Thursday, December 26, 2019

Essay on The Three Branches of Government - 1079 Words

The United States government braces its power among three powerful branches, legislative, executive and judicial. These branches interact with one another to establish authority that is strong, yet equal to have power over the country. Each branch pursues certain responsibilities and duties to operate in an efficient and effective manner in which society upholds. The executive, legislative and judicial branches all interact amid each other to validate accuracy of the nation’s most powerful law of the land, the Constitution. It is important to know how these branches interact with each other to learn how a bill becomes a law. Reflecting on how the three branches promote a balance of power that is constructive to include the agendas and†¦show more content†¦However, with all of the duties the legislative branch renders it has to be checked by the executive and judicial branches before imperative decisions are completed. The interaction that the legislative branch has wi th the judicial branch is to interpret acts of Congress that are disputed in legal cases to also declare laws of Congress void if they are not in accordance with the Constitution (Patterson, 2011, p. 42). The interaction the legislative branch has with the executive branch is when the creation of new laws or the changes of existing laws are made the executive branch is to issue regulation executing the full force of law. This gives the legislative branch power and authority within its own branch, to also subsist checked by the other two branches. The power of the executive branch is vested by the President of the United States. This branch is the largest branch that operates with assistance from the Vice President, agencies and members to successfully lead the government. The executive branch mainly operates based on the responsibilities and duties of the President implementing and forcing laws written by Congress (Whitehouse.gov). However, the interactions that the executive branch has with the other branches productively endorse power. The interactions that the executive branch has with the legislative branch are carrying out and enforce the laws thatShow MoreRelatedThree Branches of Government1117 Words   |  5 PagesThree Branches of the Federal Government In May 1787, 55 delegates from 12 states, Rhode Island declined, met in Philadelphia for the Constitutional Convention. The purpose of the convention was to revise the Articles of Confederation, but what occurred was the writing of the U.S. Constitution. George Washington was unanimously elected as President of the Convention. After four months of deliberations Gouveneur Morris submitted the final draft and 39 of the 55 delegate present signed the ConstitutionRead MoreThe Three Branches Of Government1266 Words   |  6 PagesThe Three Branches of Government The government of the United States of America is a federal constitutional republic. In layman s terms, this means that the country s national, central government and the smaller, unitary governments of the fifty states are co-equal in their power, and that the citizens of America have a say in public policies by electing representatives who voice their respective opinions. More importantly, both the central government and the state governments areRead MoreThe Three Branches Of Government725 Words   |  3 PagesBranches of Government The United States Government has three branches, legislative power, executive power, and judicial power. The founders of a division of power did not want all the power to be centralized in a monarch or anyone else, so they divided the legal authority into the three branches. Legislative power creates new laws, the constitution gives this power to congress, which is made up of the senate and the house of representatives. Executive power gives the authority to enforce laws,Read MoreThe Three Branches of Government1260 Words   |  6 PagesThe Three Branches of U.S. Government The leaders at the Constitutional Convention in 1787 desired an unbiased, fair government. They believed they could keep a strong yet non-oppressive government form by creating three divided branches. The branches are the legislative, judicial and executive branches. The legislative branch is led by Congress which is split up into the Senate and the House of Representatives. The judicial branch is fronted by the Supreme Court. The executive branch is headedRead MoreThe Three Branches Of Government1139 Words   |  5 Pages When the founders were creating the Constitution for the new nation they wanted to keep the freedoms of the United States but wanted to have a strong government. They thought the best way to get a strong government but to keep the people’s rights were to create the three branches of government. The three branches of government are Executive, Legislative, and Judicial Branch. Legislative makes laws, Executive enforces the laws, and the Judicial branch e xplains the laws. Know we will key on the LegislativeRead MoreThree branches of government1113 Words   |  5 Pagesï » ¿ ABSTRACT The components of the constitution are the framework for our country, and all function to give our government structure. The judicial, legislative, and executive branches are all key components that make up our government, acting independently from the others, and allowing for checks and balances in order to prevent misuse of power. Federalism affects how our government is run, and especially the criminal justice system. Within our criminal justice system the main components are lawRead MoreThe Three Branches Of Government1248 Words   |  5 PagesThe Three Branches of Government In the beginning the United States was based upon the Articles of Confederation where the national government consisted of only one legislative body. Under the Articles of Confederation the national government had very limited powers and because of that problems began to emerge. States were now conducting their own foreign trade negotiations, printing their own money, and organizing their own armed forces violating the national law. Because of this a groupRead MoreThe Three Branches Of The Government1298 Words   |  6 PagesThe Three Branches of the Government The Government has three branches for law making. When a law is being created, it starts at the Legislative, and then gets passed to the Executive branch, then to the Judicial branch. Each branch has their own area of the law that they look at. In the end, it is decided if the law will be issued to the people. When the law is being created, it starts at the Legislative branch. In the branch, Congress is made up of two houses, the Senate and the House of RepresentativesRead MoreThe Three Branches Of Government Essay1146 Words   |  5 Pages The Three Branches of Government In 1787 the leaders of the united states gathered to write the constitution which they also divided into three branches to ensure a central government in which no group or individual gains too much control. The three branches consists on the following Legislative, Executive, and Judicial. Legislative branch rejects or confirms presidential appointments, and also has the authority to declareRead MoreThe Three Branches Of Federal Government1290 Words   |  6 Pagesordain and establish this Constitution for the United States of America.† The Constitution is the framework of our government, containing seven articles. The first three describe the three branches of Federal government which are legislative, judicial, and executive. The second three outline the rights and responsibilities of state governments and in relation to the Federal government. Lastly, the seventh article establishes the procedure used by the thir teen states to ratify it. These powerful words

Wednesday, December 18, 2019

Benito Cereno by Herman Melville and Charlotte Temple by...

Often, works of literature reveal a story, and that story is often only taken into consideration from an individual point of view. The value of the interpretation that that story reveals is seldom told. Stories can be seen interpreted through multiple viewpoints. What one person may accept as right, may not always been seen through the perspective of somebody else. We base our judgments on our own perception of the world, but not everybody has a fundamentally similar view of the world as we do. In the story Benito Cereno by Herman Melville, the different cases in the situation can be seen. It starts out when a sailor by the name of Amass Delano encounters a beaten down ship full of African slaves. Having no knowledge about why the ship ended up in the condition it did, he had already begun forming his take on the situation. As a reader in modern days and times, societal views influence a biased perspective on the view of slavery. It is understood that the slaves are human beings and do not deserve to suffer. They deserve their freedom and their own set of rights, just like anybody else does; but back in the days and times of slavery, the perspective was different. They had a fundamentally different view of slavery. The way we perceive slavery with negative connotations, they perceive it with positive ones. Back then, people believed that the Africans were born to be servants. They wanted nothing more than serve the white man. They were born to be obedient and to be

