Wednesday, July 31, 2019

Al- Qaeda, Homeland Security, and US Patriot Act

Terrorism was viewed in the early days as an act of violence against a limited group of individuals. The acts then were consisted of bombing, kidnapping, killing prominent public officials, and others. The purpose of staging the terrorist act was to catch the government’s attention with the hope that the government may give in to the terrorists’ demands. The demands may be considered political, economical, or ideological. However, no matter the purpose is, the government usually do not heed the terrorist groups for they have been considered as a mere nuisance of the society that can easily be eradicated through military force.Additionally, terrorist groups were likened to a group of rebels operating as a group of limited members. The terrorist groups were not considered as a major threat to the nation’s security. But then, the horrifying 9/11 terrorist attack have drastically and clearly changed the world’s perception about terrorism. America, on the other hand, has greatly changed in its dealing with terrorism and terror groups. The International Community also realized that terrorism is a real threat to the world’s security. The remarkable 9/11 has indeed revealed the true face of terrorism.In response to the terrorism, America hunted all those responsible for the bombing by declaring an all out war against terrorism. Concomitant to the war is the enactment of all that would justify the government’s acts against terrorism. The government has enacted the U. S. Patriot Act and the Homeland Security. The president has rapidly heightened all measures to ensure security and to pursue all those responsible for the 9/11 and those who are connected with terrorism. Despite criticisms on the effect of the legislations to civil liberties, the government has been adamant on its stand to battle terrorism.The vengeance has eventually resulted to the war in Iraq and bombardment of Afghanistan. Likewise, the head of terrorism, Osama bin Laden and Sadam Hussein were apprehended and punished accordingly. Despite the declared death of the prominent architects of terrorism, the fight against terrorism still continues because of the belief that terrorism is still alive. The laws are also controlling within the nation. In line with this, the study will explore the organization of Al-Qaeda and at the same time present an evaluation of the counterterrorism laws. BodyThe name Al-Qaeda started to reverberate at the very onset of the 9/11 terrorist attack. The horrifying bombing of the very symbol of economic and military prowess of America, the World Trade Center, was rapidly linked to the Al-Qaeda and Osama bin Laden. Right after the attack, the government of the United States and foreign allies has united to condemn the unjustified act of terrorism. Al-Qaeda was believed to have been established in 1988. The Al-Qaeda was the by-product of the Muslims’ retaliation against the Soviet Union that occupied Afghanista n in 1979 through 1989 (Katzman).During the war against the Soviet Union, group of Muslims have started to recruit jihadis to fight against the Soviet Union. The recruiting and funding of the jihadis or fighters were initiated by Abdullah Azzam and his former student, Osama bin Laden, by founding the Maktab al-Khidamat which means Services Office (Katzman). This was also known as or Al Khifah. Notably, the Maktab al-Khidamat was believed to be the forerunner of Al-Qaeda. After the war with the Soviet Union, bin Laden and Abdullah Azzam established the Al-Qaeda in 1984 (Katzman). Al-Qaeda is an Arabic word which means â€Å"the base† (Katzman).Purposely, Al-Qaeda was established as a â€Å"rapid reaction force available to intervene wherever Muslim were perceived to be threatened† (Katzman). Al-Qaeda is also defined as â€Å"a secret, almost virtual organization, one that denies its own existence in order to remain in the shadows† (Atkins, 2004). The Al-Qaeda whi ch was jointly founded was eventually controlled by Osama bin Laden as a result of Abdullah Azzam’s assassination. Meanwhile, the assassination of Azzam was linked to Osama bin Laden. Remarkably, Al-Qaeda came to be known worldwide right after the 9/11 attack.The firmness of the organization of Al-Qaeda was believed to have been founded on ideology. There has been several controlling ideology of Al-Qaeda. Aside from being a religious duty, the Holy War has been viewed as necessary for the salvation of one’s soul and a means of defending the Muslim nation (Martin, 2006). Second, peace with the West is impossible and the only course of action in defending Islam is through violence (Martin, 2006). Third, the Al-Qaeda considers Muslim government as apostasies and is violently overthrown when they cooperate with the West (Martin, 2006).Fourth, the Al-Qaeda