Thursday, October 31, 2019

The future of helthcare depends on the role of nurses Research Paper

The future of helthcare depends on the role of nurses - Research Paper Example The United Nation targets to have a transformed health system by 2015. Nurses contribute to the emotional, psychological, physical, and social being of people seeking medical attention and the society. Strategies in the health sector run in hierarchy from the policy makers, to the practitioners and then to the public. Nurses and midwives are the last practitioners in the hierarchy and next to the patients. This position makes their role very critical. Whether health care will improve in society is dependent on the responsibility of all individuals in the hierarchy. However, nurses and midwives, being the majority and considering their position in the hierarchy, are the main determinants of the effects of change felt on the ground (Ogilvie and Sare, 2010). An analysis of the contribution of nurses to the future of health care is necessary. According to the global development goals set for achievement by 2015, there is a target to reduce child mortality, which is rampant in some region s of the world. Many of the strategies in place touch on the responsibility of nurses in provision of primary health care. The UN summit stipulated that the cause of most of these deaths was malaria, diarrhea, and malnutrition. The public needs education on how to handle these key causes of death of children under then age of five. In the hospital setting, the nurses play the most crucial role in prevention of child mortality (Barclay, 2010). Nurses offering pediatric care should be more aware and offer relevant advice to mothers on proper nutrition and basic hygiene. Nurses also partake in the distribution of nets in the prevention of malaria and offer advice on frequent treatment of the nets to the public (Sines, Saunders, and Janice, 2009). Without the efficiency of nurses, it is difficult to achieve this millennium goal. In order to achieve the development goal of ensuring maternal health care in all societies, it is the responsibility of nurses and midwives to provide the prima ry care to ensure that mothers no longer die from hemorrhage, infection, obstructed labor, and hypertensive pregnancies. Nurses specializing in midwifery are of key contribution to promoting maternal health. It is essential to ensure that they are qualified and are competitive for improved maternal health to become a reality. Nurses should provide quality prenatal and postnatal care comprehensively in the societies they are working in realizing that their roles are very important (Ball, 2000). HIV effects have increased in the recent past. This increase has forced leaders in the health sector to work tirelessly to reduce cases of new infections. Further, they aim at maximizing the care of people living with HIV to lengthen their lives. There are several fields in addressing the HIV epidemic. The first is prevention of the disease, which involves educating the public on modes of transmission and potential strategies in prevention. This is a responsibility of nurses assigned to volunt ary counseling and testing centers. In addition, nurses are involved in the testing process and the crucial responsibility of post testing counseling. Scholars denote that nurses go a mile further to motivate and encourage HIV patients for them to undergo behavioral and attitude change. They also administer advanced care to patients who are in the final stages of the disease. Additionally, nurses do not relent as they advise relatives of patients on home based care to HIV patients.