Tuesday, December 10, 2019

Entrepreneurship and Market Orientation-Free-Samples-Myassignment

Question: Identify a Suitable Entrepreneur who has been in Business for at least five years. Answer: In order to take interview of an eminent personality, a list was made of the top entrepreneurs and then the best one was selected on the basis of certain criteria. These criteria included the sources of contact, his availability and the field in which he is associated with. When these three criteria matched with the American lawyer as well as the founder of the popular electrical company Emerson, John Wesley Emerson, he was the chosen person for the interview (Bruner et al. 2017). Emerson is regarded as the company where technology and engineering have a close bond with each other by creating solutions for the customer benefits and without any kind of compromise in the world of action. The special reason behind this selection was his excellence in electrical which attracts only few people from the crowd. But it is an interesting area which should be focused on for gaining more knowledge. To know more about this entrepreneur and his passion about electronics, an appointment date was fixed for taking his interview. The selected date was 25th September 2017 according to the guests convenience. His secretary was reluctant to give the date at first owing to his busy schedule but then he was convinced of the urgency of the interview. He agreed to it when it was told that the interview will be printed in the brochure which will be released in the local book fair. Although the interview was given consent, but the hosts had to keep a time frame of 1 hour within which the interview had to be conducted. It was told that the interview questions should be prepared beforehand and sent to the guest so that no time is wasted on the specific day. The permission of printing the interview in the brochure was given only if the questions remained unchanged. One week before the final day, the set of questions was sent to the guest through mail so that he can have an idea of the answers and do not need to think or fumble. The host had taken prior permission of recording the answers as it was a better option than writing those down. A necessary homework must be done on the guest and his pertinent areas so that the questions do not make him offended. In the given scenario, John Wesley Emerson is an American lawyer as well as an entrepreneur and businessman (Bae et al. 2014). He became successful in the business of the famous Emerson electrical and electronics into an internal brand which excels in selling electronic goods all over the world (Bredvold and Skln 2016). His parents were William and Rosanna Ellen. His education was started in Pennsylvania and then he had shifted to Michigan. He studied law and was a student of bar association in Missouri (Chatterji, Glaeser and Kerr 2014). Apart from being a lawyer he had also worked as a volunteer in the military without any designation during the battle of Richmond in 1862 and also got wounded. As a result of his service he got promoted to the rank of a colonel in the 68th Missouri Volunteer Infantry (Nambisan and Baron 2013). Gradually he got promoted to the rank of a major and finally a general. He was fickle minded and was not sure of his position in the military so came back to the legal field. He started practicing law at Ironton and became a judge of the 15th Judicial Circuit Court. The preparation was at the peak before the setting of the questions. The enquiries were put in such a way as to withdraw the maximum information as well as not annoy the guest in any way. The questions were structured in a general as well as a critical way to know the keys to success of his career graph. The personal questions only asked for certain basic information and did not ask for any intruding factor. It was a great learning experience for the host when John had praised the questions and also added that in all these years of his life he has experienced very few good interviews including the present one (Carland Jr, Carland and Carland III 2015). In the first part, the questions asked for his first stepping into the business of building electrical goods and appliances and why did he choose this particular field. Many new facts were revealed in the course of interview which would provide knowledge in a new dimension to his followers. He had no intention of being the inventor of Emerson until he met two orphans who wanted to open an electrical manufacturing company (Carland and Carland 2015). In the first part of the interview, the host was surprised to find out that there is no mention of electrical or electronics in his speech or they were related somehow with his life. There was no connection between Emerson and electrical. It is a matter of amazement how can a lawyer and an army man become the founder of a popular electric company. Only in 1890, he had met two orphans from Scotland who needed financial help for settling in lives (Galindo and Mndez 2014). They wanted to open an electrical and mechanical devices manufacturing company. He helped the two orphans by donating $50,000 for their start- up business. The orphans had started a new company with the name Emerson Electric manufacturing Company with Emerson as the first president of the company. He served in that position for two years from 1890- 1892. At the time of retirement, he sold off his interest to a railroad executive named Herbert L. Parker. Emerson successfully became a multinational corporation company i n America in the electric product manufacturing sector. The company is headquartered in Missouri of United States. They have a range of products and services for different kinds of business and buyer markets. He again changed his profession after retiring from the Emerson Company (Pitt et al. 2015). He even tried his hands in writing about General Grants campaign of the Mississippi Valley. This guest was an interesting personality as he was not only the founder of the Emerson Electrical Company but also a warrior, lawyer and writer. It can be said that he is a man of versatility who believed that variety is the spice of life. Emerson had emerged as a successful company in India too. Bruner et al. (2017) had stated that Emerson has expanded as a global manufacturer in a time of 100 years. In India this company has been associated with for more than 60 years. In the 1950s, Emerson had entered the Indian market to increase the speed of growth for the new country. In the 1980s, the company established its first joint venture in the country and Fisher- Rosemount India was offered to conduct the process of automation solution and the products. In the 1990s, a range of Emerson business had entered the Indian market with the basic form of joint ventures in the respective Indian businesses. The company was able to successfully set up business centres in the Indian market of Delhi and Pune. They had a constant focus on the control system of engineering and project management. Again in 2000 Emerson purchased the Fisher Rosemount India JV to build up Emerson Process Management India. The host was awestruck in the course of the interview that how is it possible for a normal person to be an entrepreneur and become successful in the specific area. Someone who was not even associated with the electrical and electronic field became the famous founder of one of the popular electric companies. The journey continued with the purchasing of Libert JV and built the Emerson Network Power India in 2001. After a gap of 2 years the company had again opened up an Emerson Innovation Center in Pune. They had bought Copeland Joint Venture and established the Emerson Climate Technologies in India. In 2007, another Information Technology Solution Center was opened in Mohali and Network Power was launched in the Indian market in the same year. The expansion of the company was going on smoothly and they had introduced the leading Smart Wireless Solution in the Indian market. They also acquired Trident Powercraft Ltd. And such procurement continued till 2012 with the compressor technology residential air- conditioning in the market of India (Galindo and Mndez 2014). Emerson got the award for being the best apprenticeship. It was an amazing story for the readers of the brochure when they will be able to get acquainted with the journey of this great man. The business of electrical appliances was primarily started with two orphans from Scotland till it was expanded to an international level for commercial activities (Chaston 2017). In his case, he could experience success sooner as compared to other entrepreneurs. The information that was gathered from his interview is the best proof of that fact. He mentioned that he did not have any role model who could have inspired him for this particular business rather he became the inspiration for many others after he started his venture.Through his charitable work of helping the orphan become a successful entrepreneur in the business. The company reached at the peak of success when the brilliant owner of the company had delivered the idea to the rest of the world. They became one of the leading manufacturer s of electrical appliances in the world. In the interview, the host did not feel the need to push him for extra information because his beautiful oration skill satisfied the particular expectation. He was confident of himself and his passion in his life. Determination and self- motivation helped him to get the position where he reached. . The reason behind the companys outstanding growth was that it had penetrated the market at the crisis situation. Thus, it throws light on the fact that the entrepreneurs such as John Wesley think differently than the non- entrepreneurs. On one hand, the non- entrepreneurs will get affected at the time of crisis whereas on the other hand, the entrepreneurs take advantage of the situation without lamenting over the loss. The guest also acted in regarded as unexpected miracle to heal the injury of the suffering state (Hart et al. 2015). When the company was enjoying their success, they had in their possession more than 40% of the whole worlds high speed ferry manufacturing market. The instanc e of electrical appliances produced can be considered as the best stories of entrepreneurship in the recent years and the host felt proud to be a part of this rich conversation. One interesting point that was reflected in the interview was that he is against the use of any intellectual rights for his design or products. He wants to stay ahead of his competitors not by putting copyrights in his products but using advanced technology. This was the most unique part in the interview as it had drawn a new dimension in the life of the entrepreneur (Kirzner 2015). The story about Emerson's life which might be new to some is that he had never joined any political parties. His business continued to operate in marginal profits for a long time. The host mentioned that his business, that is, electronics is a cyclic business which sometimes sees a terrible increase in the number of workforce and at other times a rapid decrease (Sahut and Peris-Ortiz 2014). At the time of the interview, John was enjoying his position as a president of his own company gaining insights about life and journey it can be mentioned that he is a lifestyle entrepreneur as according to the meaning of the term; he has travelled the world and made the business on his own. He cannot be called a high- potential entrepreneur because he did not seek investors and did not want to exit from his business. He had a value for freedom and did not want to be bound by location. Profit was not the only criteria as he wanted adventure out of his business which makes him a lifestyle entrepren eur (Wu and Huarng 2015). He wanted to focus more on the goals of his own life rather than his companys. The analysis of an entrepreneurs behavior and the process of entrepreneurship centers on the four theories of entrepreneurship namely economic, sociological, psychological and anthropological. All these theories are somehow related to the process either directly or indirectly. Several factors undermine these theories such as motivation, external environment, achievement, ambition and ability and determine the making of an entrepreneur (Markantoni, Koster and Strijker 2014). Thus, it was confirmed about entrepreneurship that anyone cannot be successful in it; rather it calls for a passionate, determined and hardworking person to excel in this field. An entrepreneur must abide by his commitment to expand his business which will help in the growth of the industry. An entrepreneurs life such as John revolves around the creation of business which can be dealt as an individual or in a group (Letaifa and Rabeau 2013). Therefore the process of entrepreneurship can be regarded as the required element for economic improvement as it can identify and evaluate the business opportunities by giving way to new firms and renew the existing ones. The factors of entrepreneurship determined the business venture of John and he became an internationally acclaimed face (Gonzlez-Benito, Muoz-Gallego and Garca-Zamora 2015). But he prefers to work for only the first few hours of the day and spends the rest of the time doing his favorite task (Karlsson and Warda 2014). There were new sights that emerged at the concluding part of the interview. This enlightening interview made the host all the more excited towards this known yet unknown as well as secret world of electronic and electrical. He was so influenced by the story of light bulbs and electric appliances. It did not seem to be a bad idea to try four professions in one life. His passion as a lifestyle entrepreneur drove him and his enthusiastic nature had let him try four businesses. He did not want to stay stuck to the profession of lawyer and used writing to rejuvenate himself. References Bae, T.J., Qian, S., Miao, C. and Fiet, J.O., 2014. The relationship between entrepreneurship education and entrepreneurial intentions: A meta?analytic review.Entrepreneurship theory and practice,38(2), pp.217-254. Bredvold, R. and Skln, P., 2016. Lifestyle entrepreneurs and their identity construction: A study of the tourism industry.Tourism Management,56, pp.96-105. Bruner, R.F., Bruner, R.F., Opitz, C.S., Opitz, C.S., Bruner, R.F. and Bruner, R.F., 2017. Emerson Electric Company.Darden Business Publishing Cases, pp.1-13. Carland Jr, J.W., Carland, J.A.C. and Carland III, J.W.T., 2015. Self-actualization: The zenith of entrepreneurship.Journal of Small Business Strategy,6(1), pp.53-66. Carland, J.W. and Carland, J.C., 2015. A model of potential entrepreneurship: Profiles and educational implications.Journal of Small Business Strategy,8(1), pp.1-14. Chaston, I., 2017. Entrepreneurship. InTechnological Entrepreneurship(pp. 1-24). Springer International Publishing. Chatterji, A., Glaeser, E. and Kerr, W., 2014. Clusters of entrepreneurship and innovation.Innovation Policy and the Economy,14(1), pp.129-166. Drucker, P., 2014.Innovation and entrepreneurship. Routledge. Galindo, M.. and Mndez, M.T., 2014. Entrepreneurship, economic growth, and innovation: Are feedback effects at work?.Journal of Business Research,67(5), pp.825-829. Gonzlez-Benito, ., Muoz-Gallego, P.A. and Garca-Zamora, E., 2015. Entrepreneurship and market orientation as determinants of innovation: the role of business size.International Journal of Innovation Management,19(04), p.1550035. Hart, M., Levie, J., Bonner, K. and Drews, C.C., 2015. Global Entrepreneurship Monitor United Kingdom 2014 Monitoring Report. Karlsson, C. and Warda, P., 2014. Entrepreneurship and innovation networks.Small Business Economics,43(2), pp.393-398. Kirzner, I.M., 2015.Competition and entrepreneurship. University of Chicago press. Letaifa, S.B. and Rabeau, Y., 2013. Too close to collaborate? How geographic proximity could impede entrepreneurship and innovation.Journal of Business Research,66(10), pp.2071-2078. Markantoni, M., Koster, S. and Strijker, D., 2014. Side-activity entrepreneur: lifestyle or economically oriented?.Agglomeration, Clusters and Entrepreneurship, Cheltenham: Edward Elgar Publishing Limited, pp.132-156. Nambisan, S. and Baron, R.A., 2013. Entrepreneurship in innovation ecosystems: entrepreneurs' self?regulatory processes and their implications for new venture success.Entrepreneurship Theory and Practice,37(5), pp.1071-1097. Pitt, L., Berthon, P., Robson, M. and Prendegast, G., 2015. Does Corporate Entrepreneurship Influence Innovation in Service Firms?. InProceedings of the 1997 World Marketing Congress(pp. 639-645). Springer, Cham. Sahut, J.M. and Peris-Ortiz, M., 2014. Small business, innovation, and entrepreneurship.Small Business Economics,42(4), pp.663-668. Schaper, M.T., Volery, T., Weber, P.C. and Gibson, B., 2014.Entrepreneurship and small business. Wu, C.W. and Huarng, K.H., 2015. Global entrepreneurship and innovation in management