believes that only two sides exist and that no apocalyptic conflict between Islam and forces of evil exist (Martin, 200 6). From the time Al-Qaeda was founded in 1989, several terrorist activities were perpetuated in some other parts of the globe. In October 1993, the World Trade Center was attempted to be blown by Ramzi Ahmed Yusef (Katzman). In June 25, 1996, US Servicemen were killed while hundreds were wounded when a bomb exploded outside the Khobar Towers in Dhahran, Saudi Arabia (Martin, 2006).Then in August 7, 1998, a bombing was also planned n the US Embassies in Nairobi, Kenya and Tanzania that caused almost 200 innocent people. The USS Cole was also damaged by suicide bombing in October 12, 2000 where 17 sailors were killed (Martin, 2006). The most damaging terrorist activity was the terrifying 9/11 attack. The 9/11 terrorist attack has totally crashed the World Trade Center in New York. The third plane was directed Pentagon killing hundreds of people and the fourth plane crashed in the Pennsylvania field (Martin, 2006). The 9/11 terrorist attack has drastically changed the world’s p erception on terrorism.Likewise, the attack has changed the world’s perception about Osama bin Laden. Primarily, the target of Al-Qaeda is the US government and the American people. America has been considered as the enemy of the Muslim nation because of the wars perpetrated against them. The economic embargo and the control over the world’s economy have been highly criticized by the Muslim nation. Eventually, the perception that the West is the enemy to Muslim nations has been shaped. Since the West is considered as the enemy, the Al-Qaeda’s target has been the American people.It is noteworthy that all the attacks have been perpetrated against US embassies and US nationals. Aside from the Americans, the terrorist also targeted citizens of Europe, Israel, Russia and other allies of America. Likewise, the 9/11 is a clear message or expression of hatred of terrorist against the Americans. In order to send a clear and strong message, the terrorist has implemented h igh-profile target. In addition, they adopted the suicide bombing as a means of carrying out their designs because it is simplified and a means of eliminating last minute flexibility (Mannes, 2004).In addition, they targeted high officials and use the media in order for the government not to undermine the target. Al-Qaeda also adopted the unconventional means of acquiring information through an extensive research and contacts of professionals. Internet has been essential for Al-Qaeda in penetrating the security, intelligence, and military organizations of other countries. Notably, the information the Al-Qaeda has gathered were used in planning their attacks in several countries. Additionally, Al-Qaeda’s primary goal was to obtain nuclear weapon (Mannes, 2004).The Al-Qaeda has successfully created their own bomb through the documents they have captured. Besides, professionals were also recruited and being turned into a radical in order to obtain materials from the outside. Int erestingly, the group was able to create a biological weapon through the extensive research done by Ayman Zawahari, a medical doctor (Mannes, 2004). The group also studied in order to create their own weapons. Another tactic of the Al-Qaeda in carrying out their mission is to at least impair the economy of other country.This has been done by terrifying tourists through kidnapping of foreign nationals visiting a particular nation. Furthermore, bombing of public places has also threatened tourists from visiting places occupied by terrorist groups. In assessing the Al-Qaeda organization, it can be observed that the group has been patient and enduring in order to succeed in their plans. The tactics and strategies adopted by the group can be considered to have been brilliantly drafted and carried out. However, the group was molded and blinded by extremism. On the part of the American government, the 9/11 attack cannot just be disregarded.Right after the attack, the administration of Bush formed the 9/11 Commission. Primarily, the Commission was directed to conduct an investigation on the bombing. Thereafter, the name of Al-Qaeda appeared. In response to the 9/11 attack, Bush administration has created a new federal office of Homeland Security nine days after the attack (Andryszewski, 2004). Pres. Bush also signed into law the U. S. Patriot Act, 45 days after the 9/11/. In addition, then President Bush also signed the Homeland Security Act of 2002 in November 22, 2002 (Andryszewski, 2004).All these were the result of the fear of another terrorist attack. Furthermore, these laws have essentially changed the essence of security in the country. Meanwhile, in order to identify the targets of the laws, the government found the need to define terrorism. Terrorism