Monday, October 28, 2019

India’s Trade in 2020 Essay Example for Free

India’s Trade in 2020 Essay Introduction Indias trade has generally grown at a faster rate compared to the growth of GDP over the past two decades. With the liberalization since 1991 in particular, the importance of international trade in India’s economy has grown considerably. As a result the ratio of international trade to GDP has gone up from 14 per cent in 1980 to nearly 20 per cent towards the end of the decade of 1990s. Given the trends of globalization and liberalization, the openness of Indian economy is expected to grow further in the coming two decades. The more exact magnitude of Indias trade in 2020 and its proportion to Indias national income would be determined by a variety of factors. Many of these factors are in the nature of external shocks and are beyond the control of national policy making. One illustration is the recent surge in the crude oil prices in the international market to unprecedented levels that have impacted the country’s imports in a significant manner. In addition, the implementation of various WTO agreements are likely to affect the Indias trade. Indias trade is also likely to be affected by various bilateral/ regional preferential trade arrangements that have been concluded and those that might take shape in the coming years. This paper attempts to provide a mapping of different factors that are likely to shape the patterns and magnitudes of Indias imports and exports over the coming two decades. These factors are classified into three, namely: 1) factors affecting the demand for Indias exports of goods and services; 2) factors affecting the supply of Indias exports of goods and services; and 3) factors affecting the demand for Indias imports. The supply of imports may be assumed to be elastic and hence is not discussed. The structure of the paper is as follows. Section 1 maps out various factors affecting demand for India’s exports, Section 2, factors affecting supply of India’s exports. Section 3 lists the factors that are likely to affect demand for India’s imports. Section 4 briefly summarizes emerging patterns of India’s comparative advantage in exports of good and services. Section 5 makes some concluding remarks. 1.Factors Affecting the Demand for Exports There is a multitude of factors that are likely to affect the demand for Indias exports of goods and services as seen below. 3 Growth Performance of World Economy and Key Trading Regions The growth rates of the world economy and world trade do influence the overall demand for Indias exports. For instance, the rates of stagnation in the growth rate of world trade in the period since 1996 have affected the growth of Indias exports. Some broad correspondence between the growth rates of world trade and Indian exports is evident from Figure 1. Depending upon the intensities of Indias trade relations the growth prospects in these specific regions may also affect the demand for Indias exports. The regions which may be particularly important for Indias exports include North America, the European Union, Middle East, East and Southeast Asia and South Asia. Therefore, it will be important to watch the growth outlook and projections for these regions. Figure 1: Growth Rates of World Trade and Indias Exports Over the 1990s Source: RIS on the basis of WEO Database of the IMF 1.1.1. World Output and Trade at the Turn of the Century and the Outlook The world economy in 2000 seems to have fully recovered from the slow down of 1998-1999 on account of the East Asian crisis. The estimated world output growth of 4.8 percent in 2000 is highest since 1988 and of world trade at 12.4 percent is highest of the past 25 years (Table 1, Figure 1). The impressive recovery of the world economy and world trade in the early part of 2000 generated optimism all around as countries expected to benefit from favourable spillovers in the form of rise in demand for their exports. However, the optimism has proved to be short lived. It has been partly tarnished somewhat by the crude oil prices hitting the roof in the third quarter of 2000 and adversely affecting the outlook of many regions besides raising the threats of inflation in different parts of the world. Furthermore and more importantly, the emerging trends confirm that a trend of slow down was set in the US economy in the third quarter of the 2000. Hence, fears of a hard landing of the US economy in 2001 have continued to grow. A scenario of hard landing of the US economy in 2001 is thus likely to short-circuit the rebound of the world economy of 1999-2000, even though the major European Union economies are improving their performance. The Japanese economy continues to remain sluggish. The slow down of the US economy has a compounded effect on the growth of the world economy by adversely affecting the demand for the products of partner countries as well. As a result the growth rate of world output is likely to slow down in 2001 from the levels reached in 2000 to 3.2. The world economy is expected to pick up moderately to 3.9 per cent in 2002. The effect of the impending slow down is more severe on the growth rate of world trade which is likely to reduce by nearly half from the rate achieved in 2000 to around 6.5 per cent in 2001 and 2001. In the light of recent trends, the outlook for the world economy and trade growth over the next ten years could be taken at 3 and 6 per cent respectively. *Indonesia, South Korea, Malaysia, the Philippines, and Thailand. #ASEAN-4. Source: RIS based on World Bank (2001), IMF (2001). 1. WTO Agreements Since the implementation of the Final Act of the Uruguay Round in 1995, the WTO Agreements have become important factors in determining the patterns of world trade. Their full impact is not yet obvious as many provisions of these agreements are yet to be implemented because of the transition period provided. Most of the remaining provisions of the WTO agreements would be implemented in the coming five years. Therefore, the patterns of trade in 2020 would have to be speculated keeping in mind the impact of full implementation of the WTO agreements. Some of the agreements which are likely to affect Indias exports are the following. 1. Agreement on Textiles and Clothing The Agreement on Textiles and Clothing (ATC) proposes to phase out the MFA quotas imposed by the developed countries on the imports of textiles and clothing from developing countries over a period of 10 years ending on 31st December 2004. Given the fact that India has substantially fulfilled her quota for the products coming under MFA, it may appear that the phasing out of these quotas would help in the expansion of exports. However, the impact of the phase out is likely to be a mixed bag. This is because with MFA phase out, Indian exporters would be competing directly with other exporters of textiles and garments such as China, Korea, Taiwan, Pakistan, Thailand, Turkey, Mexico, Hong Kong, Indonesia, Macau, Philippines, Sri Lanka, Bangladesh, among others. Therefore, while ATC provides an opportunity to Indian exporters to expand their exports of textiles and garments by removing the quota restrictions, it also poses a challenge of increased international competition. Some of them will enjoy preferential access to the importing countries due to their least developed country (LDC) status such as Bangladesh. There are apprehensions on the full benefits of phase out being available to developing countries. As such the schedule of the phase-out has been back-loaded over a ten-year long phase-out period. The industrialized countries may use other protectionist measures such as anti-dumping to prevent market access after the phase-out of quotas. A large number of textiles and clothing products already face tariffs in the range of 15 to 30 per cent in the Quad countries (World Bank, 2000). Some attempts of restricting them with anti-dumping duties have already been made against these exports including those from India. Another factor that will affect the competitiveness of Indian exports of textiles and garments in the post-MFA regime is the availability of trade preferences to emerging competitors of India. For instance, Mediterranean countries such as Turkey, Cyprus and Malta and Central and Eastern European countries enjoy free trade agreement with the European Union ahead of their full membership. The Caribbean countries enjoy a similar preferential access to the United States market under the Caribbean Basin Initiative (CBI). Mexico enjoys a privileged access to the North American Market as a member of NAFTA. These trade preferences have already resulted into diversion of trade in textiles and clothing to these countries. For instance, Mexican exports of clothing to the United States have grown at the rate of 27 and 15 percent in 1998 and 1999, respectively with the growth rate of exports to Canada in these years being 30 percent and 26 percent, respectively. Similarly, exports of clothing from Bulgaria, Hungary, Poland, Romania, Turkey to the European Union in 1998 have grown at 26 percent, 14 percent, 11 percent, 23 percent and 11 percent, respectively (WTO, 2000). The ability of Indian exporters to take advantage of phase out the MFA quotas by 2004 will depend upon a number of factors such as their ability to enhance overall international competitiveness with productivity and efficiency improvements, quality control, ability to quickly come up with new designs, ability to respond to changes in consumer preferences rapidly and the ability to move up the value chain by building brand names and acquiring channels of distribution to more than outweigh the advantages of her competitors. The reservation of the garment industry for small-scale sector has affected capital investment, modernization and automation in the sector in the country. Although the small sector operation has imparted flexibility, it has prevented exploitation of economies of scale and scope by the Indian industry. The new Textiles Policy takes care of some of the concerns. It remains to be seen if the Indian industry will be able to exploit the opportunities provided by the incr eased market access with the MFA phase-out. 2. Agreement on Agriculture (AoA): The AoA proposes to liberalize the international trade in agriculture by restricting the agricultural subsidies provided by governments to the farmers, reduction in export subsidies in agriculture, removal of QRs and establishment of tariff rate quotas applicable to trade in agricultural commodities. In general India’s obligations under AoA are limited given the low level of agricultural subsidies compared to EU and the US. It is believed that implementation of the AoA commitments by industrialized countries will benefit countries like India in terms of market access for some agricultural commodities. However, the implementation of the commitments on the part of industrialized countries so far does not provide any room for optimism. The extent of subsidies given by industrialized countries have actually increased over the past few years as acknowledged by OECD reports. It is possible that in the coming years the provisions of the Agreement are implemented in the letter and spi rit. The likely effect of the full implementation on India’s trade is difficult to be speculated. However, one can have an idea about the likely scenario from efficiency indicators and incentive structure. Given lower than world prices of rice, wheat, maize, sorghum, chickpea and cotton in India, their exports may expand under the liberalised trade in agriculture. Hence the area under cultivation for these crops may increase since profitability and effective incentives will get tilted in favour of these crops. The same is true for pearl millet, pigeonpea and soyabean. However, production of oilseeds e.g. groundnut, rapeseed, mustard and sunflower, and pulses may be adversely affected in a free-trade scenario given the lower world prices. Thus, the import dependence in edible oils and pulses may increase. 3. Anti-dumping Regulations The Indian exports of a number of commodities have been subjected to anti-dumping regulations by some of our important trading partners such as the United States and the European Union. The onslaught of the anti-dumping measures on Indian exports is likely to increase in future with the growing competitiveness of Indian products. In order to minimize their disruptive effect of these regulations on Indias exports, the industry and government will have to strengthen the machinery to counter such actions (Panchamukhi, 2000). 1.2.4. Tariff Negotiations and New Trade Round Although the average tariff rates in the industrialized countries are low, they have high peak tariffs for certain products, some of which are of export interest to India such as textiles and garments, and agricultural commodities (see Table 3). Market access for these products could be facilitated by our ability to secure reduction in these tariffs in the industrialized countries through future tariff negotiations in the WTO framework. N.B. HS Chapters are given in parentheses. Source: RIS based on UNCTAD/WTO (2000) The Post-Uruguay Round Tariff Environment For Developing Country Exports: Tariff Peaks and Tariff Escalation, UNCTAD, Geneva (TD/B/COM.1/14/Rev.1; 28 January 2000) 1.2.5.Trade Preferences for the Least Developed Countries One emerging development in the WTO system has been the tendency to divide the developing countries with the offer of special trade preferences for the least developed countries. A sizeable proportion of Indias exports still comprise labour and resource intensive goods that are also exported by some of the least developed countries. If successful these preferences have the prospects of diverting trade from India to the least developed countries. The potential of these trade preferences for adversely affecting India’s exports needs to be kept in mind. 2. Chinas Accession to WTO One of the important events of the coming years for the world trade may be the entry of China into the WTO regime. China signed an agreement with the US for its entry into the WTO in November 1999. It has subsequently been negotiating such agreements with other WTO members. The accession of China to the WTO and hence the MFN status that it will receive from other WTO countries may have some implications for the competitiveness of Indias exports. This is because India and China compete in the international market for a number of labour intensive and matured technology goods such as textiles and garments, leather goods, light engineering products, chemicals and pharmaceuticals, among others. China has already been giving tough competition to Indian exports in many commodities and markets. There is a view that the accession to WTO may further strengthen China’s competitiveness and hence may affect the Indian exports adversely. There is another view that the accession of China to WTO would force it to follow WTO norms and procedures, etc. and will bring their trade policy under international surveillance. State subsidies will be regulated and hence it will make it more difficult for the Chinese exporters to dump their products in the world market. The exact impact of the accession of China to the WTO on the Indias export prospects will depend upon these counteracting effects. It is important to analyze the effects of Chinese accession to WTO on the competitiveness of Indian exports. 1.4. Preferential Trade Arrangements/Free Trade Arrangements in Rest of the World The last decade and a half has seen the proliferation of regional trading arrangements in different parts of the world. The major trading blocks that have emerged over the years include the European Union, NAFTA, Mercosur, AFTA, COMESA, among others. Besides, these free trade and common market agreements, a number of other countries have become integrated with the trading blocks through a variety of preferential or free trade arrangements. For instance, European Union has extended free trade agreement treatment to a number of Central Eastern European Union and Mediterranean countries in anticipation of full membership to these countries in the EU. These arrangements could also act to divert trade away from India especially in the labour intensive goods, as indicated earlier in the case of textiles and clothing. 1.5.Regional/Bilateral Free Trade Arrangements India has taken several steps to liberalize trade with her trading partners in the South Asia region on regional as well as bilateral basis. These steps include participation to SAARC Preferential Trading Arrangements (SAPTA) that came into being in December 1995. Under this Agreement, India has exchanged trade concessions with the SAARC member countries for nearly 3000 commodities in the first three rounds of negotiations. The fourth round of these negotiations is in the process. It is expected that the process of trade liberalization in the framework of SAARC will culminate into a South Asia Free Trade Agreement (SAFTA), although, it may take some time to take shape given the current impasse in the SAARC process. Besides SAPTA, India has recently signed a bilateral free trade agreement with Sri Lanka. India already has bilateral free trade agreement with Nepal and Bhutan. A bilateral free trade agreement is being contemplated with Bangladesh as well. There are other attempts of regional/sub-regional economic integration which may also come into being in the coming decade, for instance, BIMST-EC (Bangladesh, India, Myanmar, Sri Lanka and Thailand Economic Cooperation) which has been formed recently may adopt a preferential trading arrangement between the member countries. Although India is also a founder member of the Indian Ocean Rim Association for Regional Cooperation (IOR-ARC), a preferential trading arrangement is not contemplated as the Association has adopted the concept of open regionalism on the lines of APEC. All these attempts at free trade with the regional partners may open the markets for Indian goods further in the countries concerned. It is evident that the share of South Asian countries in Indias exports has increased from 2.73 to 4.9 over the period 1990 to 1999. The recent initiatives in regional/ bilateral trade liberalization may help to divert some trade of the countries concerned from their other trading partners in favour of India given the supply capabilities. 2. Factors Affecting the Supply of Exports It is widely believed that the major factors constraining India’s exports lie not in the lack of demand but more in the supply side constraints. Most of the supply side factors need to be addressed as a part of the policy towards trade. Some of the factors that constrain the volume and composition of Indias exports are as follows: 1. Infrastructural Bottlenecks It is widely accepted that Indias export potential remains considerably unfulfilled because of infrastructure bottlenecks such as power shortages, port handling facilities, delays in transportation which in turn are due to poor transport links within the country and poor communication facilities. The inability of Indian exporters in meeting supply schedules costs dearly in terms of image of India as a reliable source of supply. Not only that the availability of the infrastructure services is inadequate but the efficiency and quality of the delivery of what is available is highly uneven. The ability of the government in removing these constraints in the coming years will also determine the supply side of Indian exports. 2. Growth of Domestic Demand A rapid growth of domestic demand may also affect Indias ability to export at least in certain products, for instance, in tea where the rapid growth of domestic demand is expected to reduce the export surplus in the coming years. It may also apply to a number of other agricultural commodities such as rice, cotton, among others. 2.3 Inflows of Export-oriented Foreign Direct Investment Multinational enterprises (MNEs) have played an important role in the rapid growth of manufactured exports from the East and South-East Asian countries. This is because the South East and East Asian countries were able to attract export platform investments from US and Japanese MNEs in the 1970s and 1980s. The export platform or export-oriented investment arises in the process of relocation of production by MNEs abroad in order to maintain their international competitiveness in the face of rising wages and other costs in their home countries. In Malaysia and Indonesia, for instance, 70 percent of the projects involving FDI have been export-oriented. In China, the share of foreign owned firms in exports has risen from 5 percent in 1988 to 40 percent by 1997. In contrast, the share of foreign affiliates in Indias exports is marginal at 5 to 7 percent (Kumar and Siddharthan, 1997, for a review of evidence from different countries). Therefore, India has not been able to exploit the potential of MNEs for export-oriented production. MNEs can play an important role in promotion of Indias manufacture exports with relocation of export platform production in the country with their access to global marketing networks, best practice technology and organizational know-how. To some extent, therefore, Indias ability to attract export-oriented FDI will determine the magnitude of Indias exports in 2020. The studies have shown that export-oriented FDI inflows are of special type and are determined by different factors than other types of FDI (Kumar, 1994). The studies also find differences in the nature and determinants of export platform investments that are geared to MNEs home markets and those targeting the third countries (Kumar, 1998). India may make an effort to target the export platform investments of both types by sharpening her bundle of resource endowments and created assets in the light of determinants identified by these studies. 5. Technological Upgrading and Movement along with the Value Chain The Indian export structure has been highly dominated by simple and un-differentiated products where the main competitive advantage lies in cheap labour, low levels of skills and simple technologies compared to that of China and South East Asian countries except for recent growth of pharmaceuticals and software services (Lall, 1999). Not only these products are slow moving, the export structure is highly vulnerable to competition. Indias competitiveness has also been adversely affected by the failure to diversify the commodity composition of our exports. In fact the commodity concentration of Indias exports has increased with a 9 percent rise in the share of top six groups of exports in total and exports between 1987-1988 to 1998-99 (Kumar, 2000a). In comparison to India, Southeast and East Asian countries have rapidly diversified their export structure in favour of technologically advanced goods. For instance, share of technologically advanced goods (differentiated and science based goods) in India’s manufactured exports rose marginally to about 8 per cent by the mid-1990s over 5.6 per cent in the mid-1970s; in China, this proportion increased from 8.8 per cent to 23 per cent over the 1987-95 period, and for Malaysia from 12 per cent to 57 per cent over the 1980 to 1995 (Pigato et al. 1997). The markets for low technology undifferentiated goods are highly price competitive and margins are kept under pressure by constant competition by entry of new low wage countries.

