Friday, December 27, 2019

Laws for Americans Taking Guns Into Canada

Americans taking guns into Canada or transporting guns through Canada  need to know that the Canadian government has—and strictly enforces—zero-tolerance  gun control laws that must be followed by U.S. citizens taking firearms into Canada. Most problems arise from Americans forgetting they have a handgun with them when crossing the border. This happens most often to Americans from states that allow residents to carry concealed weapons. Failure to declare any firearm will result in confiscation and probably the destruction of the weapon. A fine will be assessed and jail is a possibility. In general, Americans are allowed to bring up to three allowed guns into Canada as long as the proper forms are filled out and fees paid. Guns must be declared at the border crossing. Even when guns are declared and the proper forms are completed, Canadian border service officers require travelers to prove they have a valid reason for bringing a firearm into the nation. Border officers also check to ensure that all firearms are safely stored for transportation and that the guns being transported match those described in the declaration documents. Minimum Age Only people age 18 years or older are allowed to bring firearms into Canada. While persons younger than 18 may use a firearm in Canada under certain circumstances, an adult must be present and will be held legally responsible for the firearm and its use. Non-Resident Firearms Declaration U.S. citizens bringing firearms into Canada, or taking firearms through Canada to Alaska are required to fill out a Non-Resident Firearms Declaration (Form CAFC 909 EF). The form must be presented in triplicate, unsigned, to a Canadian customs officer at the travelers first point of entry into Canada. The customs officer must witness the signature, so do not sign the form beforehand. Persons bringing more than three firearms into Canada also need to complete a Non-Resident Firearm Declaration Continuation Sheet (form RCMP 5590). Once it has been approved by the Canadian customs officer, the Non-Resident Firearms Declaration is valid for 60 days. The confirmed form acts as a license for the owner and as a temporary registration certificate for the firearms brought to Canada. The declaration can be renewed for free, providing it is renewed before it expires, by contacting the Chief Firearms Officer (CFO) (call 1-800-731-4000) of the relevant Canadian province or territory. A confirmed Non-Resident Firearms Declaration costs a flat fee of $25, regardless of the number of firearms listed on it. It is valid only for the person who signs it and only for those firearms listed on the declaration. Once the Non-Resident Firearms Declaration has been approved by the CBSA customs officer, the declaration acts as a license for the owner and it is valid for 60 days. For visits longer than 60 days, declarations can be renewed for free, providing they are renewed before they expire, by contacting the Chief Firearms Officer of the relevant province or territory. Persons bringing firearms into Canada must also comply with Canadian Storage, Display, Transportation and Handling of Firearms regulations. The Canadian customs officer at the point of entry can inform firearms owners of these regulations. Allowed, Restricted, and Prohibited Approval of the Non-Resident Firearms Declaration allows only standard rifles and shotguns commonly used for hunting and target shooting to be transported into or through Canada. Handguns with at least 4-inch barrels are considered restricted firearms and are allowed in Canada, but require the completion an approval of an Application for an Authorization to Transport Restricted Firearms. This Non-Resident Firearm Declaration costs $50 Canadian. Handguns with barrels shorter than 4-inches, fully automatic, converted automatics, and assault-type weapons are prohibited and not allowed in Canada. In addition, certain knives, even those used for hunting and fishing, may be considered prohibited weapons by Canadian officials. Related Information In all cases, travelers must declare to Canadian Customs authorities any firearms and weapons in their possession when entering Canada. There are often facilities near border crossings where weapons may be stored, pending the travelers return to the United States, but this should be done before attempting to enter Canada. Canadian law requires that officials seize firearms and weapons from persons crossing the border who deny having them in their possession. Seized firearms and weapons are never returned. The easiest way to transport firearms is to have them crated and shipped to your destination via a commercial carrier.

Thursday, December 19, 2019

Cognitive Behavioural Therapy Described as a Sticking Plaster

Cognitive Behavioural Therapy has been described as a ‘sticking plaster for the problems that people may bring to counselling (Observer, 19/02/06). With reference to the literature, critically evaluate the arguments for and against this view. Cognitive Behavioural Therapy (CBT) is a combination of two kinds of therapy; cognitive therapy and behavioural therapy (Bush, 2005). It has been shown to have a positive impact on a wide range of mood and anxiety disorders, such as depression, insomnia and panic attacks as well as more recently psychosis (schizophrenia). However, whether or not CBT actually solves the issue at hand or simply covers it up, as a sticking plaster (Martin Helmore, 2006) has recently been a topic of†¦show more content†¦Gloaguen (1998) used meta-analysis to compare the use of CBT and behavioural therapy in treating patients with depression. The study was controlled for using waiting list and placebo controls. CBT was found to be superior when compared to the controls, and also when compared to behavioural therapy, although most of the behavioural therapy trials analysed were uncontrolled. This aside, when compared to control groups CBT does have an advantage over no treatment, which is evidence of the concept that it is better than nothing for individuals suffering from depression as it can improve their quality of life. A recent trial (DeRubeis et al., 2005) found antidepressants (serotonin reuptake inhibitors) to be equally as effective in the treatment of individuals with moderate to severe as CBT. Althou gh both treatments can be seen as equally effective, the use of CBT does not require people to ingest drugs, so if both are equally as effective the CBT would be the clear choice for individuals with depression. The evidence for the area of depression and the usefulness of CBT is mixed, in spite of this, it s merits are clearly obvious. Another area where CBT is used is in the treatment of individuals with obsessive compulsive disorder (OCD). The use of CBT in this are has been more successful with not only alleviating the symptoms ofShow MoreRelatedStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pagesprofession. Chambers is CEO of Cisco Systems, the world’s largest maker of networking equipment. He is respected as a visionary leader and innovator who has the ability to drive an entrepreneurial culture. As an effective communicator, Chambers is described as warmhearted and straight talking. In this photo Chambers speaks during a launch ceremony of a green technology partnership Cisco formed with a university in China. 6 CHAPTER 1 What Is Organizational Behavior? others and who are responsibleRead MoreBrand Building Blocks96400 Words   |  386 Pagesvirtually owned the copier industry; its market share was literally 100 percent. Barriers to entry included a dominant brand name, a strong set of patents, and a huge customer base committed to a leasing program and service organization. Instead of sticking with its strengths and defending either the low end by attacking costs or the high end by developing new technologies. It diverted resources into an office of the future concept. As a result, the company was blind sided by Kodak, and Canon, who