has been defined by Federal Bureau of Investigation (FBI) as â€Å"the unlawful use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or any segment thereof, in furtherance of political or social objectives† (Sauter and Carafano, 2005, p. 65).From the definition, it is clear that terrorism has been recognized to exist within the country targeting the citizens and outside the country targeting Americans. Hence, the counterterrorism laws have been designed to deal with terrorism within and outside America. One of the weapons of America in fighting terrorism is the Homeland Security which has been referred to; â€Å"consists of all military activities aimed at preparing for, protecting against, or managing the consequences of attacks on American soil, including the CONUS and U. S. territories and possessions.It includes all actions to safeguard the populace and its property, critical infrastructure, the government, and the military, its installations, and deploying forces† (Larson, et. al. , 2000). As to the military function of the Homeland Security, it has five major key areas of focus. One is the WMD domestic prepar edness and civil support (Larson, et. al). Second is continuity of government to ensure or restore civil authority (Larson, et. al. , 2000). Third is border and coastal defense which includes management of large-scale refugee flow and revention of WMD smuggling that may potentially create threat to security (Larson, et.al, 2000). Fourth is the continuation of military operation (Larson, et. al. , 2000). And, last is the national missile defense (Larson, et. al. , 2000). In domestic preparedness, the FBI and Federal Emergency Management Agency (FEMA) can request from the Department of Defense the cooperation of the federal Army (Larson, et. al, 2000). Likewise, the National Guard can also participate in maintaining civil authorities. Interestingly, military has an essential role in all areas of Homeland Security.In a broader scope, the Homeland Security is defined as â€Å"a concerted national effort to prevent terrorist attacks within United Sates, reduce America’s vulnerabi lity to terrorism, and minimize the damage and recover from attacks that do occur† (Bolt, Colleta, and Shacklford, 2005, p. 433). In order to effectively fight terrorism, the administration of Bush has formed the Department of Homeland Security. The Department is composed of 22 federal departments, agencies, and bureaus from Central Intelligence Agency, FBI, DOD, and Center for Disease Control and Prevention (Andryszewski, 2004).These different agencies have been divided into Directorates with unique duties and jurisdiction. The first is the Border and Transportation Security Directorate which is responsible for ensuring the borders of America from terrorists coming from the outside of the country (Homeland Security, 2009). Aside from that, the Directorate ensures safety of land, sea, and air transportations. Immigration laws are also attached to the responsibility of the Directorate. The second is the Emergency Preparedness and Response Directorate which is tasked to coordina te with federal government in case of attack (Homeland Security, 2009).The third is Science and Technology Directorate responsible for biological, radiological, and chemical attacks, and nuclear weapons (Homeland Security, 2009). The last is the Information Analysis and Infrastructure Protection Directorate tasked to gather intelligence and information in detecting terrorist activities (Homeland Security, 2009). Furthermore, it is also mandated to identify infrastructures which may be vulnerable to terrorism. An Undersecretary is assigned to administer each Directorate. The Undersecretary has been assigned a task toâ€Å"access, receive, and analyze law enforcement information from agencies of the Federal Government, State and local government agencies, and private sector entities, and to integrate such information to identify and assess the nature and scope of terrorist threat to the homeland; detect and identify threats of terrorism against United States; and understand such thre at in light of actual and potential vulnerabilities of the homeland† (Bolt, Colleta, and Shackelford, 2005, p. 433). Looking back into the definition, Homeland Security has three major concerns.First, prevent terrorist attacks in America (Fisher and Green, 2003). Second, reduce the vulnerability to terrorism of America (Fisher and Green, 2003). Third, minimize damages and recovery in case of attack (Fisher and Green, 2003). In preventing terrorist attack, the Department of Homeland Security has enhanced its intelligence and warning devices capable of tracking terrorist activities (Sauter and Carafano, 2005). In addition, national laws have been enacted to deal with domestic terrorism. Security within borders has also been intensified.Furthermore, transportation