Saturday, October 26, 2019

Streak Plate And Viable Cell Count

Streak Plate And Viable Cell Count Aim and introduction should display insight into what the streak plate and viable cell count method are employed to achieve. They should also introduce MacConkey agar and how its selective and differential properties allow the characteristics of the test organism to be determined. Escherichia coli (E.coli) The aim of this experiment is to allow a certain bacterium to divide and multiply enabling us to view the bacteria in a single cell structure. E.coli is one bacterium that is good for such an experiment. E.coli can be said to be both bad and harmless, some E.coli bacteria have are highly toxic and can harm humans and animals. However, the majority of E.coli strains are relatively harmless with low toxicity. These harmless strains of E.coli are found naturally occurring in the human body, especially in areas such as the human intestines. Some E.coli can even benefit their hosts; they do this by producing specific vitamins. It is for reasons like the ones mentioned why E.coli is an appropriate bacteria to use for this experiment. Another reason is that E.coli bacterial cells have an average bacterial size of 2um; this can be seen under a light microscope. Other bacteria however may be even smaller and may require a larger microscope for viewing or even an electron microscope. Also the incubation period for E.coli to multiply and grow rapidly isnt very long and temperatures arent too high or too low. E.coli can be incubated overnight at 37oC and then stored at 4oC until its requirement. The technique use to manipulate and isolate the E. coli bacteria is known as the streak plate procedure. The technique was developed to allow bacteria to multiply and produce many colonies, during the incubation period, depending on the amount of bacteria present. Each colony will contain millions of bacteria cells derived from a single parent cell. (Talk in more detail about this procedure). We will be using this technique to allow the E. coli to multiply and divide splitting itself into colonies. The viable cell count, also known as viability count, is a method used to determine the number of living cells within a suspension, in this case E. coli. To obtain an understanding of how much E. coli cells are present in a sample this method must be put into action. (Expand) The MacConkey agar is specifically designed to allow gram negative bacteria to grow; its a recipe of many substances such as bile salts, sodium chloride proteose and many more. One of the properties of the MacConkey agar is its selective isolation and identification of bacteria; it is a medium that allows us to distinguish gram-negative bacteria. E. coli is a rod shaped gram negative bacteria, so using the MacConkey agar plate to multiply it would be appropriate, the agar will also cause the E. coli to change colour from pink to red, and this is an indication of gram negative bacteria present. A Nutrient agar is a growth medium used for the cultivation of bacteria, this specific agar remains solid even at high temperatures. The gram-stain technique was developed for viewing cells clearly under a microscope and to enable us to establish their structures. It is a very simple procedure of just adding 4 different substances accordingly, however one of these substances is toxic to humans therefore the procedure must be carried out in a fume hood. The gram stain method was introduced by It is important for scientists and medics to know the structure and function and identity of bacteria and viruses, it is for reasons like this why such experiments are carried out. Without such procedures so many bacteria and viruses wouldnt be known and could spread and become out of control. Methods: Explain why each procedure was done highlight key points state any deviation from protocol document any errors or difficulties you had with the technique Discuss the importance of aseptic technique and what steps could be taken to prevent contamination during manipulation of bacteria All methods were doing under aseptic conditions; the reason for this is to prevent contamination of the bacteria during its manipulation. Many errors could arise if aseptic conditions arent used, eventually resulting is wrote results. Streaking bacteria on MacConkey agar method: Prior to the experiment, an E. coli sample was made and given to during the practical. Risk assessment: Materials used: 10ml liquid culture of E. coli the bacteria sample to be use in this practical Sterile plastic loops used for transferring E.coli bacteria from one place to another uncontaminated. MacConkey agar plate used to allow E.coli bacteria to grow as it provides energy recourses and support Sharps bin for loops etc. these are used to keep the laboratory area as uncontaminated as possible and to make sure bacteria doesnt spread Marker pens and labels to label the plate Step 1: using a sterile plastic loop I touched a given sample of E. coli and streaked an inoculum onto a MacConkey agar plate in a specific pattern (see..). This plastic loop is then disposed of into the sharps bin. Step 2: using another sterile plastic loop, I created a run of parallel lines from the edge of the initial streaks Step 3: step 2 was repeated 2 more times with a new sterile loop used. Step 4: a final streak was made, creating a simple streak from the previous streaks into the centre of the plate. The picture below illustrates this. The MacConkey plate was then given to the technicians to incubate. It was important to dispose- on the plastic looks by placing them into the sharps bin because they are contaminated and if they touch any other surface it can lead to the spread of bacteria resulting in major contamination. Throughout this procedure plastic gloves and a lab-coat were worn, also to prevent contamination. Viable cell counts: Risk assessment Materials used: P1000 and P100 pipettes and tips used to transfer certain amounts of PBS etc. Three Nutrient agar plates 10ml sterile PBS buffer, used to maintain the pH Sterile plastic spreaders to spread the E.coli on the Nutrient agar plates Eight sterile bijoux bottles for dilutions To start the dilution, using a pipette I transferred 900 ul of diluents (PBS) in eight different sterile bijoux bottles. The PBS (phosphate buffered solution) solution is a commonly used buffer to maintain a pH; it is used in this practical because of its ability to aid biological research. After the PBS was placed into the labelled bottles, using a new sterile tip for the pipette I transferred 0.1ml of E.coli liquid culture sample (neat) into the first bottle (10-1). For the dilution to continue a new pipette tip was placed and 0.1ml of the 10-1 diluted E.coli was transferred to the 10-2 bottle, this process continued up till bottle 10-8. By doing so the E.coli will become more and more dilute within the different solutions, because less E.coli is being added each time. 10-5, 10-6 and 10-7 samples were then spread onto three different Nutrient agar plates using different sterile plastic spreaders so contamination wouldnt occur. This was done by placing 0.1ml of each dilution onto th e centre of the agar plate and then spreading it over with a sterile spreader. The agar plates were labelled and given to the technician for incubation. Gram Stain of bacteria from an isolated colony Risk assessment In order to stain the bacteria I selected an appropriate colony to stain, the colony must appear to be uncontaminated and its appearance must obviously look grown.. After this procedure is complete, the bacterial cells will be visible under a microscope. Materials needed: Bunsen burner used to heat-fix bacteria onto microscope slide Saline (PBS) emulsifier Light microscope to view bacterial cells Lens tissue to clean the lens Immersion oil for light microscope lens to allow better view at 100x magnification Stains for Gram stain method Before the bacteria can be modified to be viewed under the microscope clearly, the microscope glass slide must be cleaned to prevent contamination. After doing so a drop of sterile saline was placed onto the centre of the slide, the saline drop was placed because it can emulsify any bacterial colony that will be placed on top. To move some of the bacteria off the agar plate onto the slide, a sterile loop was used I touched the bacterial colony on the agar plate with the top of the loop and then spread the bacteria into the saline drop making it thin. Due to the moisture of the liquid I let the slide dry then used a Bunsen-burner to heat-fix the bacteria onto the slide by passing it through a few times then allowing it to cool. Heat-fixing was done so that during the staining the bacteria or wouldnt move or fall off. Once that was complete the slide was moved to a laboratory fume hood where the staining can take place, the follow 4 stage method was used: at first the bacteria sample on the slide was soaked in crystal violet for 30 seconds, after so it was rinsed with distilled water and drained. The second part is to soak the bacteria with gram iodine (mordant) for another 30 seconds then rinse with distilled water and drain it. Gram iodine is a toxic substance; it is for this particular reason why this part of the practical was carried out in a laboratory fume hood. Acetone decolouriser was then added for 10 second and the bacteria was again rinsed with distilled water and drained. The final part is to add Safranin, a counter stain, to the bacteria. It was placed on the bacteria for 30seconds and then the bacteria was further rinsed with distilled water, drained, blotted and allowed to dry. Substance Duration Further action Crystal violet (primary stain) 30 seconds Rinse with water drain Gram Iodine (Mordant) 30 seconds Rinse with water drain Acetone/alcohol (Decolouriser) 5-10 seconds Rinse with water drain Safranin (Counter stain) 30 seconds Rinse with water, drain, blot dry Stain was carried out in a laboratory fume hood due to the toxic gram iodine substance used. The transparent plastic shield of the fume hood was lowered so that only my hands were inside dealing with the chemical and biological substances. Gloves were worn during this procedure so that no stain would come into contact with the skin. When the slide was rinsed with water, it was rinsed gently with distilled water so that the bacteria are not shifted. After the staining was completed the sample can now be viewed under a light microscope and compared to other bacterial samples. The slide is placed on the stage with a drop of oil for immersion, the microscope is focused on 100x and the bacteria is viewed. Results: Should describe your findings in : prose/text, diagrams, tables and graphs which includes a description of growth characteristics and how successful your aseptic technique was MacConkey agar plate results: During the experiment there were no results to be noted as it was too early for anything to occur. After the agar plate containing the E.coli was incubated at 37oC and then stored at 4oC, its appearance was as expected. Colonies were separated, and as the streaks moved on less E.coli was present. The colonies were well distinctive and were round in their shape. The sample initially given was simply liquid, the result showed significant growth of this E.coli liquid into 3D structures. This indicates the growth of the bacteria in a fine way; the 3D structures appeared in a yellowing solid colour. Because the practical was conducted in aseptic techniques no contamination occurred. Aseptic techniques were successful in allowing me to produce accurate results. Viable cell counts My results: The colonies that appeared on the nutrient plate had a badge colour; visually they all appeared relatively same sized and volume. 10-5 10-6 10-7 10-8 TMTC 46 1 For the 10-7 the calculation for the number of bacteria in 1ml of the original culture is: (1107/0.1) x (X/1) [cross multiply] 0.1X = 1 x(1107) [divide by 0.1] Therefore X = 1.0108 For the 10-6 the calculation for the number of bacteria in 1ml of the original culture is: (46106/0.1) x (X/1) [cross multiply] 0.1X = 1 x(46106) [divide by 0.1] Therefore X = 4.6108 The number of bacteria present in 1ml of the 10-5 culture cannot be calculated as there was no value noted (TMTC). X= number of bacteria. The number of bacteria present in 1ml of 10-6 dilution is 4.6108 and in the 10-7 dilution culture is 1.0108. Class results: Pair number 10-5 10-6 10-7 10-8 1 TMTC 46 1 2 95 9 0 3 TMTC 52 9 4 TMTC 23 1 5 34 2 6 84 11 4 7 TMTC 24 18 8 2 2 26 9 102 6 0 10 19 3 3 11 TMTC 140 15 12 TMTC 57 9 13 61 12 0 14 8 6 1 15 195 51 4 16 55 27 3 17 TMTC 94 11 18 TMTC TMTC TMTC 19 TMTC TMTC TMTC 20 TMTC 113 18 Total 266 985 177 28 Average 66.5 57.9 9.8 7 Should describe your findings in : prose/text, diagrams, tables and graphs which includes a description of growth characteristics and how successful your aseptic technique was To determine the amount of bacteria within a culture a simple calculation must be done using my personal results for this experiment. There was no value for the 10-5 so this cannot be done. The result for 10-6 was 46, 46 x 10 = 460ml. To estimate the amount of E.coli present this is further multiplied by 106, therefore 460 x 106 = For the 10-7 result Æ’Â   7 x 10 = 10 Æ’Â   10 x 107 = However, I have selected some reasonable results from the table to calculate an average. Gram-stain of bacteria from an isolated colony: (view method number 3) Gram stains help us distinguish between microbial organisms, for example gram negative bacteria and gram positive bacteria. This method was developed to know the identity of bacteria present. (See procedure for The Gram Stain in the methods section). During step 5 of the Gram Strain Method above the following results were made when applying the four different substances: Substance Colour after stain Crystal violet (primary stain) Purple Gram Iodine (Mordant) Purple Acetone/alcohol (Decolouriser) Transparent (dye was washed off) Safranin (Counter stain) Reddish-pink The appearance of the E.coli bacteria under a microscope with 100x magnification was quite clear; it had a rod-like structure with a reddish-pink colour. The rods were all more or less the same size, however some were packed together and others were on their own. Discussion: Were the results the expected? Did the methods adopted achieve their aim? How the experiments could be improved. Include background information, critical evaluation of results Throughout all the experiments and procedures a lab-coat and gloves were worn to avoid skin contact with bacteria and harmful substances. Overall the aims were accomplished and the results were as predicted. MacConkey agar The colonies were expected to be in such a form, indicating that it was E.coli present and that it has rapidly multiplied into individual colonies. This further suggests that when E.coli is present under conditions where it could multiply, it multiplies by forming a round colony and expanding from there. However, some of the colonies were stuck together making it difficult to count the number of them present. What this means is that the growth of the bacteria was a success and the method adopted was accurate. The reason why some colonies were packed together may be the result of pressing too hard on the agar while streaking, with more streaking practice more accurate results can be obtained with colonies being on their own. The methods adopted for this practical achieved what was aimed for. After the incubation of the MacConkey agar plate the plate was stored for a week at a temperature of 4oC, this may have changed the appearance in colour and in shape of the formed colonies. Contam ination of the agar plate may have even occurred. An improvement to the experiment is to note down results straight after incubation is finished. Gram Stain results After analysing the microscope slide which contains the Gram Stained E.coli under the microscope its features were obvious. There were many average sized rods with a reddish-pink colour, some of these rods were packed together whist others were separated. Comparing this with another prepared sample of B.subtilis, the B.subtilis was a purple colour and has a longer and curved shape, like fine threads. However some again were packed together and others separated. The purple colour of the B.subtilis indicates that it is gram positive, and the pink colour of E.coli indicates its gram negative. When the Gram Stain method was applied to the B.subtilis it obviously stayed purple though out, with E.coli it will decolourise once the decolouriser is added. The gram stain method is highly effective and efficient when dealing with different bacteria; it helps identify them to a great extent. B.subtilis remains purple throughout the Gram Stain procedure, this itself can be an indication that it is a Gram positive bacteria. Bacterial cells have different types of cell walls, the gram negative and gram positive terms describe the nature of their structural differences. One of the important differences is that Gram positive bacteria have no outer membrane whereas Gram negative bacteria do, the purpose of this outer layer is to cover the peptidoglycan layer. When staining occurs the outer membrane of a gram positive bacterial cell wall becomes permanently stained as the strain can easily penetrate the thick peptidoglycan layer, so that if a decolouriser or distilled water is added the colour will remain purple. In the case of the gram negative bacterial cell wall the stain gets attached to the far outer membrane layer (lipopolysaccharide and protein), this layer decreases the penetration depth of the strain on the peptidoglycan, so the stain can be decolourised or removed. The diagrams below illustrate this. Gram positive: Æ’Â   Æ’Â   Æ’Â   Primary stain Mordant Decolourisation Counter-stain Note: colour remains the same throughout addition. Gram negative: Primary stain Mordant Decolourisation Counter-stain Note: colour changes Æ’Â   Æ’Â   Æ’Â   The aim of the Gram Stain method was confirm that the bacteria that was initially being dealt with was E.coli, after tests and results it confirmed that it was so the results were as expected and predicted. The methods used for this procedure were successful at achieving good results, however some can be altered. For example, the E.coli used for this experiment was used from experiment number one, not that that is a problem but when the E.coli was incubated over night and it had successfully multiplied it was stored at 4oC for quite a while (this experiment was carried out 1 week after the first one). This possible may have altered the activity of the E.coli and also its appearance. Many resources state that gram negative bacteria should have a pink colour after the counter-stain has been added and rinsed off. In this case the E.coli bacteria in this experiment had quite a dark pink colour which was really close to the colour red, this appearance of colour was visual both with the naked eye and under the microscope as individual bacterial cells. Viable cell counts As I predicted, the more dilute (10-8) solution will have less E.coli bacteria growing on its surface. As there were 20 different pairs doing the practical, and the dilutions were all done 20 times by different people, there is plenty room for error from contamination of inaccurate measurements. The 10-5 agar plates had many E.coli bacterial colonies growing on it, according to the results there was far too many bacteria that it was too many to count (TMTC). Gradually as the dilution increased the bacteria became less, 10-6 dilution had numbers ranging from 6-140. Obviously with such great difference within what is meant to be the same dilution there was some error/contamination present. The most obvious ones which had error are pair numbers 18 and 19 there was TMTC throughout (10-6, 10-7 and 10-8). What would be expected is that fewer bacteria should be present in the 10-8.

