Wednesday, November 27, 2019

Critique Of Andrew Abbott Essays - Andrew Abbott,

Critique Of Andrew Abbott Part A: Summary Introduction: Andrew Abbott's book, The System of Professions: An Essay on the Division of Expert Labour contains a mix of comparative historical analysis and current evaluation, which is assembled within an analytical model that looks at professions from the viewpoint of their jurisdictions, the tasks they do, the expert knowledge needed for those tasks, and how competitive forces internally and externally work to change both the jurisdictions and the tasks. Abbott attempts to show that professions are interdependent systems, containing internal structures. He accomplishes this task by means of analyzing the emergence of modern professions and their relationships with each other cooperatively and competitively. Section I: Work, Jurisdiction, and Competition Abbott's book takes on an individualistic direction in its inception then moves to a more systematic view of professions. Modern studies of formal professions began with the rise of the discipline of social sciences in the 19th century. In the beginning, scholars debated about the theoretical interpretations of professionalism. There was a split between proponents of functionalist and monopolistic approaches. However, academics on both sides agreed, ?that a profession was an occupational group with some special skill? (Abbott 1988: 7). Abbott mentions that there have been four different perspectives that have sought to interpret professionalization, a functional, structural, monopolistic, and a cultural view. Abbott states that the tasks of professions are to provide expert service to amend human problems (Abbott 1988: 33). These problems can be objective, in that they originate naturally or through technological imperatives. Problems can also be subjective, whereby they are imposed by society or a culture either from the present or past. Abbott argues that the ?real difference between the objective and subjective qualities of problems is a difference in amenability to cultural work? (Abbott 1988: 36). Abbott outlines that there are several types of objective foundations for professional tasks. Some being technological, some organizational, other sources of objective qualities lay in natural objects and facts, while others came from slow-changing cultural structures. Abbott also argues that a ?profession is always vulnerable to changes in the objective character of its central tasks? (Abbott 1988: 39). Besides the objective qualities, professional tasks also have subjective qualities, whi ch make them susceptible to change. Unlike objective tasks, change does not come from the vagaries of external forces, but from the ?activities of other professions impinge[ing] on the subjective qualities (Abbott 1988: 39). According to Abbott, three acts helped to embody the cultural logic of professional practice. The three subjective modalities being diagnosis, inference, and treatment. Diagnosis is the process wherein information is taken into the professional knowledge system, and treatment is wherein instruction is brought back out from it (Abbott 1988: 40). During the process of diagnosis, relevant information about the client is assembled into a picture of the client's needs. This picture is then categorized into a proper diagnostic category. This process consists of two sub-processes known as colligation and classification. ?Colligation is the first step in which the professional knowledge system begins to structure the observed problems (Abbott 1988: 41). Colligation is the forming of a picture of the client, and consists primarily of ?rules declaring what kinds of evidence are relevant and irrelevant, valid and invalid, as well as rules specifying the admissible level of ambiguity (Abbott 198 8: 41). Classification is the referral of ?the colligated picture to the dictionary of professional legitimate problems? (Abbott 1988: 41). Colligation and classification help to define which type of problems fall under which body of profession, and specifically what kind of problem it is in that particular profession. Abbott mentions that sometimes problems of classification arise. For some problems are constantly shifting classifications, and fall under more than one classification, due to their defining traits. This may lead to intervention or competition by other professions who want to assimilate the unclear problem into their own professional repertoire (Abbott 1988: 44). The procedure of ?treatment is organized around a classification system and a brokering process,? whereby results are given to the client and prescription is offered (Abbott 1988: 44). One major problem associated with treatment is the client's willingness to accept treatment. A profession that adamantly forc es clients to take treatment risks losing clients to their competition who may be

Saturday, November 23, 2019

Corporate Social Responsibility and Starbucks Primary Stakeholders Essay Example

Corporate Social Responsibility and Starbucks Primary Stakeholders Essay Example Corporate Social Responsibility and Starbucks Primary Stakeholders Paper Corporate Social Responsibility and Starbucks Primary Stakeholders Paper Case Content/Instructions 1. Introduce the organization/company, the case, and provide a brief history of the organization. 2. Provide a clear, concise statement of the problem(s)/issues(s). 3. Identify primary and secondary internal and external stakeholders affected, describe their stakes in the issue, analyze the situation for effect on these stakeholders, and describe the issues and impact from the stakeholders’ views. 4. Summarize the primary and secondary ethical issues(s) involved. . Describe the organization’s strategy in dealing with this issue(s), critique the strategy/actions taken, using facts from the course to defend your critique, and briefly state the outcomes the organization actually experienced †¦stock price, credibility, market share, management changes, residual stakeholder backlash, unresolved problems, etc. 6. State your conclusions and recommendations for other/more effective actions the company could have taken to produce better stakeholder outcomes. Support your argument with course facts/data/decision models/outside sources. 7. Each partner will write a one page summary of the case. 8. Prepare a presentation, 10 – 15 minutes (audience discussion after presentation). 2. (Include this with Starbucks having difficulties) Starbucks primary stakeholders are their employees, customers, shareholders, investors, suppliers, coffee farmers, local communities, and other business partners. Secondary stakeholders are media outlets, government, nviromentalist groups, and their competitors. . 5. Starbucks is using Corporate Social Responsibilty actions to tackle a lot of the issues they face. Starbucks defines CSR as conducting business in ways that produce social, environmental and economic benefits for the communities in which they operate and for the company’s stakeholders and shareholders. They have created internal structures to ensure that any emerging issues are recognized, prioritized, and addressed in a consistent way t hroughout the company. In response to the over consumption of water, they are in the process of installing buttons that will turn on the faucet instantly and momentarily. This will save approximatley 150 gallons of water per day in each store. Starbucks has also been named as one of the World’s Most Ethical Companies by Ethisphere Magazine. This is based off of their corporate citizenship and responsibility, corporate governance, innovation that contributes to public well being, leadership, and internal systems ethics/compliance program. Starbucks has also gave back to the communities they do business in and around the world. The last CSR report that was published in 2007, shows they gave approximatley 18. 01 million in philanthropic contributions. 2. Starbucks has been hit by the weakened economy as consumers are trying to cut back on their spending. It is much harder to draw in customers today that are willing to pay around $3 for a cup of coffee than before when the economy was booming. Fast food chains like McDonald’s are capitlizing on Starbuck’s â€Å"expensive† reputation by offering coffee products at a lesser cost. . In response to this, Starbucks is using a business-level strategic manaemetn strategy in order to compete back. They have introduced a new instant coffee called Starbucks Via, which is less than $1 a cup. This has expanded into many new markets, including airlines. They have expanded their menu in order to compete as well. You will now see â€Å"value meals† in their bistros. You can also order breakfast sandwiches, lunch items, and a wider selection of pastry items. 3. Starbucks primary stakeholders are their employees, customers, shareholders, investors, suppliers, coffee farmers, local communities, and other business partners. Secondary stakeholders are media outlets, government, enviromentalist groups, and their competitors. Sources http://business. timesonline. co. uk/tol/business/industry_sectors/leisure/article5240824. ece http://abcnews. go. com/International/SmartHome/story? id=5964908page=1 starbucks. com/aboutus/csrreport/Starbucks_CSR_FY2007. pdf http://cachef. ft. com/cms/s/2/aa9831ce-c266-11dd-a350-000077b07658. html