Wednesday, December 11, 2019

Analysis the Watsons company free essay sample

The new era is changing the business environment and competition mechanism, this report follows management theory as a guide, analysis Watsons current situation, external factors and internal factors, etc. Pointed out problems in Watsons management, proposed countermeasures, finally recommendations and summarized. 2. 0 Introduction 2. 1 Watsons Group Each week, millions of customers in 13 countries and regions, more than 8,400 Watsons stores, employing over 98,000 staffs. As Asias leading health and beauty chain store dates back to 1828, when the Canton Dispensary was first founded as a clinic to provide free medical aid to the poor family in Canton province, China. In 1981, Sir. Li Ka-shing’s Hutchison Whampoa Company have been acquired A. S. Watson Group (Hong Kong) Ltd. , since then, Watsons relied on a strong economic strength and flexible business philosophy, Watsons’s rapid rise in Asia. Developing to today, Watsons business, including health care products, beauty products, perfumes, cosmetics, food, drinks, electronic products, wine and airport retail business. We will write a custom essay sample on Analysis the Watsons company or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Also, Watsons become a well-known retail brands. 2. 2 Watsons Singapore Watsons Personal Care Store made its foray into the Singapore market in April 1988 at Marina Square. Watsons’s first pharmacy counter at Ngee Ann City in 2003, Watsons has since expanded rapidly through this few years. Today, Watsons Singapore has 112 stores and 31 pharmacy counters located within its key stores, more than 650 employees service Singapore market. 2. 3 Financial performance For 2011, Watsons Asia area retail turnover is 16. 857 billion Hong Kong dollars, among Singapore market contribute was 7% of turnover, compared with 2010, down 1%, but operating income increased to 34. 71 million Hong Kong dollars (about 6. 94 million Singapore dollars). 2. 4 Key Challenges Watsons as a famous personal care brand in Asia-Pacific area, especially in Singapore and Southeast Asia, the main challenge is competitions. Because in Singapore, Watsons personal care store’s biggest competitor is â€Å"Guardian†, the main business of the two companies are the same, Guardian pursuit differentiated services to customers, but Watsons has very strong economic support, Watsons can choose very good location to run their business, that is difficult to achieve for Guardian Singapore. 3. 0 Environmental Analysis 3. 1 External analysis 3. 1. 1 PEST analysis Political Singapore as a member of World Trade Organization (WTO), Singapore Government encourage foreign excellent company entry to Singapore to set their business, Singapore Economic Development Board promised foreign companies have preferential tax rate of 5% -10%, the maximum term of 10 years or 20 years. Singapore Government has the most comprehensive legal system, the Singapore Government provide â€Å"Investment protection plan† to foreign company in some special business areas, also Singapore as financial center in Asia, the Government will be provide financial support to foreign technology company. Economic Singapore is one of Asias leading developed country, Singapore residents per capita income was $ 40,070 in 2011, ranked 29th in the world, on the residents’ life expenditure side, Food accounted for 22%, Clothing Footwear accounted for 3%, Health care accounted for 6%. Thus, in life expenditure side, the residents pay 30% as their basic expenditure. Follow this data, we can see the market of personal care potential is huge, in todays personal care market, foreign enterprises have become the industry leader, in the past few years, there are not few local enterprises to get involved in field of personal care stores. Also, Singapore Government released population White Paper, the Government is expected to 2020, Singapores total population of 5. 8 million to 6 million, the market demand will increase. Therefore, the performance of the market forces and economic feedback will be better. Social The structure of household chemicals from basic daily consumption shift to personalized consumption. In the era of personalized consumer, consumers pay more attention to the psychological needs, their psychological feelings to decide it is reasonable to measure consumer behavior and attractive of the goods. Watsons has a good corporate image in Singapore. For example, â€Å"Watsons Singapore has recently announced its official fight against breast cancer—the No. 1 cancer killer in Singapore. † Watsons Singapore held various public service activities every year, to build good corporate social image. Thus, to obtain the support and loyalty of many customers, peoples lifestyles and consumer attitudes are changing; promote the consumption of personal care and health. Technological Environment from a technical point of view, sustainable development is a source of technological innovation, environmental protection and energy-saving ideas, promote Watsons own products to technological innovation, in the future, Cosmetics and health care products industry must focus on core competitiveness are scientific and technological content of products. Cosmetics and health products industry will become a new industry of life science applications. Therefore, expand product development capabilities, technology innovation, are one of the important factors. Porter 5 forces Bargaining power of buyers Consumers are usually dispersed, we will be divided consumer into three types. First type, some consumers may just walk around, second type, concerned about the price consumers, third type, really need to buy products consumers. Modern consumers need high-class service, in today of information transparency, compare price is very convenience, thus, they are main reasons for consumer bargain. Bargaining power of Suppliers There are many Watsons’s branch stores in the world; Watsons can be a lot of stock to reduce the purchase price. And Watsons’s own brands are ordered directly from the manufacturer of the product with lowest price, also the price is lower than other same products by other brands. Threat of new entrants For personal care market, low requirement to entry market and high profits, attract many related companies joined the possibility is very high. Simultaneously, more and more competitors use low prices strategy to attract consumers, such as online make up store, small shopping center. In addition to the low-price strategy, but Watsons after-sales service to strengthen its market position. Threat of substitute products or services Even though other personal care stores sell same products, may other store provide professional purchasing guides, but compare with price and quality of products or other reasons, all can affect consumer wishes, thus may have threats of substitute products and services. Rivalry among existing competitors The chain of personal care stores rapid growth in the market; also it has high profits, thus, the same industry companies by providing differentiated products, so as to compete with the competitors. For example, Watsons focus on after-sales service, Guardian focus on differentiation of products and services, other small cosmetic stores focus on category of cosmetics, but Watsons is a combination of department stores and cosmetics. 3. 2 Internal analysis 3. 2. 1 Tangible Financial resource Watsons Singapore is a member of A. S. Watsons Group under Sir. Li Ka-shing’s Hutchison Whampoa Limited, the parent company supports the development of Watsons in financial side. At the same time, Watsons Group itself has a lot of money, in 2011, Watsons total revenue of more than 170 billion Hong Kong dollars (about 34 billion Singapore dollars). Physical assets For Watsons personal care store, the company choose purchase floor area or rent long-term (5 years to 20 years). Worker In Watsons Singapore, it has about 650 employees, most of the Watsons staffs are full-time job, and Watson hired a few part-time employees, Watsons according to the area of the shop to equipped employees. 3. 2. 2 Intangible Reputation The most important is reputation for a company, consumers tend to buy products or services from a firm that is held in high regard, many customers are even willing to pay more for that firms recognizable brand. Reputation reduces uncertainty and risk. Watsons has very higher brand equity and reputation, consumers more readily to accept this brand, believe products quality from brand. Technology Watson has its own brand products, also has a large professional research development team, RD team keep up with customer demand, in all aspects demonstrated its ability of innovate. Human capital Watson said the talent is main reason to the success. Company to attract and cultivate large quantities of high quality, high potential and talents willing grow with the company. Watson through external recruitment, internal succession planning, high performance training plan and core staff development plan to achieve the companys human resources strategy. Watsons’s employees are more understanding and familiarity for Watson own brand products and other brands products, employees are more professional than other personal care stores. 4. 0 Management function Planning and strategizing Watsons current situation is grim, the main competitor Guardian has 153  personal care stores, Watsons only 112 stores, and advantage of opponent in the number of stores, but Guardian’s location is near MRT stations, in the shopping mall. In the future, Watsons personal care stores more focus on development in the community, community-based personal care stores emphasize timeliness, breadth, convenience, etc. through these advantages to occupy more market share. At the same time, in the next 5 years, Watsons personal care store need to set new stores to 200 locations, expand the proportion of own-brand products in the sale of products. 4. 2 Organizing Watsons organizational structure is biased towards the analysis style structure. According to the different types of stores, with different products and staff, the financial staff will come to each store to collect data, also the manager of store will report the detail to Watsons company each month, Watsons have detail of operation process, to whom to report problem, etc.   Leading Leadership is through effective communication and incentives to allow members to work hard to achieve the target, effectively motivate for each member, and effectively resolve various contradictions and conflicts that may arise. In Watsons personal care store, usually a manager on duty, led 2 to 4 staffs, in some larger personal care store has a manager with 2 directors, and 2 directors led 4 to 8 staffs. This fitting manner, let every thing has staff to do, improve the work efficiency, but does not assign specific tasks to each staff, each staff should understand the workflow. Can do best self, also can cooperate with other staff.   Controlling Controlling is the process of tracking actual work, and compares plan process, identify problems and promptly corrected, in order to ensure the effective implementation of the project plan. Managers cannot shirk the responsibility to subordinates, this is the absolute principle in Watsons. As a manager, when the allocations of tasks, the employees have responsibility, manager also bear the same responsibility, final is managers responsibility, even though should be given to employees to complete the task independently space, but that does not mean you can be irresponsible, in order to promote and ensure that employees have to complete the task, also need to give timely guidance, support, incentives and checks. Watson is a successful company, but it is not perfect. Visited Watsons retail stores and websites in few days, there are some suggestions will response. The lack of talent Competition in the market is brand competition, brand competition is the product competition, and product competition is the talent competition. In the future development plan, Watsons will open more stores in Singapore, therefore, the Watsons need more talent to achieve it, but talents are limited, Watsons can cooperate with university or college, invite related course graduates join Watsons when they finish university degree. Monitoring the quality of Watsons own brand products In the past two years, Watsons own brand products accounted 21% of the market shares in merchandise sales. The quality of products is most important in today, Watsons own brand products from the OEM factories, thus, how to guarantee the quality of the of the product is one of problems. Therefore, Watsons should be dispatched working group to the factory to monitor workflow to ensure quality of products. Actively maintain existing markets Watsons Singapore as A.S. Watsons Group early overseas market, even though the market is saturated today, but Watsons need to innovative service concept, actively consolidating market share. 6. 0 Conclusion Watsons reputation, excellent service and company image, enhance consumer loyalty. Watson may actively use its own brand in the future, improving product quality and other ways to strengthen the image of the enterprise itself. More important is the intimate service for consumers, improve customer trust for Watsons.

Tuesday, December 3, 2019

Nurses Role In Vietnam Essays - Nursing, , Term Papers

Nurse's Role In Vietnam On March 15, 1965, large shipments of troops arrived in South Vietnam. These troops occupied the country until 1973. During this time, many men fought and died for the United States of America. The numerous nurses that operated on thousands of soldiers are often forgotten. The soldiers that the nurses operated on were usually blown apart and crippled for life. The nurses worked diligently to save these men. Even by working hard to save these men they were not recognized as army personnel by the public. The Vietnamese citizens and even the male American soldiers looked down upon the nurses. The United States did not acknowledge the nurses that served in the Vietnam War until 1993. The nurses that served in the Vietnam War, although commonly unrecognized, served as bravely as their soldier counterparts, and some suffered much of the same mental and physical distress. The nurses were not considered actual army personal. They were bothered by the Vietnamese street peddlers. In one incident, as a nurse was walking home, two boys asked for money. The nurses said no, as was army policy, and kept on walking. The boys then smeared black shoe polish on her dress, legs, and shoes (Smith 59). These same boys would not even consider harassing a male officer, for fear of being put in prison or even killed. Acts such as these were common because he nurses were not able to defend themselves. The nurses were sometimes treated sometimes treated similarly by male soldiers. One example took place when a nurse was walking to the hospital for her Little 2 shift. My uniform was a joke, thanks to the driver who though that it would be funny to splash me with his jeep (Smith 161). The soldiers would seldom do this to the other men in the armed forces for fear of being punished. The men did not worry about being punished when doing things to the nurses, knowing that they would never suffer any consequences. The attitudes of the men were completely different when the women went into a bar. The soldiers and generals would invite the nurses to parties and treat them nice; but, their sole purpose would be to sleep with them (Marshall 252). The officers should have treated the nurses with respect. The most severe instance in which the male officers showed that they did not recognize the nurse as army personnel was in two cases in which nurses were murdered (Marshall 23). This should not have been tolerated. The two soldiers did not even receive severe repercussions, one was court-marshaled and the other had nothing had nothing happen to him. I f these soldiers murdered male soldiers they would have been court-marshaled and possibly received the death penalty. Aside from the Vietnamese people and the army personnel, the army as a whole did not consider the nurses important. The Vietcong pounded the airbase with mortars most of the night, and the security at the hospital was not even tightened (Smith 171). This is another case in which the nurses were not considered important enough to protect. Also, there were almost no feminine products for women to buy at the Post Exchange, a military bases department store (Marshall 42). The male officers could buy anything from playing cards to clothes, but females had to do with what they had. The nurses were also absent from absent form Hollywood screen. Women were never shown in movies Little 3 because hospitals were not considered action packed enough for filming. This further made Vietnam seem like a place were only men served. It would remain that way for the next nineteen years after the war. The women who served went unnoticed until November of 1993. A lady by the name of Diane Evans fought for many years to obtain a monument for women at the Vietnam War Memorial. One response to a letter that she wrote was the wall contains the names of eight service women who were killed in the conflict, so no additional monument was needed (Evans 90). Finally, after a hard fought battle, a monument was created for the nursed that were in Vietnam. Although the nurses were given little credit fir