has been highly monitored to detect travelling terrorists. In the second duty of the Homeland Security, the Department is tasked to minimize vulnerability by curbing any possibility of bringing any weapon of mass destru ction into the country. This way, critical infrastructure and catastrophic terrorism are prevented (Sauter and Carafano, 2005). These kinds of terrorism involve attack through computer. Finally, the third duty is fulfilled by improving the capability of the Department in responding to a terrorist attack.Response may not only involve military defense but rather, it entails preparedness in rescuing lives of the victims and in containing the place attack to limit the number of victims. Another prevalent counterterrorism law of the government is the U. S. Patriot Act. Since the Act was abruptly enacted into law as it was signed 45 days after the 9/11 attack, the Act was perceived to be an effective means of curbing terrorism. Primarily, the U. S. Patriot Act was enacted to prevent terrorism but has effectively expanded the power of the law enforcement and intelligence agencies in carrying out their duties with regard to terrorism.There are basically four ways in carrying out the respons ibilities of the Act. First, the Act applies to fighting terrorism through the use of investigative tools previously available in fighting other forms of organized crime (Katzman). Second, the Act has eradicated any kind of barriers that hinders the free flow of information between and among law enforcement (Katzman). Third, the act validated the use of new technology and identifying new threats (Katzman). Last, the Act has created new terrorism-related crimes and increased penalties of crimes (Katzman).Under the first way, the tool that has been accepted or authorized includes electronic surveillances to detect terrorism in full-range and roving wiretaps to be authorized by a federal judge (Katzman). Through the roving wiretaps, the authorities are allowed to use electronic surveillance in response to â€Å"time-sensitive criminals or terrorist activities† (Purpura, 2007, p. 176). In addition, federal agents can also conduct investigations secretly under the authority of a v alid warrant obtained also secretly. The person being investigated is not also informed about the warrant.Through this, the federal agents would be able to identify agents, eliminate immediate threats, and coordinate the arrest of suspected individuals (Katzman). Furthermore, business records of individuals linked to terrorism can be examined through the order sought from the Foreign Intelligence Surveillance Court (Katzman). The information held by one federal agency can also be shared to other agency in order to effectively fight terrorism. Traditionally, each agency kept information confidential from other agencies in adherence to the agency’s independence.However, through the Patriot Act, the confidentiality of information or record is no longer controlling. In order to fully empower the federal agents in eradicating terrorism, jurisdiction as to warrant has been made general. Warrants can be obtained in any district and may be executed at any place being investigated for terrorist activities. Interestingly, cyber hacking has also been allowed in order to trace communications related to terrorism and at the same time tract hackers (Katzman).Furthermore, in order to fully prevent any terrorist activities and ensure the punishment of terrorists, the Act has increased penalties and added crimes that are categorized as terrorism. Among the crimes includes harboring any person linked to terrorism. Likewise, conspiracy crimes and offenses have been redefined and penalties of such have been increased. There has also been a specific penalty for mass transit attack and attacks using biological weapons. Finally, some terrorist crimes have no statute of limitation while some crimes have a lengthy.It is noteworthy that the Patriot Act has been criticized because of some acts that are obviously interfering with the rights of the citizens. Through the Act, the security in airports has been intensified and the law enforcers are even authorized to detain immigrants or suspected terrorist within the authorized time of detaining a person for questioning. Profiling has also been prevalent because Arabs, Muslims, and Asians were treated separately. Visas and passport of these people were also subjected to strict scrutiny. In addition, library records have been authorized by the Act to be reviewed by the federal agents.Furthermore, Emails can also be tracked by the federal agents on the mere basis of suspicion. More importantly, bank transactions suspected of funding a terrorist activity can be legally tracked by the federal agents. This has in fact changed the law on money laundering. Since the