Thursday, November 21, 2019

Short essay Example | Topics and Well Written Essays - 750 words

Short - Essay Example For an industry to succeed in a competitive market, it should focus on two common trainings, the general management training and functional training. The main aim of training is to offer cordial services which reflect friendly and warmth required in a highly competitive market. Training also maintains the image of self-assurance and influence in the employees’ mind. As per my understanding, in a commercial aviation, comprehensive training motivate the employees by providing them with information on the expectation of the industry, skills of handling passengers as well as the regulations that guides the operation in an industry. The second main motivator to my success in a competitive commercial aviation is the creation of high-performance service delivery team. A good number of aviation services require teamwork to necessitate the delivery of impeccable services to customers. Effectual teamwork in aviation industry in most cases facilitates skills and knowledge sharing among t eam members. On the other hand, I am also motivated to work in a competitive aviation industry by recognition and recompense for a mission well accomplished. Apt reward system forms the key policy for motivation in an industry. ... Explain. I am comfortable in working with students from different cultural, political, social, racial, and religion backgrounds. My past experiences have helped me in coming up with several ways of adopting with people from different backdrop. In my initial stage of coping with students from diverse background, I will create a conscious decision aimed at establishing tangible friendship. In developing a substantial friendship with people from different background, I will make sure that, I understand the cultural diversity of people in my presence. After identifying the existing background, I will place myself in a situation which will facilitate meetings with students from different cultural settings. Attending meetings, celebrations as well as looking for other resourceful means of meeting students from different background will assist me in interacting with many students from different cultural background. I will then identify the biasness and misconceptions relating to different c ultural background. To facilitate cordial relationship with people from different cultural backgrounds, the understanding of cultural misinformation is extremely crucial. The understanding of other student’s cultural misconception will help me in asking relevant question concerning their views, customs, and culture. To get a deep understanding on cultural background of different students, reviewing of their culture and history literature is also vital. On the other hand, to cope well with people from different cultural background, it is important to listen to other people history, show a sense of caring, understand different communication values and styles, make a risk of making mistakes as well as

Wednesday, November 20, 2019

Bauhaus and the Design School Essay Example | Topics and Well Written Essays - 1500 words

Bauhaus and the Design School - Essay Example The Bauhaus school of design underwent three different phases of development In the wake of World War I and all troubles it revealed there was a need to tap into the more rational aspects of everyday life. The sentiment was seized upon by famed architect Walter Gropius who opened the school in Wiemar. Gropius in a way was forwarding the area where Germany would seek an advantage in production, that is by producing common place article with an artistic aesthetic and remaining competitive relative to other economies with more resources. Whether this was the intention of Gropius and the early architects of Bauhaus is not entirely clear but it is perhaps specious to separate the Zeitgeist of the time from the ideas of the innovators. The Bauhaus School went through three different phases in its early history influenced by the philosophical leanings of its directors. Gropius was followed as director by Hannes Meyer when the school moved to Dessau in 1928. Meyer more of a formal thinker re moved much of the aesthetic underpinnings of Gropius and became more concerned with the influence of science and its translation into a greater sense of function. This turned the pendulum toward the functional aspect of products and perhaps subverted the original aim of the school; however, the school in retrospect was to go through this cycle of thesis and antithesis between function and form throughout its history. Meyer was succeed by Ludwig Mies Van der Rohe who once again reasserted the importance of aesthetics over function.

Sunday, November 17, 2019

Informactics Nurse Specialists Essay Example | Topics and Well Written Essays - 1000 words

Informactics Nurse Specialists - Essay Example Their scope of practice spreads from operational to strategic planning. They are the link between the nursing and information system departments (ANA, 2011). INSs collect data for patient care, access information needed for providing nursing services and implement policies to ensure confidentiality, privacy and security of data. An INS combines clinical expertise and informatics expertise for the efficient and successful interpretation and use of health information technologies (ANA, 2011). An INS is responsible for designing, implementing and training with regard to information systems within the nursing department. He is also responsible for the department’s informational needs and conducts orientation programs for new nurses, physicians and ancillary staff (ANA, 2011). He maintains policies and procedures about the hospital’s medical information system and updates the staff on design and use of the order entry, results reporting and new program functions (Saba & McCo rmick, 1996). The most significant benefit of hiring an INS in a health institution is the improved quality of patient care offered (Hannah, Ball & Edwards, 2006). In their duty, nurses’ decisions are founded on information available. INSs play a key role in organizing the information available to nurses for them to carry out their duties and monitor patients accurately (Hannah et al, 2006). Also, most hospitals do regular medical research. Hiring an INS improves research in health care institution’s. By the use of computer software, nurse researchers can manipulate data making it easy for nurses to diagnose problems and come up with the right decisions. This in turns helps to improve the quality of care given (Hannah et al, 2006). There is a considerable reduction in medical and diagnostic errors. Apart from better provision of care, having an INS helps health institutions manage departmental data, after which they are able to get and integrate information from differ ent departments and use it to make the working environment more ethical (Hannah et al, 2006). As much as it is beneficial to have an INS among the staff member, it also has financial implications on the health institution. The salary budget of the hospital will go up significantly as an INS earns a salary ranging from USD 69,000 to USD 98,000 (Hannah et al, 2006). There is also a high initial cost of implementing the system, then maintaining and upgrading it. Training the nursing team will also have a cost. However, even with increased expenditure on salaries, there is a long term reduction in operation costs for the institution (Hannah et al, 2006). There will be a reduced cost of managing information systems and the institutions information. Since the INS manages the information, there are enhanced work ethics that contribute to reduced costs related to diagnostic and medical errors. These errors often lead to costly legal actions against the hospital (Hannah et al, 2006). The rol e of the INS impacts positively on the relationship between nursing and other information system departments (ANA, 2001). Armed with both technical and clinical expertise, they are a vital link between the departments and assist in fostering alliances between them (Hein, 1998). They