Monday, December 2, 2019

Potential threats to children on social networking sites

In the modern times, the world has become a global village and people are connected more than ever before. Today, people depend on the internet to do almost everything. Individuals are using modern technology to communicate and to run businesses. Social networking sites such as Facebook and Twitter have exploded in the last few years (Watters, 2012).Advertising We will write a custom report sample on Potential threats to children on social networking sites specifically for you for only $16.05 $11/page Learn More Children and adolescents have also become exceedingly active on social networking sites to communicate with friends and hook up with different people all over the world. Undoubtedly, the internet is playing a significant role in everybody’s life, and children have not been left behind. Although, the internet has much to offer, there are certain risks involved. This paper will discuss the potential threats of social networking sites to chil dren. Criminal elements Social networking sites can expose children to criminals (Roderic, 2006). Although Facebook and Twitter among other social networking sites are primarily designed for socialization, there are many users who are on these social sites for different reasons. There are many nice people on social networking sites, but those who have bad motives also do exist. Children are exposed, and criminals are targeting the most vulnerable groups in the society (Roderic, 2006). Because children and adolescents post a lot of information about themselves, social networking sites, especially Facebook, Twitter, and My Space have become heaven for internet predators (Roderic, 2006). Children are usually excited to share about their hobbies, friends, schools, their physical appearance, and their phone numbers among other exceptionally sensitive information. Such information mostly is read by criminals. When a child says that he will be at a certain place during a specific time, suc h criminals take advantage either to kidnap children or harass them. Sexual content Social networking sites can expose children and adolescents to content that is only meant for adults (Watters, 2012). It is now clear that social networks are just more than socializing. In recent times, adolescents, youths and adults have become active on the social networking sites. Some people are using the social networking sites to advertise while others are doing illegal business on the same sites. However, some individuals usually post statuses that can cause emotional damage, especially when accessed by children. It is clear that, most social networking sites, especially Facebook provides facilities that allow users to post images and videos (Roderic, 2006).Advertising Looking for report on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Watters (2012) some people are extremely sensitive, but others have bad motives and th ey only post images that are destructive to children. In fact, research has shown that big percent of images found on most social networking sites are sexual graphics. Even if your child has not posted such images, there is high likelihood that he/ she has seen photos on Facebook that are pornographic in nature. Apart from such images, there are many videos posted on the social networking sites containing graphics that have a potential to frighten and harm adolescents (Rittinghouse and Hanock, 2003). By using fake profiles, some individuals do post pictures that show them necked (nude), and this is extremely harmful to young children. Others use strong sexual language, which is also harmful to young children. Social networking sites are only designed for adults and therefore, young children should be monitored when they are using such sites. One of the biggest problems is that, many users do not screen their contents to make sure that children cannot view or access them (Stephan, 20 00). Parents should be extremely careful when it comes to social networking sites. Identity thieves It has been reported that criminals use fake profiles; they have fake identities, and some pretend to be children so that they can have children as their Facebook or Twitter friends (Rittinghouse and Hanock, 2003). Criminals are befriending children because they are pretending to be their own age. Although these cases are rare, they are very serious because they come with many problems. According to most law enforcement agencies, faking profiles is one of the fastest growing problems, and parents should be very alert to prevent their children from being victims of such criminals. Criminals are targeting children because they want to kidnap them for sex (Watters, 2012). Today, cases of adults using social networking sites and other chat rooms with attempts to befriend children and adolescents have been on the increase (Rittinghouse and Hanock, 2003). The biggest danger comes when these adults posing as children on the social sites want to meet their â€Å"new friends†. It is, therefore, clear that social networking sites have become play grounds for fraudsters, kidnappers and other criminals whose aim is to find and prey on most vulnerable targets (children) (Roderic, 2006). Parents should learn various ways of protecting their children because they are relatively vulnerable on the internet.Advertising We will write a custom report sample on Potential threats to children on social networking sites specifically for you for only $16.05 $11/page Learn More Cyber bullying Cyber bullying has increasingly become a serious problem in the recent times. Bullying is no longer restricted to the play grounds, but it can also happen on the internet too (Rittinghouse and Hanock, 2003). Social networking sites are the most targeted and children can be bullied even when they are at home or at school. This form of bullying is not physical but it can be very damaging at times as it interferes with emotions of the young and adolescents. Statistics show that children are becoming victims of cyber bullying because they are constantly on social networking sites to socialize and on the internet to study (Stephan, 2000). Cyber bullying can happen through numerous means including email and social networking sites. It is necessary to address this problem because it can affect children’s lives in a negative way. Emotional damage Experts have warned that apart from vulgar language and watching pornographic videos and images, children can also undergo emotional damage because of using social networking sites. The most risk social sites include Facebook, Twitter, and Bebo, which can interfere with confidence of users (Rittinghouse and Hanock, 2003). In such social networking cites, users have friends and some have many friends than others. Having many friends is a source of self esteem for children, but those who have few frie nds are less confident; they lack self-esteem (Roderic, 2006). This is because many children measure their happiness and success based on the number of friends. Even if a child is not facing other problems (such as bullying) on a certain social networking site, one may not feel confident enough because he only has few friends. Moreover, children are spending more time on the internet and they are losing their empathy on actual friends (Rittinghouse and Hanock, 2003). Experts have reported that since social networking sites were launched, many people have lost their real friends because they have no time to interact with each other. This is because most people are spending a lot of time glued to their computers. Some children have even forgotten about their interests and hobbies, which is pushing them away from their friends. This trend is a serious crisis because young children are losing emotional skills, needed to retain true friends. Malware and virus Another potential threat cau sed by use of social networking sites among children is the potential to harm their computers, phones, and PCs among other personal gadgets (Rittinghouse and Hanock, 2003). The internet is full of threats both for human and hardware. When children are on the social networking sites, they may accidentally expose their computers or phones to harmful malware such as virus among others.Advertising Looking for report on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More Parents unlike children are extremely cautious when clicking on what to download from their computers. They are fully aware there exist hundreds of potential hazardous risks and are, therefore, likely to avoid them. On the other hand, children are most vulnerable because they are not likely to know which links are unsafe (Roderic, 2006). On the internet, there are thousands of dangerous sites and social networking sites are not exception as they are the most targeted links. The risks that come with viruses are serious because some of them can cause hardware failures. Parents should monitor which links their children are visiting when they are on social networking sites to avoid such potential threats. Recommendations It is highly recommended that parents should monitor, supervise, and guide their children when using Facebook or Twitter among others. This is because, children are innocents, and they are unlikely to sense danger. Criminal are targeting children and adolescents on the social networking sites due to their vulnerability. Parent should install software that restricts accessing of certain pages or links. In addition, parents should train their children about various problems related to social networking sites. They should also warn them about the numerous potential threats caused by such sites. Apart from helping and encouraging children, parents should also work with law enforcement agencies to make sure that those who are responsible for bullying and posting harmful materials (such as pornographic images and videos) are punished severely. The government should also impose tough penalties on such criminals to help reduce such cases. Risk Assessment Risk Level 20 40 60 80 100 Criminal elements High High High High Very high Sexual content High High High High Very high Identity thieves Medium Medium Moderate High Very high Cyber bullying Low Low Moderate Medium High Emotional damage Low Low Low Low Medium Malware and virus Low Medium Med ium Medium High Conclusion The internet is utilized by people to run businesses and to communicate all over the world. Because of its efficiency, it has been embraced globally. Social networking sites such as Facebook, Twitter, and My Space are the most commonly used (Rittinghouse and Hanock, 2003). These networking sites have potential threats to children, who have continued to use these sites to communicate and connect with friends. The reason why children and adolescents are particularly vulnerable to being preyed upon by online criminals is because they are naive. Cyber bullying, exposure to malware, identity thieves, emotional distress, and being exposed to content only fit for adults are among the few potential threats that are presented by social networking sites to children. To curb these problems, parents should take the responsibility of monitoring, supervising, and guiding their children. Furthermore, parents should work with the law enforcement agencies to ensure crim inals are punished. By so doing, our children will be safe whenever they are using social networking sites. Reference List Rittinghouse, W., Hanock, B. (2003). Cyber security Operations Handbook. Missouri: Digital Press. Roderic, B. (2006). Developments in the global law enforcement of cyber-crime, Policing. An International Journal of Police Strategies Management, 29 (3): 408 – 433. Stephan, G. (2000). The draft cyber crime convention: creating an international law enforcement standard. Info, 2 (6): 605 – 606. Watters, P. (2012). Cyber Security: Concepts and Cases. Amsterdam: British Scientific Publishing. This report on Potential threats to children on social networking sites was written and submitted by user Kimberly Kent to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, November 27, 2019

New Zealand Births, Deaths Marriages Available Online

New Zealand Births, Deaths Marriages Available Online For individuals researching their New Zealand whakapapa (genealogy), the  New Zealand Ministry of Internal Affairs offers  online access to New Zealands historical birth, death and marriage records. To protect the privacy of living people, the following historic data is available: Births that occurred at least 100 years ago Stillbirths that occurred at least 50 years ago (officially recorded since 1912) Marriages that occurred at least 80 years ago Deaths that occurred at least 50 years ago, or the deceaseds date of birth was at least 80 years ago Information Available Via Free Search Searches are free and generally provide enough information to help you ascertain that you have the correct individual, although information collected prior to 1875 is fairly minimal. Search results typically provide: Births - registration number, given name(s), family name, mothers given name (not maiden name), fathers given name, and whether a the birth was a stillbirth. Expect to find a large number of births with no given name recorded for the child. Births were required to be registered within 42 days, yet children were often not named until they were baptized.   Deaths - registration number, given name(s), family name, date of birth (since 1972) or age at death Marriages - registration number, brides given name(s) and family name, and grooms given name(s) and family name. Parents for the bride and groom can often be found after late 1880/early 1881. You can sort search results by clicking on any of the headings.   What to Expect from a Purchased Printout or Certificate Once you find a search result of interest, you can either purchase a printout to be sent via email,  or an official paper certificate sent through postal mail. The printout is recommended for non-official research purposes (especially for registrations after 1875) because there is room for  more information on a printout than can be included on a certificate. The printout is typically a  scanned image of the original record, so will contain all the information that was provided at the time the event was registered. Older records which have been since updated or corrected may be sent as a typed printout instead. A printout will include additional information that is not available through search: Births 1847–1875:  when and where born; given name (if provided); sex; name and surname of father; name and maiden surname of mother; rank or profession of father; signature, description and residence of the informant; date registered; and signature of the deputy registrar   Births post 1875:  when and where born; given name (if provided); whether child was present at the time of registration; sex; name and surname of father; rank or profession of father; age and birthplace of father; name and maiden surname of mother; age and birthplace of mother; when and where parents were married;  signature, description and residence of the informant; date registered; and signature of the deputy registrar.  Information available for births recorded in the MÄ ori Registers (1913 – 1961)  may be slightly different. Deaths 1847–1875: when and were died; name and surname; sex; age; rank or profession; cause of death;  signature, description and residence of th e informant; date registered; and signature of the deputy registrar   Deaths post 1875:  when and were died; name and surname; sex; age; rank or profession; cause of death; duration of last illness; medical attendant who certified the cause of death and when they last saw the deceased; name and surname of father; name and maiden name (if known) of the mother; rank or occupation of the father; when and where buried; name and religion of minister or name of witness to the burial; where born; how long in New Zealand; where married; age at marriage; name of spouse; children (including number, age and sex of living children); signature, description and residence of the informant; date registered; and signature of the deputy registrar. Information available for deaths recorded in the MÄ ori Registers (1913 – 1961) and War Deaths from WWI and WWII may be slightly different. Marriages 1854–1880: when and where married; name, surname, age, rank or profession, and marital condition of the groom;  name, surname, age, rank or profession, and m arital condition of the bride; name and signature of officiating minister (or Registrar); date of registration; signatures of bride and groom; and signatures of the witnesses. Marriages post 1880: when and where married; name, surname, age, rank or profession, and marital condition of the groom;  name, surname, age, rank or profession, and marital condition of the bride; if widow/widower, the name of former wife or husband; birthplace of bride and groom, residence (present and usual) of the bride and groom; fathers name and surname; fathers rank or profession; mothers name and maiden surname; name and signature of officiating minister (or Registrar); date of registration; signatures of bride and groom; and signatures of the witnesses.  Information available for marriages recorded in the MÄ ori Registers (1911 – 1952)  may be slightly different. How Far Back are New Zealand Births, Marriages and Deaths Available? Official registrations of births and deaths began in New Zealand in 1848, while marriage registration began in 1856. The website also has some earlier records, such as church and place registers, dating back as early as 1840. Dates for some of these early registrations may be misleading  (e.g marriages from 1840–1854 may appear with a registration year of 1840).   How Can I Access More Recent Birth, Death or Marriage Records? Non-historical (recent) records of New Zealand births, deaths and marriages can be ordered by individuals with a verified RealMe identity, a verification service available to New Zealand citizens and immigrants. They can also be ordered by members of  organizations approved by the New Zealand Registrar-General.   For a fascinating historical overview of the keeping of New Zealands registers of births, deaths and marriages, see the free PDF version of Little Histories, by  Megan Hutching of the New Zealand Ministry for Culture and Heritage.

