research directly asks participantswhat they think, person perception studies a more subtle means of gaining theparticipants reactions. The current study used a person perception test toevaluate the attitudes of participants about women in a sexual relationship whenshe either proposed a condom, or said nothing about contraception, whileexpressing either concern or saying nothing about her emotional state. Therewere four different possible types of situations that the male observers couldhave been given: the concerned female who did not propose a condom, theconcerned female who sa id, I have a condom with me, the female who said nothingand did not propose a condom, and the female who said nothing about heremotional state, but said she had a condom with her. These females were thenevaluated by male observers on various aspects of her perceived personality. Males rated the females on such items as, if they were active or passive, ifthey were promiscuous or not, etc. No other research has addressed a sexualsituation where women talk about their feelings and present a condom in a personperception paradigm. It will be interesting to see how the male participantsassess the situation. This study used six different scales comprised of separateitems in order to accurately assess the perceptions the male observers heldabout the female targets. The scales were a Sexual attractiveness scale, whichdetermined how sexually attractive the woman was, a Responsibility scale, whichdetermined the extent to which the woman was responsible, a Takes Charge scale,which assessed the male observer`s ideas about how active the women in thesituations were and two other scales which assessed how Nice and Exciting thewoman was. It is hypothesized that there will be high correlations between theseparate items within each of these scales, which indicates that the it ems willbe measuring similar properties. But there will be low correlations between anytwo scales and between any items and a separate scale, which will indicate thatthe scales were measuring different attributes. Past Research on the PersonPerception Paradigm Past research has found that people do make judgments basedon the contraceptive choices that target persons choose and the conditions theyhave made the choices under, concerning abortion decisions (Allgeier, Allgeier Rywick, 1979: as cited in McKinney et al., 1987). It has also been foundthat contraceptive behavior is evaluated differently by an outside observer thatis exposed to a vignette depicting a sexual situation involving issues ofcontraception, and personal attitudes

Sunday, November 24, 2019

Automobile Industry Analysis Essay

Automobile Industry Analysis Essay Automobile Industry Analysis Essay Automobile Industry Analysis EssayIntroduction   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The automobile industry is one of the leading industries at the global level. It plays a crucial role in the development of the global economy because of the high revenues and increased customer demands. The automobile industry helps to foster economic development of the country; therefore, it is widely recognized as a major economic sector. The automobile industry consists of multiple companies specialized in car manufacturing, as well as the ones involved in marketing and distribution of automobile products, such as cars, buses, vans, trucks, motorcycles, mopeds and motorized bicycles. The global automobile industry incorporates several large car manufacturers’ blocs that work collaboratively suppliers at the global level.The major goal of this paper is to provide a detailed analysis of automobile industry that gives a clear description of the industry today and its prospects for the future. Due attention should be paid to the use of the strategy tools and theories, such as Porter’s five forces and PESTEL analysis and other approaches.Porter’s Five Forces AnalysisBargaining Power of SuppliersThe bargaining power of suppliers is low for the reason of the availability of multiple suppliers in the auto-parts industry. Nevertheless, due to the growth of the supply system and its specialization, supported by new technological advancements, manufacturers have an opportunity to reject the delivery of materials because of poor quality (Pearlson et al. 39).Bargaining Power of CustomersThe bargaining power of customers is moderate because in the automobile industry, customers need to have enough information about automobile products’ characteristics, as well as other factors that influence their decision making: price, quality, product image, brand, and environmental impact of the product. Many car manufactures produce products with the same character istics and sell them at the same price.Rivalry between Existing PlayersThe rivalry between the car manufacturers is focused on addressing the demands of customers in terms of lower prices, better product differentiation, more effective distribution strategies, and stronger business relationship with supply system. Currently, the existing players in the automobile industry are BMW, Ford, Audi, Honda, Mercedes Benz, Fiat, Lexus, Infiniti, Acura, Toyota, Volkswagen and others.Threat of SubstitutesThe threat of substitutes is moderate because automobile products vary, although they have the same purpose. Due to product differentiation, customers have an opportunity to select products considering such factors as price, quality and design.Threat of New EntrantsThe automobile industry has high level of barriers to entry. It needs specific machinery, facilities, equipment, human resources, technological devices, distribution channels, etc. The automobile industry is attractive to new entran ts, but requires them to solve a number of problems, like customer preferences, industry demands, environmental demands, and others. Thus, the threat of new entrants is low.PESTEL Analysis Political and legal factorsPolitical factors have a strong impact on the development and growth of the automobile industry. The production of hybrid vehicles requires more financial support from local governments because of the environment friendliness. The production of new vehicles must comply with the established vehicle emission standards. Governments across the globe should provide financial support to favor the distribution of vehicles with lower CO2 emissions (Geels 67). Besides, taxes and import laws affect the automobile industry growth. In fact, there are some legal requirements that should be met by the car manufacturers, including environmental regulations aimed at reduction CO2 emissions.Economic factorsThe increased prices for cars are associated with the inflation rate and economic crisis. Besides, the industry is dependent on oil prices. The following factors play an important role in the industry’s shifting in supply demands and price elasticity: local government taxes,  prices for materials and resources, population growth, buying capacity, types of economic activities, commercial usage of vehicles, fuel economy dependence, and other factors (Orsatoa Wells 994). The profitability of the automobile industry is related to the financial opportunities of customers.Socio-cultural factors Socio-cultural factors that influence the development and growth of the automobile industry include population growth rate, education level, lifestyles, safety issues, cultural differences, and the effects of consumer buying habits, their attitudes toward â€Å"green† or ecological automobile products. The automobile industry growth is dependent on the preferences of customers, most of whom need to purchase cars for families. They consider the space available in the car, safety and price.Technological factors Technological innovations play a crucial role in the development of the automobile industry. Due to the use of new technologies it is possible to enhance standards of driving. Besides, currently, the automobile industry is experiencing the problem of fuel consumption. The innovation of new cars, which are characterized as environment friendly vehicles, is aimed at reduction of fuel consumption. Besides, technological innovations are aimed at meeting the requirements of customer safety. New seat belts, air bags and other devices help to avoid injuries sustained in collisions. Anti-Brake Systems help to increase the stopping distance even on slippery pavement. The automobile industry needs investments in research and development to ensure that new technologies are useful and meet the demands of customers (Pauwels et al., 142). ). The production of high performance vehicles by car manufactures is increasing due to the benefits provided t o customers: higher engine output, more innovative braking and suspension systems and other technical characteristics that guarantee high quality of products.Environmental factors There are some environment factors that affect industry development and growth, including fuel economy and air pollution caused by CO2 emissions. Environmental concerns make car manufactures use innovative technologies. The production of environment friendly vehicles, such as hybrid cars and electric vehicles, allows changing customer demands and preferences in the future. The advantages of these vehicles over gasoline cars include low emission and high energy efficiency (Zhuang et al. 137).SWOT Analysis   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   StrengthsEvolving industry due to popularity of cars among consumers;Contribution to changes in lifestyles;Product innovations due to new technology support and advancement;Involvement of cheap workforce from the developing countries in car manufacturing (e.g. I ndia, China, Indonesia and other developing countries).WeaknessesIncreased competition;Strict regulations;High taxes;Environmental concerns;High costs of research and development opppirtunities.OpportunitiesIntroduction of fuel efficient cars;The growth of strategic alliances;Changes in customer preferences;Expansion of markets (Pauwels et al. 142).ThreatsIncreased competition;Dependence on fuel prices;High production costs;High electricity costs;Inflation rate;Poor regulation of car markets (Orsatoa Wells 1006).Conclusion  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Thus, it is necessary to conclude that currently the automotive industry is experiencing growth. The production and distribution of vehicles in China and other countries with cheap workforce have increased significantly. However, the automobile industry has some problems that require implementation of joint efforts, e.g. environmental, economic problems and technological concerns. The analysis of the automobile industry shows that it is possible to strengthen its growth at the global level. The knowledge of markets should be improved and strong brands should be built to adapt to the changing environment. Because of the large number of players in the automobile industry, the increased competition is the challenge for the industry. Besides, constant fluctuations of fuel prices lead to changes in the prices of cars. Local governments’ regulations affect the industry in some way.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Geels, Frank W. â€Å"The impact of the financial–economic crisis on sustainability transitions: Financial investment, governance and public discourse,† Environmental Innovation and Societal Transitions, 6 (March 2013): 67–95.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Orsatoa, R. J. Wells, P. (2007). â€Å"U-turn: the rise and demise of the automobile industry,† Journal of Cleaner Production, 15(11–12): 994–1006.Pauwels, Koen; Silv a-Risso, Jorge; Srinivasan, Shuba; Hanssens, Dominique M. (2004). â€Å"New Products, Sales Promotions, and Firm Value: The Case of the Automobile Industry,† Journal of Marketing: 68. 4 (2004): 142-156.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Pearlson, Keri E., Saunders, Carol S. Galletta, Dennis F. Managing and Using Information Systems, Binder Ready Version: A Strategic Approach. John Wiley Sons, 2016.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Zhuang, Ye; Nie, Shida Guo, Konghui. â€Å"A study of semi-active suspension with tuned mass damper,† in The Dynamics of Vehicles on Roads and Tracks: Proceedings of the 24th Symposium of the International Association for Vehicle System Dynamics (IAVSD 2015), Graz, Austria, 17-21 August 2015. CRC Press, 2016.