Friday, November 15, 2019

The Psychological Effects of Cyber bullying

The Psychological Effects of Cyber bullying Abstract The last few decades have resulted in major transformation across important areas of our physical, economical, social and cultural systems. These changes are due to emerging potential computer technologies and ever enhancing awareness of the people. Additionally, the strong, effective and highly swift sources of communications across the world have also added to the diversity being observed at international levels. These transformations have influenced almost every discipline, consequently leading to various psychological diversities. Presently, the people across the world appear to be highly updated regarding the developments and variations especially in the information technology. It appears to be a natural phenomenon that the ever increasing usage of these technologies and facilities not only offers numerous advantages but some sort of predicaments also arises. The cyber bullying comes to be amongst one of these and is primarily related to the factors influencing the psychological aspects. The judgement of the psychological effects of the cyber bullying requires highlighting some highly critical factors such as the age group of the persons involved, the probable responses of the users/involved persons, the magnitude and nature of interaction occurs, the overall environment in context with attitudes and behaviours. In order to generate a comprehensive rationale of the psychological effects of cyber bullying, the researcher presented interviews and elaborated the responses in context with the literature. Table of Contents Abstract 2 Table of Contents 3 Chapter 1: 5 1.1 Introduction 5 1.2 Title of the Research 5 1.3 Background of the Research 6 1.4 Objectives of the Research 6 1.5 Overview of the dissertation structure 7 1.6 Summary 8 Chapter 2: Literature Review 10 2.1 Introduction 10 2.2 Legislation against Cyber Bullying 11 2.3 Eleven Facts about the Cyber Bullying 12 2.4 The Harshest Impact of Cyber Bullying 13 Chapter 3: Research Methodology 14 3.1 Introduction 14 3.2 Research Design 15 3.3 Primary Research 15 3.4 Secondary Research 16 3.5 Data Collection 16 3.6 Interviews 17 3.7 Sampling Design 18 3.7.1 Sampling Unit 18 3.7.2 Sample size 18 3.7.3 Sampling frame 18 3.7.4 Sampling technique 19 3.8 Ethical Consideration 19 3.9 Potential Problems and the Remedies 19 3.10 Validity of the research 20 Chapter 4: Findings 21 4.1 Introduction 21 4.2 Demographic characteristics 21 4.3 Perception of the Respondents 22 4.3.1 Evaluation of Respondents Perception 22 Chapter 5: Summary, Conclusions and Recommendations 26 5.1 Summary 26 5.2 Conclusion 26 5.3 Suggestions for Additional Research 28 5.4 Limitations of this Research 28 References 30 APPENDIX 1 32 Chapter 1: 1.1 Introduction Presently, the Information Technologies are associated either directly or indirectly with every human being and influences the life at almost every crucial stage. When it comes to have interactions the role and influence of the information technology appears to be highly critical. It not only provides various advantages to the people living in a society but also facilitates them while having dealings across the borders. Along with advantages some sort of negative impacts also comes in the scenario which eventually leads to some sort of disturbances and losses. These negative impacts of information technology basically appear as a result of mismanagement and unethical dealings. The same sort of impact of information technology is witnessed in the cyber bullying. The cyber bullying normally occurs on the mediums including the internet, cellular phones and other devices which are utilized to send or post text/images intended to embarrass/hurt persons. This phenomenon is also described b y other researchers as the intentions to disturb persons in various ways such as sending continuous messages and mails to a person who rejects to have interaction. In continuation to this simple type of cyber bullying the intentions like sexual remarks, threats, pejorative labels (hate speech), posting false statement as a fact aimed at humiliation also comes under the cyber bullying. 1.2 Title of the Research The Psychological Effects of Cyber bullying 1.3 Background of the Research In the present era of globalization where the people are getting educated and close to each other with the use of various available communication resources. This diversity in the societies is leading the globe towards the environment where the people participate highly in various critical issues of the society. They are better informed and aware of their rights and privileges, this awareness and enhanced options of rapid communication leads to active participation. The people belonging to different portions of the societies strongly react to the changes and advancements around them at any level, hence, increasing the sensitivity and role of the information technology. This study aims to highlight the increasing impact and psychological effects of the cyber bullying. Therefore, a deep and critical insight of the factors related to the cyber bullying including the age group of the persons involved, the probable responses of the users/involved persons, the magnitude and nature of intera ction occurs, the overall environment in context with attitudes and behaviours, are deemed necessary. 1.4 Objectives of the Research The paper aims to focus on the impacts and psychological effects of cyber bullying. Additionally, the probable solutions will also be presented in accordance with the finding and analysis of the literature and primary data being collected. Moreover, an analysis of the nature of the cyber bullying will also be carried out in order to generate an enhanced understanding of the impact. Therefore, the paper aims on achieving the following objectives: The extents of knowledge general peoples have regarding the cyber bullying. Analysing the probable causes and intentions behind this act. Highlighting the areas which either directly or indirectly relates to the cyber bullying. Gaining an insight of the psychological effects of cyber bullying. Presenting possible solutions for controlling and diminishing the affects of cyber bullying. 1.5 Overview of the dissertation structure The entire report consists of certain areas which are listed and discussed below: 1. Introduction: This chapter introduces the main aspects of the research. This chapter includes title and what is the objective of research. Besides that, this chapter gives background of research. This chapter explains the fundamentals of cyber bullying and the implications regarding its psychological effects. The entire chapter concludes with different research questions and an overview about the research methodology that what strategy of research will be utilized in this research paper. 2. Literature Review: This chapter analyses the basics of politics along with the role of international politics in context with the Iraq invasion by the coalition. These fundamentals are explained in detail with respect to different theoretical models. Emphasis of this chapter is laid on the theories that are directly associated with the scenario. Therefore, it can be said that this chapter would give an overall idea about all the major aspects and terminologies that are directly and indirectly associated with the scenario of cyber bullying. Furthermore, this chapter would form a mindset of the reader that whether the cyber bullying leads to psychological effects? 3. Research Methodologies: The research methodology that is used in the research is discussed in this chapter. Although there are different methods of doing the research but due to the limitations of research only secondary and primary sources are used. Secondary sources are extensively used in this paper and the entire research is based on books, peer-reviewed journals, scholarly articles etc. 4. Findings and Analysis: The findings and different interpretations of the results are included in this chapter and all the results that are achieved are interpreted into meaningful form for further research and analysis. A thematic analysis is undertaken in this regard which would clarify the statement that cyber bullying leads to various psychological effects? 5. Conclusions and Recommendations: The entire research is summarised in this chapter and limitations of the research and certain recommendations are also discussed in this research paper. Besides that certain recommendations are also presented in this dissertation. This chapter can actually be considered as the crux of all the chapters as it summarises other chapters and concludes with the final results. 1.6 Summary This chapter as implied by the name sets up the scene for the entire dissertation and it focuses on different aspects like background of the research, objectives of the research and review of the methodology. The methodology section depicts that both quantitative and qualitative analysis will be used. The introduction chapter gives up an overview of the entire dissertation and it also elaborates the facts that what other chapters are included in this dissertation and what are their contents. Chapter 2: Literature Review 2.1 Introduction There has been difficulty defining bullying. After analyzing multiple definitions, Greene (2000) suggested that there were five features that researchers had agreed on. It is aggressive behavior or intentional harm doing which is carried out repeatedly and over time in an interpersonal relationship characterized by an imbalance of power. The victim does not provoke bullying behavior by using verbal or physical aggression; and bullying occurs in familiar social groups. (Vandebosch and Van Cleemput, 2009) A study in Ireland was carried out to see the effects of bullying. 