Saturday, November 23, 2019

Quotes on Strategic Composition in the Writing Process

Quotes on Strategic Composition in the Writing Process The writing process is the series of overlapping steps that most writers follow in composing texts. Also called the composing process. In composition classrooms before the 1980s, the writing was often treated as an orderly sequence of discrete activities. Since thenas a result of studies conducted by Sondra Perl, Nancy Sommers, and othersthe stages of the writing process have come to be recognized as fluid and recursive. Beginning in the mid-1990s, research in the field of composition studies began to shift again, from an emphasis on process to a post-process focus with the emphasis on pedagogical and theoretical examination of culture, race, class, and gender (Edith Babin and Kimberly Harrison, Contemporary Composition Studies, Greenwood, 1999). Reflect on these facts, and your own writing process, as you explore the following excerpts. Process vs. Product: Writing Workshops A watchword of much recent composition theory is process: teachers are warned against concentrating on papers as products and invited to engage with papers as part of the writing process. . . .Teachers interested in the writing process may turn their classes into writing workshops in which commentary on papers is designed to spark an ongoing process of revision. In at least one influential model, this workshop atmosphere follows from the belief that students already know how to express themselves, that writing is based on an innate competence for expression.(Harry E. Shaw, Responding to Student Essays, Teaching Prose: A Guide for Writing Instructors, edited by K.V. Bogel and K. K. Gottschalk, Norton, 1984) The Recursive Nature of the Writing Process   [D]uring any stage of the writing process, students may engage mental processes in a previous or successive stage.(Adriana L. Medina, The Parallel Bar: Writing Assessment and Instruction, in  Reading Assessment and Instruction for All Learners, ed. by Jeanne Shay Schumm. Guilford Press, 2006)- The term [recursive] refers to the fact that writers can engage in any act of composingfinding ideas, thinking about ways of organizing them, imagining ways of expressing themat any time during their writing and often perform these acts many times while writing.(Richard Larson, Competing Paradigms for Research and Evaluation in the Teaching of English.  Research in the Teaching of English, October 1993) Creativity and the Writing Process The open-ended writing process may lead to successive versions of a short piece of writing as it goes through various stages or transformations: you end up keeping what is in effect the last version and throwing away all the previous onesthat is, throwing away 95 percent of what you have written. . . .If you separate the writing process into two stages, you can exploit these opposing muscles [of creativity versus critical thinking] one at a time: first be loose and accepting as you do fast early writing; then be critically toughminded as you revise what you have produced. What youll discover is that these two skills used alternately dont undermine each other at all, they enhance each other.For it turns out, paradoxically, that you increase your creativity by working on critical thinking. What prevents most people from being inventive and creative is fear of looking foolish.(Peter Elbow, Writing With Power: Techniques for Mastering the Writing Process, 2nd ed. Oxford University. Press , 1998) Writers on the Writing Process You must write first and avoid afterward. A writer is in no danger of splitting an infinitive if he has no infinitive to split.(Stephen Leacock, How to Write, 1943)- In the writing process, the more a story cooks, the better. The brain works for you even when you are at rest. I find dreams particularly useful. I myself think a great deal before I go to sleep, and the details unfold in the dream.(Doris Lessing in Mrs. Lessing Addresses Some of Lifes Puzzles, by Herbert Mitgang. The New York Times, April 22, 1984) Criticism of the Process Paradigm For many writing teachers and researchers, the thirty-year-old love affair with the process paradigm has finally begun to cool. . .. Frustration has focused on a number of problems: the way writing has been turned into a largely interior phenomenon; the way it has been reduced to a more-or-less uniform sequence of stages (thinking, writing, revision); the way it has been modeled on a single kind of text, the school essay; and the way it has been conceived as the outcome of a general skill that transcends both content and context and is capable of being learned in a short period of time by young people in formal educational settings. At its worst, critics have contended, the process has left our students without a precise language to talk about rhetorical products, without substantive knowledge concerning rhetorical practices and their effects, and without the deep-seated rhetorical habits and dispositions needed for effective and responsible participation in genuinely deliberative de mocracies.(J. David Fleming, The Very Idea of a Progymnasmata. Rhetoric Review, No. 2, 2003)

Thursday, November 21, 2019

Modern computer games can have a negative effect on the way young Essay

Modern computer games can have a negative effect on the way young people think and behave - Essay Example Children keep playing games till late in the night as a result of which they are not able to get up for the school in the morning in time. They arrive late at school and are preoccupied with the thoughts of the game. As a result of this, they are not able to pay attention at the lecture. This reflects in their poor academic performance. Students’ interest in the studies is also marred because they find the real life very uninteresting, unattractive, and boring compared to the fantasy world of gaming. Violent computer games have a tendency to make young players violent. Computer games diffuse the sensibility of the players over the passage of time. Murder, rape, bullying, racism, drug trafficking, and other different forms of violence that seem obviously condemnable in the real life become norms in the world of gaming. â€Å"Rather than just passively watching a rated-R violent movie, when kids play a game, they are one of the main characters† (John, 2013). Many young players are radically transformed into potential criminals before they can even realize the harm that has been done to them by gaming. Modern computer games have a huge role in creating negative stereotypes about gender. Women in the computer games are portrayed as objects of sex. The bodily features of the female characters in games are enhanced so as to give them perfect and ideal look to entice the young players. Many games require the male characters to seduce the female characters into different kinds of acts of fraud, adultery, and violence. For growing children raised in an otherwise controlled and regulated environment, computer games portray a world where there is a lot to explore in terms of freedom, and yet all of that is based on fantasy and is fake. Particularly the less conscientious and less agreeable children become hostile as a result of playing computer games (MNT, 2010). To conclude, modern computer games have a lot of

Tuesday, November 19, 2019

Birth Control Essay Example | Topics and Well Written Essays - 500 words

Birth Control - Essay Example While concerned about the problems of overpopulation in the world, including the United States, these experts viewed policy change as an incremental process that came from careful research and the persuasion of political leaders (Kass-Annese and Danzer, 2003). At the other end of the spectrum stand activists who view overpopulation as a national and global emergency that needs to be addressed immediately and with radical, coercive measures if voluntary programs cannot help. Birth control methods are divided into physical methods and behavioral methods. The main physical methods are briers and hormonal methods, ormeloxifene and intrauterine method, emergency contraception and induced abortion, sterilization. To behavioral methods belong: futility awareness, statistical methods and 'interrupted sex', abstinence and lactational period (Birth Control 2007). Many advocates of birth control state that the population problem remains serious, and the issue should be addressed through private efforts and a gradual change in public policy. Overpopulation stands above any specific attachment to a particular economic system. As a result, family planning becomes an ideology in itself. Subsequently, proponents of family planning, while believing that the issue should remain nonpartisan, prove surprisingly flexible in their political allegiances. Catholic opposition to artificial birth control an