Thursday, November 21, 2019

'All-inclusive resorts can never be reconciled with principles of Essay

'All-inclusive resorts can never be reconciled with principles of sustainability - Essay Example Despite all these, little has been done concerning tourism resorts as a tourism destination, more so the all- inclusive resorts. An important issue for discussion in tourism development has been the sustainability development. However, deeper understanding is given by addressing the concepts of demand and supply in relation to market conditions. The key issues associated with sustainable tourism are the achievement of social inclusion, effectual environmental protection, and reliable economic development. These are yet to be seen if achievable with the all-inclusive resorts. Many have had to look for ways of encouraging and enhancing international diffusion, as well as knowledge exchange. This has to do with the volatile nature of tourism as a business; the reason for this dynamism is political instability and fluctuation of currency (Nagle, 1999). This paper also discusses the key issues facing the industry, the main challenge being globalisation. Tourism as a business entity responds to globalisation by creating alliances and collaborations. The public sector is mostly concerned to provide protection to small businesses that face the challenge of globalisation. It has to be acknowledged that the tourism industry has not been embracing the advantages of the knowledge economy, especially by utilising management practices and increasing competition through innovation and development of new products. A well networked tourism industry incorporates adequate knowledge of globalisation and economy. By so doing, the industry benefits from global trends. Network developments can be used to see the weak points in the industry by examining destination and tourism. Anon (2011) identifies that â€Å"embeddedness within networks is identified as a key strategy for survival for contemporary tourism businesses† (p. 261). The concept of tourism sustainability began in late 20th century when the tourism industry turned green (Swarbrooke, 1999). The aim was to have

Wednesday, November 20, 2019

Critically assess the extent of the benefits of adopting international Dissertation

Critically assess the extent of the benefits of adopting international financial reporting standards in lieu of a country's dome - Dissertation Example However, intense training is needed by the employees while implementing IFRS which in turn increases the cost in the financial recording process. Therefore, the adoption of IFRS over the already applied financial standards in the national context is quite likely to give rise to a few noteworthy challenges besides its advantages. Table of Contents Abstract 2 1.Introduction 4 2.Creation of International Financial Reporting Standards 5 2.1 IFRS in Political Environment in UK 8 2.2 Controversies Related to the Adoption of IFRS in UK 9 2.3 Advantages of Converting Into IFRS 10 2.4 Requirements to Attain Maximum Benefits from IFRS 13 2.5 Tax Impacts of Transitioning Into IFRS 15 2.6 Challenges Related to Incorporation of IFRS 15 2.7 Other Related Challenges 18 2.8 Concerns Arising from Implementation of IFRS 20 2.9 Reasons behind Altering UK GAAP 21 2.10 Differences between IFRS and UK GAAP 21 2.11 Critical Review of Adoption of IFRS 22 3.Conclusion 24 4.Recommendations 24 25 References 26 1. Introduction Comparing the financial statements of different reporting enterprises becomes a cumbersome task owing to the deviation in procedures along with the principles taken into account by these organisations in designing financial statements. With the intention of making these methods and principles uniform as well as comparable to a certain extent, financial recording standards are created. Theoretically, accounting standards are termed to be the statements of policy of practice which belongs to regulatory accounting bodies (Pearson Education, 2012). This policy of practice needs to be observed in the preparation as well as the presentation of the financial statements. In simple terms, accounting standards can be identified as written documents offered by the regulatory bodies within the nation or even in the international ground. It tends to comprise of numerous components such as measurement, treatment, revelation and presentation of the accounting transactions (ICAEW, 2012). The chief objective of enforcing accounting standards is to eliminate differences in the treatment related to numerous accounting aspects and hence to initiate uniformity in the financial presentation which further facilitates an accurate and transparent disclosure of monetary facts concerning a particular business. Accounting standards also aim to harmonise the varied accounting policies which is generally followed while creating and demonstrating the financial statements by distinct financial enterprises in order to assist in proper comparison between the inter-firm and intra-firm (ICAEW, 2012). However, in various occasions it has been observed that companies which function in accordance to the nationally implemented strategies often have to face certain challenges when adopting the internationally grounded financial standards. As noted by Brown (2011), â€Å"there will always be winners and losers from changes in accounting standards, if only because of their distributiv e effects, undoubtedly some consequences are regarded by companies and investors as, on balance, bene?cial† (pp. 269). Emphasising on these various aspects, the objective of the

Sunday, November 17, 2019

The Future of The United Nations Essay Example | Topics and Well Written Essays - 500 words

The Future of The United Nations - Essay Example The primary responsibility for a state is to provide protection to people within the state itself" (International Commission On Intervention And State Sovereignty 2001). Sovereignty is more then just an emblem or measure of international relations between countries. The UN does not remove sovereignty of member countries, however it takes steps to make sure the overall the UN member countries stay sovereign. It does that by assisting countries whenever an event comes up which somehow or the other effects their sovereignty (International Commission On Intervention And State Sovereignty 2001). Just to quote a recent example, Iraq and Afghanistan were proving a threat to the international community at large. Media reports claimed that the two countries possessed weapons of mass destruction and their rulers were tyrants, wanting to cause harm to their country men by taking innocent lives. The UN taking notice of the security concern, deployed its peave making force in these two countries with the aim to protect its member state from being affected anyhow by these "weapons of mass destruction" (Thakur 2001). Another very important question after the September 2011 terrorist attacks has been how should the United Nation handle "intervention calls" for human protection purposes. Interventing on humanitarian grounds has always been a very controversial topic. The Rwanda incident of 1994 is often remembered as a landmark event where UN intervention could have prevented mass genocide, but the failure of international will to intervene lead to one of the greatest human catastrophes ever. The demand for interventions has been raised by many states however the UN has not been able to service all these demands. Reasons have been various by the former UN secretary general once put it down really well in words. He said â€Å"If humanitarian intervention is, indeed, an unacceptable assault of sovereignty, how should we respond to Rwanda, to a Srebrenica – to gross and

Friday, November 15, 2019

Selective Oestrogen Receptor Molecules (SERM)

