Thursday, November 28, 2019

About Nickel Dimed Essay Example

About Nickel Dimed Paper Barbara Ehrenreich’s non-fiction bestseller, Nickel and Dimed, is the story of an essay writer who went undercover as a low wage worker to find out how non-skilled workers make ends meet. The experiment took place in Florida, Maine, and Minnesota, with the author finding a job and lodgings in each location. The experiment was to be held for one month in each location, working full time and living only off the amount of money earned in low-wage jobs. The goal was to determine whether or not the author could both live off the money earned and have enough money at the end of the month to pay the next month’s rent. The purpose of Ehrenreich’s book is simply to determine if she â€Å"could match income to expenses, as the truly poor attempt to do every day. † Working different jobs in restaurants, a hotel, a nursing home, a cleaning service, and at a major retailer Ehrenreich finds the truth – it is nearly impossible to match income and expense on wage income. Her research shows that a strong â€Å"work ethic† is often not enough to provide necessities like shelter, food, and transportation. We will write a custom essay sample on About Nickel Dimed specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on About Nickel Dimed specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on About Nickel Dimed specifically for you FOR ONLY $16.38 $13.9/page Hire Writer For people who work in restaurants, hotels, retail stores, and other service jobs the pay is simply not enough to work your way up the ladder of success. Barbara undertakes life as a person that earns poverty-level wages. The book is a real eye opener to what you can actually do for six to seven dollars an hour. The theme of this book is, from my view, you never realize what you have until it is gone. People all across the United States of America live without some of our necessities because they cant afford much more than shelter and food. Barbara shows in this book that living on minimum wage is possible, but barely. My analysis of the theme in this book is very important for people to see and understand that the group of people who earn the bare minimum wage is probably what you wouldnt suspect. Most Americans believe all those who are poor and homeless are those without a job, only surviving on a little amount received through governmental aid. But in this book, we learn that is no always true. People can still have a job living in the same conditions as someone who doesn’t have a job. They can just have very low-wage jobs. These low-wage jobs hourly pay from the $5. 15 mandatory minimum to the mere but reputable $10 wage. At this salary one may not seem noticeably poor, however factor in the needed expenses of housing, food, childcare, and transportation, one may dwindle into poverty. With an increasing amount of low wage workers from such communities as those of welfare recipients, the employment opportunity is becoming scarce forcing one to migrate in order to accomplish the best salary, leaving a more stressful lifestyle with many more hardships to endure.