Wednesday, November 27, 2019

Critique Of Andrew Abbott Essays - Andrew Abbott,

Critique Of Andrew Abbott Part A: Summary Introduction: Andrew Abbott's book, The System of Professions: An Essay on the Division of Expert Labour contains a mix of comparative historical analysis and current evaluation, which is assembled within an analytical model that looks at professions from the viewpoint of their jurisdictions, the tasks they do, the expert knowledge needed for those tasks, and how competitive forces internally and externally work to change both the jurisdictions and the tasks. Abbott attempts to show that professions are interdependent systems, containing internal structures. He accomplishes this task by means of analyzing the emergence of modern professions and their relationships with each other cooperatively and competitively. Section I: Work, Jurisdiction, and Competition Abbott's book takes on an individualistic direction in its inception then moves to a more systematic view of professions. Modern studies of formal professions began with the rise of the discipline of social sciences in the 19th century. In the beginning, scholars debated about the theoretical interpretations of professionalism. There was a split between proponents of functionalist and monopolistic approaches. However, academics on both sides agreed, ?that a profession was an occupational group with some special skill? (Abbott 1988: 7). Abbott mentions that there have been four different perspectives that have sought to interpret professionalization, a functional, structural, monopolistic, and a cultural view. Abbott states that the tasks of professions are to provide expert service to amend human problems (Abbott 1988: 33). These problems can be objective, in that they originate naturally or through technological imperatives. Problems can also be subjective, whereby they are imposed by society or a culture either from the present or past. Abbott argues that the ?real difference between the objective and subjective qualities of problems is a difference in amenability to cultural work? (Abbott 1988: 36). Abbott outlines that there are several types of objective foundations for professional tasks. Some being technological, some organizational, other sources of objective qualities lay in natural objects and facts, while others came from slow-changing cultural structures. Abbott also argues that a ?profession is always vulnerable to changes in the objective character of its central tasks? (Abbott 1988: 39). Besides the objective qualities, professional tasks also have subjective qualities, whi ch make them susceptible to change. Unlike objective tasks, change does not come from the vagaries of external forces, but from the ?activities of other professions impinge[ing] on the subjective qualities (Abbott 1988: 39). According to Abbott, three acts helped to embody the cultural logic of professional practice. The three subjective modalities being diagnosis, inference, and treatment. Diagnosis is the process wherein information is taken into the professional knowledge system, and treatment is wherein instruction is brought back out from it (Abbott 1988: 40). During the process of diagnosis, relevant information about the client is assembled into a picture of the client's needs. This picture is then categorized into a proper diagnostic category. This process consists of two sub-processes known as colligation and classification. ?Colligation is the first step in which the professional knowledge system begins to structure the observed problems (Abbott 1988: 41). Colligation is the forming of a picture of the client, and consists primarily of ?rules declaring what kinds of evidence are relevant and irrelevant, valid and invalid, as well as rules specifying the admissible level of ambiguity (Abbott 198 8: 41). Classification is the referral of ?the colligated picture to the dictionary of professional legitimate problems? (Abbott 1988: 41). Colligation and classification help to define which type of problems fall under which body of profession, and specifically what kind of problem it is in that particular profession. Abbott mentions that sometimes problems of classification arise. For some problems are constantly shifting classifications, and fall under more than one classification, due to their defining traits. This may lead to intervention or competition by other professions who want to assimilate the unclear problem into their own professional repertoire (Abbott 1988: 44). The procedure of ?treatment is organized around a classification system and a brokering process,? whereby results are given to the client and prescription is offered (Abbott 1988: 44). One major problem associated with treatment is the client's willingness to accept treatment. A profession that adamantly forc es clients to take treatment risks losing clients to their competition who may be

Saturday, November 23, 2019

Corporate Social Responsibility and Starbucks Primary Stakeholders Essay Example

Corporate Social Responsibility and Starbucks Primary Stakeholders Essay Example Corporate Social Responsibility and Starbucks Primary Stakeholders Paper Corporate Social Responsibility and Starbucks Primary Stakeholders Paper Case Content/Instructions 1. Introduce the organization/company, the case, and provide a brief history of the organization. 2. Provide a clear, concise statement of the problem(s)/issues(s). 3. Identify primary and secondary internal and external stakeholders affected, describe their stakes in the issue, analyze the situation for effect on these stakeholders, and describe the issues and impact from the stakeholders’ views. 4. Summarize the primary and secondary ethical issues(s) involved. . Describe the organization’s strategy in dealing with this issue(s), critique the strategy/actions taken, using facts from the course to defend your critique, and briefly state the outcomes the organization actually experienced †¦stock price, credibility, market share, management changes, residual stakeholder backlash, unresolved problems, etc. 6. State your conclusions and recommendations for other/more effective actions the company could have taken to produce better stakeholder outcomes. Support your argument with course facts/data/decision models/outside sources. 7. Each partner will write a one page summary of the case. 8. Prepare a presentation, 10 – 15 minutes (audience discussion after presentation). 2. (Include this with Starbucks having difficulties) Starbucks primary stakeholders are their employees, customers, shareholders, investors, suppliers, coffee farmers, local communities, and other business partners. Secondary stakeholders are media outlets, government, nviromentalist groups, and their competitors. . 5. Starbucks is using Corporate Social Responsibilty actions to tackle a lot of the issues they face. Starbucks defines CSR as conducting business in ways that produce social, environmental and economic benefits for the communities in which they operate and for the company’s stakeholders and shareholders. They have created internal structures to ensure that any emerging issues are recognized, prioritized, and addressed in a consistent way t hroughout the company. In response to the over consumption of water, they are in the process of installing buttons that will turn on the faucet instantly and momentarily. This will save approximatley 150 gallons of water per day in each store. Starbucks has also been named as one of the World’s Most Ethical Companies by Ethisphere Magazine. This is based off of their corporate citizenship and responsibility, corporate governance, innovation that contributes to public well being, leadership, and internal systems ethics/compliance program. Starbucks has also gave back to the communities they do business in and around the world. The last CSR report that was published in 2007, shows they gave approximatley 18. 01 million in philanthropic contributions. 2. Starbucks has been hit by the weakened economy as consumers are trying to cut back on their spending. It is much harder to draw in customers today that are willing to pay around $3 for a cup of coffee than before when the economy was booming. Fast food chains like McDonald’s are capitlizing on Starbuck’s â€Å"expensive† reputation by offering coffee products at a lesser cost. . In response to this, Starbucks is using a business-level strategic manaemetn strategy in order to compete back. They have introduced a new instant coffee called Starbucks Via, which is less than $1 a cup. This has expanded into many new markets, including airlines. They have expanded their menu in order to compete as well. You will now see â€Å"value meals† in their bistros. You can also order breakfast sandwiches, lunch items, and a wider selection of pastry items. 3. Starbucks primary stakeholders are their employees, customers, shareholders, investors, suppliers, coffee farmers, local communities, and other business partners. Secondary stakeholders are media outlets, government, enviromentalist groups, and their competitors. Sources http://business. timesonline. co. uk/tol/business/industry_sectors/leisure/article5240824. ece http://abcnews. go. com/International/SmartHome/story? id=5964908page=1 starbucks. com/aboutus/csrreport/Starbucks_CSR_FY2007. pdf http://cachef. ft. com/cms/s/2/aa9831ce-c266-11dd-a350-000077b07658. html

Thursday, November 21, 2019

Short essay Example | Topics and Well Written Essays - 750 words

Short - Essay Example For an industry to succeed in a competitive market, it should focus on two common trainings, the general management training and functional training. The main aim of training is to offer cordial services which reflect friendly and warmth required in a highly competitive market. Training also maintains the image of self-assurance and influence in the employees’ mind. As per my understanding, in a commercial aviation, comprehensive training motivate the employees by providing them with information on the expectation of the industry, skills of handling passengers as well as the regulations that guides the operation in an industry. The second main motivator to my success in a competitive commercial aviation is the creation of high-performance service delivery team. A good number of aviation services require teamwork to necessitate the delivery of impeccable services to customers. Effectual teamwork in aviation industry in most cases facilitates skills and knowledge sharing among t eam members. On the other hand, I am also motivated to work in a competitive aviation industry by recognition and recompense for a mission well accomplished. Apt reward system forms the key policy for motivation in an industry. ... Explain. I am comfortable in working with students from different cultural, political, social, racial, and religion backgrounds. My past experiences have helped me in coming up with several ways of adopting with people from different backdrop. In my initial stage of coping with students from diverse background, I will create a conscious decision aimed at establishing tangible friendship. In developing a substantial friendship with people from different background, I will make sure that, I understand the cultural diversity of people in my presence. After identifying the existing background, I will place myself in a situation which will facilitate meetings with students from different cultural settings. Attending meetings, celebrations as well as looking for other resourceful means of meeting students from different background will assist me in interacting with many students from different cultural background. I will then identify the biasness and misconceptions relating to different c ultural background. To facilitate cordial relationship with people from different cultural backgrounds, the understanding of cultural misinformation is extremely crucial. The understanding of other student’s cultural misconception will help me in asking relevant question concerning their views, customs, and culture. To get a deep understanding on cultural background of different students, reviewing of their culture and history literature is also vital. On the other hand, to cope well with people from different cultural background, it is important to listen to other people history, show a sense of caring, understand different communication values and styles, make a risk of making mistakes as well as