Selective Oestrogen Receptor Molecules (SERM) Lucy Perry Perry Pharma Development Pipeline Introduction: Perry Pharma Research Development (PP-RD) has been investigating Selective Oestrogen Receptor Molecules (SERM) for potential development that will be effective in both breast and uterine cancer as part of its drug pipeline. Early clinical testing of PKWT and PKWX, for which PP holds Australian patents (66633 –PKWT and 44455 – PKWX) for, indicates significant improvement in their selectivity, clinical outcomes and safety profiles when compared to the current SERMs. Thus, providing an assessment of the development considerations including efficacy, safety, therapeutic indications and potential market share would aid PP in making decisions concerning the development of these molecules. This information is now vital due to a potential infringement of patent 66633 – PKWT, by HCH who manufacture ‘Tamax’, and are about to launch the successor ‘Pro-tam’. PP-RD has analysed samples of ‘Pro-tam’, which has been identified as PKWT. Because of the impending launch, PP-Legal is including recommendations for dealing with this infringement within this review. Selective Oestrogen Receptor Modulators Cancers that grow in response to oestrogen are termed ‘ER-positive’. Oestrogen receptor positive cancers growth is modulated by oestrogen binding at the oestrogen receptor (ER). These ER are located in breast, bone, central nervous system and uterine tissues. SERMs action in the body is through agonism or antagonism at the ER, leading to both positive and negative effects depending on the tissue site. Antagonism of the ER and blocking of the action of oestrogen in a specific tissue such as the breast or uterus is responsible for anti-cancer action of a SERM (Fabian 2005, Maximov 2013). PP is interested in developing PKWT and PKWX for these ER-positive cancers. Treatment of ER-positive cancer: ER positive cancers are one of the most common forms of breast cancer subtype (ACS 2014a). SERMs are used as primary, combination or adjuvant therapy for cancers expressing the ER receptor (Yilmaz 2013, ACOG 2014, Sledge 2014). Compound choice is dependent on the patient population, and the associated treatment period may last up to 10 years (ACOG 2014, Sledge 2014). In uterine and endometrial cancers SERMs are less utilized, (Burke 2003, ACS 2014b,c). Tamoxifen has shown some efficacy, however the Product Information does not list endometrial and uterine cancer within the indications; these are included in the Precautions section (eBS 2014, ACS 2014b, c). Highly selective SERMs are being developed to reduce off target action and improve safety profile, through exploiting the receptor subtypes. (Jordan 2004, Maximov 2013). However biological agent based therapies for breast and uterine cancers (Fabian 2005) make the future for SERMs unclear. Issues in the development of PKWT PKWX: Indications: PP needs to be strategic in the selection of indications to pursue. This will dictate not only the size of the treatable population and the amount of clinical data required for the registration dossier but also potential return on investment. It will also play a significant part in whether the compounds are listed on the Pharmaceutical Benefits Scheme (PBS) PKWT and PKWX both have shown high selectivity as well as good safety and clinical outcomes in women of all ages compared to current SERMs and establish these compounds within an already crowded market. First, PP can position development of a ‘one tablet for both breast and uterine indications for all ages’. Although this will mean a complex and costly clinical development plan, it entails a potentially a larger population to treat due to the wider indications. Second, PP may take a different approach aiming for a specific indication such as the ER positive breast cancer in post-menopausal women, but limiting the treatable population. It is worth noting importantly that there are no SERMs with approved indications for uterine or endometrial cancer, despite phase II trials (Munster 2006), which indicates a potential gap in the market. PP could launch the first SERMs indicated for ER-positive uterine cancer. PP will need rates of ER positive uterine cancer to determine the available market to ensure return on investment and determine any potential competition through patent searches. The third option is to enter the market leveraging the structural novelty of PKWX active metabolite, with improved outcomes and safety. This may provide a compelling case for prescribers to switch treatment options. Efficacy PKWT and PKWX have both shown good clinical outcomes for both breast and uterine cancer. They are also highly selective, which is an important consideration so that off-target action is minimised which responsible for the safety profile of the current SERMs (discussed in Safety section) A consideration for prescribers is the secondary effects of oestrogen treatment. SERMs have been shown to be effective against osteoporosis, keeping lipid profiles favourable, aiding in the reduction in symptoms of menopause, cardio-protectivity and risk prevention of cancer (Maximov 2013, Munster 2006, Pickar 2010). PKWT and PKWX must show some of these positive secondary effects to be competitive. Prescribers will not switch to SERMs which can lead to the same outcome but leave a patient worse off e.g. from loss of bone minerals or exacerbation of menopausal symptoms. Length of treatment with SERMs such as Tamoxifen can be up to 10 years to ensure optimal clinical outcomes for patient (ACOG 2014). PP needs to investigate whether PKWT or PKWX requires the same significant period of treatment to achieve clinical outcomes. Safety Due to the pharmacological action of SERM’s acting as either agonists or antagonists at the ER, negative secondary effects can occur. SERMs safety profile includes development of endometrial abnormalities, increased risk of endometrial cancers, pulmonary venous thromboembolism’s and increased incidence of stroke (Pickar 2010, Qin 2013). PKWT PKWX have been found to have better safety profiles, due to the higher selectivity for breast and uterine ER’s, both acting as antagonists at these receptors. Tamoxifen has agonistic properties at uterine tissue which is linked to its use increasing the risk of uterine/endometrial cancers (Yilmaz 2013). However no information has been provided on the adverse event profile known to date and no animal data on long term use associated with treatment length of current SERMs. Market Share and Market Advantage: ‘Tamax’ is a recognised brand, (first patented 1978) with an established market; it is now the preferred treatment for breast cancer in pre-menopausal women. ‘Pro-tam’ which has reportedly an improved safety profile over the originator ‘Tamax’, already has an established brand and market. PP may become a direct competitor and will require a significant point of difference to change prescribing habits of clinicians. The market advantage within the breast cancer treatment arena may be the improved safety and clinical outcome; however PP needs to consider whether it wants to produce a ‘me-too’ compound. As a SERM to treat uterine cancer specifically, it would be a first. PP should consider pursuing compounds specifically into this new market, especially if there is the added advantage of treating breast cancer. Again PP should consider the structural novelty of the PKWX metabolite as well as improved safety and clinical outcome as a market advantage to attract clinicians and gain some ground in the ER-positive breast cancer market. Regions in which Tamax has been launched needs to be obtained, so PP can determine if there are any new markets, and if there are regional specific factors such as the PBS. Pricing strategy and treatment indications will be important in these markets. Investment Costs As part of the review process there needs to consideration of the level of return on investment. PP need to be sure that if development goes forward they have a treatable population and potential to gain market share or market advantage. PP may wish to consider attempting to out-license the compounds if the development costs prove too much of an investment. Legal: PP-Legal has flagged potential PKWT patent infringement by HCH. The associated legal proceedings may add significant costs to the development budget and also effect development timelines. ‘Pro-tam’: Potential Patent Infringement? HCH is launching ‘Pro-tam’, a prodrug that is claimed to be metabolised into ‘Tamax’. PP-RD have analysed the metabolite and found it to be PKWT. PP-Legal advises pursuing this as a potential infringement by HCH on the PKWT patent and to ensure appropriate legal action is taken to avoid any adverse impact on further development of PKWT. PP-Legal have suggested undertaking the following steps: Review the ‘Pro-tam’ priority date to ensure that it is dated after the PKWT priority date (25 April 2002). If the ‘Pro-tam’ patent does have a priority date prior to 25 April 2002: PP-Legal will review the ‘Pro-tam’ patent to determine any grounds to challenge its validity or navigate around the patent. Applying for a patent on PKWT for uterine cancer. This will require negotiation of a licensing agreement with HCH. PP transfers its efforts to the development of the more novel PKWX. If the patent for ‘Pro-tam’ was lodged after the priority date for PKWT, PP has grounds to pursue patent infringement and attempt to block the ‘Pro-tam’ launch by lodging a request for an interlocutory injunction. This will allow PP to restrain the allegedly infringing actions by HCH until settled in court (IP Australia 2012). The justification would be based on the ‘Pro-tam’ patent not meeting the novelty criteria as the chemical structure of ‘Pro-tam’ is listed as part of the PKWT claim scope (IP Australia 2012). HCH legally can patent the prodrug, but at the point of metabolism, the PKWT patent is infringed. PP-Legal have previously determined PKWT does not exist in published prior art. A patent on a prodrug and its metabolites is only valid if all conditions of patent validity are met. The ‘Pro-tam’ active metabolite structures should therefore be captured in the claims. If the PKWT structure is not listed and the PP-RD can provide evidence that PKWT is the active metabolite, there are grounds to claim falsification of aspects of the patent, as HCH has not disclosed all claim details into the public domain, thus invalidating the patent (IP Australia 2012). Here the emphasis is on HCH proving the case otherwise. PP-Legal suggests creating a further portfolio of surrounding patents for maximum protection of PP intellectual property and allow for further development of the SERM pipeline. The ‘Tamax’ patent has since lapsed, however, for completeness, PP-Legal have provided potential actions for PP to still patent PKWT if the Tamax patent was still valid. The original patent claimed a single isomer structure, which is not PKWT, nor was it described as racemic. The existence of other isomers was not common knowledge at the time of the patent application so HCH were likely unaware that the structure listed in the claim scope had isomers. Between 1996 2000 journal articles were published discussing the discovery of isomers of compounds that may confer improved efficacy and safety profiles. Despite these articles being in the public domain, HCH did not move to patent any potential isomers of ‘Tamax’. If a compound is described as a racemic mix in the aspects and that patent is challenged, court rulings in previous legal cases have stated that it is considered common knowledge that racemic mixtures may contain isomers with different properties and that it is obvious to try to separate these. Considering this information, PP could move to patent the PKWT isomer, on the basis that Existence of different isomers of compounds was not common knowledge at the time of the original ‘Tamax’ patent so the argument of obviousness that the patent would cover the PKWT isomer cannot be made by HCH (IP Australia 2012). If HCH had claimed a generalised formula for ‘Tamax’ type compounds, PP would be infringing (Harris 2013). Information on differences in efficacy and safety of undiscovered isomers has been in the public domain since 1996 and HCH still did not move to patent any isomers. Separation of isomers is possible by skilled practitioners since technological advancements have occurred. Conditions of patent validity can be met by PP – PKWT is novel as it is not described in prior art, it is inventive in that it requires a person skilled in the art (i.e. not obvious) to separate the isomers and it is potentially useful in treating disease (IP Australia 2012). Development Recommendations: PP needs to consider which indications to pursue –as it will affect the size and cost of the clinical development programme. The improved clinical outcome and safety, as well as selectivity, can provide market advantage in both indications. However, a breast cancer ‘me-too’ drug may not be successful in obtaining a PBS listing which is crucial to success of a medicine in the Australian market. The PKWT patent infringement proceedings may affect development schedules and add significant cost. Whereas PKWX has a novel structure that is not subject to patent infringement, so this may be the better compound to pursue to avoid the legal route Word Count 2118 References American Cancer Society (2014a) Breast Cancer http://www.cancer.org/> (Accessed Aug2014) American Cancer Society (2014b) Uterine Cancer http://www.cancer.org/> (Accessed Aug2014) American Cancer Society (2014c) Endometrial Cancer http://www.cancer.org/> (Accessed Aug2014) American College of Obstetricians Gynaecologists (2014) Committee Opinion – Tamoxifen and Uterine Cancer. www.acog.org> (Accessed Aug2014) Burke TW Walker CL (2003) Arzoxifene as therapy for endometrial cancer Gynaecologic Oncology 90 (2003) S40–S46. (Accessed Aug2014) eBS (2014) TGA Nolvadex Product Information. Astra Zeneca 2013 https://www.ebs.tga.gov.au (Accessed Aug2014) Fabian CJ Kimler BF (2005) Selective Estrogen-Receptor Modulators for Primary Prevention of Breast. CancerJ Clin Oncol 23:1644-1655 (Accessed Aug2014) Harris, T., Nicol, D., Gruen, N. 2013 Pharmaceutical Patents Review Report. Commonwealth Government of Australia.http://www.ipaustralia.gov.au/pdfs/2013-05-27_PPR_Final_Report.pdf> (Accessed Aug2014) IP Australia (2012) Pharmaceutical Patents Review: Background issues and suggested Issues Paper. Commonweath Government of Australia www.ipaustralia.gov.au/pdfs/Background_and_Suggested_Issues_Paper_PharmaReview.pdf> (Accessed Aug2014) Jordan VC (2004) Selective estrogen receptor modulation Concept and consequences in cancer. Cancer Cell Volume 5, Issue 3, p207–213. (Accessed Aug2014) Maximov PY,Lee TM,Jordan VC (2013) The discovery and development of selective estrogen receptor modulators (SERMs) for clinical practice. Curr Clin Pharmacol.2013 May;8(2):135-55 (Accessed Aug2014) Munster PN (2006) Arzoxifene: the development and clinical outcome of an ideal SERM. Drug Evaluation March 2006, Vol. 15, No. 3 , Pages 317-326. (Accessed Aug2014) McMeekin DS, Gordon A, Fowler J, Melemed A, Buller R, Burke T, Bloss J, Sabbatini P (2003) A phase II trial of arzoxifene, a selective estrogen response modulator, in patients with recurrent or advanced endometrial cancer. Gynecologic Oncology 90 (2003) 64–69. (Accessed Aug2014) Qin T, Yuan ZY, Peng RJ, Zeng YD, Shi YX, Teng XY, Liu DG, Bai B Wang SS (2013) Efficacy andtolerability of toremifene and tamoxifen therapy in premenopausal patients with operable breast cancer: a retrospective analysis. Curr Oncol, Vol. 20, pp. 196-204; (Accessed Aug2014) Pickar JH, MacNeil T Ohleth K (2010) SERMs: Progress and future perspectives Maturitas Volume 67, Issue 2, Pages 129-138, October 2010 (Accessed Aug2014) Sledge GW, Mamounas EP, Hortobagyi GN, Burstein HJ, Goodwin PJ Wolff AC, (2014) Past, Present, and Future Challenges in Breast Cancer Treatment Journal of Clinical Oncology, Vol 32, No 19 (July 1), 2014: pp 1979-1986 (Accessed Aug2014) Yilmaz S,Gà ¶nenà § IM,Yilmaz E (2014) Genotoxicity of the some selective estrogen receptor modulators: a review. Cytotechnology.2014 Aug; 66(4):533-41.(Accessed Aug2014) Personal Reflection Starting this assignment I had no real knowledge of SERMs- I had a basic understanding of the use of tamoxifen so building background knowledge was a prompt learning curve. However, such events are to be expected in all professional practice and simply enable improvement. When I think about the writing and the researching of this assignment, I can say that I found the intellectual property section the most challenging and intellectually stimulating area, as it resonated with my detail oriented nature and love of deconstructing/reconstructing events and processes. I enjoyed the researching of case law and the practicalities of patents. I always enjoy doing the literature searches and review of papers, and the chance to delve into the legal terminology pushed me outside my comfort zone. The drug development side of the assignment was not so interesting to me. I would put this down to the word limit not really allowing for much exploration of the area. I would have liked to explore market share and the epidemiological basis and strategy of selecting an indication/s for these compounds in a much more detailed review. Because of my work sits strongly in the population health area, this early end of the development pathway is not really something that I am asked to consider often. However from the viewpoint of building a personal knowledge base and being able to provide answers to my direct reports regarding the drug development process in a more holistic manner, this assignment has been of help. Search Strategy Keyword Wildcard Search: PubMed Google Scholar SERM, oestrogen receptor modulator, ER breast cancer, ER uterine cancer, ER endometrial cancer, tamoxifen, hormonal cancer, Obtained literature centred on these wild card searches. Reviewed the literature to build a knowledge base to write the first half of the assignment. Reviewed 9128 course notes to finalise ideas. Keyword Wildcard search: Google Google Scholar Pharmaceutical Patents, enantiomer patents, isomer patents, isomer legal cases, patent portfolios, patent law Australia, pharmaceutical patent cases Australia, intellectual property law Australia, Obviousness, inventiveness. Obtained literature and websites centred around these wildcard searches, Reviewed the literature to build understanding of IP law and previous case law. Referred back to Australian IP law to check proposal was sound. Reviewed 9128 course notes to finalise ideas.