Sunday, November 24, 2019

Security Technology Evaluation of Bank Solutions

Security Technology Evaluation of Bank Solutions Introduction Maintenance of data security in banks is vital. Agency’s Disaster Recovery/Business Continuity Plan is needed to proceed with this process. This plan allows some parts of the business to continue operating without interruptions to the customers. CSIA 485 case study presents the failure in ensuring data safety with regard to handling of storage tapes.Advertising We will write a custom report sample on Security Technology Evaluation of Bank Solutions specifically for you for only $16.05 $11/page Learn More The system in use limits on accountability and credibility of data security. The plan which is used in CSIA 485 involves the development of information security policy, standard backup procedures, network design, information detection systems and various encryption methods. In the case of CSIA 485, there was a failure in system update. Such an incident was caused by some technical issues, which shows that the participants of the critical plan did not have adequate training on the means of using DRBCPs (National Institute of Standards and Technology, 2009). The IT problem the company faces is rooted in the sever inefficiency that can be mitigated through efficient upgrading of the bank data systems. Capabilities Servers have different designs that function to provide for networking, cooling, management, interconnection and dynamism in data management and control. Servers help in consolidation of data and software for effective management, security and sharing within the bank. This allows for moving of data, files, software and digital assets from laptops, desktops and mobile devices for central management and storage for the reduction of risks and costs. The shift is a vulnerable process since the bank intends to maintain process continuity as it upgrades the systems without disrupting services to customers. Through adequate training on the use of the DRBC systems, users learn the best ways of confidential sharing o f information within the bank. The technology shows security aspects relevant to the needs of Bank Solutions, Inc, which will allow for the development of standards of information security policy, backup procedures, network designs, information detection systems, and various encryption methods among others. The system assures reliability through central monitoring and ensures efficiency in system updating (Kim Solomon, 2011). The disadvantage of this system is that upgrading can make some of the bank employees in the decentralized data centers lose their jobs. Such a situation can lead to resistance from the staff members. Centralization reduces the responsibilities of staffs due to data centers. However, overworking server maintainers can cause delays in acquisition of authorization for access in critical times.Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Cost The costs associated with the setup of a secure server infrastructure involve acquisition, setting up and ongoing costs. Acquisition costs involve the acquiring of software and hardware necessary for the setting up of the system. This includes variable costs of EDA and CAM/ CAD tools dependent on the number of engineers employed to work on the process. Setup costs involve professional services for constricting the storage server, application server as well as other applications. These costs involve the training of branch administrators on handling with daily operations for basic level support. Ongoing costs are classified in two divisions, labor costs and maintenance costs. Maintenance costs are fixed and used only on demand, while there is variability of labor costs. Each server in the company requires regular daily administration within the year for about 4 hours, and the labor involved costs about $50 per hour. Decentralization strategy for the servers will cost the bank $1.6 million – 52.5%, as a one- time hardware, software and setup cost. Ongoing maintenance and support cost take 33% on a spending within 3 years. This can increase to 46% of overall operating costs within five years. To avoid the failure in systems updating, Bank Solutions can use a centralized approach to setup its server operations. Such a measure is helpful of reduction of setup and administration costs. Instead of spending on pocket servers for the use of few users, the IT managers can take advantage of economies of scale through the creation of few servers, storage servers and powerful applications. The cost of acquisition in the centralized system is $544,000 with setup being $33, 000 and ongoing expenses of $334,200. However, through the utilization of the power of performance efficiency of decentralized systems and the possibility of elimination of distance through virtual connectivity of users, the centralized solution is the best choice for the data security. It will help in reducing of acquisition cos ts, setup and ongoing costs for short and long-term operations. Maintenance The maintenance of this technology is an issue, which requires comprehensive dissection to prevent any instances of abrupt failure (Slezak, 2009). For instance, the section of maintenance calls for periodical upgrading of software, computers, payments of employees responsible for taking care of the technology, replacement of hardware and other security equipment. The maintenance of the servers will facilitate security services to avoid detrimental complications of server issues. Users must be responsible for protection of sensitive data through secure management of passwords.Advertising We will write a custom report sample on Security Technology Evaluation of Bank Solutions specifically for you for only $16.05 $11/page Learn More The database administrator takes care of administration of databases, assigning local user roles and granting system privileges. It also requires the maint enance of underlying security in data transmission in various operating systems. Trusted application administrators help in creation and administration of accesses and user privileges as well as maintenance of security in the centralized enterprise. Avoidance of server issues requires ongoing checkups and proper management to ensure smooth running of the technical infrastructure. A barrier to success in the centralization of the server system can result from employees who feel that they may lose their jobs. It is also apparent that centralization increases responsibility of fewer IT specialists and calls for advanced trainings to handle the new systems. Requirements The security system must be FDIC compliant for the bank to develop a storage area network in the head office of the bank. The second one can be developed in one of the data centers with a reduction of server requirements to a single rack and elimination of patched storage of data storage tapes. The main server is capable of rescuing information in the alternate data center within 5 minutes allowing customers and employees to continue accessing their accounts without noticing the failure interruptions. The achievement of this comes with its financial implications; such training requires huge financial commitment (Camara et al., 2011). Lack of required skills can delay effectiveness in convergence that can hamper the daily operations of the bank. Any slight hitch in shifting from decentralized to centralized servers, unless professionally executed, can hinder normal bank operations and lead to customer dissatisfaction. Such vulnerability requires thorough evaluation and timing of the transformation processes. Flexibility The setup has ample proximity advantage since it enhances the performance of Windows applications in the bank. Since users and applications are at the same location, high performance may be guaranteed. Centralization of the server system is flexible and not bound to specifications. I t will allow the bank to make extensions on its systems and alter its layouts without resource wastages. It helps in consolidation and reduction of crowding of server racks in the data centers ultimately reducing the maintenance costs. Centralization allows for integration of operations and monitoring of the systems for the ease of cross sectional analysis necessary for upgrading the Bank Solutions information gained from all the departments regarding the customers, costs and employees data to ensure the effectiveness of updating.Advertising Looking for report on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Such an approach ensures the improvement of service quality. The system helps in enhancing performance through coordination of security, customer support and cost control. In CSIA 485 case, the failure happened due to obsolete servers which they were no longer necessary in the centralized system. This challenges the viability of the costing of upgrading resources since they are irrelevant to the new system. Feasibility Centralization of Bank Solutions, Inc seeks to address the issues in the server security system. The management should address such issues as updates of software, perform regular tests of item process facility, provide secure channels, partition employees according to levels of data access, and improve system efficiency as required by the bank. It will reduce the present data tape storage in unsecure means within data centers, external storage facilities backyards and at Bank Solutions Data Center East, which can lead to data being compromised. However, as the case of CSIA 485 shows, the disadvantage rests on IT professionals, who are in charge of the data centers, since their services become unnecessary in the centralized system, and it might lead to firing most of them, which can result in resistance hampering smooth operations in the bank. Conclusion The case of CSIA 485 requires that Bank Solutions, Inc centralize its servers to effect efficient management of the data systems. Through the adoption of efficient standards, the bank data remains secure and available to only those who receive authorization. Centralization will eliminate duplication of IT infrastructure in the offices and reduce on unnecessary IT expenses leading to high efficiency of utilization of resources and elimination of potential data insecurities. The company must be ready to incur the costs involved and take advantage of the flexibility that the system will provide. Through effective maintenance and availability of the necessary requirements, the company will be in a po sition of assuring customer satisfaction always. References Camara, S., Crossler, R., Midha, V. Wallace, L. (2011). Disaster Recovery and Business Continuity: A Case Study for CSIA 485. Journal of Information Systems Education. 22 (2), 117-122. Kim, D., Solomon, M. (2011). Fundamentals of information systems security. Sudbury, MA: Jones Bartlett Learning. National Institute of Standards and Technology. (2009). Recommended Security Controls for Federal Information Systems and Organization. NIST Special Publication 800-53 Revision 3. Retrieved from https://csrc.nist.gov/publications/detail/sp/800-53/rev-3/archive/2010-05-01

Thursday, November 21, 2019

International Business Essay Example | Topics and Well Written Essays - 3000 words - 10