Wednesday, November 20, 2019

Bauhaus and the Design School Essay Example | Topics and Well Written Essays - 1500 words

Bauhaus and the Design School - Essay Example The Bauhaus school of design underwent three different phases of development In the wake of World War I and all troubles it revealed there was a need to tap into the more rational aspects of everyday life. The sentiment was seized upon by famed architect Walter Gropius who opened the school in Wiemar. Gropius in a way was forwarding the area where Germany would seek an advantage in production, that is by producing common place article with an artistic aesthetic and remaining competitive relative to other economies with more resources. Whether this was the intention of Gropius and the early architects of Bauhaus is not entirely clear but it is perhaps specious to separate the Zeitgeist of the time from the ideas of the innovators. The Bauhaus School went through three different phases in its early history influenced by the philosophical leanings of its directors. Gropius was followed as director by Hannes Meyer when the school moved to Dessau in 1928. Meyer more of a formal thinker re moved much of the aesthetic underpinnings of Gropius and became more concerned with the influence of science and its translation into a greater sense of function. This turned the pendulum toward the functional aspect of products and perhaps subverted the original aim of the school; however, the school in retrospect was to go through this cycle of thesis and antithesis between function and form throughout its history. Meyer was succeed by Ludwig Mies Van der Rohe who once again reasserted the importance of aesthetics over function.

Sunday, November 17, 2019

Informactics Nurse Specialists Essay Example | Topics and Well Written Essays - 1000 words

Informactics Nurse Specialists - Essay Example Their scope of practice spreads from operational to strategic planning. They are the link between the nursing and information system departments (ANA, 2011). INSs collect data for patient care, access information needed for providing nursing services and implement policies to ensure confidentiality, privacy and security of data. An INS combines clinical expertise and informatics expertise for the efficient and successful interpretation and use of health information technologies (ANA, 2011). An INS is responsible for designing, implementing and training with regard to information systems within the nursing department. He is also responsible for the department’s informational needs and conducts orientation programs for new nurses, physicians and ancillary staff (ANA, 2011). He maintains policies and procedures about the hospital’s medical information system and updates the staff on design and use of the order entry, results reporting and new program functions (Saba & McCo rmick, 1996). The most significant benefit of hiring an INS in a health institution is the improved quality of patient care offered (Hannah, Ball & Edwards, 2006). In their duty, nurses’ decisions are founded on information available. INSs play a key role in organizing the information available to nurses for them to carry out their duties and monitor patients accurately (Hannah et al, 2006). Also, most hospitals do regular medical research. Hiring an INS improves research in health care institution’s. By the use of computer software, nurse researchers can manipulate data making it easy for nurses to diagnose problems and come up with the right decisions. This in turns helps to improve the quality of care given (Hannah et al, 2006). There is a considerable reduction in medical and diagnostic errors. Apart from better provision of care, having an INS helps health institutions manage departmental data, after which they are able to get and integrate information from differ ent departments and use it to make the working environment more ethical (Hannah et al, 2006). As much as it is beneficial to have an INS among the staff member, it also has financial implications on the health institution. The salary budget of the hospital will go up significantly as an INS earns a salary ranging from USD 69,000 to USD 98,000 (Hannah et al, 2006). There is also a high initial cost of implementing the system, then maintaining and upgrading it. Training the nursing team will also have a cost. However, even with increased expenditure on salaries, there is a long term reduction in operation costs for the institution (Hannah et al, 2006). There will be a reduced cost of managing information systems and the institutions information. Since the INS manages the information, there are enhanced work ethics that contribute to reduced costs related to diagnostic and medical errors. These errors often lead to costly legal actions against the hospital (Hannah et al, 2006). The rol e of the INS impacts positively on the relationship between nursing and other information system departments (ANA, 2001). Armed with both technical and clinical expertise, they are a vital link between the departments and assist in fostering alliances between them (Hein, 1998). They