Tuesday, November 12, 2019

Radiology :: essays research papers fc

1. Turn on PC and RMS appears Will use 1,4,5 6,8, 9 A on menu 2. Hit 4 for Transcription 3. 5 Edit Header/Report 4. Report Look Up 5. Use Sequence # from written report 6. Exam Date – always use reort date and make sure it matches 7. Seq # 8. F1 Enter Status D = date dictated T = date typed N = New To use Dictophone: Log on by hitting System Access Twice (may want to use Cody and my code is 086999) Use # 1 to select by Report Presss 3 by Subject # - (number under pt’s name) may have to key it to dictaphone more than once – may need to use a 8 before number on paper Put in number and hit the # sign Put in transcription time in military time – jot down on report from taped message Put in auth # from phone screeen Enter dictated time MD’s Hospital Computer numbers: 00---- 2 lead zeros and then 4 digits and justified to the left On PC: F9 to enter W/P (word processing section) Report design: Use Z N)normal S)specific use N unless some thing additional written in by Radiologist F3 and F4 to view and move back and forth between headers Some Radiologists give the date and some don’t - -HAVE TO HAVE A DATE – IF THEY DON’T GIVE ONE, USE DATE ON WRITTEN REPORT Can go back and review sheet when done and for Mammograms, put in data from written additonal sheet (Radiologist Findings) F1 first Enter T for transcription menu Choose breast Catagories (Radiologist Findings) If no answer to a section, hit Escape to go past it If answer, fill in, hit enter and then F1 to Save Press Escape to bring back to beginning screen If Reason for Exam noted, to back to Pt.System – into Pt Information; Enter Pt’s number, F1 Begin Search, Find Visits ALT H, Find Visit and Enter; Alt M --Mammographic Software – Reasons check whatever is checked, F1 to save, if problem indicated, Sign OFF Dictophone when finished/Sign off PC software at Transciption Menu (1 Sign Off) TO PRINT REPORTS In Transcription Menu Go to Sign Off By Radiologist Find reports by Radiologist F2 to pull up everything for Radiologist F1 to select Print When you do this, it prints all for all transciptionists SHORT CUT KEYS: IMPRESSION Hit Alt I F1 SAVE ACR Code: Hit Alt 9 Find Visit Alt H Mammagraphic system Alt M Alt C Clinical History Correct all misspellings found If note to fax, enter fax number on header screen, Only answer Fax as Y is you know fax number of MD office in system already; if you don’t know, answer N, enter Fax # as 9,776-6176 or if long distance enter as 9,9197766176 AND put it in comments to Fax