International Business - Essay Example Primary activities are those activities which involve the organisation of supplies inputs or inbound logistics, operations of manufacturing, delivery as well as the distribution of commodities (Distribution is also referred to as outbound logistics), marketing of products and lastly, sales as well as after –sales services. Each of these mentioned primary activities has the aid of support activities and this is the point at which support activities come in. Support activities may involve; a company’s planning capacity, development of technology, human resource management (HRM), and procurement activities. (Weiss, 2002 p 144) The analysis of global commodity chain involves a process of study on value creation in the process of production and distribution. Business strategies are also very close to the function of value chain, this is since it says that in the world economy goods’ production is in a chain process commencing from one country up to the final country. Each process in the commodity chain has value being added to the product and the magnitude of value relies on the competitiveness in the market. More and more the largest value is enhanced in the product branding and differentiation processes as evidenced in large business organisations like Nike. Analsysing commodity chain aids in the understanding of power relations displayed in the global system. It’s made possible by the world financial order as administered by the IFIs – International Financial Institutions. Commodity chain study unravels understanding of the function of branded transnational capitalism. It also promises to guide in the exploration of the fluctuating distribution of realisations of value between the social groups at the steps of production and the differing fractions of elites of the transnational business. (Murphy 2008 pp 9-10) Member states of OECD’s government as well as the political approach are the ones

Wednesday, November 20, 2019

Modern Imperalism(The british Empire) Essay Example | Topics and Well Written Essays - 2500 words

Modern Imperalism(The british Empire) - Essay Example Being often dubbed â€Å"internal colonialism†, those relationships, according to Levine, did little, if anything, to narrow the gap between the rich and the poor, but exploited the divide for colonial ends (11). Insofar as the poor had found a solution, although not always an easy one, to their problems, migrating in large numbers from their impoverished regions into distant lands, the eighteenth- and nineteenth-century British Empire is largely considered â€Å"a significantly Scottish enterprise† (Levine 11). On the other hand, as Judd points out, the primary motive and most powerful drive behind the establishment of the Empire and its global growth was the â€Å"desire for profitable trade, plunder and enrichment† (3). Thus, having served many useful purposes, besides bringing wealth to a substantial part of the British population, the Empire was seen as both â€Å"a mainstay† of the restored Stuart monarchy after the period of republican rule known as â€Å"the Commonwealth and Protectorate† and the stabilising factor in â€Å"the post-revolutionary Britain of the late seventeenth century† (Judd 3-4). ... d been perceived as â€Å"underwriting the nation’s future in a variety of ways†, including as â€Å"a means of uniting the British people in a common cause, a means of â€Å"inspiring a sense of international mission†, as well as a â€Å"device to blunt the edge of class warfare and egalitarian philosophies†; most notably, however, the Empire helped boost both the confidence of the individual and the nation, stifling fears of degeneration and decline. (Judd 4-5). This essay is intended to review the reasons for the British invasion in Egypt in 1882, including such as the situation in Europe, imperial geopolitics, commercial and strategic interests, as well as domestic economic concerns due to the pressure of increased international competition. The essay argues that the invasion was necessitated by a cocktail of factors, whose relative weigh varied with each stage of the British involvement. 2. Historical Background Porter point out that the British Empi re significantly changed over the nineteenth century; thus, the West Indian islands rapidly lost their relative importance in the British trade after 1815, whereas the westward extension of Canada to the Pacific, along with the emergence of six colonies in Australia, transformed not only altered the pattern of investment distribution within the Empire, but also created a number of â€Å"self-governing, self-confident ‘settler capitalist societies’†, which generated nearly â€Å"16.5 per cent of Britain’s overseas trade† (Porter 5). Despite the changes, India, which underwent a consolidation of the British control over its territories between 1819 and 1870 – remained of â€Å"paramount importance in any assessment of Imperial assets† (Porter 5-6). This expansion, in turn, brought about other significant developments,

Monday, November 18, 2019

Organizational Theory Design and Change Essay Example | Topics and Well Written Essays - 250 words - 5

Organizational Theory Design and Change - Essay Example Some factors arising from the organization’s structure and culture that assign subunits varying degree of power are as follows: An organization fundamentally gets hold of resources from the environment. Therefore, the subunit that assumes greater control over the organizational resources, retains greater power as compared to other subunits, that so not have as strong a hold over them. In addition to the organizational resources, a subunit’s approach to the strategic information and its control of it are the cardinal sources of its authority. Subunits assuming a central responsibility to the flow of resources are able to minimize the vagueness that other subunits face (Jones). Therefore, any subunit that is able to control an organization’s principal sources causing uncertainty retains considerable power, though, as the contingencies an organization faces change, the distribution of power between individual subunits changes. Besides, if a subunit assumes such a ro le in the organization’s structure that no other subunit can play, then it becomes vital for the organization’s success. Such a subunit becomes quite nonsubstitutable, in comparison to other subunits, that may be meddled with or replaced as per the need of the hour. Works cited: Jones, Gareth. Organizational Theory, Design, and Change. 6th ed. NJ: Prentice Hall.  2007.