Friday, November 15, 2019

The Psychological Effects of Cyber bullying

The Psychological Effects of Cyber bullying Abstract The last few decades have resulted in major transformation across important areas of our physical, economical, social and cultural systems. These changes are due to emerging potential computer technologies and ever enhancing awareness of the people. Additionally, the strong, effective and highly swift sources of communications across the world have also added to the diversity being observed at international levels. These transformations have influenced almost every discipline, consequently leading to various psychological diversities. Presently, the people across the world appear to be highly updated regarding the developments and variations especially in the information technology. It appears to be a natural phenomenon that the ever increasing usage of these technologies and facilities not only offers numerous advantages but some sort of predicaments also arises. The cyber bullying comes to be amongst one of these and is primarily related to the factors influencing the psychological aspects. The judgement of the psychological effects of the cyber bullying requires highlighting some highly critical factors such as the age group of the persons involved, the probable responses of the users/involved persons, the magnitude and nature of interaction occurs, the overall environment in context with attitudes and behaviours. In order to generate a comprehensive rationale of the psychological effects of cyber bullying, the researcher presented interviews and elaborated the responses in context with the literature. Table of Contents Abstract 2 Table of Contents 3 Chapter 1: 5 1.1 Introduction 5 1.2 Title of the Research 5 1.3 Background of the Research 6 1.4 Objectives of the Research 6 1.5 Overview of the dissertation structure 7 1.6 Summary 8 Chapter 2: Literature Review 10 2.1 Introduction 10 2.2 Legislation against Cyber Bullying 11 2.3 Eleven Facts about the Cyber Bullying 12 2.4 The Harshest Impact of Cyber Bullying 13 Chapter 3: Research Methodology 14 3.1 Introduction 14 3.2 Research Design 15 3.3 Primary Research 15 3.4 Secondary Research 16 3.5 Data Collection 16 3.6 Interviews 17 3.7 Sampling Design 18 3.7.1 Sampling Unit 18 3.7.2 Sample size 18 3.7.3 Sampling frame 18 3.7.4 Sampling technique 19 3.8 Ethical Consideration 19 3.9 Potential Problems and the Remedies 19 3.10 Validity of the research 20 Chapter 4: Findings 21 4.1 Introduction 21 4.2 Demographic characteristics 21 4.3 Perception of the Respondents 22 4.3.1 Evaluation of Respondents Perception 22 Chapter 5: Summary, Conclusions and Recommendations 26 5.1 Summary 26 5.2 Conclusion 26 5.3 Suggestions for Additional Research 28 5.4 Limitations of this Research 28 References 30 APPENDIX 1 32 Chapter 1: 1.1 Introduction Presently, the Information Technologies are associated either directly or indirectly with every human being and influences the life at almost every crucial stage. When it comes to have interactions the role and influence of the information technology appears to be highly critical. It not only provides various advantages to the people living in a society but also facilitates them while having dealings across the borders. Along with advantages some sort of negative impacts also comes in the scenario which eventually leads to some sort of disturbances and losses. These negative impacts of information technology basically appear as a result of mismanagement and unethical dealings. The same sort of impact of information technology is witnessed in the cyber bullying. The cyber bullying normally occurs on the mediums including the internet, cellular phones and other devices which are utilized to send or post text/images intended to embarrass/hurt persons. This phenomenon is also described b y other researchers as the intentions to disturb persons in various ways such as sending continuous messages and mails to a person who rejects to have interaction. In continuation to this simple type of cyber bullying the intentions like sexual remarks, threats, pejorative labels (hate speech), posting false statement as a fact aimed at humiliation also comes under the cyber bullying. 1.2 Title of the Research The Psychological Effects of Cyber bullying 1.3 Background of the Research In the present era of globalization where the people are getting educated and close to each other with the use of various available communication resources. This diversity in the societies is leading the globe towards the environment where the people participate highly in various critical issues of the society. They are better informed and aware of their rights and privileges, this awareness and enhanced options of rapid communication leads to active participation. The people belonging to different portions of the societies strongly react to the changes and advancements around them at any level, hence, increasing the sensitivity and role of the information technology. This study aims to highlight the increasing impact and psychological effects of the cyber bullying. Therefore, a deep and critical insight of the factors related to the cyber bullying including the age group of the persons involved, the probable responses of the users/involved persons, the magnitude and nature of intera ction occurs, the overall environment in context with attitudes and behaviours, are deemed necessary. 1.4 Objectives of the Research The paper aims to focus on the impacts and psychological effects of cyber bullying. Additionally, the probable solutions will also be presented in accordance with the finding and analysis of the literature and primary data being collected. Moreover, an analysis of the nature of the cyber bullying will also be carried out in order to generate an enhanced understanding of the impact. Therefore, the paper aims on achieving the following objectives: The extents of knowledge general peoples have regarding the cyber bullying. Analysing the probable causes and intentions behind this act. Highlighting the areas which either directly or indirectly relates to the cyber bullying. Gaining an insight of the psychological effects of cyber bullying. Presenting possible solutions for controlling and diminishing the affects of cyber bullying. 1.5 Overview of the dissertation structure The entire report consists of certain areas which are listed and discussed below: 1. Introduction: This chapter introduces the main aspects of the research. This chapter includes title and what is the objective of research. Besides that, this chapter gives background of research. This chapter explains the fundamentals of cyber bullying and the implications regarding its psychological effects. The entire chapter concludes with different research questions and an overview about the research methodology that what strategy of research will be utilized in this research paper. 2. Literature Review: This chapter analyses the basics of politics along with the role of international politics in context with the Iraq invasion by the coalition. These fundamentals are explained in detail with respect to different theoretical models. Emphasis of this chapter is laid on the theories that are directly associated with the scenario. Therefore, it can be said that this chapter would give an overall idea about all the major aspects and terminologies that are directly and indirectly associated with the scenario of cyber bullying. Furthermore, this chapter would form a mindset of the reader that whether the cyber bullying leads to psychological effects? 3. Research Methodologies: The research methodology that is used in the research is discussed in this chapter. Although there are different methods of doing the research but due to the limitations of research only secondary and primary sources are used. Secondary sources are extensively used in this paper and the entire research is based on books, peer-reviewed journals, scholarly articles etc. 4. Findings and Analysis: The findings and different interpretations of the results are included in this chapter and all the results that are achieved are interpreted into meaningful form for further research and analysis. A thematic analysis is undertaken in this regard which would clarify the statement that cyber bullying leads to various psychological effects? 5. Conclusions and Recommendations: The entire research is summarised in this chapter and limitations of the research and certain recommendations are also discussed in this research paper. Besides that certain recommendations are also presented in this dissertation. This chapter can actually be considered as the crux of all the chapters as it summarises other chapters and concludes with the final results. 1.6 Summary This chapter as implied by the name sets up the scene for the entire dissertation and it focuses on different aspects like background of the research, objectives of the research and review of the methodology. The methodology section depicts that both quantitative and qualitative analysis will be used. The introduction chapter gives up an overview of the entire dissertation and it also elaborates the facts that what other chapters are included in this dissertation and what are their contents. Chapter 2: Literature Review 2.1 Introduction There has been difficulty defining bullying. After analyzing multiple definitions, Greene (2000) suggested that there were five features that researchers had agreed on. It is aggressive behavior or intentional harm doing which is carried out repeatedly and over time in an interpersonal relationship characterized by an imbalance of power. The victim does not provoke bullying behavior by using verbal or physical aggression; and bullying occurs in familiar social groups. (Vandebosch and Van Cleemput, 2009) A study in Ireland was carried out to see the effects of bullying. 363 boys out of the 1870 participants (19%) reported to have been bullied at some point in their life. It was found that the odds ratio was four times higher to self-harm or commit suicide in boys that had experienced bullying, over the ones who hadnt. This study found psychological issues within the bullied boys. They had problems getting on with their schoolwork, their sexual orientation and physical abuse. (McMahon,E, Reulbach,U, Keeley,H, Perry,I and Arensman,E) This study displays the harsh reality of bullying, however it doesnt end there, as general bullying has moved on with technology. In the past it was limited to the playground, now it follows victims home, and they are unable to escape. Cyber bullying is seen as the new breed of bullying. Ten years ago this sort of bullying wasnt heard of. However, technology has now made it an issue. Such things include the internet and mobile phones. The internet has several different aspects, which can lead to cyber bullying. For example these include, email, social networking sites, instant messaging and skype. Problems with these now reflect todays bullying phenomenon. There have been different definitions of cyber bullying, one of which say suggested by Olweus (1993), A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself. (Slideshare.net) 2.2 Legislation against Cyber Bullying Law and legislation regarding penalizing the bullying has been implemented mainly in U.S in many states including New York, Maryland and Rhode Island. The laws have now been passed by seven states against digital harassment in 2007. Ordinance has been passed which has stated online harassment as a crime and would be dealt with state punishment in Missouri. In June, 2008, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.) proposed a federal law that would criminalize acts of cyber bullying. Lawmakers are trying to state new legislation against cyber bullying as there is no specific law in the books which deals with this particular crime. A new federal law is expected to be implemented soon as no one has been prosecuted yet under this crime. The proposed federal law would make it illegal to use electronic means to coerce, intimidate, harass or cause other substantial emotional distress. In August 2008, the California state legislature passed one of the first laws in the country to deal directly with cyber-bullying. The legislation, Assembly Bill, gives school administrators the authority to discipline students for bullying others offline or online. This law took effect, January 1, 2009. A recent ruling first seen in the UK determined that it is possible for an Internet Service Provider (ISP) to be liable for the content of sites which it hosts, setting a precedent that any ISP should treat a notice of complaint seriously and investigate it immediately. 2.3 Eleven Facts about the Cyber Bullying In the recent past, various researches have been conducted to ascertain the facts regarding the cyber bullying and under mentioned eleven facts have been derived: Round about 42 percent of the kids have been found bullied online with a ration of one out of every four have faced recurrence Among this percentage, being ignored and disrespected were the most common forms of cyber bullying. In the case of middle school students approximately 9 out of 10 have had their feelings hurt online. About 75% have visited a Web site bashing another student. Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them. About 21% of kids have received mean or threatening e-mails. The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes, except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the Internet is available all the time. The primary cyber bullying location where victimizing occurs, at 56%, is in chat rooms. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying. About 58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once. Cyber bullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children indicated they had been victims and perpetrators. 2.4 The Harshest Impact of Cyber Bullying The effects of cyber bullying are quite harsh and can badly affect youth in their life. The statistics show that all individuals adults or teens are being bullied in their life but it is more common to teens. Many parents worry about their kids spending time on the Internet. However, research shows that most parents arent thinking about cyber bullies; most are more concerned with their child coming across a pornography Web site. An article at middleweb.com shows that cyber bullying should be at the top of every parents watch list. The articles disturbing opening paragraph follows: Only after Ryan Halligan hanged himself did his father realize what the 13-year-old had been doing online. Through three months worth of links and instant messages saved on his home computer, Ryans growing pain and the callousness of his online tormentors became clear. Youre a loser, one message jabbed. There were other taunts, Web searches on suicide, and, ultimately, threats to kill himself to get back at school bullies. Tonights the night, Ryan finally typed. Its about time, the screen replied. This nightmare situation continued after Ryans death on October 7, 2003, when his father, after clicking on his sons saved links, found months of horrible messages directed to Ryan. Chapter 3: Research Methodology 3.1 Introduction This dissertation was conducted in order to assess the background and psychological effects of cyber bullying. Both qualitative and quantitative approaches were utilized in order to gather the important data by the researcher. Two research methods were used for gathering the data for the research which are namely survey and interview respectively. The data gathered from the survey was then processed and analyzed which was later compared to the Likert scale for data interpretation. The techniques used in this study are there to analyze the data presented in the research. The research conception, methods applied to the research and rationalization of the research methodology applied are discussed within the presented chapter. Various approaches such as quantitative, qualitative, and Likert scale approach are explained in the following chapters with their respective limitations and advantages. The chapter also sheds light on the most appropriate data collection methods for the current r esearch. The data collection procedures utilised the primary and secondary research are also reviewed in this chapter. It is important to note here that this research was mainly based on the questionnaires and interviews even though other research methodologies were briefly discussed. In order to specify the procedures and methodologies for collection and analysis of the data a master plan is used known as Research Methodology. Series of rational decision making alternatives are being presented in the research methodology. These alternatives depend upon a range of available options to the researchers. The unit of analysis, time dimension, the purpose of study, data processing, sampling design, and analysis of the data are presented in the research methodology. Mainly two techniques of research, Qualitative and quantitative are utilized. Though both of the methods have their own significance, the use of exploratory quantitative research design for this study appears to be appropriate. 3.2 Research Design Research is an endless effort for truth. It certainly brings to light new knowledge or corrects previous errors and misconceptions and adds to the existing body of knowledge in an orderly manner. This part deals with procedure adopted to conduct the study. The researcher had to depend on the related literature and structured questionnaires. Descriptive data were typically collected through a questionnaire survey, an interview or observation. A formal structure research method will be suitable for conducting such type of research especially when the data is quantitative. Therefore conclusive research method has been chosen. Decision making will be based on the findings based on results obtained from literature review and interviews. The type of conclusive research that will be adopting is descriptive research method. This method helps to estimate the perceptions of factors characteristics. It is also very supportive in making specific predictions. The method of survey for obtaining da ta is based on the response and questioning of respondents. In this method, a variety of questions are asked from respondents regarding their perception and influence on their decision. This will help us measure its worth in todays life. 3.3 Primary Research Primary research is the collection of data that does not exist. This can be through numerous forms: including interviews, questionnaires, telephone conversations, surveys, etc. The major merit with conducting primary research is that it accurate. However, the disadvantage of primary research is that it may be time consuming, as it involves dealing with people from various regions, the human sources may only become resourceful out of their own willingness, and this may take them quit sometimes before making up their minds to tell you what they know or give you their side stories about your questions (Focardi Fabozzi, 1998). 3.4 Secondary Research The data acquired from secondary sources is very important in forming the base for the primary research to be carried out. Cost and time effectiveness are the biggest advantages of the secondary sources which attracts the users to use these sources. The limitations of secondary sources entails to reliability of the source and difficulty in finding recent and relevant data. The secondary data is collected from articles, books, journals, reports and other reliable sources. Moreover other sources such as public libraries, Universities and government sources can also be used for the collection of secondary sources. These sources have extensive data available on different research areas. Data can also be collected from directories and catalogues available in libraries or internet (Reid and Bojanic 2009). Secondary research is the collection of existing data, that is, in contrast to primary research. For example: research on experiments or specific subjects. The merit of secondary research is that its not time consuming however a disadvantage is that the information retrieved may not be relevant. 3.5 Data Collection In research studies, the source of data is two-fold. Data comes from the inner world of libraries as well as from the outer world of human being. It is either the shelved data or it is the data acquired live from the people involved in the study. This research being in the technological advancements and judgment of psychological effects of cyber bullying, the researcher aims to collect data mainly from the respondents. After considering the various methods of data collection such as ethnographic style, survey, experimental style, and narrative enquiry, interviews have been chosen as it allows the collection of highest opinions within the time span of the project as well as the fact that the results could be accurately mapped and correlated to provide quantitative information. 3.6 Interviews In order to achieve the purpose of the investigation, the key focus lies on finding out which techniques should be applied. Interviews were the best method for understanding this research. A respondent interview is one where the interviewer directs the interview and the interviewer responds to the questions of the researcher. And to add more weight on this observation, Borodzicz, (2004) stated that the standard survey interview is itself fundamentally slipped and that it therefore cannot give out as the ideal ideological model against which to assess other approaches. He also elaborates by describing interviews as the verbal exchange of information between two or more people for the principal purpose of one person or group gathering information from the other. And that Semi structured interviews enable one to fix and control circumstances in order to collect appropriate data while remaining flexible and responsive (Borodzicz, 2004). Structured interviews consist of closed-ended questions, where the structure of the questions, responses and the interview itself is decided prior to the interview. The interviewer has more control over the responses, and can lead the interview into the direction they want. However, the responses received are limited. Semi-structured interviews consist of closed and/or open-ended questions, allowing the interviewer to have some control over the responses and the interview. Although the open-ended questions allow the interviewee to express themselves and encourage them to present their views and opinions. Unstructured interviews consist of open-ended questions that do not restrict the interviewees responses, therefore collecting a wide range of information. This kind of interview is more supple in-terms of the questions being asked and their ordering, all depending upon the interviewees responses. 3.7 Sampling Design 3.7.1 Sampling Unit Sampling unit will consist of people having age of 15 years or more. The people belong to various disciplines of life including the students; the youth, the professionals etc. will be included in the sampling unit. Both males and females will be interviewed. 3.7.2 Sample size Sample size of 08 people will be used. 3.7.3 Sampling frame Sampling frame includes the following age groups: 15-25 years 25-30 years 30 or more 3.7.4 Sampling technique Sampling without replacement will be used. According to this approach one element cannot be selected again, once it is used it is removed from the list to ensure not be selected again. 3.8 Ethical Consideration All the measures adopted in this research are aimed to avoid any ethical violation. The research tactics will affect the people from whom data and information has been gathered, so to avoid any violation by pursuing the following points. à ¢Ã¢â€š ¬Ã‚ ¢ I will not force a specific outcome; rather go with an open mind to accept whatever will be the finding à ¢Ã¢â€š ¬Ã‚ ¢ I will respect the privacy of our participants à ¢Ã¢â€š ¬Ã‚ ¢ Proper credits will be provided to the document sources, I know that our college does not accept plagiarism. Plagiarism is a fraudulent act of a researcher when he or she uses the writings of other writers without citing the source (Nueman, 2003). It is more like stealing the work of another researcher, it also include the immoral action of obtaining information from internet sources without providing proper citation. 3.9 Potential Problems and the Remedies Many respondents are unaware of the asked question or are unable to transform the event in a descriptive way; hence conscious effort should be provided in allocating it at right place to right person. Researcher must take care not to let their prior theoretical frame work or pre-conceived notion blind them to contrary event in a social setting. Qualitative researcher need to be sensitive to distinction of race, sex, and age and to other major social divisions.(neuman,2004) The facts reveals in open ended questions, that it can be affected by individual biasness, for that I will concerned more than five responses before drawing any conclusion regarding particular variable or speculation. 3.10 Validity of the research Validity is concerned with whether the findings are really about what they appear to be about. The information collected from the above mentioned and discussed sources will have a validity reason being that they will be gathered from the genuine sources such as the websites and details taken from the manager. Therefore it will be the information at its purest form and will 100% validity. Chapter 4: Findings 4.1 Introduction In this chapter, the data gathered from the different respondents who have interviewed in connection with their experiences and opinions regarding the cyber bullying and its psychological effects is presented and analysed. This chapter discusses the results of the interviews conducted to the 08 chosen respondents. In order to assure clarity and high level of understanding the selected respondents were briefed prior to starting the survey process regarding various basic aspects of the study which include purpose, significance and objectives. In order to analyze the data, sections have been formulated for the findings. The first section presents a synopsis of the demographic profile of the participants. This profile was categorised in accordance with various factors including gender, age, academic background, and place of residence of the respondents. The view of respondents regarding cyber bullying will be discussed in the subsequent section and in the last section, their standpoint o n the conception that cyber bullying leads to various psychological effects. Data collected from the survey was collected and analyzed to achieve the desired aim. 4.2 Demographic characteristics This section will discuss the demographic profile of 08 individuals who answered the survey by the researcher. The description of the respondents includes their gender, age, educational background, and their experience. The majority of the participants were male (74%) and the age bracket was 15-35 years which shows that most of the participants were quite related to frequent use of information technologies. Hence, it is expected that with their experience, the responses of this population would be more reliable, accurate and authentic. This was as a result of personal judgement used by the researcher, in an attempt to gain as much diversity as possible. 4.3 Perception of the Respondents The following sections will present the data and results in accordance with Likert scale. It is worthwhile to mention here that the participants were presented a set of statements so they can express their agreement or disagreement using five-point scale, wherein 5 is equivalent to an answer that qualities a strong agreement and 1 as showing a strong disagreement. This will provide a better understanding about the observations of the following respondents. 4.3.1 Evaluation of Respondents Perception It can be stated that the judgement of the psychological effects of cyber bullying requires in-depth analysis of the responses. In this regard, this part of the paper would present the evaluation and assessment of the responses generated from the collected data. Statement Strongly Agree Agree Neutral Disagree Strongly Disagree Are you aware of the cyber bullying and have you ever involved? 3 5 Do you think the social networking sites are the main mediums of cyber bullying? 4 1 2 1 Do you consider that the social level supports extended to cater cyber bullying (including the assistance by academic institutes for students) is appropriate? 2 3 2 1 Do you think social networking sites do enough to prevent cyber bullying? 2 5 1 Do you think that cyber bullying leads to various psychological effects? 4 2 2 Table 1 Evaluation of Respondents Viewpoint 4.4 Interview This portion of the research will present a brief analysis of interview conducted from the selected respondents. Are you aware of the cyber bullying and have you ever involved? The respondents appear to be not only very much aware of the term Cyber Bullying but they were also having sufficient knowledge regarding the effects of cyber bullying. They presented their views and experiences about the cyber bullying. It was revealed that most of them have bullied in the past and some of them even have being bullied more than once. Despite of having being bullied with different types of mediums, maximum of the respondents were of the opinion that they have gone through severe sort of stress during that specific period. The factor of stress was noted at a high ratio in the kids and the ones affiliated with schooling. They stated that the period they remained disturb