Thursday, October 24, 2019

The Ugliness of War in Wilfred Owens Dulce et Decorum est Essays

The Ugliness of War in Wilfred Owen's Dulce et Decorum est Wilfred Owen's "Dulce et Decorum est" is seen as a strong expression of the ugliness of war, and "an attack on the idea of war being glorious" (Kerr 48). It transmits an irritating clip, with full animation and in vivid colors, of embittered and battered soldiers marching to their death. It also, cogently presents a nightmarish vision of hell uploading all its demons into the root directory of an impoverished soldier who saw one of his comrades gassed to death. The images that Owen confected with the skill of a professional craftsman remain grafted in the reader's memory long after the poem is read, echoing its sober message times and times again. The soldier's voice bitterly imploring that patriarchy stop disseminating lies about the glory and sweetness of death in defense of ones country haunts the text. The poem presents this extremely tense experience articulately in 28 lines of well-confected verse. It is this confected eloquence and the well structured articulation of this highly disturbing experience that really betrays the poem's lack of immediacy and artificiality, and makes the poet an accomplice with those he attacks as disseminators of lies. Scrutinizing Owen's poem under the magnifying lens of Longinus' treatise On the Sublime, and Harold Pinter's view on discourse reveals that the poem perches on a detrimental fault line that destabilizes its mainstream readings. While Owen challenges patriarchy and insinuates at its responsibilities for the horror of the war, he himself maintains, to a great extent, a conventional approach to writing poetry that does not subvert the traditional patriarchal forms of versification. The diction of the poem is delibe... ...arizes them to him to the extent that they cease to become that terrible after several repeated readings. In fact, in Owen's poem the war is exhausted by its discourse the way, to borrow Jean Baudrillard's expression, "the eyes are exhausted in the gaze and the face is exhausted in the makeup." (76) Works Cited Baudrillard, Jean. Seduction. Trans. Brian Singer. New York: St. Martin's Press, 1990. Dorsch, T. S. Classical Literary Criticism. London: Penguin books, 1965. Kerr, Douglas. Wilfred Owen's Voices: Language and Community. Oxford: Clarendon Press, 1993. Owen, Wilfred. Wilfred Owen: Collected Letters. Ed. Harold Owen and John Bell. London: Oxford UP, 1967. -----. Wilfred Owen: The Complete Poems and Fragments. Ed. John Stallworthy. 2 vols. New York: Norton, 1984. Hollis, J. R. Harold Pinter: The Poetics of Silence. New York: Macmillan, 1970.

Wednesday, October 23, 2019

EPA †Policy-making in the Federal System Essay

The federal government enacted the Clean Air Act, so as to protect the citizens of the United States. At the same time Congress created the Environmental Protection Agency with its primary role of regulating and the enforcement of environmental policies at the state and tribal levels. A brief history on air pollution, in October 1928 in the industrial town of Donora Pennsylvania a thick cloud formed. This thick cloud lingered for five days, causing sickness in 6,000 and killing 20 of the town’s people. And in 1952, over 3,000 people died in London to what is known as the â€Å"Killer Fog†. These events alerted the federal government to the dangers that can come from air pollution and the public health issues that can arise from pollutants in the air. The original Clean Air Act of 1963 was passed, establishing funding for the study and cleaning of air pollution. The United States Environmental Protection Agency (EPA) was established and began operating on December 2, 1970. The EPA’s primary responsibility is enforcing and regulating the laws, these regulations and laws are for protecting the environment and public health. The EPA is a regulatory agency that Congress has authorizes to write regulation that explains the critical details that are necessary to implement environmental laws. (epa.gov/laws-regulation) The Clean Air Act – 42 U.S.C.  §7401 et seq. (1970), regulated air emissions from stationary and mobile sources. With the approval of this Act the EPA was able to establish the National Ambient Air Quality Standards (NAAQS) which regulates emissions of hazardous air pollutants that can harm public health. The Energy Policy Act – 42 USC  §13201 et seq. (2005) addressing energy  production in the United States, such as Energy efficiency; Renewable energy; Oil and gas; Coal; Nuclear matters; Vehicles and motor fuels. This Act provides loan guarantees for entities that develop or use inventive was that avoid producing greenhouse gases. Another provision of the Act increases the amount of biofuel that must be mixed with gasoline sold in the United States. (epa.gov/laws-regulation) America’s federal environmental laws set national standards, and on the condition that a state can shoulder the crucial task by enforcing these standards, they do by adopting laws that are as severe as the federal laws. Many states have assumed these responsibilities of enforcing the national standards by giving responsibility of specific programs throughout agencies within the state. The federal government is the overseer that enforces all cases and supervises the states’ activities while also monitoring state and the tribal operations of the Environmental Protection Agency programs. The Environmental Protection Agency supports the states and tribes to achieve effective enforcement and environmental compliance, and maintains support approved state programs through grant funds, and involvement. The Environmental Protection Agencies and state agencies make active efforts to educate the regulated community. A numerous compliance assistance tools have been put in place to help business, industry and state governments to conform to the environmental requirements. Web sites have been developed; hotlines, workshops, compliance training, fact sheets, and additional compliance guidelines are given to the regulated community. The Clean School Bus Program unites businesses, education, transportation, and public health organizations to encourage actions to stop the unnecessary idling of public schools busses. Modifying old schools busses with better emissions control technologies and proving cleaner fuels. The EPA is publishing a proposed rule designed to reduce air pollution, in 2017 the Tier 3 design would set new standards for vehicle emissions criteria and lessen the sulfur found in gasoline. This new rule would reduce tailpipe and evaporative emissions. The lower sulfur gasoline will improve  fuel economy by reducing gas consumption as well as reducing greenhouse gas (GHG) emissions. The Environmental Protection Agency seeks to provide a healthy environment. By partnership-building with states and communities the reduction of environmental pollutants becomes a joint venture. References: Retrieved from: http://www2.epa.gov/laws-regulations/summary-energy-policy-act Retrieved from: http://www.epa.gov/otaq/documents/tier3/420f13016a.pdf Retrieved from: http://www.epa.gov/air/caa/peg/understand.html