Friday, November 15, 2019

Innovations in Technology for Hospitals

Innovations in Technology for Hospitals Public service Innovations through ICT  Ã¢â‚¬Å"eHospital-Dompe† Project â€Å"mChanneling† – a story of transformation of a government hospital in Sri Lanka. Abstract: District Hospital – Dompe is in Gampaha District, having the bed strength of 102 beds under Ministry of Health- Western Province. It’s †eHospital-Dompe† project is the most successful electronic transformation of a government hospital in Sri Lanka. The â€Å"eHospital Dompe† project was aimed making a District Hospital in Sri Lanka more efficient through adaptation of ICT solutions and appropriate change management. â€Å"mChanneling† solution is the first ever automated appointment system in a government hospital in Sri Lanka it is a service provided FREE OF CHARGE to deliver more patient friendly service. A unique public private sector partnership of Ministry of Health, all categories of hospital health staff, ICTA, Well wishers from the community, software hardware providers, presidential secretariat mobile partner were among the cornerstones of the success of this project. Keywords: eHospital-Dompe, Government Hospital, ICT, Change Management, mChanneling Introduction: This project was conceived in 2010. At that time the District Hospital, Dompe was an ordinary government hospital. The hospital was disorganized, overcrowded and there were unnecessary delays that compromised total patient care. The author, the hospital administration, and the hospital staff wanted to change the situation and make the hospital more efficient. Under the guidance of Regional Director of Health Services-Gampaha and Acting Director of the Hospital, the author, with the help of all categories of hospital staff launched a programme to provide efficient health care. The programme included attitude changing, improving moral, building up of team spirit and obtaining optimal use of the abilities of the staff. In addition re-arrangement of the hospital setting, provision of specific accesses to each service points especially emergency access and improving the quality of care provided, were also included into the programme. A new patient Registration Desk, Queue Management Centre, and a Reception Desk were established and 5s concepts were introduced. In addition, an uninterrupted power supply solution was installed with the assistance of donors in the community. Objectives: Rearrangement of the hospital setting to provide a hassle-free service Provision of efficient health care service Uplifting of quality of care provided into international standards The ultimate goal is to have a â€Å" Happy Content Patient â€Å" The ICT Solution – Background: We believed that an information technology solution would help make the hospital more efficient and approached the Information and Communication Technology Agency of Sri Lanka (ICTA) for support. The ICTA’s â€Å"eSociety† initiative supported us with a grant of Rs.4,150,000.00 for wired networking, computer hardware, and software. This was facilitated by Director, re-engineering government programme, Head of eSociety initiative and Project Manager for eHealth of ICTA. We visited Base Hospital-Karawanella where an ICT system was already in place. This enabled us to get an idea of the software that was available. We found that the software had to be customized to make it suitable for our hospital. After extensive discussions Lunar Technologies, Kalutara, under the direct guidance of the author and his team, developed a new system [Hospital Health Information Management System (HHIMS) Version 1.2]. This system has undergone several revisions since then. It is now available as free and open source software that could be downloaded, installed, and used by anyone. This was facilitated by the ICTA. To deploy the software solution, we networked all the Units of the Hospital, and bought an in-house server [Processor – Quad core E5530 Xeon 2.4 Ghz]. All the networking was wired and was done by Sri Lanka Telecom Services. All the service points/units were provided with a computer [A total of 41 computers: 31 were desktops (processor – Dual core) and 10 were laptops (processor i3)]. Sri Lanka Telecom Services was also the hardware provider. The system was inaugurated on 27 December 2011 under the patronage of Secretary, Ministry of Health (Western Province) and Regional Director of Health Services-Gampaha. The Process: In this project, all the units of the hospital are networked (wired) with an in-house server. All the service points/units are provided with computers linked each other. When a patient comes to the OPD, he will be registered in our system (once in life time) provided with a system generated Patient Identification Number a Patient specific Bar-Code. With this Bar-Coded Patient’s Health Card, the patient is then sent to Electronic Queue Management Centre. There, he will be given the today’s token to assign the correct place in the queue correct doctor’s chamber. Then he will be sent to doctor for consultation. All the doctors are provided with laptops bar-code scanners. When the doctor swipes the patient’s card with the barcode scanner, the doctor can get the patient’s demographic data, past medical surgical history, allergic history etc. within seconds. After the examination, the doctor enters the prescription/ procedure/lab test to the system accordingly. The patient is then sent to the relevant unit to get the ordered treatment done. When the patient goes to the dispensary, the pharmacist there can get patient’s prescription by swiping Bar-Coded Patient’s Health Card. The Laboratory, dressing room, injection room, E.T.U, Medical clinics Dental clinic are also connected to the system. All the daily reports (OPD register, Drugs dispensed, Drug Stock Balance) are generated by the system. When the patent is admitted to hospital, his medical records are updated with the relevant details at the discharge a system generated diagnosis card is issued. Three (03) backups are generated by the system automatically per day data encryption, predefined user access levels, individual usernames /passwords ensure data security. An additional feature of the system is immediate notification of notifiable diseases via email. Stand alone clinics in the hospital, such as the Medical Clinic, Family Medical Clinic, and the Screening Clinic for Non Communicable Diseases (NCDs) are also linked to the system. The DMO’s office is also linked to the system and as a result, he can monitor the hospital from his room. Advantages: The system has been in operation for approximately 2  ½ years at the time of writing this paper. The system holds data of well over 50,000 patients. The OPD has become methodical, efficient and trouble free after the implementation of the IT solution. Two minor staff officers who manually did daily registrations have been re assigned for other tasks now, saving manpower. The OPD staff is benefited from the electronic queue management system and system generated daily reports. They enjoy their work in a paperless environment. There is no more manual searching of previous prescriptions as there are no chits books. The patients are easily managed now as they have faith in the system. The doctors have benefited by getting accurate, comprehensive past histories with medication, investigations and demographic data. They get to know about the availability of drugs immediately. They can plan the patient’s management and easily retrieve lab reports .With all those information doctors can make a more accurate diagnosis. At the same time they are directed for rational use of drugs, especially antibiotics. Doctors can also make sure that the ordered procedure was performed correctly at the relevant unit. The doctors can have a look at statistics for their personal interest (e.g. the number of patients treated by him/her). The nurses in each unit have benefited by their tasks being made easy as they get clear orders from doctors in advance of the patients’ arrival, which helps them to get ready for the treatment. In addition, they get system generated daily summaries. The pharmacists /dispensers are able to get legible prescriptions with automatic calculation of the number of tablets, making their duty easier. In addition, automatic stock balancing has reduced their workload made the dispensary process methodical accurate. The Medical Laboratory Technicians receives properly labeled samples. The administrator is also benefited as he/she can monitor the whole process sitting in his/her room. Obtaining statistical data is made easy by the system and it helps to utilize manpower optimally. Remote monitoring, easy statistical works, optimal resource utilization