363 boys out of the 1870 participants (19%) reported to have been bullied at some point in their life. It was found that the odds ratio was four times higher to self-harm or commit suicide in boys that had experienced bullying, over the ones who hadnt. This study found psychological issues within the bullied boys. They had problems getting on with their schoolwork, their sexual orientation and physical abuse. (McMahon,E, Reulbach,U, Keeley,H, Perry,I and Arensman,E) This study displays the harsh reality of bullying, however it doesnt end there, as general bullying has moved on with technology. In the past it was limited to the playground, now it follows victims home, and they are unable to escape. Cyber bullying is seen as the new breed of bullying. Ten years ago this sort of bullying wasnt heard of. However, technology has now made it an issue. Such things include the internet and mobile phones. The internet has several different aspects, which can lead to cyber bullying. For example these include, email, social networking sites, instant messaging and skype. Problems with these now reflect todays bullying phenomenon. There have been different definitions of cyber bullying, one of which say suggested by Olweus (1993), A person is bullied when he or she is exposed, repeatedly and over time, to negative actions on the part of one or more other persons, and he or she has difficulty defending himself or herself. (Slideshare.net) 2.2 Legislation against Cyber Bullying Law and legislation regarding penalizing the bullying has been implemented mainly in U.S in many states including New York, Maryland and Rhode Island. The laws have now been passed by seven states against digital harassment in 2007. Ordinance has been passed which has stated online harassment as a crime and would be dealt with state punishment in Missouri. In June, 2008, Rep. Linda Sanchez (D-Calif.) and Rep. Kenny Hulshof (R-Mo.) proposed a federal law that would criminalize acts of cyber bullying. Lawmakers are trying to state new legislation against cyber bullying as there is no specific law in the books which deals with this particular crime. A new federal law is expected to be implemented soon as no one has been prosecuted yet under this crime. The proposed federal law would make it illegal to use electronic means to coerce, intimidate, harass or cause other substantial emotional distress. In August 2008, the California state legislature passed one of the first laws in the country to deal directly with cyber-bullying. The legislation, Assembly Bill, gives school administrators the authority to discipline students for bullying others offline or online. This law took effect, January 1, 2009. A recent ruling first seen in the UK determined that it is possible for an Internet Service Provider (ISP) to be liable for the content of sites which it hosts, setting a precedent that any ISP should treat a notice of complaint seriously and investigate it immediately. 2.3 Eleven Facts about the Cyber Bullying In the recent past, various researches have been conducted to ascertain the facts regarding the cyber bullying and under mentioned eleven facts have been derived: Round about 42 percent of the kids have been found bullied online with a ration of one out of every four have faced recurrence Among this percentage, being ignored and disrespected were the most common forms of cyber bullying. In the case of middle school students approximately 9 out of 10 have had their feelings hurt online. About 75% have visited a Web site bashing another student. Four out of ten middle school students have had their password(s) stolen and changed by a bully who then locked them out of their own account or sent communications posing as them. About 21% of kids have received mean or threatening e-mails. The psychological and emotional outcomes of cyber bullying are similar to real-life bullying outcomes, except for the reality that with cyber bullying there is often no escape. School ends at 3 p.m., while the Internet is available all the time. The primary cyber bullying location where victimizing occurs, at 56%, is in chat rooms. Girls are about twice as likely as boys to be victims and perpetrators of cyber bullying. About 58% of kids admit someone has said mean or hurtful things to them online. More than four out of ten say it has happened more than once. Cyber bullying has increased in recent years. In a national survey of 10-17 year olds, twice as many children indicated they had been victims and perpetrators. 2.4 The Harshest Impact of Cyber Bullying The effects of cyber bullying are quite harsh and can badly affect youth in their life. The statistics show that all individuals adults or teens are being bullied in their life but it is more common to teens. Many parents worry about their kids spending time on the Internet. However, research shows that most parents arent thinking about cyber bullies; most are more concerned with their child coming across a pornography Web site. An article at middleweb.com shows that cyber bullying should be at the top of every parents watch list. The articles disturbing opening paragraph follows: Only after Ryan Halligan hanged himself did his father realize what the 13-year-old had been doing online. Through three months worth of links and instant messages saved on his home computer, Ryans growing pain and the callousness of his online tormentors became clear. Youre a loser, one message jabbed. There were other taunts, Web searches on suicide, and, ultimately, threats to kill himself to get back at school bullies. Tonights the night, Ryan finally typed. Its about time, the screen replied. This nightmare situation continued after Ryans death on October 7, 2003, when his father, after clicking on his sons saved links, found months of horrible messages directed to Ryan. Chapter 3: Research Methodology 3.1 Introduction This dissertation was conducted in order to assess the background and psychological effects of cyber bullying. Both qualitative and quantitative approaches were utilized in order to gather the important data by the researcher. Two research methods were used for gathering the data for the research which are namely survey and interview respectively. The data gathered from the survey was then processed and analyzed which was later compared to the Likert scale for data interpretation. The techniques used in this study are there to analyze the data presented in the research. The research conception, methods applied to the research and rationalization of the research methodology applied are discussed within the presented chapter. Various approaches such as quantitative, qualitative, and Likert scale approach are explained in the following chapters with their respective limitations and advantages. The chapter also sheds light on the most appropriate data collection methods for the current r esearch. The data collection procedures utilised the primary and secondary research are also reviewed in this chapter. It is important to note here that this research was mainly based on the questionnaires and interviews even though other research methodologies were briefly discussed. In order to specify the procedures and methodologies for collection and analysis of the data a master plan is used known as Research Methodology. Series of rational decision making alternatives are being presented in the research methodology. These alternatives depend upon a range of available options to the researchers. The unit of analysis, time dimension, the purpose of study, data processing, sampling design, and analysis of the data are presented in the research methodology. Mainly two techniques of research, Qualitative and quantitative are utilized. Though both of the methods have their own significance, the use of exploratory quantitative research design for this study appears to be appropriate. 3.2 Research Design Research is an endless effort for truth. It certainly brings to light new knowledge or corrects previous errors and misconceptions and adds to the existing body of knowledge in an orderly manner. This part deals with procedure adopted to conduct the study. The researcher had to depend on the related literature and structured questionnaires. Descriptive data were typically collected through a questionnaire survey, an interview or observation. A formal structure research method will be suitable for conducting such type of research especially when the data is quantitative. Therefore conclusive research method has been chosen. Decision making will be based on the findings based on results obtained from literature review and interviews. The type of conclusive research that will be adopting is descriptive research method. This method helps to estimate the perceptions of factors characteristics. It is also very supportive in making specific predictions. The method of survey for obtaining da ta is based on the response and questioning of respondents. In this method, a variety of questions are asked from respondents regarding their perception and influence on their decision. This will help us measure its worth in todays life. 3.3 Primary Research Primary research is the collection of data that does not exist. This can be through numerous forms: including interviews, questionnaires, telephone conversations, surveys, etc. The major merit with conducting primary research is that it accurate. However, the disadvantage of primary research is that it may be time consuming, as it involves dealing with people from various regions, the human sources may only become resourceful out of their own willingness, and this may take them quit sometimes before making up their minds to tell you what they know or give you their side stories about your questions (Focardi Fabozzi, 1998). 