Tuesday, October 22, 2019

Renaissance Music Essays - Renaissance Music, Medieval Music

Renaissance Music Essays - Renaissance Music, Medieval Music Renaissance Music The Renaissance was a period by which modern scholars consider as that between 1350 1600. Abundant in this new age was inventions and individualistic beliefs. Changes in music and cultural behavior were some of the most evident development from its predecessor of the Middle ages. Period of new inventions, belief, musical styles of freedom, and individuality. It was a period of exploration and adventure from 1492-1519, which saw the likes of Christopher Columbus, Vasco da Gama, and Ferdinand Magellan. This was a drastic difference from the Middle Ages where the church held most of the power. The power was slowly transferring to the artist, musician, and people of high society. The word Renaissance means rebirth. Used by artist and musician to recover and apply the ancient learning and standards of Greece and Rome. Rich Italian cities, such as Florence, Ferrari, and milanland Venice started the Renaissance Age. Because these cities were very wealthy, people started spending money on different things, such as painting, learning materials, and new systems of government. These were good times for most and because of the ever-changing styles and attitudes towards culture and the church, music was the best buy for the money. This all gave rise to a new type of scholar, called the humanist. Humanism was a subject concerned with human kind and the culture. Painters and sculptors now used subjects from classical literature and mythology such as characters from Homers epic poems. Painters like Raphael and Leonardo da Vinci were more interested in realism and used linear perspective in creating their subjects. The nude body was a favorite theme of the ages where as in the Middle Ages was an object of shame and concealment. Artist was no longer regarded as mere artisans, as they were known in the past, bu t for the first time emerged as independent thinkers. The Catholic Church was far less powerful now than they had been in the Middle ages. The church no longer monopolized learning or the minds of the common worshiper. Aristocrats and the upper middle class now considered education a status symbol and music was an intricate part of that status quote. The invention of print accelerated the spread of learning. Johan Gutenberg was credited with printing the first Bible during this period, which gave this excellent piece of literature a wider audience. The printing press made books much easier to come by which made them cheaper. Now common people could afford a literary luxury, which was once only accessible to the rich. Therefore, literacy became more widespread since common people had access to all forms of print to include music. With the Renaissance was the idea of the universal man, every educated person was expected to be trained in music. As in the Middle Ages, the musicians worked in churches, courts and towns. The church remained an important patron of music, but musical activity gradually shifted to the courtyards. Kings princes and dukes competed for the finest composers. With this, new found fame musicians enjoyed higher status and pay than ever before. Composers were regarded higher and held important positions throughout Europe. Many musicians became interested in politics in hopes that their status as a musician or composer would help to foster ones careers. This was a sharp contrast from most of the Renaissance composers and musicians. Most were from the Low Countries and from families that were not of prominate nobility. In the renaissance, as in the Middle Ages vocal music was more important than instrumental music. The humanistic interest in language influenced vocal music in a new way. As a result, an especially close relationship was created between words and music. Composers often used word painting, musical representation of specific poetic images. Renaissance music sounds were more full than medieval music and had a more pleasing affect to the ear. New emphasis was put on the bass line for a richer harmony. Choruses music did not need instrumental accompaniment. The period was called the gold age of unaccompanied a Cappella choral music. This is where the present day barber shops quartet originated. This new technique made renaissance music both a pleasure and challenge, for each singer had to maintain an individual rhythm. This must have been

Monday, October 21, 2019

Saladin - Muslim Hero - Salah Ad-din Yusuf Ibn Ayyub

Saladin - Muslim Hero - Salah Ad-din Yusuf Ibn Ayyub Saladin was also known as: Al-malik An-nasir Salah Ad-din Yusuf I. Saladin is a westernization of Salah Ad-din Yusuf Ibn Ayyub. Saladin was known for: founding the Ayyubid dynasty and capturing Jerusalem from the Christians. He was the most famous Muslim hero and a consummate military tactician. Occupations: SultanMilitary LeaderCrusader Adversary Places of Residence and Influence: AfricaAsia: Arabia Important Dates: Born: c. 1137Victorious at Hattin: July 4, 1187Recaptured Jerusalem: Oct. 2, 1187Died: March 4, 1193 About Saladin: Saladin was born to a well-off Kurdish family in Tikrit and grew up in Balbek and Damascus. He began his military career by joining the staff of his uncle Asad ad-Din Shirkuh, an important commander. By 1169, at the age of 31, he had been appointed vizier of the Fatimid caliphate in Egypt as well as commander of the Syrian troops there. In 1171, Saladin abolished the Shiite caliphate and proclaimed a return to Sunni Islam in Egypt, whereupon he became that countrys sole ruler. In 1187 he took on the Latin Crusader Kingdoms, and on July 4 of that year he scored a resounding victory at the Battle of Hattin. On October 2, Jerusalem surrendered. In retaking the city, Saladin and his troops behaved with great civility that contrasted sharply with the bloody actions of the western conquerors eight decades earlier. However, though Saladin managed to reduce the number of cities held by the Crusaders to three, he failed to capture the coastal fortress of Tyre. Many Christian survivors of the recent battles took refuge there, and it would serve as a rallying point for future Crusader attacks. The recapture of Jerusalem had stunned Christendom, and the result was the launch of a third Crusade. Over the course of the Third Crusade, Saladin managed to keep the greatest fighters of the West from making any significant advances (including the notable Crusader, Richard the Lionheart). By the time fighting was finished in 1192, the Crusaders held relatively little territory in the Levantine. But the years of fighting had taken their toll, and Saladin died in 1193. Throughout his life he had displayed a total lack of pretension and was generous with his personal wealth; upon his death his friends discovered hed left no funds to pay for his burial. Saladins family would rule as the Ayyubid dynasty until it succumbed to the Mamluks in 1250. More Saladin Resources: Saladin in PrintBiographies,   primary sources, examinations   of Saladins military career, and books for younger readers . Saladin on the WebWebsites that offer biographical information on the Muslim hero and background  on the situation in the Holy Land during his lifetime. Medieval IslamThe Crusades Chronological Index Geographical Index Index by Profession, Achievement, or Role in Society The text of this document is copyright  ©2004-2015 Melissa Snell. You may download or print this document for personal or school use, as long as the URL below is included. Permission is  not  granted to reproduce this document on another website. For publication permission,  please  contact  Melissa Snell. The URL for this document is:http://historymedren.about.com/od/swho/p/saladin.htm

Sunday, October 20, 2019

Bootstrap Time

Bootstrap Time This essay is not about the whipping kind of bootstrap, but the kind you pull yourself up I received an anonymous request on my website, but I replied, wanting so badly to help this person get centered in his fight to be a writeror his enlightenment that maybe he isnt cut out to be a writer. Yes, there are some of those out there, and believe it or not, they never recognize themselves. I will not quote the person because the grammar was poor, but it went something like this: I have written a book. A well-known publisher wants to publish it. The publisher said it needed lots of work. They will not publish it on their own because of the work it needs. If I still want it published, theyll do so for $2,000. I want this book to reach people. Can you help me get money to make it happen? This is how many books on Amazon, Barnes Noble, Kobo, and more become published. This poor individual thought that paying the money would get someone to look at the book, fix it, and put it out there. I wrote him back and told him to forget about publishing and start learning how to write. If a vanity press tells him that the book needs work, dangthe book needs work. Time to suck it up and face the fact that his writing needs serious attention over a serious period of time until the book is as good as it can be. In other words Anyone can publish a book. Only good books sell. Only well promoted good books sell well. And you control it all. Nothing will make you feel more accomplished than to sweat blood and learn: 1) how to write 2) how to edit 3) how to publish (all methods) 4) how to sell There are too many tools and resources out there not to educate yourself. Yes, it takes time. All good things in life take time and dedication. My wish for you is to feel the fire to make your writing work well.

Saturday, October 19, 2019

Comparison of U.S. & Other Health System Essay Example | Topics and Well Written Essays - 750 words

Comparison of U.S. & Other Health System - Essay Example However higher costs does not mean better quality of life, health statistics in Spain show higher life expectancies (82.2 years), lower mortality rates (10.9/1000), and overall lower incidences of population major diseases (diabetes:9.0%, cardiovascular diseases: 23.15%, obesity: 23.95%) compared to US [life expectancies (78.6 years) mortality rates (13.9/1000), major diseases (diabetes:10.85%, cardiovascular diseases: 15.6%, obesity: 31.7% ) (National Center for Health Statistics, 2013; World Health Organization, WHO, 2012). Differences come from lifestyle habits, the Spanish have an active lifestyle and Mediterranean diet, and the US a sedentary lifestyle coupled with unbalanced diet (Borkan, et al., 2010; The Department for Professional Employees, DPE, 2013; National Center for Health Statistics, 2013; WHO, 2012). Health Care Financing: Comparison between US and Spain The US has hybrid healthcare financing: government medical subsidy is combined with private or group insurance for payments: private funding ( insurance or individual’s out-of-pocket payments) amount up to 50% of the total health care spending, with the rest from federal (38%) and local or state funds (12%) (DPE, 2013). For Spain, after healthcare reform financing is also shared, but the government pays up to 74% of the expenses, the rest is paid by individuals or employers (Legido-Quigley, et al., 2013). Spanish healthcare relies more heavily on taxes than US healthcare, contributing to lower healthcare costs per person compared with the latter (WHO, 2012). Health Care Administration: Comparison between US and Spain The US principal agency in healthcare provision is the Department of Health and Human Services (HHS), which works with other agencies (e.g. Agency for Healthcare Research and Quality, Centers for Disease Control and Prevention, etc.) to improve the population’s health through research and development, establishment of quality standards, among others (National Center f or Health Statistics, 2013). In Spain the Spanish National Institute of Health (Instituto Nacional de Salud, INSALUD) similarly functions as the HHS in providing the public with quality health services, however unlike HHS it is decentralized and delegates power over regional health communities (Borkan, et al., 2010). Health Care Personnel and Facilities: Comparison between US and Spain Only around one-fifths of the healthcare facilities in the US are government-owned and the rest are private institutions, accounting for high healthcare costs per individual (DPE, 2013). A low physician-to-patient ratio of 24 physicians per 10,000 people promotes high healthcare costs but less quality services (Holtz, 2008; National Center for Health Statistics, 2013). In Spain, healthcare facilities are mostly government-owned and subsidized, and physicians and nurses are salaried, which reduce additional costs per individual (Borkan, et al., 2010). Also, services are better due to a higher physician -to-patient ratio, 39 per 10,000 persons (WHO, 2012). Access and Inequality Issues: Comparison between US and Spain US ranks first in terms of health care responsiveness due to its state-of-the-art health care delivery system, which contributes to an increase in preventable deaths (Holtz, 2008; WHO, 2012). Spain’