made health administrators duty easy. But, the main advantage is for the patients. With the help of the system they get better care. They will be able to have a personal medical record into international standards able to get treated in a short period of time in patient friendly environment. â€Å"mChanneling†- a FREE appointment system : mChanneling solution is the first ever automated appointment system in a government hospital in Sri Lanka it is a service provided FREE OF CHARGE. It is a joint effort of Presidential Secretariat, Ministry of Health(Western Province),ICTA, Regional Director of Health Services(Gampaha) District Hospital-Dompe. The free health system in Sri Lanka is obviously providing a service with quality to the nation. Though the quality of care is high, the efficiency of service is questionable at the O.P.D level. To overcome that delay seen in the O.P.D at D.H Dompe, an IT solution had been implemented 02  ½ years back functioning well by the moment. When the traditional paper based O.P.D is functioning, a patient’s overall average waiting time at the O.P.D is 01 hour 41 minutes. With the implementation of the IT solution the average waiting time has been reduced to 55 minutes. But with the busy life style even that time period seemed to be longer our attempt was to decrease the waiting time up to 30 minutes. To reach our goal, we planned an automated appointment system called â€Å"mChanneling† for the O.P.D of District Hospital-Dompe. As it is a timely need of entire Sri Lankan health sector, the design was made to be more simplified usable in any hospital in Sri Lanka. The solution can be functioned with only one computer with a internet access at any hospital the hospital need not to be a eHospital(computerized hospital) also. The mchanneling platform is a web-based one the administrative powers are with hospital authorities. The number of appointments to be issued each day is decided by the hospital itself uploaded. The hosting organization (Mobitel) is then open it to the general public by an IVR (interactive voice response).The hosting is FREE of charge the channeling is also FREE. The patient has to bear the call charge only there are no hidden charges. The assigned mchanneling HOT LINE Number is 0711-370370 . When a patient calls to the hotline, it is connected with Mobitel’s server redirected with a predefined voice IVR. It provides appointments only from District Hospital-Dompe Base Hospital-Dambadeniya by the moment. The patient can select the preferred language should go on as directed by the voice IVR. The automated IVR will ask for the date for the appointment the patient has to select time of the appointment. Each appointment contains 15 minutes any caller can obtain only 02 appointments per day by one phone number. The patients are facilitated to obtain an appointment within next 07 days. At the end of voice IVR, the patient has to confirm the selected appointment/appointments. Then the patient will receive a system generated confirmation SMS with details of appointment a reservation ID. The patient is asked to come to the hospital with the details of the obtained appointment- the SMS or the phone number from w hich the appointment is obtained or the Reservation ID . The reception desk staff of the hospital is facilitated with an access to mChanneling web interface able to track the reserved appointments online real time. The patients with appointments are provided with a PRIORITY CARD at the reception desk sent to the doctor assigned for mChanneling, according to the appointment time. The doctor is doing the consultation ordering the medicines as usual (At D.H Dompe it is done through the already implemented IT solution). Then the patient is sent to the special mChanneling counter at the dispensary for a priority service his priority card is collected. Advantages: The main advantage of mChanneling is to the general public as this solution enlighten the free health system in Sri Lanka by making it more patient friendly. The patients will experience an efficient service with minimal time spent at the Hospital. The Electronic Health Records Computerized Hospital Health Information Management System will be adding strength to the patients’ overall experience. The hospital staff will also benefitted by getting to know about the patients who supposed to visit the hospital, beforehand. The administrators will be able to allocate resources manpower accordingly. In addition, the health staff can experience the online web applications its usability it will lead to a carrier improvement of the staff making a more competent health worker. Challenges: There are two main challenges in the Sri Lankan health sector that prevents embracing of IT. First is the complexity of the health sector and the other is poor knowledge and attitudes towards IT. We launched several programmes to overcome the later problem. Several lectures, workshops, competitions (e.g. Best Worker Competition), 5S programmes, productivity programmes (Institutional/Home/Green Productivity) and Out Bound Training(O.B.T) were arranged for all health staff with the view to changing their attitudes. All of our staff has been given basic computer training under the guidance and direct involvement of the Faculty of Computer Science and Engineering, University of Moratuwa. Head of the Department, guided the programme. Then we selected 60 staff members who were directly involved with the system and provided them with software training. A selected small group was trained on basics of hardware as well. They were refreshed and guided regularly by the author. Small user group d iscussions were conducted to understand and improve the usability.The community was convinced by posters, banners public addressing system of the hospital. The patients got used to the new system rapidly. They were intelligent enough to understand the value of this project and it made our task easier. The Acceptance: Under the ethical clearance of Faculty of Medicine, University of Kelaniya with the approval of Education , Training Research Unit of Ministry of Health, a cross sectional descriptive study was conducted to access the Customer satisfaction on using Information Technology in treating patients at Out Patient Department. 384 patients were interviewed. Median age of the study group was 42 years (Inter-quartile range: 33 to 52) and 297 (77%) were females. Among them, 334 (87%) had never used computers, 230 (60%) were not employed and 358 (93%) had more than one visit to the hospital. Three hundred eighty (99%) were highly impressed on using a personal health identification card and 336 (87%) believed their personal data is secured. Majority were â€Å"highly impressed† for using Information Technology on obtaining appointment at registration counter (n=381, 99%), during doctor consultation (n=374, 97%) and on obtaining drugs at pharmacy (n=375, 98%). Three hundred and fifty (91.1%) believed overall time spent at hospital has reduced as a result of less waiting time at registration counter (n=369, 96%), doctor channeling (n=367, 95%) and pharmacy (n=346, 90%) and all felt the quality of care has improved after introducing Information Technology. All patients recommended extending the present syst em to other clinics and wards. The way forward .. The system has been in successful operation for 2  ½ years by now. We always try to improve the software and its usability to improve the quality of health care provided by our hospital. Improving the patient’s health card with the Health Identification Number (HIN) proposed by the Ministry of Health is one of our priority expectations. We are working hard to ensure a more patient friendly service with use of Information Technology . Infrastructure development within our hospital is also necessary for the sustainability of the project. The electronic Bed Head Ticket and inter connectivity with other hospitals are needed to have an effective electronic transformation and these are within our reach. Conclusion: With the experience gathered through the â€Å"eHospital-Dompe† project, we can conclude that appropriate use of ICT can definitely contribute to improvement in the quality of care provided in the Sri Lankan healthcare sector. Electronic Resources: 1. eHospital- Dompe Project in YouTube. Available at: http://www.youtube.com/watch?v=-YqujXDfHHQ 2.Hospital Health Information Management System (HHIMS) Can be downloaded from git://gitrepo.icta.lk/hhims/hhims.git By: Dr. K.B Sampath Kulathilaka (M.B.B.S(Sri Lanka), Cet. In Health Programme Management( Uni. Of Colombo) Medical Officer In-charge of â€Å" eHospital-Dompe â€Å" Project â€Å"mChanneling† District Hospital – Dompe 0777-577927 / 0718-672770 Email ; [emailprotected]