Tuesday, November 12, 2019

Karla Ann Marling’s book “As Seen on TV” Essay

Karla Ann Marling’s book â€Å"As Seen on TV† addresses the perception television had on shaping the fashion and cultural persona of everyday life in the United States during the 1950’s. She presents this phenomenon as a cultural chain reaction that occurred in response to Christian Dior releasing his new line of clothing right around the same time as President Ike Eisenhower’s inauguration, one of the first major TV events of the Decade.   As noted in her book, when she says, â€Å"Ike’s 1953 inauguration was one of the first big TV events of the decade. The cameras caught every detail of.† Eisenhower’s costume: the mink coat, the silly hat worn over bangs, the suit with the nipped-in waist and flared hipline, the charm bracelet, and high heels that pinched (Marling, 1994).† Of course for the President himself, Christian Dior new line would have no significant effect on the culture or American society, but through his Wife Mamie Eisenhower wearing a dress by the infamous designer as well as wearing more stylish accessories like high heels, and pearls, it introduced a major shift in how women would dress, there on out, and the style itself became known as â€Å"The New Look.†Ã‚   In essence it slight freed-up sexual repression of the 1950’s and became representative of a lifestyle, so that they could be completely turned on their head in the 60’s during the explosion of the feminist movement. Christian Dior designed what became known as the â€Å"hour Glass† shape, by using different padded linings as the author notes. The molded, hourglass hap was achieved through a variety of means: padding hidden in the lining of jackets to accentuate the swelling of the hips; boning, stays, or other constricting devices built into waistlines; and an internal framework composed of layers of tulle, organza, silk pongee, and a new â€Å"miracle fabric†-nylon†,1994†. In response to this the author notes that â€Å"It could be argued, of course, that the woman inside was irrelevant to the dress, that she was the victim of fashion, enslaved and oppressed by her own dinner gown.†Ã‚   This represents many of the counter arguments presented by men who opposed changes being introduced to society by the fashion industry.   This also represents much of the conflict of the reading.   The author goes on to present a quote by acclaimed 1950’s psychoanalyst Edmund Bergler when he says, the fashions industry is a â€Å"gigantic unconscious hoax† perpetrated on women by homosexual men who wanted to make them look ridiculous (Marling, 1994).† In sum, the author closes her piece by pointing out how there is still to this day controversy over how much authorship can be placed on Christian Dior for the creation of â€Å"The New Look.†Ã‚   It is seen as a culturally defining moment in history, which would eventually give way to the admiration of glamour that was bestowed upon such figures as Jackie O, Marilyn Monroe, and Elizabeth Taylor. It also represents a slight window into the modern era and its obsession with fashion to the likes of which as produced such irreverent iconic figures as Lady Gaga, who could arguably be pegged as the child of Christian Dior and Mamie Eisenhower, 1953. Karla Ann Marling’s book (1994). â€Å"As seen on TV†