3.4 Secondary Research The data acquired from secondary sources is very important in forming the base for the primary research to be carried out. Cost and time effectiveness are the biggest advantages of the secondary sources which attracts the users to use these sources. The limitations of secondary sources entails to reliability of the source and difficulty in finding recent and relevant data. The secondary data is collected from articles, books, journals, reports and other reliable sources. Moreover other sources such as public libraries, Universities and government sources can also be used for the collection of secondary sources. These sources have extensive data available on different research areas. Data can also be collected from directories and catalogues available in libraries or internet (Reid and Bojanic 2009). Secondary research is the collection of existing data, that is, in contrast to primary research. For example: research on experiments or specific subjects. The merit of secondary research is that its not time consuming however a disadvantage is that the information retrieved may not be relevant. 3.5 Data Collection In research studies, the source of data is two-fold. Data comes from the inner world of libraries as well as from the outer world of human being. It is either the shelved data or it is the data acquired live from the people involved in the study. This research being in the technological advancements and judgment of psychological effects of cyber bullying, the researcher aims to collect data mainly from the respondents. After considering the various methods of data collection such as ethnographic style, survey, experimental style, and narrative enquiry, interviews have been chosen as it allows the collection of highest opinions within the time span of the project as well as the fact that the results could be accurately mapped and correlated to provide quantitative information. 3.6 Interviews In order to achieve the purpose of the investigation, the key focus lies on finding out which techniques should be applied. Interviews were the best method for understanding this research. A respondent interview is one where the interviewer directs the interview and the interviewer responds to the questions of the researcher. And to add more weight on this observation, Borodzicz, (2004) stated that the standard survey interview is itself fundamentally slipped and that it therefore cannot give out as the ideal ideological model against which to assess other approaches. He also elaborates by describing interviews as the verbal exchange of information between two or more people for the principal purpose of one person or group gathering information from the other. And that Semi structured interviews enable one to fix and control circumstances in order to collect appropriate data while remaining flexible and responsive (Borodzicz, 2004). Structured interviews consist of closed-ended questions, where the structure of the questions, responses and the interview itself is decided prior to the interview. The interviewer has more control over the responses, and can lead the interview into the direction they want. However, the responses received are limited. Semi-structured interviews consist of closed and/or open-ended questions, allowing the interviewer to have some control over the responses and the interview. Although the open-ended questions allow the interviewee to express themselves and encourage them to present their views and opinions. Unstructured interviews consist of open-ended questions that do not restrict the interviewees responses, therefore collecting a wide range of information. This kind of interview is more supple in-terms of the questions being asked and their ordering, all depending upon the interviewees responses. 3.7 Sampling Design 3.7.1 Sampling Unit Sampling unit will consist of people having age of 15 years or more. The people belong to various disciplines of life including the students; the youth, the professionals etc. will be included in the sampling unit. Both males and females will be interviewed. 3.7.2 Sample size Sample size of 08 people will be used. 3.7.3 Sampling frame Sampling frame includes the following age groups: 15-25 years 25-30 years 30 or more 3.7.4 Sampling technique Sampling without replacement will be used. According to this approach one element cannot be selected again, once it is used it is removed from the list to ensure not be selected again. 3.8 Ethical Consideration All the measures adopted in this research are aimed to avoid any ethical violation. The research tactics will affect the people from whom data and information has been gathered, so to avoid any violation by pursuing the following points. à ¢Ã¢â€š ¬Ã‚ ¢ I will not force a specific outcome; rather go with an open mind to accept whatever will be the finding à ¢Ã¢â€š ¬Ã‚ ¢ I will respect the privacy of our participants à ¢Ã¢â€š ¬Ã‚ ¢ Proper credits will be provided to the document sources, I know that our college does not accept plagiarism. Plagiarism is a fraudulent act of a researcher when he or she uses the writings of other writers without citing the source (Nueman, 2003). It is more like stealing the work of another researcher, it also include the immoral action of obtaining information from internet sources without providing proper citation. 3.9 Potential Problems and the Remedies Many respondents are unaware of the asked question or are unable to transform the event in a descriptive way; hence conscious effort should be provided in allocating it at right place to right person. Researcher must take care not to let their prior theoretical frame work or pre-conceived notion blind them to contrary event in a social setting. Qualitative researcher need to be sensitive to distinction of race, sex, and age and to other major social divisions.(neuman,2004) The facts reveals in open ended questions, that it can be affected by individual biasness, for that I will concerned more than five responses before drawing any conclusion regarding particular variable or speculation. 3.10 Validity of the research Validity is concerned with whether the findings are really about what they appear to be about. The information collected from the above mentioned and discussed sources will have a validity reason being that they will be gathered from the genuine sources such as the websites and details taken from the manager. Therefore it will be the information at its purest form and will 100% validity. Chapter 4: Findings 4.1 Introduction In this chapter, the data gathered from the different respondents who have interviewed in connection with their experiences and opinions regarding the cyber bullying and its psychological effects is presented and analysed. This chapter discusses the results of the interviews conducted to the 08 chosen respondents. In order to assure clarity and high level of understanding the selected respondents were briefed prior to starting the survey process regarding various basic aspects of the study which include purpose, significance and objectives. In order to analyze the data, sections have been formulated for the findings. The first section presents a synopsis of the demographic profile of the participants. This profile was categorised in accordance with various factors including gender, age, academic background, and place of residence of the respondents. The view of respondents regarding cyber bullying will be discussed in the subsequent section and in the last section, their standpoint o n the conception that cyber bullying leads to various psychological effects. Data collected from the survey was collected and analyzed to achieve the desired aim. 4.2 Demographic characteristics This section will discuss the demographic profile of 08 individuals who answered the survey by the researcher. The description of the respondents includes their gender, age, educational background, and their experience. The majority of the participants were male (74%) and the age bracket was 15-35 years which shows that most of the participants were quite related to frequent use of information technologies. Hence, it is expected that with their experience, the responses of this population would be more reliable, accurate and authentic. This was as a result of personal judgement used by the researcher, in an attempt to gain as much diversity as possible. 4.3 Perception of the Respondents The following sections will present the data and results in accordance with Likert scale. It is worthwhile to mention here that the participants were presented a set of statements so they can express their agreement or disagreement using five-point scale, wherein 5 is equivalent to an answer that qualities a strong agreement and 1 as showing a strong disagreement. This will provide a better understanding about the observations of the following respondents. 4.3.1 Evaluation of Respondents Perception It can be stated that the judgement of the psychological effects of cyber bullying requires in-depth analysis of the responses. In this regard, this part of the paper would present the evaluation and assessment of the responses generated from the collected data. Statement Strongly Agree Agree Neutral Disagree Strongly Disagree Are you aware of the cyber bullying and have you ever involved? 3 5 Do you think the social networking sites are the main mediums of cyber bullying? 4 1 2 1 Do you consider that the social level supports extended to cater cyber bullying (including the assistance by academic institutes for students) is appropriate? 2 3 2 1 Do you think social networking sites do enough to prevent cyber bullying? 2 5 1 Do you think that cyber bullying leads to various psychological effects? 4 2 2 Table 1 Evaluation of Respondents Viewpoint 4.4 Interview This portion of the research will present a brief analysis of interview conducted from the selected respondents. Are you aware of the cyber bullying and have you ever involved? The respondents appear to be not only very much aware of the term Cyber Bullying but they were also having sufficient knowledge regarding the effects of cyber bullying. They presented their views and experiences about the cyber bullying. It was revealed that most of them have bullied in the past and some of them even have being bullied more than once. Despite of having being bullied with different types of mediums, maximum of the respondents were of the opinion that they have gone through severe sort of stress during that specific period. The factor of stress was noted at a high ratio in the kids and the ones affiliated with schooling. They stated that the period they remained disturb