Wednesday, November 13, 2019

Child Abuse and Neglect :: Violence Against Children

  Ã‚  Ã‚  Ã‚  Ã‚  There have been various studies based on childhood sexual abuse and relationships in adulthood. There have been studies that had shown that multiple maltreatment and loss experiences in childhood interfered with the formation of secure attachments that created adult problems in self and social functioning. Childhood maltreatment showed there was poor adult self-functioning in the form of higher levels of depression and lower levels of self-esteem. Self blame in response to childhood sexual abuse and maltreatment in adult relationships also predicted poorer adult self and social functioning for individuals with childhood sexual abuse.   Ã‚  Ã‚  Ã‚  Ã‚  A study by Gerard McCarthy and Alan Taylor have shown that abusive childhood experiences are linked to difficulties in establishing supportive cohabiting relationships during adulthood. Their study aims to identify specific psychological factors mediating links between child abuse and adverse adult psychological functioning. Participants who had experienced child abuse were more likely to experience difficulties in adult love relationships, but self-esteem and relationship attributions were not found to be linked to child abuse.   Ã‚  Ã‚  Ã‚  Ã‚  The most common effect of childhood sexual abuse during adulthood for women is rage. A study by Susan G. Painter and Carol C. Howell studied women’s sexuality after childhood sexual abuse. Researchers in this particular study interviewed women who expressed raged through their sexuality. Results indicated that rage and maladaptive behaviors are learned in childhood and carry over to adult relationships. Although anger is common in the abused female, it is frequently pushed into unconscious at the time of the abuse. When the abused becomes aware of her anger, it has become rage. Women who were sexually abused as children grow up repressing anger; as a result they may enter adulthood totally unaware of the rage that lies within them. Researchers (Draucker, 1996; Maltz, 1991) reported that childhood sexual abuse may cause negative attitudes about touch and sex that result in troublesome reactions to adult sex.   Ã‚  Ã‚  Ã‚  Ã‚  Many incest survivors had struggle with their abuse unaided, and that number of those who are in prisons, mental institutions, or working in prostitution have been influenced by a history of sexual abuse. Those who have been most affected by such abuse may be unable to verbalize their pain and anger. Child sexual abuse is a violation that affects every aspect of a child’s life. Trusting relationships may be brought into question for a child once sexual boundaries have been violated. The sexually abused child experiences a pervasive anxiety that cannot be relieved by the usual self-comforting behaviors of children.