Sunday, November 17, 2019

Regenerative medicine Essay Example for Free

Regenerative medicine Essay Regenerative medicine Is the process of replacing or regenerating human cells, tissues or organs to restore or establish normal function. It can be used for many things by many different techniques. It can benefit many different people in many different ways. Regenerative medicine replaces/repairs tissues that the body cannot repair on its own. This includes things such as organs like kidneys; if one needs to be removed we may be able to replace/repair It. Regenerative medicine can save lives and be a lot more useful than average people may think it Is. Using state of the arc technology we may be able to prevent organ transplant rejection due to the fact that we can grow the organ from the patients owns cells/tissue. Current estimates say that approximately one in three Americans can benefit from regenerative medicine. Stem cells are used a lot in regenerative medicine. The stem cells are what are used to create the organ in the lab. The scientists first take the stem cells and place them and a model for them to grow on. Once the stem cells have grown and formed tissues around the mold they add what the organ needs to do its function. They then end electrical signals to bring the organ to life, like a heartbeat, almost as if they are reviving it. This has the potential of saving millions of lives in the long run, maybe even billions, or eventually trillions if mankind last that long. Of course technology will advance and there will be dfferent techniques and approaches for regenerative medlclne, but technology Is developing faster than ever in the past 100 years, so we may not be as far away from achieving great things as you might think. Say someone needs a new bladder, but no bladders that match them are currently available. Well with regenerative medicine we can create a new bladder in a hopefully short period of time with the tissues and cells of the person who needs the bladder. Therefor there will be no shortage of organs and no problems regarding the body rejecting the organ anyways. The only downside of this Is that growing tissues and cells takes time. So, If the patient needs a new bladder Immediately, growing one will not be an opuon because It will not grow fast enough In time for the person to live. But I see that there are three solutions. Solution one is that people could regularly visit their octor to be sure nothing is wrong, so if something is wrong we may be able to notice it before Its too late. Solution two is that in the future we can only hope that technology will be advanced enough for us to speed up the growth of these tissues, this will help In situations where the patients does not have a lot of time. The third solution Is that If we have the materials needed, we could eventually create enough organs with enough different tissues that nine times out of ten, one of the organs will match. I believe that any of these three solutions could work, but they ingredient to chieving this is time and effort. This is why I feel like more people should be choosing careers in science. It is very interesting and can help benefit all humans on the plant in the long run. So If more people worked with regenerative medicine who knows what the limits could be. Fasclnatlon wltn ty to regenerate tlssues ana organs nas exlstea slnce mankind first realized that it is possible (This was thousands of years ago, even though they couldnt really do anything and the term regenerative medicine was not used). Long before the term Regenerative Medicine was came up with, humans were ealizing the effects and capabilities of medicinal intervention. The Ancient Civilizations of Sameria, Egypt, China, India, and South America all pioneered medical discoveries and techniques that still impact the field today. Practices that we take for granted, such as cleansing and debridement of wounds using vegetable and mineral concoctions were common. Hundreds of scientists and philosophers over thousands of years have worked to establish our current technologies. The early 1800s saw a huge expansion in the fields of biology and medicine when scientists revealed that all ife depends on chemical reactions that occur within cells, which could, in fact, be reproduced in the laboratory. The discovery and official introduction of antibiotics by Alexander Flemming in 1928 changed the field of health-care forever. Followed shortly after by the discovery of cell division and heritability in the form of a helical, ladder-like structure, called DNA, science was geared to bring a whole other ball game. These discoveries meant that human biology and the systems contained within could now be brought into and manipulated in the laboratory. As the turn of he 20th century hit, previously mystical processes of life science finally become tangible. Regenerative medicine has grown from prior activities including surgery, surgical implants (artificial hips), and increasingly sophisticated bio-material scaffolds (skin grafts). The work that truly launched regenerative medicine into a tangible area of science began as cell therapy. Work in the field of transplantation in the mid-1950s gave rise to some of the first therapeutic surgeries in medicine. Performed on identical twins, the first kidney transplant occurred in 1954 followed by he first liver and lung transplants in 1963, pancreas transplant in 1966, and the first heart transplant in 1967. Bone marrow transplants for treatment of leukemia patients had the public and scientific communities in an uproar of excitement. Following this wave of enthusiasm, cell biologists began to question the capabilities of the integrity of the tissues being transplanted and wondered whether it was possible to create, grow, and harvest these tissues in the laboratory. Thus began the era of Tissue Engineering which has lead us into the field of Regenerative Medicine. Cell therapy is a therapy in which cellular material is injected into a patient. Cell therapy originated in the nineteenth century when scientists experimented by injecting animal material in an attempt to prevent and treat illness. Although such attempts produced no positive benefit, further research found in the mid twentieth century showed that human cells could be used to help prevent the human body rejecting transplanted organs, leading in time to successful bone marrow transplantation. Today two distinct categories of cell therapy are recognized. The first ategory is cell therapy in mainstream medicine. This is the subject of intense research and the basis of potential therapeutic benefit. Such research, especially when it involves human embryonic material, is controversial. The second category is in alternative medicine, and perpetuates the practice of injecting animal materials in an attempt to cure disease. This practice, according to the American Cancer Society, Is not DacKea Dy any mealcal evidence 0T erectlveness, ana can nave aea01y consequences.

Thursday, November 14, 2019

The Flu :: Influenza Virus

THE FLU The Flu is the common name influenza which is a virus that attacks the respiratory system. The flu virus releases its genetic information into the cells nucleus to replicate itself. When the cell dies, those copies are released and they affect other cells throughout the rest of the body. With that happening the virus weakens the immune system. When your sick with the flu, your body builds up a defense by making antibodies against it. The flu virus spreads through air when a person coughs, sneezes, or speaks. The Flu was first founded in Seattle September, 1918. The avian flu can also be known as the â€Å"Bird Flu†. The bird flu is being passed around by migratory birds. It can be transmitted from birds to mammals and in some limited circumstances to humans. The flu will also be known as the H5N1 virus. The H5N1 virus has raised concerns about a potential human pandemic because its virulent (deadly; extremely dangerous) and it can evolve like other influenza viruses. As many other viruses and illnesses the flu can be a lot more deadlier. When you get the flu the lungs are severely harmed from infected cells called macrophages and T-cells. The virus can spread way beyond the lungs but generally do not. Many people catch the flu and think they have the common cold because of some of the same symptoms. But actually the flu can be more dangerous if you don’t treat it immediately. Ways to prevent the flu: †¢ Wash your hands thoroughly and frequently †¢ Never pick up used tissues †¢ Never share cups and/or used utensils †¢ Always cover your mouth and nose with a tissue when you cough or sneeze †¢ Stay home when you get sick Research also says that after 5 days the fever and other symptoms have disappeared but a cough and weakness may continue. Usually all symptoms are gone within a week or two. But its important to treat the flu seriously because it can lead to other viruses such as pneumonia and other life-threatening complications. For the most part it appears in infants, senior citizens, and people with long term health problems. People with the flu may not know but they are actually contagious from a day before they feel sick. It would usually be one week for adults and two weeks for young kids. Anyone at any age can have serious complications with the flu but those at high risk are people over 50 years old, children between 6 months and 2 years, women more than 3 months pregnant the flu season, anyone living in a long-term care facility, and anyone with chronic heart, lung or kidney conditions, diabetes, or weakened immune system.