Sunday, November 10, 2019

Paparazzi Go Too Far

When the Paparazzi Go Too Far 1. Introduction Everyone who is interested in pop culture and the entertainment industry knows who the paparazzi are. According to Merriam-Webster’s dictionary, the term paparazzi is defined as â€Å"a free lance photographer who aggressively pursues celebrities for the purpose of taking candid photographs. † The term actually came from a film from the 1960’s called ‘La Dolce Vita’, directed by Federico Fellini. A character in the film was a news photographer named Paparazzo. Paparazzi target celebrities and public figures that are in the spotlight.In recent years, the paparazzi have taken their job of snapping photos to another extent. They will go to any length to get the shot of a celebrity, even if that means stalking a celebrities’ every move. The media’s intrusive and insistent attention towards celebrities has caused celebrities to lose their privacy. An anti-paparazzi law is the best solution to hel p celebrities and public figures who entertain us gain their rights and privacy back. 2. Power of the Media Its almost impossible for us not to be under the power by the media.Every event that happens in the world is brought to everyone’s attention faster with the technology that has enhanced our way of receiving media. The media is everywhere we turn and it makes us question how we will be able to control the media so that its a proper influence on our lives. 2. 2 Celebrity Infatuation If you go into any store that sells magazines you will find a large selection of magazines that are just devoted to celebrities and gossip. We live in a time where there is a significant difference between the rich and the poor and there are so many of us that want to know the latest on people who live in the spotlight (1).Most people do not think of celebrities of being just like normal people. We think about their shiny cars, designer clothing, and huge mansions, but we never stop to think b eyond all the glitz and glamour, of what they are like as people. Many people are obsessed with celebrity gossip because they like to know whether a celebrity is going through a money crisis, divorce or fight with another celebrity which is kind of sick in a way because, why should we care? It’s their life and why should we butt into their personal lives? People love celebrity gossip for pretty much the same reasons people like to watch TV drama series.Watching somebody live their life publicly and do things â€Å"regular† people do every day gives people a way to relate (1). Celebrity gossip that may be considered â€Å"good† is most times something that a celebrity has done that is embarrassing or frowned upon (1). It’s almost like when someone laughs at another person who tripped and fell. Many celebrities sacrifice a measure of their privacy by virtue of their celebrity status and by the decision they made when they stepped into the spotlight and the attention of the paparazzi is a side effect of this decision.But, the paparazzi take their job to the next level by going too far. 2. 2 Paparazzi Go Too Far Celebrities lose their rights of privacy by putting themselves in the public eye. It’s normal to have paparazzi taking photos of celebrities at appearances and events but during their daily and personal life is where the paparazzi go too far. There is no way a member of the paparazzi could sneak into or around your house and take pictures of you and get away with it. Celebrities shouldn’t be any different.They should have the right to keep their life private because they are human beings and anyone else wouldn’t like the world to know what you were eating every day, when you went to the bathroom and how you looked at the beach. Paparazzi have even caused tragic deaths; for example Princess Diana’s. Princess Diana’s death was a tragic event that was felt around the world. She died in a car crash that was partially caused by the high-speed chase of the paparazzi in a Paris tunnel on August 31, 1997.News had reported that paparazzi were at the scene of the accident, but they didn’t help her or any of the others that were severely injured in the crash (12). Instead, the paparazzi chose to take pictures of the dying princess during her last few moments alive. Princess Diana had two sons, Prince Harry and Prince William, that were ages 12 and 15 when She died. It was said that the three paparazzi that were taking the photos were charged by French officials but in 2002 the charges were dropped (13).Can you imagine how it felt for them not only to lose their mother but to see the photos of their mother laying on a gurney, cut up and trying to cling on to life? Meanwhile, those paparazzi and their publishers were making a pretty penny from the photographs. There are other cases of celebrities who have fallen to victims of the paparazzi. Justin Bieber was involved in an inci dent where he was driving on freeway 101 in Los Angeles California and 4 to 5 vehicles of paparazzi were following him. As Bieber tried to escape by speeding, the paparazzi stayed right on his tail.This kind of activity went on for about 15 miles until an officer pulled Bieber over for speeding. While the officer was proceeding with the citation, the paparazzi took pictures of all the action. After the officer pulled away and Bieber continued his drive down freeway 101 the paparazzi returned (2). Bieber had called 911 as he was trying to get away from them he told the dispatcher about the situation saying, â€Å"They're being very dangerous, swerving around other cars trying to get to me,† Bieber told the dispatcher. â€Å"And when I get to a stop they pull up next to me and just be, like, just harass me (2). Bieber also told the dispatcher â€Å"I was trying to go fast so that I could lose these people and I got pulled over. And then the police told me if they kept followi ng me to call again (2). † A patrol car caught up with Justin where he filed a complaint to have an investigation to see if any of the paparazzi will be charged with violating the paparazzi law (2). There was a huge uproar about the video that surfaced online that showed Kate Moss swarmed by paparazzi at Los Angeles International Airport that had her covering her crying child who was scared (4).Kate Moss was forced and encouraged by authorities to hide behind the police desk at LAX so that a crew of officers could literally push the paparazzi out of the way to get her and her child to the van safely. The recent scandal of involves Duchess of Cambridge, Kate Middleton, is a new scandal that has people buzzing about how the paparazzi are getting away with invading privacy. Photographs were taken of Princess Kate topless on the terrace of a private home that had several hundred meters of land between the home and a public road. The pictures were taken with a specialized zooming c amera.According to NPR, The French magazine Closer that had the possession of the photographs must hand over all digital files of photos containing snapshots of a topless Kate Middleton and refrain from republishing any of them or face fines of $13,000 a day (5). Even the royal family have fallen to victims of the paparazzi. These examples are what endangers the welfare of celebrities. Celebrities are restricted on the amount of normal daily things they can do in public without the paparazzi following them. The paparazzi law in California was passed to help celebrities find their right to privacy again.Since the law was passed, the Media and California Newspaper Publishers Association have tried to fight the bill with their argument that there is no way that any journalist or freelance photographer should have charges put against them for publishing an article (5). But, a long-time security professional and the creator of the Paparazzi Reform in 2009, Sean Burke, disagrees with that argument saying, â€Å"The car chases that take place in L. A. put people in danger and have nothing to do with breaking news. They threaten the lives of celebrities and their children, as well as pedestrians (5). Rights and Laws 3. 1 Current Anti-Paparazzi Law The current anti-paparazzi law in California was passed in 2010 and signed into law by then Governor Arnold Schwarzenegger. The law will fine paparazzi for taking photos that invade a celebrity’s right to privacy. It will also target media outlets who purchase the photos. â€Å"The law makes it a crime to take and then sell photos that are unauthorized of celebrities when they are in a personal or familial activity (13). † Photographers who violate this law can face fines that are up to 50,000 dollars (13).The main part of the law is that it will affect paparazzi who drive recklessly to get a photo. Since the law came out people have been questioning if some of the laws within the paparazzi law will withstand legal scrutiny but that seems to be unknown. The aggressive driving law should remain because it doesn’t touch upon the freedom of the press. Driving is about conduct, not speech and that is what makes this law protected by freedom-of-the-press laws. Drivers, pedestrians and the public need to have protection from the aggressive tactics of the paparazzi who are driving and this law will help provide that protection (10). . 2 Rights of Celebrities Celebrities have other rights too that can be sorted into two categories; publicity rights and privacy rights. According to Tabrez Ahmad’s research of celebrity rights and the protection under IP laws, the right of publicity is the essential â€Å"right of every human being to control the commercial use of his or her image (7). † It also grants entertainers or public figures control over the commercial exploitation of their names, likeness or other aspects of their personae (7).An example of violating someone’s r ight to publicity would be when Tom Cruise and Nicole Kidman sued the beauty store Sephora for using a picture of them without permission in a brochure that was promoting perfumes in September of 2002 (8). The basic concept for privacy rights is it is a personal freedom and is every person’s right to be let alone. This right to celebrities is violated all the time. In most cases, people become curious about every personal detail of the celebrities’ life because they connect with them and think of them as someone who is important in their life. Anti-Paparazzi or Anti-PressThere are arguments stating that the paparazzi law threatens the First Amendment. According to the Paparazzi Reform Initiative, â€Å"the first amendment was written without limitations for the purpose of developing a law that could be adjusted as the nation grew and advanced in ways the Founding Fathers could not predict (9). † They probably never thought that there would be a herd of people ch asing down American citizens to capture their image so they could use it for financial gain. The intention for the paparazzi law was not to become anti-press but to simply protect human rights.Supporter of the anti paparazzi law and president of a security firm in Orange County, Barry Mozian, agrees with the law by saying, â€Å"This should not be considered photojournalism in any sense of the word (10). † Mozian also said that â€Å"magazines and supermarket tabloids are in a totally different category than legitimate publishing houses who publish high-quality collections of photographs (10). † Photojournalism stands by journalistic qualities and ethics. It’s purpose is to be accurate, objective and present a fair representation of events, people or places to the public (11). The paparazzi don’t have any of those qualities or motives.The paparazzi’s motives are to exploit the lives of the rich and famous and their stories and pictures are just for the sake of money. Conclusion Celebrities live a life where their human rights aren’t protected and are taken from them. They have very few causes of action to protect their rights of privacy and publicity against invasions by the media. The anti-paparazzi law provides some protection for celebrities and public figures who experience invasions of privacy. It provides a solution for these people to live their lives like we do without intense security from the paparazzi.There have been recent events that have led governments to look into how they could protect the rights of these people and solve this problem by creating laws that protect individuals from invasive situations by the media. The solution available to the US right now is the anti-paparazzi law where it will secure these individuals that their safety and privacy will be protected. Works Cited Mendelson, Andrew L. â€Å"Academia. edu | On the Function of the United States Paparazzi: Mosquito Swarm or Watchdogs of C elebrity Image Control and Power | Andrew Mendelson. † Academia. du | On the Function of the United States Paparazzi: Mosquito Swarm or Watchdogs of Celebrity Image Control and Power | Andrew Mendelson. N. p. , Sept. 2007. Web. 13 Oct. 2012. . Duke, Alan. â€Å"CNN. † CNN. Cable News Network, 01 Jan. 1970. Web. 03 Oct. 2012. . â€Å"Paparazzi. † Merriam-Webster. Merriam-Webster, n. d. Web. 03 Oct. 2012. . Lesley Ciarula Taylor Toronto S. Anti-paparazzi law passed in California. Toronto Star (Canada)  [serial online]. n. d. :Available from: Newspaper Source, Ipswich, MA. Accessed September 26, 2012. Memmott, Mark. â€Å"French Magazine Ordered To Hand Over Photos Of ToplessKate, Not Republish Any. † NPR. NPR, 18 Sept. 2012. Web. 03 Oct. 2012. . Locke C. Does anti-paparazzi mean anti-press? : First Amendment implications of privacy legislation for the newsroom. Seton Hall Journal Of Sports & Entertainment Law  [serial online]. January 2, 2010;20(2):227-2 47. Available from: OmniFile Full Text Mega (H. W. Wilson), Ipswich, MA. Accessed September 26, 2012. Prof. Dr. Tabrez Ahmad. â€Å"Celebrity Rights: Protection under IP Laws† JIPR 16 (2011): 7-16. â€Å"Cruise and Kidman Sue over Ad. † BBC News. BBC, 20 Sept. 2002. Web. 04 Oct. 2012. . The PAPARAZZI Reform Initiative – Legal. The PAPARAZZI Reform Initiative – Legal. N. p. , n. d. Web. 04 Oct. 2012. . Wood, Daniel B. â€Å"Will and Kate Visit Could Test California's New Paparazzi Laws. † The Christian Science Monitor. The Christian Science Monitor, 09 July 2011. Web. 03 Oct. 2012. . â€Å"Paparazzi Is Not Photojournalism. † Daily Sundial. N. p. , 12 Oct. 2009. Web. 02 Oct. 2012. . Walker, Sam. â€Å"Paparazzi and pursuit of privacy. (cover story). † Christian Science Monitor 02 Sept. 1997: 1. MAS Ultra – School Edition. Web. 13 Oct. 2012. â€Å"Schwarzenegger Signs New Anti-paparazzi Law. † CNN. N. p. , 14 Oct. 2009. Web . 13 Oct. 2012.