Tuesday, November 12, 2019

Karla Ann Marling’s book “As Seen on TV” Essay

Karla Ann Marling’s book â€Å"As Seen on TV† addresses the perception television had on shaping the fashion and cultural persona of everyday life in the United States during the 1950’s. She presents this phenomenon as a cultural chain reaction that occurred in response to Christian Dior releasing his new line of clothing right around the same time as President Ike Eisenhower’s inauguration, one of the first major TV events of the Decade.   As noted in her book, when she says, â€Å"Ike’s 1953 inauguration was one of the first big TV events of the decade. The cameras caught every detail of.† Eisenhower’s costume: the mink coat, the silly hat worn over bangs, the suit with the nipped-in waist and flared hipline, the charm bracelet, and high heels that pinched (Marling, 1994).† Of course for the President himself, Christian Dior new line would have no significant effect on the culture or American society, but through his Wife Mamie Eisenhower wearing a dress by the infamous designer as well as wearing more stylish accessories like high heels, and pearls, it introduced a major shift in how women would dress, there on out, and the style itself became known as â€Å"The New Look.†Ã‚   In essence it slight freed-up sexual repression of the 1950’s and became representative of a lifestyle, so that they could be completely turned on their head in the 60’s during the explosion of the feminist movement. Christian Dior designed what became known as the â€Å"hour Glass† shape, by using different padded linings as the author notes. The molded, hourglass hap was achieved through a variety of means: padding hidden in the lining of jackets to accentuate the swelling of the hips; boning, stays, or other constricting devices built into waistlines; and an internal framework composed of layers of tulle, organza, silk pongee, and a new â€Å"miracle fabric†-nylon†,1994†. In response to this the author notes that â€Å"It could be argued, of course, that the woman inside was irrelevant to the dress, that she was the victim of fashion, enslaved and oppressed by her own dinner gown.†Ã‚   This represents many of the counter arguments presented by men who opposed changes being introduced to society by the fashion industry.   This also represents much of the conflict of the reading.   The author goes on to present a quote by acclaimed 1950’s psychoanalyst Edmund Bergler when he says, the fashions industry is a â€Å"gigantic unconscious hoax† perpetrated on women by homosexual men who wanted to make them look ridiculous (Marling, 1994).† In sum, the author closes her piece by pointing out how there is still to this day controversy over how much authorship can be placed on Christian Dior for the creation of â€Å"The New Look.†Ã‚   It is seen as a culturally defining moment in history, which would eventually give way to the admiration of glamour that was bestowed upon such figures as Jackie O, Marilyn Monroe, and Elizabeth Taylor. It also represents a slight window into the modern era and its obsession with fashion to the likes of which as produced such irreverent iconic figures as Lady Gaga, who could arguably be pegged as the child of Christian Dior and Mamie Eisenhower, 1953. Karla Ann Marling’s book (1994). â€Å"As seen on TV†