Friday, October 18, 2019

Evolution and current status of the method Assignment

Evolution and current status of the method - Assignment Example This is mainly because there is no universal method that is appropriate and suitable for all teaching contexts. Rather, different methods will work better, or even worse, in different contexts and equally important, they are all partially valid (Prabhu 161). For instance, the choice of communicative language teaching can be viewed as an ignorant perception that what is suitable for Europe will also be appropriate for Africa simply because it is a documented method. Essentially, that only serves to develop resistance from learners. The approach of method limits the relationship between teachers and theorizers to one in which teachers are not empowered with knowledge, skill and autonomy implying that they may not devise relevant, coherent and systematic methods based on principled practicality (Kumaravadivelu 1994, p. 537). It is further observed by Brown (74) that the concept of method places all responsibility in the classroom environment upon the teacher and effectively barring stud ents from developing their own initiatives and strategies towards learning. Further, the concept also stifles the notion of self-regulation among learners, which means they cannot develop goal-oriented attempts to direct their learning. Rather, what is preferred is pedagogy of practicality that attempts to go beyond the deficiencies that characterize the dichotomies of the theories of theorists versus the theory of teachers by empowering teachers to form their own theories (Kumaravadivelu 2001, p. 541).

What are the benefits and hazards of medical marijuana Research Paper

What are the benefits and hazards of medical marijuana - Research Paper Example The federal government considers marijuana as a class one controlled substance and is, therefore, illegal to have while more than twenty states in the country have effective laws that govern the use of marijuana as a medicine. Such contradictions in the importance and illegality of the drug continue to heighten the controversy that surrounds the use of marijuana in the country. This report, therefore, discusses the benefits and the hazards of medical marijuana with the view to determining the suitability of the substance. The report presents a number of the medical benefits of the drug and compares them to the possible hazards of the substance. Such is a contribution to the raging debate on the use of the drug. Cannabis sativa also known as marijuana is a type of psychoactive drug. The drug has a number of physiological and psychoactive effects. Owing to such nervous effect, the federal government just as many other governments throughout the world banned the use of cannabis in the country. However, a number of scholars and medical practitioners began vouching for the use of the drug claiming that it presented a number of medical benefits. As such, medical marijuana has been in use in a number of state and come in various forms suitable for smoking, vaporization and ingestion in the form of a pill. However, the use of the drug and the numerous advantages it presents remain contentious. Scholars and medical practitioners continue to give varied opinions concerning the use of the drug. Supporters of the use of cannabis continue to cite a number of benefits it presents while opponents of the use of the drug allude to the numerous hazards it presents as the discussion below portrays. Key among the medical benefits of marijuana is that it contributes to the management of such serious diseases as cancer, sclerosis and AIDS among many others. Marijuana can help relieve the pain from the above diseases (Caulkins, Hawken, Kilmer & Kleiman, 2012).

Analysis of Valet Ticket Assignment Example | Topics and Well Written Essays - 250 words

Analysis of Valet Ticket - Assignment Example There is a variety of laws which regulates valet ticket across U.S. These laws have been put in place so as to safeguard consumers from the damage of cars and personal belongings inside the car. Valet parking is mostly common in California particularly in Southern California and Los Angeles (Chrest, 2001). Planet Hollywood hotel& casino based in Las Vegas has a valet parking service. The state must license each valet organization in California. In order for the hotel to qualify for the license, the hotel must have an insurance policy to protect the vehicles while in their custody. The insurance cover will protect the persons and vehicles up to a specific amount of a deductible. Bailment theory has been defined as the delivery of something in respect of trust for a special object. If a car is damaged or a person is injured while is in the hotel, the initial question is whether a valet ticket has been offered. When a car containing personal belongings is left in a valet parking, courts usually engage in two analysis to determine liability. One concerns the vehicle and the other concerns the contents in the vehicle. When keys are left with the valet operator, there is bailment. However, if there is damage to a vehicle, and the keys had not been surrendered to the valet there is no

Thursday, October 17, 2019

Research on a Rental Car Company Called Easycar Case Study

Research on a Rental Car Company Called Easycar - Case Study Example Easycars strives to offer its customers service quality that is redefined. Easycars offers the best in car rental services: latest cars in excellent condition with maximum efficiency and mileage. From efficient no - nonsense hatchbacks to shining limos, they have it all. Each car comes with a personalized service: an attendant/ chauffeur who knows the ins and outs of the car and would only be too happy to help a new customer, GPS equipment to help navigate the customer, a laptop charger, mobile phone charger, easy to read maps of the city with location of major landmarks and hotels. Only experienced drivers with a clean record are hired and made to undergo a rigorous training session before they start work with the company. Each car also comes with a complementary snack hamper and mineral water bottles that are replaced on a daily basis. Booking an Easycar is as easy as booking a flight ticket. Just login, register and book a car through the company's website or through a travel agen t. So, there you go! As easy as a click and go. Reliable and dependable are two words to easily describe the company's services. Easycars has a record of delivering excellent services in terms of reliability and dependability. In the rare event of a car breaking down, the company promises to send a replacement or a trained mechanic within half an hour. This is possible because of its partnership with other local, smaller auto companies and garages in smaller towns across the country. Thus, without investing in an office or personnel, Easycars is able to provide the customer reliable service and replacement in case of breakdowns. The employees are friendly, courteous, competent and trained to handle emergencies. Drivers have to undergo a strict background check through a reputed security agency before they can join the company. Each driver also has to provide two referrals before joining Easycars. So, the customer knows that he is in safe hands when hiring a car and a driver from Easycars. Easycars not only has booking staff, but an exclusive customer care section too. The staff is young, enthusiastic and ready to help. The Branch Manager, who would represent the face of the company can be reached on his cell number 24/7.The support staff has different plans suitable to each customer's budget and preferences. They are also willing to accommodate a few changes if requested by the customer. They do not go into forced selling or other gimmicks, instead discreetly allow the customers to make the choice. They just guide the customer in picking the best plan and tariff. The company has a tie-up with major luxury hotels and a few budget hotels across major cities in Hong Kong, Singapore and India. There are plans on the anvil for corporate discounts and offers, tie-up with airlines and hospitals too. The tie-up with hospitals is the unique selling point of Easycars as there has been a tremendous increase in people from the U.S and Europe coming to India for cost-effective medical treatment. In Singapore, the company offers discounts and attractive packages to groups of 20 or more tourists at Changi airport itself. 2.) Discuss cultural barriers and required adaptation when Easycar enters the Asian market. As Erica Walsh puts it "Many people can feel overwhelmed when planning a vacation to the Far East. The distance, language and cultural barriers

To What Extent Was Truman's Decision to Drop the Atomic Bomb Justified Research Paper

To What Extent Was Truman's Decision to Drop the Atomic Bomb Justified - Research Paper Example The first atomic bomb was dropped over Hiroshima by a B-29 war craft on august 6 1945, resulting in the destruction of the city and instant deaths of over 90,000 people. It is still not clear why japan hesitated in surrendering after the damage and carnage in Hiroshima as the Truman administration did not give them much time to respond. On august 9 1945, the second atomic bomb was dropped over Nagasaki, a secondary target, to avoid poor visibility due to bad weather in Kokura, the primary target. The bombing of Nagasaki resulted in over 60,000 instant deaths. The Truman administration was planning on further attacks, but japan surrendered 5 days after Nagasaki bombing. These actions exposed Truman to sharp criticism, with many people referring to the bombings as barbaric. The main aim of this report is to use various primary and secondary sources to determine the level to which Truman’s actions were justified. Primary sources include official documents, eyewitness accounts and excerpts from harry Truman’s speeches and diaries, and secondary sources include textbooks and journal articles supporting or opposing Truman’s actions. ... In any case, the American public was getting weary of war and Truman wanted to conclude it to prevent the countless deaths that were happening at the hands of the Japanese2. In addition, Truman was not enjoying the public perception that he was too soft on the Japanese3. Russia had the intentions of taking over the Japanese territory and something had to be done about it; and Truman figured that the United States had to show its power to the world to prevent the Soviet Union from emerging as the world’s super power4. Truman thought that if Russia gained any more power than it had, then it would resort to enforcement, spread and strengthening of communism5. The atomic bombs seemed to be the ideal tool to show America's superiority over the Soviet Union; and Truman showed the Soviet Union that he had the bombs and was ready to use them6. Japan only acted as a demonstration board since the United States was neither in good terms with japan, nor with the soviet union. However, Tru man did not expect to cause deaths of innocent civilians, in fact, he believed that the two cities he ordered bombed were military bases7. In addition, Japan, USSR, and Germany were developing nuclear weapons; it was only a matter of the country that could use theirs first, which was mainly the reason why the United States joined hands with Canada and United Kingdom to pursue the Manhattan project8. To avoid the possibility of a nuclear war, Truman decided to use the means at his disposal to instill fear to the other countries developing the weapons. The other reason cited for Truman's use of the atomic bombs was to end the war as quickly as possible so that he could save countless of lives, including American9, Japanese, and

Wednesday, October 16, 2019

Analysis of Valet Ticket Assignment Example | Topics and Well Written Essays - 250 words