Sunday, November 10, 2019

Diary Task Unit 4 Task 1 Essay

In order to complete the diary task, it is important that you use the format given. Within this diary task, you need to draw from your experiences within your nursery placement. You need to ensure that your supervisor signs your diary sheet before submission (on the back page 360). Your work will not be accepted without it and your work will count as a late submission. You also need to submit your grading criteria sheet (Page 363). There is no word limit. You need to write thoroughly (but sensibly). You should not be writing as much as an assignment. You need to use the headings that have been given to you below. Task 1: Choose TWO 2 ways from the list in which you have been involved in keeping children safe: †¢ Identifying possible hazards in the setting †¢ Sterilising feeding equipment †¢ Encouraging children to use resources in a safe and controlled way †¢ Comforting a child who is ill and reporting necessary information to the appropriate person †¢ Dealing with a minor accident or injury †¢ Following a procedure to avoid transmitting infection †¢ Maintaining security during arrival and departure times in the setting P4.1 Describe your involvement in EACH situation You need to identify the two points that you have chosen. You then need to describe your involvement in each situation (We suggest you answer them in two separate paragraphs) Remember to link to your practice and give examples of how you have been evolved. P4.2 Show evidence of your knowledge of procedures in EACH situation You need to link clearly to your practice We recommend that you link to polices and procedures in the setting to demonstrate evidence of your knowledge. You can have appendices if you wish but only put in relevant information that you are going to refer to. P4.3 Evaluate briefly your role in EACH situation You need to consider how valuable your role was Did something go wrong? Why? What could have been done differently? What was the impact on the children and other staff? Are you given opportunity to develop your role in these areas? If so how and if not then what actions are you going to put into place e.g. meeting with your supervisor. Remember to reference to back up your ideas and provide a bibliography REMINDER: Please spend time on your diary tasks as you need to ensure you achieve a minimum of 80 Marks overall to receive a grade E. Please refer to the CACHE Candidate Handbook for further guidance (P.395).

Friday, November 8, 2019

Pres. George W. Bush and the Middle East essays

Pres. George W. Bush and the Middle East essays This essy explores 3 Bush quotes about the Middle East to analyze, from a layperson's perspective: 1) what is he saying (or trying to say)? 2) are his administrations policies consistent with the statement? Quote @ "There's nothing more deep than recognizing Israel's right to exist. That's the most deep thought of all. ... I can't think of anything more deep than that right." This statement seems to be the result of very shallow thinking: a more literate person would most likely have substituted "profound" for "deep" in the sense of "thoroughgoing; far-reaching: profound social changes; penetrating beyond what is superficial or obvious." Looking at the history of the conflict between the Israelis and the Palestinians, I wonder why the Palestinians' right to their homeland is not also considered "deep"? There are even Israeli and Jewish American organizations that agree that if the Israeli government is serious about peace, they will withdraw settlers from Palestinian lands. In the same press conference that this quote came from, Bush all but affirms that the Israelis are friends, while the Palestinians are just, well, Palestinians... "But we're concerned about the Middle East, because it's affecting the lives of the Palestinians and our friends, the Israelis." Quote B: "There's a lot of people in the Middle East who are desirous to get into the Mitchell process. Andbut first things first. Thethese terrorist acts and, you know, the responses have got to end in order for us to get the frameworkthe groundworknot framework, the groundwork to discuss a framework for peace, to lay theall right." 1. There are Middle Eastern people who want to follow the Mitchell Plan. What's the Mitchell Plan? It's a plan developed by a group of Middle East experts, led by former U.S. Senator George Mitchell and including Warren Rudman and their colleagues Suleyman Demirel(Turkey), ...

Wednesday, November 6, 2019

Iraq Survey essays

Iraq Survey essays I went around a high school during lunch to survey a student and ask him about some questions about our situation with Iraq and the Middle East. I asked a series of fifteen questions to see what their opinions and feelings were for issues that can or will come up as this situation grows. Their opinions were similar to what I feel, but some aspects were different with my interviewee. The first question asked was concerning the US military draft. He said that he was terrified of the thought of being drafted into war. He is afraid that if the war grows large enough, that there would be a chance he could be drafted. I feel the same way, because I just turned eighteen and the possibility of being drafted is there. I am also concerned that if the war grows, that I could be drafted and sent to the Middle East. The second question asked was about homeland security. I asked if there was a fear that we could be bombed or attacked at home. He said that he was scared that we could be attacked somehow, but not by means of a bombing. He feels that there is no immediate threat to Ooltewah, Tennessee. I also feel that way, but I am afraid that Oak Ridge could be a target and that could endanger us in this area. The third question was asking if he agrees that we are the largest threat to world peace. He did not know the answer to this question, but I would have to say no that we are working towards a better, safer world. I disagree with Britain saying that we posed the largest threat to world peace. The fourth question was whether or not bin Laden was still alive and whether or not he poses a threat to the United States. He said that he thinks that he is still alive, and that he poses a larger threat to the US than Iraq. I would disagree because Iraq is more organized and a longer known enemy. We think Iraq has built weapons of mass destruction and is not afraid to use them. I have not heard of bin Laden ha ...