Friday, November 8, 2019

Systems Design Specification essays

Systems Design Specification essays New Age Media has designed an entire business solution for William Ellis Books. After reviewing all the existing manual documentation, analysing the requirements of the business and understanding the need for a more effective and efficient method of performing his business needs, William Ellis has demonstrated his approval of the system requirements specification. Therefore the design specification phase is illustrated throughout the attached report. In designing such a system several elements were taken into account. The design specification addresses the problems that were initially recognised as affecting WEB. Manual filing systems have been replaced to enhance client sales and marketing service. Orders are now placed electronically in the corresponding order file and then crosschecked for availability. This allows for better time management. The user-friendly system allows customer details to be obtained at the right click of a mouse, new customer details can be entered while at the same time building a customer and rare book database. The objective of this is to send current information via WEB newsletter to the database which ensures a higher standard of customer service and marketing. Further design specifications focus on each section of the context diagram, structure charts and more importantly the actual design of system templates including input and output screens, devices and controls that will enable the effective i mplementation of this system. This document is the blue print for the construction of a business system to be implemented by New Age Media. The system will add value to WEB and give the business a competitive advantage in the rare book and manuscript industry. It is the recommendation of this report that con ...

Wednesday, November 6, 2019

U.S.-Japanese Foreign Policies Before World War II

U.S.-Japanese Foreign Policies Before World War II On December 7, 1941, nearly 90 years of American-Japanese diplomatic relations spiraled into World War II in the Pacific. That diplomatic collapse is the story of how the foreign policies of the two nations forced each other into war. History U.S. Commodore Matthew Perry opened American trade relations with Japan in 1854. President Theodore Roosevelt brokered a 1905 peace treaty in the Russo-Japanese War that was favorable to Japan, and the two had signed a Commerce and Navigation Treaty in 1911. Japan had also sided with the U.S., Great Britain, and France during World War I. During that time, Japan also embarked on an empire that it modeled greatly after the British Empire. Japan made no secret that it wanted economic control of the Asia-Pacific region. By 1931, however, U.S.-Japanese relations had soured. Japans civilian government, unable to cope with the strains of the global Great Depression, had given way to a militarist government. The new regime was prepared to strengthen Japan by forcibly annexing areas in the Asia-Pacific, and it started with China. Japan Attacks China Also in 1931, the Japanese army launched attacks on Manchuria, quickly subduing it. Japan announced that it had annexed Manchuria and renamed it Manchukuo. The U.S. refused to diplomatically acknowledge the addition of Manchuria to Japan, and Secretary of State Henry Stimson said as much in the so-called Stimson Doctrine. That response, however, was only diplomatic. The U.S. threatened no military or economic retaliation. In truth, the United States did not want to disrupt its lucrative trade with Japan. In addition to a variety of consumer goods, the U.S. supplied resource-poor Japan with most of its scrap iron and steel. Most importantly, it sold Japan 80% of its oil. In a series of naval treaties in the 1920s, the United States and Great Britain had endeavored to limit the size of Japans naval fleet. However, they had made no attempt to cut off Japans supply of oil. When Japan renewed aggression against China, it did so with American oil. In 1937, Japan began a full-blown war with China, attacking near Peking (now Beijing) and Nanking. Japanese troops killed not only Chinese soldiers, but women and children as well. The so-called Rape of Nanking shocked Americans with its disregard for human rights. American Responses In 1935 and 1936, the United States Congress had passed Neutrality Acts to prohibit the U.S. from selling goods to countries at war. The acts were ostensibly to protect the U.S. from falling into another war like World War I. President Franklin D. Roosevelt signed the acts, although he did not like them because they prohibited the U.S. from helping allies in need. Still, the acts were not active unless Roosevelt invoked them, which he did not do in the case of Japan and China. He favored China in the crisis, and by not invoking the 1936 act he could still shuttle aid to the Chinese. Not until 1939, however, did the United States begin to directly challenge continued Japanese aggression in China. That year the U.S. announced it was pulling out of the 1911 Treaty of Commerce and Navigation with Japan, signaling a coming end to trade with the empire. Japan continued its campaign through China, and in 1940 Roosevelt declared a partial embargo of U.S. shipments of oil, gasoline, and metals to Japan. That move forced Japan to consider drastic options. It had no intention of ceasing its imperial conquests, and it was poised to move into French Indochina. With a total American resource embargo likely, Japanese militarists began looking at the oil fields of the Dutch East Indies as possible replacements for American oil. That presented a military challenge, though, because the American-controlled Philippines and the American Pacific Fleet based at Pearl Harbor, Hawaii, were between Japan and the Dutch possessions. In July 1941, the United States completely embargoed resources to Japan, and it froze all Japanese assets in American entities. The American policies forced Japan to the wall. With the approval of Japanese Emperor Hirohito, the Japanese Navy began planning to attack Pearl Harbor, the Philippines, and other bases in the Pacific in early December to open the route to the Dutch East Indies. Ultimatum: The Hull Note The Japanese kept diplomatic lines open with the United States on the off-chance they could negotiate an end to the embargo. Any hope of that vanished on November 26, 1941, when U.S. Secretary of State Cordell Hull handed Japanese ambassadors in Washington D.C. what has come to be known as the Hull Note. The note said that the only way for the U.S. to remove the resource embargo was for Japan to: Remove all troops from China.Remove all troops from Indochina.End the alliance it had signed with Germany and Italy the previous year. Japan could not accept the conditions. By the time Hull delivered his note to the Japanese diplomats, imperial armadas were already sailing for Hawaii and the Philippines. World War II in the Pacific was only days away.