Tuesday, November 12, 2019

Patient Satisfaction

Patient satisfaction is critically important to the health care industry today due to the competitive nature of the field. Patients have many choices when it comes to seeking medical attention, and hospitals are dependent on return business to stay operational. Hospitals have traditionally utilized the semi-private room model in order to increase profitability. A semi-private room is a room shared by two patients. Each patient is given their own bed, but they usually share a single bathroom. Unfortunately the financial practice of using semi-private rooms comes at the expense of patient satisfaction. Research has shown that private rooms increase patient satisfaction, because of the decreased likelihood of nosocomial infection, a quieter environment, and the inherent privacy afforded when conducting patient care. Nosocomial Infection Perhaps the biggest challenge facing healthcare today is the epidemic of hospital acquired (nosocomial) infection. Patients come to the hospital for varying degrees of injury, or illness with the expectation of receiving medical treatment. What they are not expecting is exposure to potentially life threatening infections during their stay. According to a joint study by Jimma University and Addis Ababa University the most common causative agent found in nosocomial infection is Staphylococcus aureus. This harmful pathogen can be transmitted via direct or indirect contact. This means the pathogen can be transmitted by patient to patient contact, staff to patient contact, or the sharing of a common surface like a toilet seat (Bereket et al. , 2012). Patients in private rooms are far less likely to come into contact with each other, shared surfaces, or shared medical equipment all of which can harbor infectious microorganisms (Skocynska et al. , 2012). Standardizing the practice of private rooms can greatly reduce nosocomial infection rates within patient populations. Patient's who contract nosocomial infection are bound to have lower satisfaction rates. By reducing the nosocomial infection rate hospitals can ensure increased patient satisfaction. To make matters worse strains of methicillin-resistant S. aureus (MRSA) are becoming commonplace. MRSA is easily transmittable and resistant to most commonly used antimicrobial agents (Bereket et al. , 2012). Nosocomial infections such as MRSA result in increased length of stay, higher morbidity rates, and increased cost of hospitalization. Recent studies have shown that each exposure to a new roommate in the hospital setting results in a 10% increase in the risk of acquiring MRSA (Stall, 2012). Private rooms eliminate the possibility of exposure to MRSA infection related to roommates in the hospital setting, which vastly reduces the rate of hospital acquired MRSA infections amongst all patient populations. Reducing the spread of MRSA can result in decreased length of stay, lower morbidity rates, and decreased cost of hospitalization. A hospital concerned about patient satisfaction can see the value that private rooms have to offer when it comes to reducing MRSA exposure. Proper hygiene is also of major concern where nosocomial infection is concerned. Unfortunately staff members are usually to blame for spreading infectious microorganisms from one patient to the next. Studies have shown healthcare professionals are more likely to perform hand hygiene between patient rooms rather than between beds in the same room (Bereket et al. , 2012). This is not necessarily due to a failing on the part of healthcare professionals, but a failing of healthcare systems utilizing semi private rooms. Take this scenario for instance: a nurse is working with a patient in a semiprivate room when suddenly the bed alarm goes off on the neighboring bed. The roommate is an elderly female with Alzheimer's-dementia who recently fell at home and suffered a fractured hip. The nurse has already been in physical contact with one patient and now has to take action in order to prevent the roommate from falling. The nurse must act quickly to prevent a fall-related injury and does not have time to perform hand hygiene before assisting the roommate back to bed. This nurse would not have been put in such a position had her patients been placed in private rooms to begin with. Standardizing the use of private rooms prevents situations such as the above from occurring, promotes proper hand hygiene amongst healthcare professionals, and protects patients from unnecessary exposure to nosocomial infection. Peace and Quiet Nosocomial infection is not the only issue having a devastating effect on patient satisfaction. In fact the most common complaints in hospitals today are noise related (Eggertson, 2012). With patient satisfaction being of paramount importance hospital systems should be paying close attention to what bothers their patients. Loud roommates, visitors, medical alarms, and television sets can worsen an already noisy environment for a patient trying to get some much needed rest. Some patients need more frequent monitoring than others. A post-operative patient may need to have their vital signs checked hourly, a diabetic may need to have their blood sugars checked regularly, and a patient on a high risk infusion may need constant monitoring. This can be extremely disrupting for the patient in the neighboring bed. Some patient's may also have numerous visitors, watch TV late at night, or be just generally disruptive to their neighbor. Private rooms may not address all noise complaints in the hospital, but will at the very least resolve those related to roommates. Considering this issue is the number one patient complaint in hospitals today it is guaranteed to increase patient satisfaction. In addition to being the number one patient complaint excessive noise has been proven to cause sleep disturbances in hospitalized patients. Sleep disturbances result in increased lengths of stay, increased morbidity, and higher costs of care (Buxton et al. , 2012). Patients recovering from surgery or acute illness need undisturbed rest periods for proper healing. An unnecessarily extended, complicated, and expensive hospital stay caused by sleep deprivation is extremely detrimental to patient satisfaction. Private rooms increase the quality of sleep, reduce lengths of stay, decrease morbidity, and result in a lower cost of care. These factors result in increased patient satisfaction. Noise-related issues in hospitals not only affect the adult population, but can have deleterious effects on the infant population as well. The neonatal intensive care unit (NICU) often places infants in nurseries where multiple babies are cared for in the same room. NICUs consist of high risk infants with varying degrees of illness. Some of the infants being cared for require constant monitoring and intervention. This can result in a very ill infant receiving care that involves noisy alarms, life saving machinery, and ongoing care-related activity. The result is sleep disturbances, increased tress levels, and compromised healing processes for all infants in the room. Placing infants in private rooms eliminates the noise concerns created by the delivery of care for other infants and facilitates family interaction with the ill infant (Feldman, 2009). This results in better outcomes for the infants and happier parents. Considering the fact that infants are not old enough to make decisio ns regarding where to seek medical treatment, it is necessary for hospitals to recognize that parental perception of infant care is of paramount importance to patient satisfaction. Respecting Privacy Another large concern affecting patient satisfaction is related to patient privacy. In 1996 the U. S. Department of Health & Human Services (HHS) instituted the Health Insurance Portability and Accountability Act (HIPAA) in order to protect patient privacy (HHS, 2013). HIPAA violations can have a devastating effect on a hospital's financial health, with each violation resulting in up to $1. 5 million in penalties annually (AMA, 2012). In a financially unstable economy with reimbursement rates at an all time low these penalties can add to existing budget deficits. Budget deficits in a healthcare system result in understaffing, which leads to disgruntled employees and higher patient-to-staff ratios. Understaffing leads to the degradation of patient care. A prime example of this is call bell response time. Patients do not appreciate having to wait twenty minutes for a staff member to respond to a call button. When there is a high patient to staff ratio the time it takes for staff to respond to each patient call lengthens. Unfortunately when hospital administrators make budget cuts, cutting staffing is usually where they begin. Private rooms can help prevent HIPAA violations from occurring during the delivery of care, which can save a hospital millions of dollars in penalties, and allow greater financial resources for staffing needs. A financially healthy hospital can afford to keep a reasonable patient-to-staff ratio, which allows for staff members to deliver quality care in a timely fashion, and results in greater patient satisfaction. The financial repercussions of HIPAA violations are not the only concern when it comes to patient privacy. Patient perception of measures taken to protect privacy during hospitalization has a great impact on patient satisfaction. Performing patient care while maintaining a patient's right to privacy is nearly impossible in a semi-private room. A study conducted by Juliet Whitehead and Dr. Herman Wheeler shows that patients define and conceptualize privacy by the following criteria: â€Å"Privacy of information, e. g. having one's conversation being not over heard. Privacy of person and body, e. g. not being viewed during one's private moments. Having one's own personal space. † (Whitehead & Wheeler, 2008). The very concept of sharing a room with another person makes it extremely difficult to conceptualize having personal space. The delivery of care almost always involves private bodily functions and the sharing of private information. Privacy cannot be reasonably protected in the delivery of care when two patients share a room with nothing but a curtain separating them. Private rooms increase a patient's perception of the privacy they experience during their stay, which is of great importance in increasing patient satisfaction levels. The most common form of HIPAA violations occur when healthcare is being delivered to a patient in the presence of others without obtaining the patient's informed consent (Ziel, 2004). In a semi-private room a nurse has to ask her patient if it is OK to discuss details of the patient's care in front of anyone who happens to be present at the moment. If the patient does not agree the nurse is required to provide a private setting in which to discuss, or deliver care. This means that if a patient is in a semi-private room the nurse is required to move her patient to a private area, or ask the roommate to leave while care is performed. In reality it does not happen this way in the hospital setting. Care is delivered regardless of whether or not there is a roommate present. Nurses do ask visitors to leave the room while delivering care if a patient requests, but do not ask other patients to do so. This means that privacy violations occur multiple times a day to patients in semi-private rooms. The use of private rooms makes it much easier to deliver care while protecting patient privacy and thereby increases patient satisfaction. Conclusion With the ever growing research indicating that private rooms increase patient satisfaction it is truly a wonder why some hospital systems continue to argue against the switch to private patient rooms. Whether by decreasing nosocomial infection rates, providing quieter environments, or increasing patient privacy the use of private rooms clearly has a positive impact on patient satisfaction. In an extremely competitive economy where patients have a choice where they will seek medical attention it seems only logical that patient satisfaction should be a top priority when considering the choice between private or semi-private rooms. Hospitals that chose to listen to their patient population will soon realize that private rooms result in greater patient satisfaction and return business. References American Medical Association (2013). HIPAA Violations and Enforcement. Retrieved from https://www.ama-assn.org/ama/pub/physician-resources/solutions-managing-your-practice/coding-billing-insurance/hipaahealth-insurance-portability-accountability-act/hipaa-violations-enforcement.page Bereket, W., Hemalatha, K., Getenet, B., Wondwossen, T., Solomon, A., Zeynudin, A., & Kannan, S. (2012). Update on bacterial nosocomial infections.  European Review for Medical and Pharmacological Sciences,  16(8), 1039-1044. Buxton, O., Ellenbogen, J., Wang, W., Carballeira, A., O'Connor, S., Cooper, D., & †¦ Solet, J. (2012). Sleep disruption due to hospital noises: a prospective evaluation.  Annals of Internal Medicine,  157(3), 170-179. doi:10.7326/0003-4819-157-3-201208070-00472 Eggertson, L. (2012). Hospital noise.  The Canadian Nurse,  108(4), 28-31. Feldman, L. (2009). Patient safety. Private rooms becoming the standard in NICUs. Hospitals & Health Networks/AHA, 83(11), 10. Lorenz , S., & Dreher, H. (2011). Hospital room design and health outcomes of the aging adult.  Herd,  4(2), 23-35. SkoczyÅ„ska, A., Sadowy, E., Krawiecka, D., Czajkowska-Malinowska, M., Ciesielska, A., Przybylski, G., & †¦ Hryniewicz, W. (2012). Nosocomial outbreak of Streptococcus pneumoniae Spain9VST15614 clone in a pulmonary diseases ward.  Polskie Archiwum Medycyny WewnÄ™trznej,  122(7-8), 361-366. Stall, N. (2012). Private rooms: a choice between infection and profit. CMAJ: Canadian Medical Association Journal = Journal De L'association

Sunday, November 10, 2019

Demonstrative Communication Essay

Demonstrative Communication is a type of communication that observes non verbal cues. Examples of non-verbal cues include tone of voice, facial expressions, and body language. Communication can be defined as the process of sending and receiving messages. Communication involves the exchange of thoughts, messages, or information with a person or persons. Communication can be verbal or nonverbal, written or visual. There are many ways to communicate with one another most people only think verbal when you talk about communication. A lot of people don’t realize that facial expressions and body language are a part of communication. The use of body language can be subtle or more demonstrative this would depend on situation that is going on. The person you are communicating with as well as your own style. An effective use of body language, as with other components of communication can help one understand the message you are trying to send. Our demonstrative communication needs to be matched with our verbal message; if these two behaviors do not match with a similar â€Å"tone† misinterpretations can occur. Demonstrative communication can only be effective when the listener understands the message the person is trying to send. Effective communication is necessary for life’s relationships, work, and play. To achieve effective communication it is important to maintain eye contact this ensures alertness to the conversation. Eye contact can also make sure the other person knows it is importation and that you are talking to them. One cause of misunderstanding is the verbal message does not match the demonstrative communication. Effective communication requires active listening from both. The messenger wants to watch the receiver to see if they understand the message and be prepared for questions and feedback that the receiver might have. We have to maintain eye contact as well as positive body language and facial expressions to maintain communication. When the listener completely understands the message sent the message is effective. Ineffective communication may be caused when the messenger is using language the receiver does not understand, when angry, or loss of eye contact. The messenger may be speaking too quickly for the receiver to pick up the information. If both the receiver and listener are angry he or she will receive the information wrong. If you are trying to communicate when you’re mad it can cause confusion. You may speak loud, cut the other off and not listen to what is being said. You will only hear what you want to hear. Another sign of ineffective communication is if the messenger or the receiver does more talking than listening. For example: Some families have fallen apart due to miscommunication and for sending the wrong information and the receiver getting an offensive message. This is cause by not saying the proper words and using the incorrect facial expressions, body language and gestures. Effective communication is the process of two-way communication between the messenger and receiver. If communication is ineffective it can cause confusion to both the messenger and the receiver. Another way it can be ineffective would be if you don’t keep eye contact this can give the receiver or the messenger time to wonder away from the subject. If you lose eye contact that can mean it is not interesting and you are losing the communication. Not listening to what one has to say and be cut off but the messenger or the receiver would also cause problems and miscommunication. Demonstrative communication involves listening and responding to the message. Listening and responding depends on who you are talking to and what is being discussed. If you are not listening when someone is speaking to you, your response may be false or not correct according to what is being discussed or with the tone it was said in. Listening is one of the most important skills you can have. How well you listen has a major impact on your personal and work life. In order to listen, a person has to hear and look at you. This way they get the tone of you verbal communication as well as the demonstrative communication. Demonstrative communication reinforces verbal communication in a conversation. To fully understand what someone is saying you have to hear the words as well as watch the body language of the people in the conversation.

Friday, November 8, 2019

How To Attract Girls Essays - Education, Euthenics, Education Reform

How To Attract Girls Essays - Education, Euthenics, Education Reform How To Attract Girls Sometimes girls and boys seem to avoid the company of one another, but finally everyone find something common in each other and fall in love at least once. Actually You are just afraid of making serious relationship, because You do not know what the girl thinks and feels about you. In general the first time is always more complex. The men are so confused about what women think about them that it can create some obsessions. It can lower Your self-esteem. Do not let it happen! Despite of the difficulties it is exciting and anxious process. It will be hard to get someone's love. In return You will feel like a bird flying, everything will sing around and your heart will jump inside when You see that You have taken a liking to her. How do You see that!? She will smile, laugh after every your silly joke and hesitate to look into your eyes. If she will not, she is not fallen in love. Let's imagine the calling to someone for the first date. Probably you are nervous and afraid of her refusal. Who makes the first step have to be brave and known that everybody have to do it some day. You have to know the Estonian proverb, The brave beginning is a half of victory. For Your better feeling You may invent some reason for calling. For example ask something about a homework, but do not seem to her as a foolish. First of all you have to insist in your mind that you are like every other boy. Everyone have something interesting and attractive which can put the girls to lose their heads. Perhaps You are funny speaker or good listener. In the last case You have to give many questions to get her meet with You. You have to realize your best sides of character and use them in calling. Do not be selfish, at least in the first time. Next, You have to be prepared to lose - do not except your failure and do not give up after it. People are learning from mistakes. Now let's go to call. Oh, Your voice and the style of communicating have to be something different from talking with friends! Do not use a foul language. First of all You have to be very polite in communicating with her parents in the case they take a phone. You could introduce yourself and ask for her with the official and calm voice, Good afternoon, I am Bobby Dolt and I would like to speak with Ann Smith. Is she home at home now?. You have a time to relax and forget about all Your weaknesses. Now She probably comes. It will be better if You create the image of ladies' man and chatty boy and mix their a little bit sexual appetite. But do not overstrain with that stuff. Now she is saying, Helllooo and You will show the manliness and other skills You have learned. Your voice must be soft, easygoing, but dynamic. It means not boring. Hey, If You feel yourself in a right way forget about Your homework! Let Your inspiration to fly. Do not disturb her for a few hours. Be in short. You just have to invite her somewhere. Please do not make some terrible noises like in car crush or the water falling in bathroom. In the case You cannot exist without them You can sing like birds do. Do not say her such things like, What the hell are You doing their? Or What a horrible voice You have by phone!. I remain You that You had a goal to create some friendship. Follow my advises and You can get Cindy Crawford to Your callers. If You are good reader and smart boy You have to go through it and You might see her next time in the theater, cinema or night club. You will be well done if during the next meeting she will be merry and kind with You. Your relationships depend mostly on Your communication in the first few weeks. It does not mean that later You can turn into a rude imp. Actually all people have to relate toward each other in a polite manner and do not hold anger in their hearts. Always take a stand to others like You want them to attitude toward You.