Sunday, November 10, 2019

Business and Admin Research Information

Give Reasons for agreeing Objectives and deadlines for researching information Agreeing objectives is essential for a team or individual to know what they are focusing on to avoid wasting resources and time. Knowing the How, What, When and Why of an assignment will mean being able to complete the task in a timely manner and correctly. Deadlines strongly affect what you research e. g. World news is being update by the hour, with a well-defined deadline; we can better gather the relevant information as equired.There is no point to having a long deadline and present a report of yesterdays news; Who is interested in old news? How much will you pay for yesterday newspaper? Is it worthless? A copy of todays newspaper is worth money, but yesterdays is worthless. Therefore, objectives and deadline must go hand in hand. With the right objective and a set deadline you know what must be done and how long you have. 1. 2 Give reasons for identifying and agreeing sources of information As there ar e many different ways to find out information, for example; The internetBooks and EBooks Word of mouth etc. , Reference material Academic Journals Magazines Statistics Specialist information Interviews Past speeches Pictures Organizations It is therefore crucial that you make sure the information is correct, relevant and at the right time, with all the required information in hand. Only if data is stored in a procedural manner it can be easily retrieved. Information might be retrieved for marketing purposes, for communications, for monitoring purposes; for surveys and other research that an organisation or business might conduct.Information will also be retrieved in situations where information might have to be shared with partner companies and with the police or Tax Services. Storage of data plays a major role in improving the performance of a company and this can happen either offline or online and in various formats. Storing information is essential for many reasons; these includ e Ease of access and readability, The level of detail you are able to store The choice to have various copies of the information in case of loss and ease of transfer.Be Able To Research Information for Others 2. Agree aims, objectives and deadlines for the information search Agreeing aims and objectives regarding tasks will help you to do your work efficiently as they give a clear idea of what is needed and why. Deadlines are also very important as our customers and our reputation is negatively affected if we don't complete work in the required time, so time limits help to estimate the time you have to spend on each one, otherwise you could spend too long researching one source and then find out it was the wrong source.Having deadlines allows you to structure your own deadlines, allowing a certain mount of time on each source of research, so you do not overlook the information of another. 2. 2 Identify sources of information Question 1. 2 answers this question. 2. 3 Search for and o btain data Research comprises of; â€Å"A creative work undertaken on a systematic basis, in order to increase the stock of knowledge. This includes knowledge of man, culture and society, and the use of this stock of knowledge to devise new applications. † (OECD (2002) Frascati Manual: proposed standard practice for surveys on research and experimental development, 6th edition).It is used to establish or confirm facts, reaffirm the results of previous work, solve new or existing problems, support theorems, or develop new theories. The primary purposes of basic research (as opposed to applied research) is documentation, discovery, interpretation, or the research and development (R;D) of methods and systems for the advancement of human knowledge. There are several forms of research: Scientific Humanities Artistic, Economic Social Business Marketing Practitioner research, etc. Nothing damages someone's professional credibility as quickly as an error, even a inor one.While a simp le calculation error or typo can seem trivial in the scheme of things, it implants doubt into your audience's mind. They now think; â€Å"If this person can make these simple errors, they can also make larger errors†. Errors occur for many reasons; Ignorance Lack of time Poor planning Laziness Incorrect data Invalid source material The most common errors we see are in spreadsheets and written communications. Spreadsheets can be deceiving because they print out or display very professionally and can hide simple calculation errors.Careless manipulation of formulas can cause errors that are difficult to visually detect. that miss detection by spell checker programs due to multiple meanings and basic sentence structure. Also, if the reader finds inconsistences in the flow of the report/ information or if it sounds far-fetched, they being to wonder whether or not the information is plausible. No matter the root cause, errors suggest a lack of caring or attention. Conversely, peopl e notice attention to detail. The customer experience holds true for presentations and report slides.

Friday, November 8, 2019

How to Make Glowing Jell-O

How to Make Glowing Jell-O Its incredibly easy to make Jell-Oâ„ ¢ or other gelatin glow under a black light. Heres how to make it happen: Glowing Jell-O Materials package of Jell-O or other gelatintonic waterblack light Make the Jell-O Follow the directions on the package, except use tonic water instead of water.For a small package, the usual directions would be to heat 1 cup of tonic water to boiling.Mix the boiling tonic water and Jell-O until the powder is completely dissolved.Stir in another cup of tonic water.Pour the liquid into a pan or bowl.Refrigerate the Jell-O until is has set.You can use cookie cutters to make shapes out of the gelatin if desired.Shine a black light on the Jell-O to make it glow. No matter what flavor/color of Jell-O you use, it will glow bright blue under the black light. This is the fluorescence of the quinine in the tonic water. Quinine also gives tonic water a distinctive bitter flavor which you will also taste in the gelatin. If you dont like the taste, you can lessen it by using half tonic water and half tap water in the recipe. Either sugar-free or regular tonic water works fine for this recipe. Some recipes call for using a low percentage of tonic water (5-10%). The glow from this gelatin will be extremely faint, especially if the dessert is colored. You need a decent amount of quinine to get a bright glow.

Wednesday, November 6, 2019

USS Langley - The US Navys First Aircraft Carrier

USS Langley - The US Navys First Aircraft Carrier Laid down on October 18, 1911, at the Mare Island Naval Shipyard in Vallejo, CA, USS Langley (CV-1) began its life as the Proteus-class collier USS Jupiter (AC-3). Its keel-laying ceremony was attended by President William H. Taft. Work continued through the winter and the collier was launched on April 14, 1912. The US Navys first turbo-electric-powered ship, Jupiter joined the fleet in April 1913, under the command of Commander Joseph M. Reeves. USS Jupiter Shortly after passing sea trials, Jupiter was sent south to the Mexican coast off Mazatln. Carrying a detachment of US Marines, the Navy hoped that the ships presence would aid in calming tensions during the 1914 Veracruz crisis. With the situation diffused, the collier departed for Philadelphia in October, becoming the first ship to transit the Panama Canal from west to east in the process. After service with the Atlantic Fleet Auxiliary Division in the Gulf of Mexico, Jupiter was switched to cargo duty in April 1917. Assigned to the Naval Overseas Transport Service, Jupiter sailed in support of US efforts during World War I, and made two cargo voyages to Europe (June 1917 and November 1918).   During its first Atlantic crossing, the collier carried a naval aviation detachment commanded by Lieutenant Kenneth Whiting. These were the first American military aviators to reach Europe. Returning to coaling duties in January 1919, Jupiter operated in European waters to facilitate the return of troops serving with the American Expeditionary Forces following the end of the war. Later that year, the ship received orders to return to Norfolk for conversion into an aircraft carrier. Arriving on December 12, 1919, the ship was decommissioned the following March. The US Navys First Aircraft Carrier Work began immediately to convert the ship, which was renamed in honor of aviation pioneer Samuel Pierpont Langley on April 21, 1920. In the yard, workers reduced the ships superstructure and built a flight deck over the length of the ship. The vessels two funnels were moved outboard and an elevator constructed for moving aircraft between decks. Completed in early 1922, Langley was designated CV-1 and commissioned on March 20, with Whiting, now a commander, in command. Entering service, Langley became the primary test platform for the US Navys budding aviation program.    USS Langley (CV-1) - Overview Type: Aircraft CarrierNation: United StatesBuilder: Mare Island Naval ShipyardLaid Down: October 18, 1911Launched: August 14, 1912Commissioned: March 20, 1922 Specifications Displacement: 11,500 tonsLength: 542 ft.Beam: 65 ft.Draft: 18 ft. 11 in.Speed: 15 knotsComplement: 468 officers and men Armament 55 aircraft4 Ãâ€" 5 guns Early Operations On October 17, 1922, Lieutenant Virgil C. Griffin became the first pilot to fly from the ships deck when he took off in his Vought VE-7-SF. The ships first landing came nine days later when Lieutenant Commander Godfrey de Courcelles Chevalier came aboard in an Aeromarine 39B. The firsts continued on November 18, when Whiting became the first naval aviator to be catapulted from a carrier when he launched in a PT. Steaming south in early 1923, Langley continued aviation testing in the warm waters of the Caribbean before sailing to Washington DC that June to conduct a flight demonstration and show its capabilities to governmental officials. Returning to active duty, Langley operated out of Norfolk for much of 1924, and underwent its first overhaul late that summer. Putting to sea that fall, Langley transited the Panama Canal and joined the Pacific Battle Fleet on November 29. For the next dozen years, the ship served with the fleet off Hawaii and California working to training aviators, conducting aviation experiments, and taking part in war games. With the arrival of the larger carriers Lexington (CV-2) and Saratoga (CV-3) and the near completion of Yorktown (CV-5) and Enterprise (CV-6), the Navy decided that the little Langley was no longer needed as a carrier. Seaplane Tender On October 25, 1936, Langley arrived at Mare Island Naval Shipyard for conversion into a seaplane tender. After removing the forward section of the flight deck, workers built a new superstructure and bridge, while the aft end of the ship was altered to accommodate the ships new role. Re-designated AV-3, Langley sailed in April 1937. Following a brief assignment in the Atlantic during early 1939, the ship sailed for the Far East, reaching Manila on September 24. When World War II began, the ship was anchored nearby at Cavite. On December 8, 1941, Langley departed the Philippines for Balikpapan, Dutch East Indies before finally making for Darwin, Australia. World War II During the first half of January 1942, Langley aided the Royal Australian Air Force in conducting anti-submarine patrols out of Darwin. Receiving new orders, the ship sailed north later that month to deliver 32 P-40 Warhawks to Allied forces at Tjilatjap, Java and to join American‑British‑Dutch‑Australian forces gathering to block the Japanese advance into Indonesia. On February 27, shortly after meeting with its antisubmarine screen, the destroyers USS Whipple and USS Edsall, Langley was attacked by a flight of nine Japanese G4M Betty bombers. Successfully evading the first two Japanese bombing runs, the ship was hit five times on the third, causing the topsides to burst in to flames and the ship to develop a 10-degree list to port. Limping towards Tjilatjap Harbor, Langley lost power and was unable to negotiate the mouth of the harbor. At 1:32 PM, the ship was abandoned and the escorts moved into sink the hulk to prevent its capture by the Japanese. Sixteen of Langleys crew were killed in the attack.