Analysis of Valet Ticket - Assignment Example There is a variety of laws which regulates valet ticket across U.S. These laws have been put in place so as to safeguard consumers from the damage of cars and personal belongings inside the car. Valet parking is mostly common in California particularly in Southern California and Los Angeles (Chrest, 2001). Planet Hollywood hotel& casino based in Las Vegas has a valet parking service. The state must license each valet organization in California. In order for the hotel to qualify for the license, the hotel must have an insurance policy to protect the vehicles while in their custody. The insurance cover will protect the persons and vehicles up to a specific amount of a deductible. Bailment theory has been defined as the delivery of something in respect of trust for a special object. If a car is damaged or a person is injured while is in the hotel, the initial question is whether a valet ticket has been offered. When a car containing personal belongings is left in a valet parking, courts usually engage in two analysis to determine liability. One concerns the vehicle and the other concerns the contents in the vehicle. When keys are left with the valet operator, there is bailment. However, if there is damage to a vehicle, and the keys had not been surrendered to the valet there is no

Tuesday, October 15, 2019

To What Extent Was Truman's Decision to Drop the Atomic Bomb Justified Research Paper

To What Extent Was Truman's Decision to Drop the Atomic Bomb Justified - Research Paper Example The first atomic bomb was dropped over Hiroshima by a B-29 war craft on august 6 1945, resulting in the destruction of the city and instant deaths of over 90,000 people. It is still not clear why japan hesitated in surrendering after the damage and carnage in Hiroshima as the Truman administration did not give them much time to respond. On august 9 1945, the second atomic bomb was dropped over Nagasaki, a secondary target, to avoid poor visibility due to bad weather in Kokura, the primary target. The bombing of Nagasaki resulted in over 60,000 instant deaths. The Truman administration was planning on further attacks, but japan surrendered 5 days after Nagasaki bombing. These actions exposed Truman to sharp criticism, with many people referring to the bombings as barbaric. The main aim of this report is to use various primary and secondary sources to determine the level to which Truman’s actions were justified. Primary sources include official documents, eyewitness accounts and excerpts from harry Truman’s speeches and diaries, and secondary sources include textbooks and journal articles supporting or opposing Truman’s actions. ... In any case, the American public was getting weary of war and Truman wanted to conclude it to prevent the countless deaths that were happening at the hands of the Japanese2. In addition, Truman was not enjoying the public perception that he was too soft on the Japanese3. Russia had the intentions of taking over the Japanese territory and something had to be done about it; and Truman figured that the United States had to show its power to the world to prevent the Soviet Union from emerging as the world’s super power4. Truman thought that if Russia gained any more power than it had, then it would resort to enforcement, spread and strengthening of communism5. The atomic bombs seemed to be the ideal tool to show America's superiority over the Soviet Union; and Truman showed the Soviet Union that he had the bombs and was ready to use them6. Japan only acted as a demonstration board since the United States was neither in good terms with japan, nor with the soviet union. However, Tru man did not expect to cause deaths of innocent civilians, in fact, he believed that the two cities he ordered bombed were military bases7. In addition, Japan, USSR, and Germany were developing nuclear weapons; it was only a matter of the country that could use theirs first, which was mainly the reason why the United States joined hands with Canada and United Kingdom to pursue the Manhattan project8. To avoid the possibility of a nuclear war, Truman decided to use the means at his disposal to instill fear to the other countries developing the weapons. The other reason cited for Truman's use of the atomic bombs was to end the war as quickly as possible so that he could save countless of lives, including American9, Japanese, and

Ethics in Psychology Essay Example for Free

Ethics in Psychology Essay The definition of ethics is as follows: â€Å"a theory or system of moral values; the general nature of morals and of the specific moral choices to be made by a person†. (dictionary.com ) In modern day society, we have bio-ethicists; professionals who are trained to judge what can be considered ethical, as well as strict guidelines set forth by the APA (American Psychological Association). However, during the early years of the formation of Psychology, there were no bio-ethicists or universal guidelines, therefore some of the early experiments such as the â€Å"Little Albert†, and â€Å"Mother Attachment† would be considered unethical and therefore would not be permitted today. In 1920, behaviorist John B. Watson and his assistant Rosalie Rayner conducted an experiment now called the â€Å"Little Albert†. The desired outcome of the experiment was to show empirical evidence of classical conditioning in humans. (T. Bartlett) A similar study that preceded â€Å"Little Albert† was conducted by Russian physiologist Ivan Pavlov, which demonstrated the conditioning process in dogs. It is said that Watson wanted to continue and further Pavlov’s research to eventually show that emotional reactions could be classically conditioned in humans. Watson and Rayner first selected a nine month old baby from a local hospital, his name was Douglas Merritte. The child was then exposed to a series of stimuli including a white rat, a rabbit, a monkey, masks, and burning newspapers; his initial reactions were observed and recorded. The boy initially showed no fear of any of the objects he was shown. However, the second time the boy was exposed to the white rat, it is accompanied by a loud starling clang, that clearly frightens the child. This portion of the experiment is repeated multiple times until the mere sight of the white rat, or creatures that have a similar appearance, frighten the child even when unaccompanied by the startlingly clang. The researchers have successfully conditioned Little Albert to be afraid. (T. Bartlett) Today â€Å"Little Albert† is considered to be a cruel experiment of questionable value, clearly in violation of all five of the APA’s general ethical guidelines. The APA states that psychologists must: â€Å"respect the dignity and worth of all people, and the rights of individuals to privacy, confidentiality, and self-determination. Be aware that special safeguards may be necessary to protect the rights and welfare of persons or communities whose vulnerabilities impair autonomous decision making. Be aware of and respect cultural, individual and role differences, including those based on age, gender, gender identity, race, ethnicity, culture, national origin, religion, sexual orientation, disability, language and socioeconomic status and consider these factors when working with members of such groups. Try to eliminate the effect on their work of biases based on those factors, and they do not knowingly participate in or condone activities of others based upon such prejudices.†(APA) The first problem with â€Å"Little Albert† stems from the harm caused to the individual in question. Douglas Merritte was ultimately driven to feel extreme fear and even terror when exposed to anything that remotely resembled the white rat. This was mentally damaging for the child, and may have impaired his ability to integrate himself into society at a later date. (Cherry. K) Secondly, the right to withdraw was not present in the experiment; even when the boy became distressed and even ill the experiment continued. Therefore, today, the â€Å"Little Albert† experiment would be considered highly unethical. During the 1960’s, American Psychologist Harry Harlow, conducted a series of controvertial experiments known as the â€Å"Mother Attachment Experiments†. These experiments were used to analyze the mother-child relationship in primates. In Harlows initial experiments, infant monkeys were separated from their mother’s shortly after birth and were raised instead by surrogate mothers made either wire or soft terry cloth. In one experiment both types of surrogates were present in the cage, but only one was equipped with the ability to nurse the infant. Some infants received nourishment from the wire surrogate, and others were fed from the cloth mother. Harlow established that mother love was really behavior based, meaning the offspring would seek physical comfort, rather than feeding. Harlows isolation studies also demonstrated the need for maternal interaction with their infants and the importance of play as part of the normal process of psychosocial growth. Harlow has received multiple awards for these experiments, they have been deemed of extreme significance for understanding those aspects of human behavior related to depression, aggression or sexual dysfunction, which originated in the formative years of mother-infant interaction.†(Theodore Lidz of Yale University Medical School). However, due to the fact that the experiments caused extreme psychological effects on the primates used in the trials, they could be seen as highly unethical. In the APA’s ethical principles of psychology, section 8.09 clearly states that psychologists must have a: Humane Care and Use of Animals in Research. Subsections B and D of sectio n 8.09 are relevant when considering Harlow’s treatment of the primates. Subsection B states: â€Å"Psychologists trained in research methods and experienced in the care of laboratory animals supervise all procedures involving animals and are responsible for ensuring appropriate consideration of their comfort, health and humane treatment† (APA). In the â€Å"Mother Attachment† experiments, Harlow himself was not trained in the research methods and experienced in the care of the primates, nor was there any consideration for their comfort or mental health after the experiment. Furthermore, subsection D states that: â€Å"Psychologists make reasonable efforts to minimize the discomfort, infection, illness and pain of animal subjects† (APA). Harlow failed to minimize the negative effects of his experiments on the primates in a long term setting; most primates involved in the study were clinically depressed after the termination and in some cases during the experiment.Therefore, in accordance to the APA’s ethical guidelines Harlowâ €™s experiment would be seen as morally questionable and in most cases unethical in modern society. There is no question that the science which is psychology has been built and greatly advanced through the means of what some would consider unethical means and experimentation. â€Å"Little Albert† is seen today as a cruel experiment of questionable value. However knowledge was gained from this â€Å"unethical† experiment that has helped modern day psychologists. The â€Å"Mother Attachment† experiments, have won multiple awards for their â€Å"extreme significance† (Theodore Lidz) in the analysis of behavior based on the mother-child relationship; despite the fierce criticism and controversy surrounding the experiments. Should both experiments be considered morally wrong and unethical? Perhaps. Did both experiments play a large role in the advancement of psychology? Without a doubt. Therefore in Harlow and Watson’s cases, the end justifies the means. References American Psychological Association (APA). Ethical Principles of Psychologists and Code of Conduct. Retrieved December 10, 2012, from http://www.apa.org/ethics/code/index.aspx?item=3 Bartlett, T. (2012). The Sad Saga of Little Albert Gets Far Worse for a Researchers Reputation . Chronicle of Higher Education, Vol. 58(Issue 23), A-26. Cherry, K. Psychology Complete Guide to Psychology for Students, Educators Enthusiasts. Little Albert The Little Albert Experiment. Retrieved December 10, 2012, from http://psychology.about.com/od/classicpsychologystudies/a/little-albert-experiment.htm (1975). Honoring Harlow for dedicated research . Science News , Vol.107 (Issue 24), 383.