Sunday, November 3, 2019

Exploring the impact of retail promotion strategy on customer Essay

Exploring the impact of retail promotion strategy on customer behaviour - Essay Example From this research it is clear that the food retail industry is very competitive in the UK with retailers adopting strategies to optimise store performance and increase loyalty. This level of competition is likely to accelerate with recent headlines expressing concern over Tesco’s dominance of the food retail market. This is not a new concern as prior to these reports, the regulating standards body prevented Tesco from acquiring Safeways over fears that the industry would not be competitive. The food retail industry is also one which is characterised by tight profit margins as customers in this industry are constantly on the lookout for value for money in terms of prices offered. This has resulted in food retailers adopting various promotion strategies in a bid to control customer behaviour, and the bulk of the promotion strategies seem to have focussed on loyalty. Other promotion strategies that have been used include blanket couponing and one-to-one marketing. These strategi es have also relied on recording customer shopping behaviour, and the information collected is often used to ascertain what customers’ buy, the frequency with which they buy these products and when they buy it. This information is then used to give the customer coupons or vouchers that are specific to their frequent purchases. Some food retailers like Aldi’s and Lidl’s have not adopted any promotional strategies and instead they have gone for low pricing on the basis that it introduces stable pricing to customers.

Friday, November 1, 2019

Thank you later Essay Example | Topics and Well Written Essays - 750 words

Thank you later - Essay Example It tells us that Miss Moore's lesson has had an impact. This is from 'Everyday Use' by Alice Walker and Dee is speaking to her mama regarding the quilts she wanted to take from Maggie. She viewed them as valuable now, having identified herself with her African American roots. She thought Maggie was not worthy of owning such items, would only use them and destroy them, while she would display them for decoration. The quote showed Dee's attitude to her sister and her own heritage.3. This comes from 'Sonny's Blues' by James Baldwin and is the narrator, Sonny's older brother speaking. He realized the power and wonder Sonny created with his music. It also suggested a deeper understanding of himself, society and his and Sonny's place within it. He valued his brother and his talent at last.5. Mrs. Wright would be meek and obedient, rather scared of the others at first, especially Torvald because he is a man. She might look for instructions from the other women, being afraid to draw attention or to assert her independence. Dee would be annoyed at their situation, tidying herself up, concerned with her appearance and status, and maybe a little impatient with Mrs. Wright.Torvald, as the only man, used to having his own way and women running around after him, might try to organize the women into carrying out tasks such as fetching wood, looking for food, making a shelter. Miss Moore would at first observe all that was happening, then talk to everyone to get their views on how to deal with things. Dee would tell Torvald to stop trying to be master over the women, maybe even argue with him, which would annoy him greatly. Once Mrs. Wright felt she was safe, thanks to Dee's brave attitude and Miss Moore's regard for her input, she would become more assertive. All of them would have to change to more cooperative behaviors and accept that in order to survive, they must see each other's strengths and treat each other as equals. 6. This quote forms the last words in 'The Storm' by Kate Chopin. It has ambiguity, after what Calixta did with Alcee while her husband and son took shelter at the shop. The 'storm' could be interpreted as her passion and the 'happiness' of everyone concerned is ironic. Bobinot was blissfully ignorant, Bibi was safe at home, Alcee's passion had been shared, and his wife Clarisse did not have to sleep with him, which made her happy. It was an ironic closure, suggesting more tempests to come. 7. Aunt Jennifer's Tigers 1. Adrienne Rich is the poet. 2. The speaker is a detached observer, and could be the voice of a young person relating what she saw as the sad life of the older woman, told in an ironic tone. 3. This relates to the tigers Aunt Jennifer was embroidering. 4. Metaphor for tigers 5. The wedding ring's "massive weight" that "sits heavily" symbolized the burden she was under in being married to uncle. 6. She was afraid of him, as the tigers are not afraid of men. The poet talked of "terrified hands" and "ordeals" Aunt had suffered. Name Anderson Scholarship Address Address Date: Write in Dear..MrMrs etc. I am writing to thank you for donating the Anderson

Wednesday, October 30, 2019

Personal Moral Compass & Vision Statement Essay Example | Topics and Well Written Essays - 750 words

Personal Moral Compass & Vision Statement - Essay Example Back in the late 1990’s Nike, a corporation that was built on image and marketing to obtain tremendous brand value, lost a lot of customers due a sweetshop scandal. In this paper I will provide an assessment of my capabilities for ethical leadership and vision five years from now. Since a very young age I have always had very high moral standards. I believe it is important to do things the right way. In the marketing profession there are many challenges that a professional may face. There are ethical dilemmas such as choosing whether to target other competitors and aggressively discredit their practices in campaigns even when the claims may be half truths or irrelevant information. I believe do not believe that adverting people should use the competition as a point of basis of a campaign. Advertising should focus on highlighting the strengths of the firm or product. I think advertising campaigns such as the Dunking Donuts campaign that tells people that real friends donâ€℠¢t let their friends drink at Starbucks are unethical. I consider that my capabilities to make decisions using ethical leadership are outstanding. I have always considered the ethical implications my decisions in life and in business. I can improve my ethical understanding by taking structured seminars and continued education courses on the subject. In the past when I have been faced with tough ethical decisions I sometimes communicate the dilemma to friend or colleague in order to gain their opinion and input on the matter. Active listening skills are useful to evaluate the feedback from other people in order to make better informed decisions. Five years from now I plan to be working in a marketing department. At that time I will face ethical challenges on a recurrent basis. I potential challenge that I may face could involved deciding whether to expand the operations of the company into developing countries to raise profits with the consequence being lowering the jobs the firm cre ates in the United States. The options in this scenario are to expand into one or many foreign countries or to target growth exclusively in the domestic market. My ethical point of view on these types of business international matters is that it is the ethical responsibility of the company is to choose the alternative that maximizes shareholder’s wealth. Patriotism is a nice notion, but in business being close minded doesn’t lookout for the best interest of the firm. A good option to create balance would be to invest in the international option if is more profitable, to then in the future use those profits to diversify your operation and help the US economy by investing in new ventures in the United States. There are other important ethical decisions that I might face in 2016 as a professional in the workplace. A topic that is going to gain greater popularity in marketing circles in 2016 is corporate social responsibility. I have seen companies that are using innovativ e marketing programs to help out social causes. A few years ago Starbuck Cafe introduced a program that donated 5 cents out of every sale of certain beverages towards supporting AIDS programs in Africa. These types of programs at first glance might be seeing with hesitation by upper management because their perception might be that such a mandatory donation is an added cost that lowers the profitability of a product. Ethical leadership can have tremendous benefits. As a marketing professional it would be my duty to educate management over the value of such a