Sunday, November 10, 2019

Business and Admin Research Information

Give Reasons for agreeing Objectives and deadlines for researching information Agreeing objectives is essential for a team or individual to know what they are focusing on to avoid wasting resources and time. Knowing the How, What, When and Why of an assignment will mean being able to complete the task in a timely manner and correctly. Deadlines strongly affect what you research e. g. World news is being update by the hour, with a well-defined deadline; we can better gather the relevant information as equired.There is no point to having a long deadline and present a report of yesterdays news; Who is interested in old news? How much will you pay for yesterday newspaper? Is it worthless? A copy of todays newspaper is worth money, but yesterdays is worthless. Therefore, objectives and deadline must go hand in hand. With the right objective and a set deadline you know what must be done and how long you have. 1. 2 Give reasons for identifying and agreeing sources of information As there ar e many different ways to find out information, for example; The internetBooks and EBooks Word of mouth etc. , Reference material Academic Journals Magazines Statistics Specialist information Interviews Past speeches Pictures Organizations It is therefore crucial that you make sure the information is correct, relevant and at the right time, with all the required information in hand. Only if data is stored in a procedural manner it can be easily retrieved. Information might be retrieved for marketing purposes, for communications, for monitoring purposes; for surveys and other research that an organisation or business might conduct.Information will also be retrieved in situations where information might have to be shared with partner companies and with the police or Tax Services. Storage of data plays a major role in improving the performance of a company and this can happen either offline or online and in various formats. Storing information is essential for many reasons; these includ e Ease of access and readability, The level of detail you are able to store The choice to have various copies of the information in case of loss and ease of transfer.Be Able To Research Information for Others 2. Agree aims, objectives and deadlines for the information search Agreeing aims and objectives regarding tasks will help you to do your work efficiently as they give a clear idea of what is needed and why. Deadlines are also very important as our customers and our reputation is negatively affected if we don't complete work in the required time, so time limits help to estimate the time you have to spend on each one, otherwise you could spend too long researching one source and then find out it was the wrong source.Having deadlines allows you to structure your own deadlines, allowing a certain mount of time on each source of research, so you do not overlook the information of another. 2. 2 Identify sources of information Question 1. 2 answers this question. 2. 3 Search for and o btain data Research comprises of; â€Å"A creative work undertaken on a systematic basis, in order to increase the stock of knowledge. This includes knowledge of man, culture and society, and the use of this stock of knowledge to devise new applications. † (OECD (2002) Frascati Manual: proposed standard practice for surveys on research and experimental development, 6th edition).It is used to establish or confirm facts, reaffirm the results of previous work, solve new or existing problems, support theorems, or develop new theories. The primary purposes of basic research (as opposed to applied research) is documentation, discovery, interpretation, or the research and development (R;D) of methods and systems for the advancement of human knowledge. There are several forms of research: Scientific Humanities Artistic, Economic Social Business Marketing Practitioner research, etc. Nothing damages someone's professional credibility as quickly as an error, even a inor one.While a simp le calculation error or typo can seem trivial in the scheme of things, it implants doubt into your audience's mind. They now think; â€Å"If this person can make these simple errors, they can also make larger errors†. Errors occur for many reasons; Ignorance Lack of time Poor planning Laziness Incorrect data Invalid source material The most common errors we see are in spreadsheets and written communications. Spreadsheets can be deceiving because they print out or display very professionally and can hide simple calculation errors.Careless manipulation of formulas can cause errors that are difficult to visually detect. that miss detection by spell checker programs due to multiple meanings and basic sentence structure. Also, if the reader finds inconsistences in the flow of the report/ information or if it sounds far-fetched, they being to wonder whether or not the information is plausible. No matter the root cause, errors suggest a lack of caring or attention. Conversely, peopl e notice attention to detail. The customer experience holds true for presentations and report slides.

Friday, November 8, 2019

How to Make Glowing Jell-O

How to Make Glowing Jell-O Its incredibly easy to make Jell-Oâ„ ¢ or other gelatin glow under a black light. Heres how to make it happen: Glowing Jell-O Materials package of Jell-O or other gelatintonic waterblack light Make the Jell-O Follow the directions on the package, except use tonic water instead of water.For a small package, the usual directions would be to heat 1 cup of tonic water to boiling.Mix the boiling tonic water and Jell-O until the powder is completely dissolved.Stir in another cup of tonic water.Pour the liquid into a pan or bowl.Refrigerate the Jell-O until is has set.You can use cookie cutters to make shapes out of the gelatin if desired.Shine a black light on the Jell-O to make it glow. No matter what flavor/color of Jell-O you use, it will glow bright blue under the black light. This is the fluorescence of the quinine in the tonic water. Quinine also gives tonic water a distinctive bitter flavor which you will also taste in the gelatin. If you dont like the taste, you can lessen it by using half tonic water and half tap water in the recipe. Either sugar-free or regular tonic water works fine for this recipe. Some recipes call for using a low percentage of tonic water (5-10%). The glow from this gelatin will be extremely faint, especially if the dessert is colored. You need a decent amount of quinine to get a bright glow.

Wednesday, November 6, 2019

USS Langley - The US Navys First Aircraft Carrier

USS Langley - The US Navys First Aircraft Carrier Laid down on October 18, 1911, at the Mare Island Naval Shipyard in Vallejo, CA, USS Langley (CV-1) began its life as the Proteus-class collier USS Jupiter (AC-3). Its keel-laying ceremony was attended by President William H. Taft. Work continued through the winter and the collier was launched on April 14, 1912. The US Navys first turbo-electric-powered ship, Jupiter joined the fleet in April 1913, under the command of Commander Joseph M. Reeves. USS Jupiter Shortly after passing sea trials, Jupiter was sent south to the Mexican coast off Mazatln. Carrying a detachment of US Marines, the Navy hoped that the ships presence would aid in calming tensions during the 1914 Veracruz crisis. With the situation diffused, the collier departed for Philadelphia in October, becoming the first ship to transit the Panama Canal from west to east in the process. After service with the Atlantic Fleet Auxiliary Division in the Gulf of Mexico, Jupiter was switched to cargo duty in April 1917. Assigned to the Naval Overseas Transport Service, Jupiter sailed in support of US efforts during World War I, and made two cargo voyages to Europe (June 1917 and November 1918).   During its first Atlantic crossing, the collier carried a naval aviation detachment commanded by Lieutenant Kenneth Whiting. These were the first American military aviators to reach Europe. Returning to coaling duties in January 1919, Jupiter operated in European waters to facilitate the return of troops serving with the American Expeditionary Forces following the end of the war. Later that year, the ship received orders to return to Norfolk for conversion into an aircraft carrier. Arriving on December 12, 1919, the ship was decommissioned the following March. The US Navys First Aircraft Carrier Work began immediately to convert the ship, which was renamed in honor of aviation pioneer Samuel Pierpont Langley on April 21, 1920. In the yard, workers reduced the ships superstructure and built a flight deck over the length of the ship. The vessels two funnels were moved outboard and an elevator constructed for moving aircraft between decks. Completed in early 1922, Langley was designated CV-1 and commissioned on March 20, with Whiting, now a commander, in command. Entering service, Langley became the primary test platform for the US Navys budding aviation program.    USS Langley (CV-1) - Overview Type: Aircraft CarrierNation: United StatesBuilder: Mare Island Naval ShipyardLaid Down: October 18, 1911Launched: August 14, 1912Commissioned: March 20, 1922 Specifications Displacement: 11,500 tonsLength: 542 ft.Beam: 65 ft.Draft: 18 ft. 11 in.Speed: 15 knotsComplement: 468 officers and men Armament 55 aircraft4 Ãâ€" 5 guns Early Operations On October 17, 1922, Lieutenant Virgil C. Griffin became the first pilot to fly from the ships deck when he took off in his Vought VE-7-SF. The ships first landing came nine days later when Lieutenant Commander Godfrey de Courcelles Chevalier came aboard in an Aeromarine 39B. The firsts continued on November 18, when Whiting became the first naval aviator to be catapulted from a carrier when he launched in a PT. Steaming south in early 1923, Langley continued aviation testing in the warm waters of the Caribbean before sailing to Washington DC that June to conduct a flight demonstration and show its capabilities to governmental officials. Returning to active duty, Langley operated out of Norfolk for much of 1924, and underwent its first overhaul late that summer. Putting to sea that fall, Langley transited the Panama Canal and joined the Pacific Battle Fleet on November 29. For the next dozen years, the ship served with the fleet off Hawaii and California working to training aviators, conducting aviation experiments, and taking part in war games. With the arrival of the larger carriers Lexington (CV-2) and Saratoga (CV-3) and the near completion of Yorktown (CV-5) and Enterprise (CV-6), the Navy decided that the little Langley was no longer needed as a carrier. Seaplane Tender On October 25, 1936, Langley arrived at Mare Island Naval Shipyard for conversion into a seaplane tender. After removing the forward section of the flight deck, workers built a new superstructure and bridge, while the aft end of the ship was altered to accommodate the ships new role. Re-designated AV-3, Langley sailed in April 1937. Following a brief assignment in the Atlantic during early 1939, the ship sailed for the Far East, reaching Manila on September 24. When World War II began, the ship was anchored nearby at Cavite. On December 8, 1941, Langley departed the Philippines for Balikpapan, Dutch East Indies before finally making for Darwin, Australia. World War II During the first half of January 1942, Langley aided the Royal Australian Air Force in conducting anti-submarine patrols out of Darwin. Receiving new orders, the ship sailed north later that month to deliver 32 P-40 Warhawks to Allied forces at Tjilatjap, Java and to join American‑British‑Dutch‑Australian forces gathering to block the Japanese advance into Indonesia. On February 27, shortly after meeting with its antisubmarine screen, the destroyers USS Whipple and USS Edsall, Langley was attacked by a flight of nine Japanese G4M Betty bombers. Successfully evading the first two Japanese bombing runs, the ship was hit five times on the third, causing the topsides to burst in to flames and the ship to develop a 10-degree list to port. Limping towards Tjilatjap Harbor, Langley lost power and was unable to negotiate the mouth of the harbor. At 1:32 PM, the ship was abandoned and the escorts moved into sink the hulk to prevent its capture by the Japanese. Sixteen of Langleys crew were killed in the attack.