Monday, November 4, 2019

Tidal Barrage Social and Economic Benefits Vs Environmental and Dissertation

Tidal Barrage Social and Economic Benefits Vs Environmental and Ecological Negatives - Dissertation Example There is a major difference between a dam and a tidal barrage in the sense that dams store water on one side whereas, tidal barrages firstly allow water to flow into a river during high tides and later releasing the water back during low tides (Heal, 2009). This is mainly done by controlling the tidal flow and sluice gates. A sluice gate is a barrier made of wood or metal set in the sides of waterways. The main purpose of sluice gates is to control water level and flow in rivers and bays. They are also used in wastewater treatment to recover wide arrays of minerals in mining operations (Iwo-Hwu, 2008). Tidal barrages are the oldest and most convenient methods of tidal power generation; many countries like Russia, the UK, and China have been benefitted by it. However, there are positive and negative factors associated with tidal barrage. A Tidal barrage may offer social and economic benefits in terms of producing tidal energy that can be useful for the society at the cost that is very affordable and economical (Sobolev, et al, 2009). This helps in meeting energy needs along with adding value to the social and economic framework. The research is based on ascertaining the importance of tidal barrages along with analysing the social and economic benefits and environmental and ecology negatives. For this purpose, a systematic and critical approach will be undertaken to underpin the pros and cons of tidal barrage and thus reflecting the overall value and challenges. 1.2: Research Aim The research aims to investigate the importance of tidal barrage along with underpinning the social and economic positives and environmental and ecological negatives. In order to support and strengthen the proposed research aim, the researcher has formulated few research objectives that have been discussed as follow: 1.3: Research Objectives The purposed research objectives are as follow: To underpin the usefulness and impact of tidal barrage in a critical manner To assess and analyse th e social and economic positives To evaluate and assess the environmental and ecological negatives To critically assess the value and contribution of tidal barrage in strengthening the overall infrastructure To offer recommendations based on the results to enhance the positive effects of a tidal barrage 1.4: Research Questions The researcher has formulated few research questions that will further help in seeking answers for the proposed research aim and objectives. The research questions are as follow: 1. What is the usefulness and significance of tidal barrage? 2. What are the social and economic benefits associated with the effective maintenance of tidal barrage? 3. What are the environmental and ecological challenges associated with the structuring of tidal barrage? 4. What are the initiatives that can be undertaken to enhance the utility and benefits of tidal barrage? 1.5: Rationale for the Research Topic Sources and resources of energy play a pivotal role in the social and econo mic development of countries. Oftentimes, conventional sources of energy help nations to cut power costs along with safeguarding the environment and eco-system. In this regard, tidal barrages have emerged as one of the highly cost

Friday, November 1, 2019

Presentation notes Essay Example | Topics and Well Written Essays - 1000 words

Presentation notes - Essay Example In the cost method, depreciation is charged in the income statement against income as an expense, and the value of the asset after deducting depreciation is carried to the balance sheet. In the revaluation method, any increase in future value of the asset, is recorded in the balance sheet and is recognized directly in equity under the head revaluation surplus. If the future value of an asset decreases then the decrease is recorded in the income statement as an expense item. Accounting for the revaluation method is beneficial if the future value of the assets increase since the inclusion of revaluation surplus will increase revaluation reserve, which will increase the value of equity of a company. But if the future value is on the verge of decrease it is better to consider the cost method instead of the revaluation method for the purpose valuation of assets on a long-term basis. The reason to this can be explained with the help of a small example given below- Question: A building was purchased by a company on 1st January 2009 at a cost of $100million. The company estimates the life-time of the asset to be 50years, and thus the asset is to be depreciated over 50years. The company decides to use the revaluation for determining the value of the buildings at the end of 2015. The value of the building at the end of 31st December 2015 was $80 million, as determined by an efficient valuer. Answer: Using the revaluation method as opted by the company- Value of the building on 1st January 2009= $100million Value of the building on 31st December 2015= $80million Therefore, Accumulated Depreciation= $20million ($100million-$80million). Thus the value at which the asset is to be carried in the balance sheet on 31st December 2015 is $80million. If the company had opted for the cost method of depreciation, then- Value of the building on 1st January 2009= $100million Life of the asset= 50years Therefore, Accumulated depreciation at the end of 6years on 31st December 2015= $100 million/50years * 6Years = $12million. Thus the value at which the asset is to be carried in the balance sheet on 31st December 2015 is $88million. Thus, from the above example it can be concluded that due to the use of revaluation method, a revaluation loss of $8million was suffered which is adjusted against the existing revaluation reserve of the company. It also led to the increase in the value of depreciation and decreased the value of the asset in the balance sheet. Increase in depreciation will affect the income adversely, as it will lead to a decrease of net income by $8million which will have a consequent effect on the balance sheet and will also impact the shareholders. Considering the above illustration, it is advisable to use the cost method to record the value of land and building of Rabbit Limited. Though revaluation method is considered to provide a more accurate record in terms of part replacement and depreciation, yet it is criticized on the grounds that the amount o f depreciation charged on a particular asset differs year to year though the asset provides the same benefits, which make the accounting system complex and time consuming, and sometimes it is said to have chances of manipulation. So as stated by the director of Rabbit ltd. that the prices of the value of real estate are on the verge of decreasing, so it will be better to use the