Sunday, November 3, 2019

Read an article and answer questions Example | Topics and Well Written Essays - 250 words

Read an and answer questions - Article Example Aside from these surveys, researchers used real women and digitally manipulate their overall appearance as the participants watched; researchers can immediately recount their reactions and perceptions to their own bodies. Women are insecure and at times overly degrade themselves because of not achieving â€Å"the look.† Binge eating --- Women feel more satisfied with their bodies when they are not eating and their stomach became flatter. Throwing away the food eaten and followed by eating fruits as subordinate. Time and again, binge eaters or bulimics, in their latter life recorded serious illnesses that include death. Anabolic steroid use – Because of the pressure to keep up with the competition specifically in the body building field, men are taking steroids to further enhance their muscle shapes or bulkiness. This addicting drug use has harmful effects in the body. Through time using this enhancer results in the breaking down of the functions of the kidney and liver. Hypertension, hepatitis and high risk of fan HIV infection for those who uses the injectable that centers on men because they are the ones subjective to body building. Cosmetic surgery – A billion dollar industry and a phenomenon for the society of youth-obsessed society. Commercials dominantly affected the women on how they supposed to look. What is the norm and what is the â€Å"perfect† that pushed them to decide to go on the knives. Cosmetic surgery is not just simply placing make up on and being washed off at the end of the day. This would reverse the natural look of ones’ physical being. This also includes liposuction. Dieting (â€Å"fad† or â€Å"faddy†) --- This is usually a liquid protein diet or fruit diet and a powder mixed with water protein drinks. A person would eat no other than fruit throughout this period. Dieting with only drinks and easily digested fruits tend to make a person hungrier and crave more than ever thus, diverting into another kind

Friday, November 1, 2019

Professional Interview Paper Term Example | Topics and Well Written Essays - 750 words

Professional Interview - Term Paper Example She worked and served the society in the abovementioned role for one and a half year before becoming the Nurse Manager in the same facility. Nonetheless she moved to become the part of Family Nurse Practitioner program at the University of Winter in August 2004 whereas she had to quit her job at State hospital in order to take care of her ill aunt at home. Additionally she was able to remain a full time student at the campus during her first semester of the course but she was forced to become a part-timer at the later stage so that she can take better care of the aunt. According to the source it is very difficult and testing to manage a fulltime profession when one has to take care of children and an ill aunt and therefore she remained at home for one and a half year while continuing her part-time studies. After completing the course she gladly accepted a job of a Pediatric Rheumatology Nurse at University of US Medical Center. Yet it is important to note that her new position was te mporary in nature and that was ideal for her because it gave her the freedom to manage her studies while making a handsome fortune on the sideline. But shortly she was offered to take up a permanent position and the management pledged to give her ample amount of space to take care of her studies. The target professional enjoyed working with the children and managed to complete her FNP program and subsequently she got her certification and degree in 2010. The nurse continued working as a Pediatric Rheumatology Nurse until January 2011 when she decided to take a position of Family Nurse Practitioner at the US State Hospital. Current Practice The concerned professional is presently working in the role of Family Nurse Practitioner in the female unit of some State medical facility. The nurse has the duties and responsibilities of getting complete history of the patient while running an entire physical test before one can be admitted for the services. Core Competencies The current positio n of the featured professional prays on her abilities to promote a healthy lifestyle in the patients whereas she is also responsible for educating and informing them about reasons, symptoms and remedies of the most commonly prevailing diseases. The professional is also anticipated to run a full physical examination whilst she is supposed to diagnose and propose treatments as well. The frequently occurring situations include pregnancy, amenorrhea, dysmenorrhea, menorrhagia, metorrhagia, sexually transmitted diseases that are to be managed by the nurse. Legal and Ethical Issues with Healthcare The current role of the featured nurse can make her face several number of ethical and legal dilemmas for instance an incapacitated patient may not be able to put her signature on the documents that will cause delay in her treatment (Appelbaum, November, 2007). But in these kinds of situations nursing staff must consult legal experts before taking any course of action. Suggestions and Recommenda tions The nurse must remain awake to the fact that physical illnesses are