Tuesday, November 5, 2019

Moeritherium - Facts and Figures

Moeritherium - Facts and Figures Name: Moeritherium (Greek for Lake Moeris beast); pronounced MEH-ree-THEE-ree-um Habitat: Swamps of northern Africa Historical Epoch: Late Eocene (37-35 million years ago) Size and Weight: About eight feet long and a few hundred pounds Diet: Plants Distinguishing Characteristics: Small size; long, flexible upper lip and nose    About Moeritherium Its often the case in evolution that huge beasts descend from humble forebears. Although Moeritherium wasnt directly ancestral to modern elephants (it occupied a side branch that went extinct tens of millions of years ago), this pig-sized mammal possessed enough elephant-like traits to place it firmly in the pachyderm camp. Moeritheriums long, flexible upper lip and snout point to the evolutionary origins of the elephants trunk, the same way its long front incisors can be considered ancestral to tusks. The similarities end there, though: like a small hippopotamus, Moeritherium probably spent its time half-submerged in swamps, eating soft, semi-aquatic vegetation. (By the way, one of the closest contemporaries of Moeritherium was another prehistoric elephant of the late Eocene epoch, Phiomia.) The type fossil of Moeritherium was discovered in Egypt in 1901, near Lake Moeris (hence the name of this megafauna mammal, the Lake Moeris beast, various other specimens coming to light over the next few years. There are five named species: M. lyonsi (the type species); M. gracile, M. trigodon and M. andrewsi (all discovered within a few years of M. lyonsi); and a relative latecomer, M. chehbeurameuri, which was named in 2006.

Sunday, November 3, 2019

Environmental Scanning Essay Example | Topics and Well Written Essays - 1750 words

Environmental Scanning - Essay Example Of all efforts, which are aimed at improving processes in an organisation, it is the alignment of the organisation with its environment that is the single most important to an organisation's success. Therefore, in an effort to align an organisation with its environment, it is very important that an organisation carries out environmental scanning and scenario planning. According to (Saxby, Parker, Nitse, & Dishman, 2002) environmental scanning is quite an involving process, which requires strategic planning, and the involvement of heavy resources to execute. Environmental scanning for any given business involves acquiring and using information surrounding key organizational events, market trends and other important trends as well as external relationships between an organisation and its partners, shareholders, as well as the customers (Aguillar, 1967). Environmental scanning is important in that the knowledge an organisation acquires from carrying out the process enables the organisation to carry out strategic planning especially in regard to how the organisation should respond to future challenges, respond to competitor activity as well as respond to the market environment. This is very important to any organisation considering that for an organisation long term planning is as important as the short term planning. Therefore failing to carry out a thorough environmental scanning is likely to result into loss of business for the company or in some cases losing out on market shares. Environmental scanning is important in that it positions the organisation to foresee future threats; an environmental scanning helps the organisation to identify future opportunities occasioned by political, economical as well as social factors. Unless the organisation is able to identify what the future holds for the company, it is very unlikely that such an organisation would continue satisfying its customers. Lack of proper environmental scanning results into loss of market share something, which can adversely affect organizational expansion and extension plans. Therefore environmental scanning should be carried in such a way so as to enable an organisation to face the future with certainty as well as plan the possible scenarios and course of action incase things do not work according to plan. Environmental scanning involves several steps, which include undirected viewing, conditioned viewing, enacting as well as searching (Kohn, 2005). Environment requires the correct analysis of the industry, which the organisation belongs to. Therefore viewing involves actual observation of the organisation activities, noting any difficult or challenging situations, which seem detrimental to the organizational success. Viewing enables an organisation to take note of environmental factors or issues, which require be looking at and resolved. Viewing is the right step, which results, into identification of environmental issues, which are a threat to the organisation, or on the other hand, viewing generates information or insight into opportunities in the market which if further analysed can present the organisation with greater avenues for growth. Undirected viewing according to (Aguillar, 1967) involves a situation whereby an organisation fails to invest the necessary

Friday, November 1, 2019

Montefiore Medical Centre Case Study Example | Topics and Well Written Essays - 1250 words

Montefiore Medical Centre - Case Study Example In this particular case , one of the fundamental issues that had to be tackled before the introduction of any new system was the introduction and implementation of proper motivational schemes due to the layoffs which had created a demotivated environment for the remaining workforce. And wages were already an issue as the hospital was facing an issue of merit payment non-payments as a result of financial issues which had made such payments impossibility. However, during the year 1999, the hospital had thought along the lines of providing the Senior Executives 20% bonuses in case the hospital was not able to meet its targets. However, these measures should not be used in those circumstances when the hospital when is facing financial crunch which it is at present and hence, this would not be the best of motivational schemes to introduce. An alternative to using money as a motivational technique would be using non-financial motivational techniques such as praising the work of the workforce, giving awards to the best performer, having better communication lines in order to allow the worker a chance to voice their concerns and creating a friendly environment in which the workers were made to feel like a part of a team rather than people who were being used as guinea pigs in some experiment. The second question dealt with the issue of the way the management dealt with the issue. The management would have to change its current operational strategy as that has resulted in creating a misunderstanding between it and the workers who not are unaware of what is required of them but also the purpose as to why the management is doing what is doing. Hence, this not only shows a severe breakdown in communication but also outlines the vast differences that exist in terms of the hierarchical structure. In order to overcome these, the management would have to take greater interest in the workforce and listen to their viewpoints and make them feel like they are actually part of a team instead of merely having meetings. The meetings were surely not successful when the workforce was still being left in the dark as to be required of them; hence the management would have to do a complete overhaul of its communication and co-ordination policy. The third question dealt with the issue of implementing the balanced score card and whether it was actually a wise decision on the behalf on the management to introduce it or whether it resulted in aggravating the situation even further. In terms of the effectiveness of balanced scorecard, it allowed Brennan to create a focused system in which the financials were aligned with the goals of the company, the performance measure which would allow the medical centre to become an interactive centre which would be connected to the external environment. At the same time, it would be outline the cost, quality and cycle of the clinical and administrative measures. Considering the sort of investment that this tool took and the sort of feedback that it received despite having met fierce resistance in the initial times, this tool is certainly worthy enough to become a real and animated technique adopted by the centre. However, in order for it to be successful proper communication and

Wednesday, October 30, 2019

Protecting Trade Secrets Essay Example | Topics and Well Written Essays - 500 words

Protecting Trade Secrets - Essay Example There is reference to ‘reasonable’ in terms of the enforcement of the restraint, with direct bearing upon the protection of the company’s interests, being the clients and trade secrets of that business. The concept of restrictive covenants placed upon an individual has a long history, with legal case references being made as far back as the 17th century where a judgment was passed by Chief Justice Coke that an individual cannot bide himself not to use his trade generally. In 1711, a legal case; Mitchel v. Reynolds, mention was made in favor of the law, but against free discretion. Thus the law stipulated from these early times, that if a clause of restraint is unreasonable, it can be seen as void. Specifically pertinent to individuals; is a term known as the ‘blue pencil test’ which was defined in a 19th century English case namely, Nordenfelt v Maxim Nordenfelt Guns and Ammunition Co. Ltd [1894] AC 535, here elements of a contractual agreement can be enforced legally were reasonable, and the portions that had elements of illegality would be stricken from the agreement (via the scratching out of wording with a blue pencil), this would include individual words that make the clause excessively wide. Having dealt with the a general overview of legal descriptions and definitions of restraints of trade affecting the individual, one has to move on to the subjective viewpoint of the individual that is presented with such a restraint of trade within their offer of employment via their employment contract. Ultimately the individual has to make the decision of accepting or declining the contract, this decision must be made knowing that the restraint can be void if the clauses are worded in a fashion that causes the restraint to be too wide. However if directly relating to the business or company’s clients or trade secrets and the