Monday, October 14, 2019

Information Systems Acquisition Development And Maintenance Information Technology Essay

Information Systems Acquisition Development And Maintenance Information Technology Essay The ISO 27002 standard is the new name of the ISO 17799 standard. It is code of practice for information security. It basically outlines hundreds of potential controls and control mechanisms, which may be implemented. The standard which is to be established guidelines and general principles for initiating, implementing, maintaining, and improving information security management inside an organization. The actual controls listed in the standard are proposed to address the specific requirements identified via a formal risk assessment. The standard is also intended to provide a guide for the development of organizational security standards and effective security management practices and it is also helpful in building confidence in inter-organizational activities ISOs future plans for this standard are focused largely around the development and publication of industry specific versions. One of the content of the ISO 27002 is information system acquisition, development, and maintenance, the details of which are as follows:- Information Systems Acquisition, Development, and Maintenance (ISO 27002) Table of Contents Overview Standards Security Requirements of the information systems Correct processing of the information Cryptographic control Security of the system files Security in development and support processes Technical vulnerability Management Overview Information security must be taken into account in the Systems Development Lifecycle (SDLC) processes for specifying, building/acquiring, testing, implementing and maintaining IT systems. Automated and manual security control requirements should be analyzed and fully identified during the requirements stage of the systems development or acquisition process, and incorporated into business cases.   Purchased software should be formally tested for security, and any issues risk-assessed. The  Systems Development Life Cycle (SDLC), or  Software Development Life Cycle  in systems  and  software engineering, is the process of creating or altering systems, and the models and  methodologies  that people use to develop these systems. The concept generally refers to  computer  or  information systems. Systems Development Life Cycle (SDLC) is a process used by a  systems analyst  to develop an  information system, including  requirements, validation,  training, and user (stakeholder) ownership. Any SDLC should result in a high quality system that meets or exceeds customer expectations, reaches completion within time and cost estimates, works effectively and efficiently in the current and planned  Information Technology  infrastructure, and is inexpensive to maintain and cost-effective to enhance Standards ISO 27002: Information Security Management   Clause 12: Information Systems Acquisition, Development, and Maintenance Security Requirements of the information systems Security can be integrated into information systems acquisition, development and maintenance by implementing effective security practices in the following areas. Security requirements for information systems Correct processing in applications Cryptographic controls Security of system files Security in development and support processes Technical vulnerability management Information systems security begins with incorporating security into the  requirements  process for any new application or system enhancement. Security should be designed into the system from the beginning. Security requirements are presented to the vendor during the requirements phase of a product purchase. Formal testing should be done to determine whether the product meets the required security specifications prior to purchasing the product   Security requirements are established to ensure as an integral part of the development or performance of an information systems. The acquisition of a system or application often includes a Request for Proposals (RFP), which is a formal procurement process. During this process, security requirements need to be identified. Indiana University includes both  a security review and a security questionnaire as part of the RFP process. Learn more about this effective practice. The main objective of this category is to ensure that security is an integral part of the organizations information systems, and of the business processes associated with those systems. Correct processing of the information This category aims to prevent errors, loss, unauthorized modification or misuse of information in applications. Application design includes controls such as those to validate input/output data, internal processing,  and message integrity, in order to prevent erros and preserve data integrity. Input data validation  Data input in applications should be validated to ensure that the data is correct and appropriate.   Control includes use of both automatic and manual methods of data verification and cross-checking, as appropriate and defined responsibilities and processes for responding to detected errors. Control of internal processing Validation checks should be incorporated into applications to detect the corruption of information through processing errors or deliberate acts.  Ã‚   Control includes use of both automatic and manual methods of data verification and cross-checking, as appropriate and defined responsibilities and processes for responding to detected errors. Message integrity  Requirements for ensuring authenticity and protecting message integrity in applications should be identified, and appropriate controls identified and implemented. Output data validation  Data output from applications should be validated to ensure that the processing of stored information is correct and appropriate to the circumstances.   Control includes use of both automatic and manual methods of data verification and cross-checking, as appropriate and defined responsibilities and processes for responding to detected errors. Cryptographic control Objective of cryptographic is to  describe considerations for an encryption policy in order to protect information confidentiality, integrity, and authenticity. A cryptography policy should be defined, covering roles and responsibilities, digital signatures, non-repudiation, management of keys and digital certificates  etc. Certain data, by their nature, require particular confidentiality protection. Additionally, there may be contractual or other legal penalties for failure to maintain proper confidentiality when Social Security Numbers are involved, for example. Parties who may acquire unauthorized access to the data but who do not have access to the encryption key the password that encrypted the data cannot feasibly decipher the data. Data exist in one of three states: at rest in transit or undergoing processing. Data are particularly vulnerable to unauthorized access when in transit or at rest. Portable computers (holding data at rest) are a common target for physical theft, and data in transit over a network may be intercepted. Unauthorized access may also occur while data are being processed, but here the security system may rely on the processing application to control, and report on, such access attempts. This category aims to protect the confidentiality, integrity and authenticity of information by cryptographic means. Policy on the use of cryptographic controls. Policies on the use of cryptographic controls for protection of information should be developed and implemented.   Control includes Statement of general principles and management approach to the use of cryptographic controls Specifications based on a thorough risk assessment,  that considers appropriate  algorithm selections, key management and other core features of cryptographic implementations. Consideration of legal restrictions on technology deployments. Application, as appropriate, to data at rest and fixed-location devices, data transported by mobile/removable media and embedded in mobile devices, and data transmitted over communications links and specification of roles and responsibilities for implementation of and the monitoring of compliance with the policy key management.  Key management policies and processes should be implemented to support an organizations use of cryptographic techniques.   Control includes procedures for distributing, storing, archiving and changing/updating  keys recovering, revoking/destroying and dealing with compromised keys; and logging all transactions associated with keys. Security of the system files The main objective is to ensure the security of system files. Security requirements should be identified and agreed prior to the development or acquisition of information systems. Security requirements analysis and specification An analysis of the requirements for security controls should be carried out at the requirements analysis stage of each project. Control of operational  software. Procedures should be implemented  to control the installation of software on operational systems, to minimize the risk of interruptions in or corruption of information services.   Control includes: updating performed only with appropriate management authorization; updating performed only by appropriately trained personnel; only appropriately tested and certified software deployed to operational systems; appropriate change management and configuration control processes for all stages of updating; appropriate documentation of the nature of the change and the processes used to implement it; a rollback strategy in place, including retention of prior versions as a contingency measure; and Appropriate audit logs maintained to track changes. Access to system files (both executable programs and source code) and test data should be controlled. To ensure that system files  and sensitive data in testing environments  are protected against unauthorized access, and that  secure code management systems and processes are in place for configurations, software, and source code. Documented procedures and revision control systems should be utilized to control software implementation for both applications and operating systems. New York University described their approach in the presentation. Protection of system test data  Ãƒ ¢Ã¢â€š ¬Ã‚ ¢ Test data should be selected carefully and appropriately logged, protected and controlled. Access control  for program source  code  Ãƒ ¢Ã¢â€š ¬Ã‚ ¢ Access to program source code should be restricted.   Control includes: appropriate physical and technical safeguards for program source libraries, documentation, designs, specifications, verification and validation plans; and maintenance and copying of these materials subject to strict change management and other controls. Security in development and support processes This category aims to maintain the security of application system software and information. Change control procedures  The implementation of changes should be controlled by the use of formal change control procedures.   Control includes: a formal process of documentation, specification, testing, quality control and managed implementation; a risk assessment, analysis of actual and potential impacts of changes, and specification of any security controls required; a budgetary or other financial analysis to assess adequacy of resources; formal agreement to and approval of changes by appropriate management; and appropriate notification of all affected parties prior to implementation, on the nature, timing and likely impacts of the changes; Scheduling of changes to minimize the adverse impact on business processes. Information leakage Opportunities for information leakage should be appropriately minimized or prevented.   Control includes: risk assessment of the probable and possible mechanisms for information leakage, and consideration of appropriate countermeasures; regular monitoring of likely information leak mechanisms and sources; and End-user awareness and training on preventive strategies (e.g., to remove meta-data in transferred files). Application system managers should be responsible for controlling access to [development] project and support environments.   Formal change control processes should be applied, including technical reviews.   Packaged applications should ideally not be modified. Checks should be made for information leakage for example  via  covert channels and Trojans if these are a concern. A number of supervisory and monitoring controls are outlined for outsourced development. One of the security layers that can expose serious vulnerabilities is the application layer. Inventorying and securing all applications, software interfaces, or integration points that touch sensitive data is crucial in any organization that handles personal identity data, HIPAA, PCI, or any data that can lead to identifying confidential information. Unfortunately, this layer is subject to extensive variations and stretches across many technologies, human competencies, and organizational controls, practices, and standards. As such, it is difficult to secure and sustain, usually requiring departments to re-evaluate much of their software development, acquisition, and production control organization, staffing, and practices. Moreover, since applications are enhanced to adapt to changing business needs relatively often, even while the technology they depend on may also be changing, a consistent and routinized approach to maintaining their security must be adopted. Fortunately, there are many excellent resources to help organizations get started. a formal process of documentation, specification, testing, quality control and managed implementation; a risk assessment, analysis of actual and potential impacts of changes, and specification of any security controls required; a budgetary or other financial analysis to assess adequacy of resources; formal agreement to and approval of changes by appropriate management; and appropriate notification of all affected parties prior to implementation, on the nature, timing and likely impacts of the changes; scheduling of changes to minimize the adverse impact on business processes Technical vulnerablility Management Technical vulnerabilities in systems and applications should be controlled by monitoring for the announcement of relevant security vulnerabilities, and risk-assessing and applying relevant security patches promptly. To ensure that procedures are implemented to mitigate and/or patch technical vulnerabilities in systems and applications. Control of internal processing  Validation checks should be incorporated into applications to detect the corruption of of information through processing errors or deliberate acts.  Ã‚   Control includes: use of both automatic and manual methods of data verification and cross-checking, as appropriate; and defined responsibilities and processes for responding to detected errors. This category aims to reduce risks resulting from exploitation of published technical vulnerabilities. Control of technical vulnerabilities  Timely information about technical vulnerabilities of information systems used by the organization should be obtained, evaluated in terms of organizational exposure and risk, and appropriate countermeasures taken.   Control includes: A complete inventory of information assets sufficient to identify systems put at risk by a particular technical vulnerability; Procedures to allow timely response to identification of technical vulnerabilities that present a risk to any of the organizations information assets, including a timeline based on the level of risk; Defined roles and responsibilities for implementation of countermeasures and other mitigation procedures. Conclusion Sadly it is not a perfect world and when breaches of security do occur, for whatever reason, it is important to contain the result by reporting the incident and responding to it as quickly as possible. To whom should an incident be reported? What information will that person need to know? What precautions should one take to limit the organizations exposure to the security breach? It is essential that all staff know what comprises an information security incident and also a security weakness and to whom they report it. At the same time it is essential that all management know how to respond if they are on the escalation process for information security incident management reporting or escalation. It may be that there will be little or no time to organise a response to the incident, in which case the more thinking which has gone into the response procedure the better placed the organisation will be to deal with it. Documented and practices information security incident management procedures should be developed and practiced. Whilst information security incidents are not a desired outcome for any organisation, they must learn, and their staff must learn, from them to prevent them occurring again. A process of learning from such incidents by use of induction training, ongoing awareness training or other means should be undertaken and all staff, contractors and third parties should be undertaken. Remember that if the response is likely to include formal disciplinary action then the full process should be formally described and approved by the organisational management to remove the possibility of dispute after the event. If evidence is to be collected it should be done by competent staff and with due regard for rules of evidence for the jurisdiction.