Sunday, November 3, 2019

Read an article and answer questions Example | Topics and Well Written Essays - 250 words

Read an and answer questions - Article Example Aside from these surveys, researchers used real women and digitally manipulate their overall appearance as the participants watched; researchers can immediately recount their reactions and perceptions to their own bodies. Women are insecure and at times overly degrade themselves because of not achieving â€Å"the look.† Binge eating --- Women feel more satisfied with their bodies when they are not eating and their stomach became flatter. Throwing away the food eaten and followed by eating fruits as subordinate. Time and again, binge eaters or bulimics, in their latter life recorded serious illnesses that include death. Anabolic steroid use – Because of the pressure to keep up with the competition specifically in the body building field, men are taking steroids to further enhance their muscle shapes or bulkiness. This addicting drug use has harmful effects in the body. Through time using this enhancer results in the breaking down of the functions of the kidney and liver. Hypertension, hepatitis and high risk of fan HIV infection for those who uses the injectable that centers on men because they are the ones subjective to body building. Cosmetic surgery – A billion dollar industry and a phenomenon for the society of youth-obsessed society. Commercials dominantly affected the women on how they supposed to look. What is the norm and what is the â€Å"perfect† that pushed them to decide to go on the knives. Cosmetic surgery is not just simply placing make up on and being washed off at the end of the day. This would reverse the natural look of ones’ physical being. This also includes liposuction. Dieting (â€Å"fad† or â€Å"faddy†) --- This is usually a liquid protein diet or fruit diet and a powder mixed with water protein drinks. A person would eat no other than fruit throughout this period. Dieting with only drinks and easily digested fruits tend to make a person hungrier and crave more than ever thus, diverting into another kind

Friday, November 1, 2019

Professional Interview Paper Term Example | Topics and Well Written Essays - 750 words

Professional Interview - Term Paper Example She worked and served the society in the abovementioned role for one and a half year before becoming the Nurse Manager in the same facility. Nonetheless she moved to become the part of Family Nurse Practitioner program at the University of Winter in August 2004 whereas she had to quit her job at State hospital in order to take care of her ill aunt at home. Additionally she was able to remain a full time student at the campus during her first semester of the course but she was forced to become a part-timer at the later stage so that she can take better care of the aunt. According to the source it is very difficult and testing to manage a fulltime profession when one has to take care of children and an ill aunt and therefore she remained at home for one and a half year while continuing her part-time studies. After completing the course she gladly accepted a job of a Pediatric Rheumatology Nurse at University of US Medical Center. Yet it is important to note that her new position was te mporary in nature and that was ideal for her because it gave her the freedom to manage her studies while making a handsome fortune on the sideline. But shortly she was offered to take up a permanent position and the management pledged to give her ample amount of space to take care of her studies. The target professional enjoyed working with the children and managed to complete her FNP program and subsequently she got her certification and degree in 2010. The nurse continued working as a Pediatric Rheumatology Nurse until January 2011 when she decided to take a position of Family Nurse Practitioner at the US State Hospital. Current Practice The concerned professional is presently working in the role of Family Nurse Practitioner in the female unit of some State medical facility. The nurse has the duties and responsibilities of getting complete history of the patient while running an entire physical test before one can be admitted for the services. Core Competencies The current positio n of the featured professional prays on her abilities to promote a healthy lifestyle in the patients whereas she is also responsible for educating and informing them about reasons, symptoms and remedies of the most commonly prevailing diseases. The professional is also anticipated to run a full physical examination whilst she is supposed to diagnose and propose treatments as well. The frequently occurring situations include pregnancy, amenorrhea, dysmenorrhea, menorrhagia, metorrhagia, sexually transmitted diseases that are to be managed by the nurse. Legal and Ethical Issues with Healthcare The current role of the featured nurse can make her face several number of ethical and legal dilemmas for instance an incapacitated patient may not be able to put her signature on the documents that will cause delay in her treatment (Appelbaum, November, 2007). But in these kinds of situations nursing staff must consult legal experts before taking any course of action. Suggestions and Recommenda tions The nurse must remain awake to the fact that physical illnesses are

Wednesday, October 30, 2019

Sleep in ICU setting Research Paper Example | Topics and Well Written Essays - 1250 words

Sleep in ICU setting - Research Paper Example From the results that were obtained from the patients, the study brought out the fact that quality of perceived ICU perceived sleep in ICU was poorer than the baseline sleep that the patients obtained from home. Perceived quality of sleep and sleeping during the day did not change during the time the patients were in the ICU and there was no difference in the environment stimuli (Randall, 2000). The study was designed to determine the quality of life mostly the physical functions of those that survive in the ICU during the early processes of recovery. The study is was also to describe the former critically harsh patients finished instruments on the general health and the life quality in the initial six months of their recovery (Lane, 1989). The method that was used in the study is that which involved response to a designed questionnaire and questions about the problems. From the study, it was found out that the survivors of critical illness and hospitalization in the ICU recover well despite feeling important control and disturbed sleep at the time they recover. The study was designed to analyze patients who had a past or are currently diagnosed with cancer and were consequently admitted in the ICU to enable characterization of the symptoms that are experience of a cohort of ICU patients at high risk of experiencing hospital deaths. The method used in the study involved analysis of patients’ self-reports of the one hundred cancer patients that were sampled after getting treated in medical ICU. The results that were obtained from the cancer patients showed that there were common distressing symptoms in the patients when they are in the ICU and they were also found to be at significant levels of severity. The results that were obtained also suggested that there should be strategies in the use of ICU therapies. The study was designed to investigate lack of adequate

Monday, October 28, 2019

Taste and Books Essay Example for Free

Taste and Books Essay Books are wonderful gifts to mankind. Books are useful in many ways. They educate, entertain and serve as good companions when we are lonely. They guide us when we are confused. They inspire us when we are low in spirit. They are men’s best friends. Books console us when we are in sorrow. We are never alone in the company of books. They demand nothing for the service they do to the mankind. The kingdom of books is as vast as universe. There are books on literature, science, fiction, history, art, culture, civilization, architecture, fashion, technology, philosophy, etc. Some books are for serious reading, some are intended to enrich our knowledge and learning. Many books give us an insight into various aspect of life. Books on travel and adventure infuse into us a spirit of fearlessness and adventure. The reading of novels is a pleasant pastime for many of us. This provides an escape from the din and bustle of life. One is completely lost in the company of good books. There is no sphere of life which has not been explored by the books. Books are good source of dissemination of useful ideas. They are effective tools to popularize the fruits of our research in various fields of knowledge. They help in the spread of our progressive views. They are reservoir of knowledge and information. They pass the knowledge and information from generation and generation. In fact, no single labour of human fruit has been as helpful to the advancement of civilization as books. Books are written in all languages of the world. The advancement of science and technology has brought about a great change in the field of books. Five centuries back, the books as we have today did not exist. But machines and technology have helped in the spread of knowledge. Moreover, the high percentage of literacy, the growth of libraries in towns and villages and growing fondness of the intellectuals to have their private libraries have led to the growth of publishing industry. This in turn contributed to the spread of knowledge and information. Books are written by experienced persons who are wise and have matured minds. They are full of ideas, and thoughts which enlighten us and guide us at the time of trouble. There are books which entertain, enthrall and thrill us according to our taste. Different people have different tastes and choices. As one grows old, one’s interest and taste also changes. A child may be crazy for comics, picture, story books or works of science fiction. Some people have great love for books. Books are their permanent friends. They carry them wherever they go. Books help to widen our interest. They broaden our outlook. They enrich our thoughts. They help us in understanding different aspects of life. They give us inspiration to do great things in life. They encourage us to fight the odds of life bravely. They fill our minds with noble thoughts. They awaken our souls. They mould our characters. But we should be very cautious in the choice of books. Books which are not good may mislead the readers. They can spoil us. Thus, books are a blessing. They are the treasure richer than the treasure of the king. This treasure is inexhaustible. They are the gold mines of art, literature, science and information. We should develop a habit of reading. It is good for us and society as well.