Sunday, October 27, 2019

Introduction to Underwriting

Introduction to Underwriting INTRODUCTION TO UNDERWRITING Underwriting is an agreement, entered into by a company with a financial agency, in order to ensure that the public will subscribe for the entire issue of shares or debentures made by the company. The financial agency is known as the underwriter and it agrees to buy that part of the company issues which are not subscribed to by the public in consideration of a specified underwriting commission. The underwriting agreement, among others, must provide for the period during which the agreement is in force, the amount of underwriting obligations, the period within which the underwriter has to subscribe to the issue after being intimated by the issuer, the amount of commission and details of arrangements, if any, made by the underwriter for fulfilling the underwriting obligations. The underwriting commission may not exceed 5 percent on shares and 2.5 percent in case of debentures. Underwriting has become very important in recent years with the growth of the corporate sector. It provides several BENEFITS to a company:- It relieves the company of the risk and uncertainty of marketing the securities. Underwriters have an intimate and specialized knowledge of the capital market. They offer valuable advice to the issuing company in the preparation of the prospectus, time of floatation and the price of securities, etc. They also provide publicity service to the companies which have entered into underwriting agreements with them. It helps in financing of new enterprises and in the expansion of the existing projects. It builds up investors confidence in the issue of securities. The issuing company is assured of the availability of funds. Important projects are not delayed for want of funds. It facilitates the geographical dispersal of securities because generally, the underwriters maintain contacts with investors throughout the country. TYPES OF UNDERWRITING Syndicate Underwriting: is one in which, two or more agencies or underwriters jointly underwrite an issue of securities. Such an arrangement is entered into when the total issue is beyond the resources of one underwriter or when he does not want to block up large amount of funds in one issue. Sub-Underwriting:- is one in which an underwriter gets a part of the issue further underwritten by another agency. This is done to diffuse the risk involved in underwriting. Firm Underwriting: is one in which the underwriters applyfor a block of securities. Under it, the underwriters agree to take up and pay for this block of securities as ordinary subscribers in addition to their commitment as underwriters. UNDERWRITERS To act as an underwriter, a certificate of registration must be obtained fromSecurities and Exchange Board of India (SEBI). The certificate is granted by SEBI under the Securities and Exchanges Board of India (Underwriters) Regulations, 1993. These regulations deal primarily with issues such as registration, capital adequacy, obligation and responsibilities of the underwriters. Under it, an underwriter is required to enter into a valid agreement with the issuer entity and the said agreement among other things should define the allocation of duties and responsibilities between him and the issuer entity. These regulations have been further amended by theSecurities and Exchange Board of India (Underwriters) (Amendment) Regulations, 2006. ROLE OF UNDERWRITERS The primary role of the underwriter is to purchase securities from the issuer and resell them to investors. Underwriters act as intermediaries between issuers and investors, providing for an efficient of capital. The underwriters take the risk that it will be able to resell the securities at a profit. Perhaps the most visible and familiar element of the initial public offering process is the underwriter. The underwriter is the organization that is actually responsible for pricing, selling, and organizing the issue, and it may or may not provide additional services. With direct public offerings, there is no need for an underwriter. Selection of a good underwriter is of the utmost importance, but its important to understand that many underwriters are equally selective of their clients. Because an underwriters reputation depends on successful issues, few firms will be willing to stake their reputation on questionable companies. When selecting an underwriter, its important to seek out an established company with a good reputation and quality research coverage in your field. The decision may also depend on the kind of agreement the underwriter is willing to make regarding the sale of shares. For profitable and established private companies, it shouldnt be difficult to locate an underwriter willing to make a firm commitment arrangement. Under such an agreement, the underwriter agrees to buy all issues shares, regardless of ability to sell them at a particular price. For riskier or less established companies, an underwriter may offer best efforts arrangement for the initial public offering. A best efforts contract requires the underwriter to buy only enough shares to fill investor demand. Under this arrangement, the underwriter accepts no responsibility for unsold shares. Aside from fees and sales arrangements, most underwriters are fairly similar in their roles. An underwriter will assist in the preparation and submission of all appropriate SEC filings, helping potential investors make informed decisions about your offering. All underwriters are required to exercise due diligence in verifying the information they submit, so a certain amount of investigation should be expected from any responsible underwriter. In addition to SEC registration filings, the underwriter will create a preliminary prospectus that will become a major part of the issues marketing campaign. This document is also referred to as the red herring, after a small red passage in the document that states that the company is not attempting to sell shares prior to SEC approval. Once SEC approval is obtained, the underwriter and the corporation will embark on a road show to gauge and attract interest from investors. While the road show does not involve getting binding commitments from investors, it helps the underwriter determine the best strategies for pricing and issuance. After the initial public offering, the underwriter continues to provide services for the newly public corporation. For months or even years after the offering, the underwriter may continue to make a market for the stock, ensuring liquidity for investors and making the shares more desirable. Twenty-five days after the issue, the underwriter is also permitted to make statements or projections regarding the company and its prospects. ANALYSIS OF RESEARCH ARTICLES ARTICLE 1 ROLE OF UNDERWRITER IN INITIAL PUBLIC OFFERING (IPO) When a company wants to raise funds throughinitial public offering (IPO)it appoints aninvestment bank for underwritingthe issue. AnInvestment bankis also called asmerchant bank. There is no regulatory restriction to use the services of amerchant bankfor IPO. Since in an IPO a company participates for the first time, it doesnt have complete understanding of the rules and documentation, required to be submitted, to get a clearance from the regulator. Famous merchant bankers world over are Goldman Sachs, Credit Suisse and Morgan Stanley. Banks like Deutsche, Citi, UBS etc have investment banking wings. Underwriters assess and analyze firms current performance, firms future earnings potential, industry scenario, competition in the same sector, current local and global market situations etc. to decidethe issueprice/price band. They also work on the activities like completion of the mandatory documentation as required by the regulatory body. Underwriters charge a fee for this activity, which is generally a percentage ofthe issuesize. If the issue size is very large a syndicate of merchant banks takes up the task of underwritingthe issue. However onemerchant bankleads the other. MERCHANT BANKERS The merchant bankers are those financial intermediaries involved with the activity of transferring capital funds to those borrowers who interested in borrowing. They guarantee the success of issues by underwriting them. Merchant banks are popularly known as issuing and accepting houses. Unlike in the past, their activities are now primarily non-fund based (fee based). They offer a package of financial services. The basic function of merchant banks is marketing corporate and other services that are guaranteeing sales and distribution of securities and also other activities such as management of customer services, portfolio management of customer services, portfolio management, credit syndication, acceptance credit, counseling, insurance, etc. As per SEBI (Merchant bankers) Rules, 1992: Merchant bankers means any person who is engaged in the business of issue management either by making arrangements regarding selling, buying or subscribing to securities or acting as manager, consultant, advise or rendering corporate advisory service in relation to such issue management. MERCHANT BANKING Merchant banking activity was formally initiated into the Indian capital markets when grind lays bank received the license from reserve bank in 1967.grindlays started with management of capital issues ,recognized the needs of emerging class of entrepreneurs for diverse financial services ranging from production planning and system design to market research .even it provides management consulting services to meet the requirements of small and medium sector rather than large sector. Citibank setup its merchant banking division in1970.the various tasks performed by this divisions namely assisting new entrepreneur ,evaluating new projects ,raising funds through borrowing and issuing equity. Indians banks started banking services as a part multiple services they offer to their clients from 1972.state bank of India started the merchant banking division in 1972.in the initial years the SBIS objective was to render corporate advice and assistance to small and medium entrepreneurs. REGISTRATION OF MERCHANT BANKERS WITH SEBI It is mandatory for a merchant banker to register with the sebi. Without holding a certificate of registration granted by the securities and exchange board of India, no person can act as a merchant banker in India. Only a body corporate other then a non-banking financial company shall be eligible to get registration as merchant banker. The applicant should not carry on any business other than those connected with the securities market. All applicants for merchant bankers should have qualifications in finance, law or business management. The applicant should have infrastructure like office space, equipment, manpower etc. The applicant must have at least two employees with prior experience in merchant banking. MERCHANT BANKERS IN INDIA There are 135 merchant bankers who are registered with sebi now in India. There are public sector, private sector and foreign players registered with sebi. The below are the examples of few of the merchant bankers in each of the public, private and foreign players. PUBLIC SECTOR MERCHANT BANKERS SEBI CAPITAL MERKETS LTD. PUNJAB NATIONAL BANK. IFCI FINANCIAL SERVICES LTD. KARUR VYSYA BANK LTD. STATE BANK OF BIKANER AND JAIPUR. PRIVATE SECTORS MERCHANT BANKERS: ICICI SECURITIES LTD. AXIS BANK LTD(FORMERLY UTI BANK LTD.) BAJAJ CAPITAL MARKETS LTD TATA CAPITAL MARKETS LTD. ICICI BANK LTD. RELIANCE SECURITIES LIMITED. KOTA MAHINDRA CAPITAL COMPANY LTD. YES BANK LTD. FOREGN PLAYERS IN MERCHNT BANKING. GOLDMAN SACHS(INDIA)SECURITIES PVT.LTD. BARCLAYS SECURITIES(INDIA)PVT.LTD. BANK OF AMERICA.N.A. DEUTSCHE BANK. DEUTCHE EQUITIES INDIA PRIVATE LIMITED. SERVICES OF MERCHANT BANKS PROJECT COUNSELLING: Project counseling includes preparation of project reports,deciding upon the financing pattern to finance the cost of the project and appraising the project report with the financial institutions or banks.it also includes filling up of application forms with relevant information for obtaining funds from financial institutions and obtaining government approval. MANAGEMENT OF DEBT AND EQUITY OFFERINGS This forms the main function of the merchant banker.he assists the companies in raising funds from the market.the main areas of work in this regard include: instrument designing, pricing the issue, registration of the offer document, underwriting support and marketing of the issue, allotment and refund, listing on stock exchanges. ISSUE MANAGEMENT Management of issue involves marketing of corporate securities viz. equity shares, preference shares and debentures or bonds by offering them to public. Merchant banks act as per SEBI guidelines, the merchant banker arranges a meeting with company representatives and advertising agents to finalize arrangements relating to date of opening and closing of issue, registration of prospectus, launching publicity campaign and fixing date of board meeting to approve and sign prospectus and pass the necessary resolutions. Pricing of issues is done by the companies in consultant with the merchant bankers. MANAGERS, CONSULTANATS AND ADVISERS OF THE ISSUE: The managers of the issue assist in the drafting of prospectus, application forms and completion of formalities under the companies act, appointment of registrar for dealing with share applications and transfer and listing of shares of the company on the stock exchange. Companies can appoint one or more agencies as managers to the issue. UNDERWRITING OF PUBLIC ISSUE: Underwriting is a guarantee given by the underwriter that in the event of under subscription, the amount underwritten would be subscribed by him. Merchant banking subsidiaries cannot underwrite more than 15% of any issue. PORTFOLIO MANAGEMENT: Portfolio refers to investment in different kinds of securities such as shares, debentures or bonds issued by different companies and government securities. Portfolio management refers to maintaining proper combinations of securities in a manner that they give maximum return with minimum risk. RESTRUCTURING STRATEGIES: AA merger is a combination of two companies into a single company where one survives and other losses its corporate existence. A takeover is the purchase by one company acquiring controlling interest in the share capital of another existing company. Merchant bankers are the middlemen in setting negotiation between the companies. Merchant bankers assist the management of the client company to successfully restructure various activities, which include mergers and acquisitions, management buyouts, joint ventures among others. OFFSHORE FINANCE: The merchant bankers help their clients in the following areas involving foreign currency: Long term foreign currency loans Joint ventures abroad Financing exports and imports Foreign collaboration arrangements ROLE OF MERCHANT BANKER IN A PRIMARY MARKET ISSUE MANAGEMENT: Merchant banker is the intermediary appointed by companies in the primary market issue. It has to look at the entire issue management and work as the manager to the public issue. References: http://lastbull.com/iporole-of-underwriter/