Monday, October 28, 2019

Cyberterrorism Essay Example for Free

Cyberterrorism Essay The term cyberterrorism was created in the mid 90’s by combining cyberspace and terrorism. The term has been widely accepted after being embraced by the United State Intelligence Community. Janczewski and Colarik describe cyberterrorism as â€Å"Premeditated, politically motivated attacks by subnational groups, clandestine agents, or individuals against information and computer systems, computer programs, and data that result in violence against non-combat targets† (Janczewski Colarik, 2005, p. 43). Cyberterrorism is a form of terrorism that uses any form of connected source to engage in attacks of information systems, incitement to violence, theft of data, and planning of terrorist attacks (Britz, 2011, p. 197). As an introduction into the topic, the following definition is key to understanding the definition: â€Å"Cyberterrorism is the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks, and the information stored therein when done to intimidate or coercer a government or its people in furtherance of political or social objectives. Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not† (Denning, 2000). Cyberterrorism is considered an act of violence or intimidation using cyberspace. It is more complicated than simply hacking into a system to see what damage can be done; it has to stem from a motivational source such as politics, foreign government, or some other rousing source (Gross, 2003). Enemies of the U. S. are strongly motivated by hate. Hate can be a strong motivator when it comes to cyberterrorism, and just terrorism in general. When hate is the driving factor of actions, the consideration for the targeted group is very minimal, and the results of hate crimes are usually violent and gruesome acts. The FBI’s definition isn’t that far off from Denning’s. They have published three different distinct definitions of cyberterrorism: â€Å"Terrorism that†¦initiates attacks on information† – â€Å"the use of Cyber tools† – and â€Å"a criminal act perpetrated by the use of computers (Baranetsky, 2009). Most government agencies that have a response program for cyberterrorism have their own published definition of cyberterrorism. The question rises ‘why does cyberterrorism occur? ’ The answer is that the terrorist want cause specific damage to the target. There are three factors that are considered when this question is asked, the first being the fear factor. It is the most common denominator of the majority of terrorist attacks. The attackers want to create as sense of fear in individuals, groups, or societies – whomever they are targeting (Janczewski Colarik, 2005, p. 45). Perhaps a cyber example of this could be the attack of IT installations. Then there is the spectacular factor. Spectacular means that the attacks are aimed at creating direct losses or resulting in a lot of negative publicity (Janczewski Colarik, 2005, p. 45). An example of the spectacular factor at work was in 1999 when Amazon. com was closed because of a Denial of Service (DOS) attack. They suffered losses from the attack, but the worse affect was the publicity that that was received (Taylor, Calabresi, Krantz, Pascual, Ressner, 2000). The last factor is the vulnerability factor. This is simply when vulnerability of an organization is exposed (Janczewski Colarik, 2005). An example of this could be the vandalism of an organizations webpage. The importance and significance of cyberterrorism is a very debatable topic. Kim Taipale, founder and executive director for the Stilwell Center for Advanced Studies in Science and Technology Policy believes â€Å"cyberterrorism, whatever it is, is a useless term. Taipale believes that, â€Å"terrorists will use any strategic tool they can† so â€Å"cyber† terrorism is no more important then other forms (Baranetsky, 2009). The statements by Taipale are strong, and arguments could be made supporting her, and arguments could be made that go against her beliefs. It is true that terrorism is growing all over the world, and terrorists are beginning to use various outlets to threaten nations, groups, and individuals. So the case could be made stating that cyberterrorism is just an accessible outlet terrorists have, because of the access that is granted to an individual on cyberspace. In conflict with that argument is the argument that cyberspace is not monitored and policed enough, and has little to no restrictions as to what can be done in cyberspace. This is an ongoing debate that will not be discussed in this paper. Different Forms of Cyber Attacks Various types of cyber attacks are used within the terrorist aspect of cyberspace. According to the Center for Strategic and International Studies, cyberterrorism is â€Å"the use of computer networks to shut down critical infrastructure (such as energy, transportation, government operations) or to coerce or intimidate a government or civilian population† (Lewis, 2002, p. ). The most commonly used tactics used to neutralize critical infrastructure are attacks known as the Trojan horse, viruses, phishing, Denial of Service (DoS), and Direct Denial of Service attacks. The first of the types of the cyber attacks to be discussed is the Trojan horse. A Trojan horse is a computer program that conceals a harmful code. Relating to the well know tale of the Trojan horse, it allows you into a system, and then leaves an outlet that allows you to get back into the system. In essence, it is software that appears to perform one action while actually performing another (Gohring, 2009, p. 6). A Trojan horse is a program that appears harmless but hides malicious functions. The most common Trojan horse of today’s day and age is NetBus, which was used for illegally breaking into computer systems and, in particular, used to plant child pornography on computers of people of integrity. Viruses are another form of cyber attack. Viruses are programs that â€Å"infect computer files, usually executable programs, by inserting a copy of itself into the file. These copies are usually executed when the infected file is loaded into memory, allowing the virus to affect other files. A virus requires human involvement to spread† (Kuehl, 2012). Virus writers write programs that infect the systems of certain users, but needs direct involvement by the creator or another human source to spread the virus. Very similar to a virus is a worm. The worm works just like a virus, implemented into a system by a creator. The difference between a worm and a virus is the fact that a worm doesn’t need the hands-on human involvement. Back in 2003, SQL Slammer worm spread throughout the cyber world. This was a worm that exploited a buffer overflow vulnerability of Microsoft’s SQL Server. Six months prior to the launch of the worm, the vulnerability was taken notice of and a patch was developed to strengthen the vulnerability. The worm worked by generating random IP addresses, and if belonged to an SQL Server that was not covered by the patch, it was infected and immediately began sending out more copies of the worm to more random IP addresses (Leyden, 2003). There was no human involvement after the worm was created initiated by the creator. It spread itself to random IP addresses, which categorizes it as a worm. Phishing is a form of deception used in cyberspace. Phishing attempts to trick users into giving out their personal data. The techniques used in phishing attempts are emails and websites that are designed to look like legitimate agency websites asking for an individual’s bank and financial account information and passwords (Kuehl, 2012). This method is not used so much by cyberterrorists, but the possibility is there. A more serious cyber attack comes in the form of a Denial of Service (DoS) attack. DoS attacks deny system access to users by overwhelming the target source with messages and blocking legitimate traffic (Kuehl, 2012). It causes a system overload, and can block the ability to exchange data between systems using the Internet. DoS attacks usually target banks, and earlier this year in September, several major banks were attacked using DoS. The websites of Bank of America, JPMorgan Chase, Wells Fargo, U. S. Bank, and PNC Bank all were victims of a DoS attack (Goldman, 2012). The websites were overloaded with traffic directed at them causing them to crash. Most of the time while the cyberterrorists use these attacks to steal information from bank customers, but in this case the motivation was simply to temporarily take down the banks’ public-facing websites, putting them under extreme heat from the public and potentially tarnishing their reputations. There are three levels of cyber capability that need to be taken into thought when considering types of cyberterrorism attacks. The first is simple-unstructured capability. This allows a cyberterrorist to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability (Denning, 2000). This level is sometimes not considered to be cyberterrorism, because of the simplicity of the attack. There is slight to no attention focused on the target, which does not reveal any sort of motivation. Referring back to the definition of cyberterrorism, it has to stem from a motivational source to be considered cyberterrorism (Gross, 2003). The simple-unstructured capable individuals are basically the ones who hack into systems just to see what kind of damage they can cause. The second level of capability is the advance-structured level. This is the competence to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses a straightforward and uncomplicated target analysis, command control, and learning capability (Denning, 2000). These organizations have motivations, but they are not strong enough to cause serious damage to the identified target. The last capability is the complex-coordinated capability. This is the ability for coordinated attacks capable of causing mass-disruption against integrated, heterogeneous defenses. They have the capacity to create sophisticated hacking tools. There is a highly capable target analysis, command control, and organization learning capability (Denning, 2000). Organizations with this type of capability are highly sophisticated with dangerous motivations. These dangerous organizations are the ones that can cause millions of dollars of damage, and also tons of negative publicity, two of the main objectives of cyberterrorist. There are cases when terrorists actually run other forms of terrorisms, such as bombings, with the use of cyberspace. The anonymity and global reach of the Internet has helped facilitate terrorism (Cole Glasser, 2009). â€Å"They put up websites to spread their messages and recruit supporters, and they use the Internet to communicate and coordinate action. However, there are few indications that they are pursuing in cyberterrorism, either alone or in conjunction with acts of violence† (Denning, 2000). There is an example of this from the late 90’s. In February 1998, Clark Staten, executive director of the Emergency Response and Research Institute in Chicago, testified before the Senate Judiciary Committee Subcommittee that it was believed that â€Å"members of some Islamic extremist organizations have been trying to develop a network of hackers to support their computer activities in offensive information warfare attacks in the future† (Denning, Cyberterrorism, 2000). It is the perfect way to recruit, because of the anonymity that is granted to the individual. â€Å"The Internet is the ideal medium for terrorism today: anonymous but pervasive† (Cole Glasser, 2009, p. 95).