establishment of the Department of Homeland Security and U. S. Patriot Act, terrorism has been effectively deterred. The enhancement of security measures within borders and ports have hindered terrorist from pursuing their evil designs. In addition, several crimes such as smuggling have been prosecuted through the implementation of the counterterrorism law s.Several terrorist suspects have also been arrested through the active fulfillment of the federal agent of their duties. In line with this, suspects were thoroughly investigated due to the expansion of the court’s jurisdiction in trying and hearing terrorism cases. Remarkably, the laws have effectively brought back security within the nation. The fear of another terrorist attack has finally been eradicated. Despite criticisms, the effort of the government in curtailing terrorism has bear fruit. Notably, the people behind the 9/11 attack and other terrorist attacks have been prosecuted and punished accordingly.The very seat of terrorism has also been bombarded and paralyzed in order to prevent the rise of any sign of terrorism. The measures taken by the U. S. in fighting terrorism has also been adopted by other countries in their own fight to terrorism. The application of the counterterrorism laws has also reached policies of other countries. One of which is the Money Launder ing Law which has affected the bank transactions that passes through countries. Meanwhile, financial supports from suspicious donor have contributed to the success of terrorist activities.In order to avoid the free flow of the funds to support suspicious organizations, the government has strictly monitored bank transactions involving suspicious depositors and suspicious funds through the Patriot Act. Terrorist acts have also been effectively deterred at the very port of entry. The security equipments have been intensified and upgraded to detect any weapon that may be used to perpetrate a terrorist activity. Such equipments include scanners, surveillance cameras, and x-ray machines. The use of such equipments has been legally justified by the counterterrorism laws.Remarkably, all these measures have been effective in pacifying the nation from the threat of terrorism. Conclusion Traditionally, security can be acquired through the walls erected around houses. Terrorism, on the other ha nd, was considered as a petty problem yet a crime capable of being curtailed. More importantly, any act of terrorism can be disregarded by the government and responded through defensive military attack. However, the essence of security and terrorism has drastically changed after the 9/11 attack. Terrorism has become real and the injury it causes is unimaginable. Terrorism has also become the main enemy of the whole world.It also united the international community in curtailing and in eradicating any sign of it. Likewise, the 9/11 has angered America. The architecture of the attack also proved that Al-Qaeda can penetrate and destroy the security of America. The world’s perception of security has also drastically changed. America, on the other hand, has been quite paranoid about its security. However, it cannot be blamed because of the damaged caused by the 9/11 attack. The America viewed threat to have existed within and outside its territory. More importantly, the reality abo ut Al-Qaeda has finally been revealed through the bombing of twin towers.Al-Qaeda has indeed existed for a very long period. It has been living as a shadow that its existence was doubted by security forces. The organization has also been intelligent in carrying out its mission by extensively and safely planning the attacks. Likewise, the measures it has adopted in implementing the plans are sure yet deadly. But such cannot be considered difficult because of the ideology that has been instilled among the members. On the part of the victim of the attack, the countermeasures that have been adopted are the Homeland Security and U. S. Patriot Act.The Homeland Security was established as a means of centralizing the effort of the government in curbing terrorism. The Patriot Act, on the other hand, has enhanced the power of the federal agents in carrying their responsibilities with regard to terrorism. Any means that may be effective in tracking any sign of terrorism has been adopted and ap plied all throughout the country. Above all, the intelligence and security capabilities of the federal government have been heightened to effectively and efficiently eradicate terrorism. Both laws have been directed against terrorism.Upon the implementation of the counterterrorism laws, several changes have transpired. The enhancement of security has ensured the safety of America and American people. Several terrorist has also been arrested and punished accordingly. More importantly, the fear that has been instilled by the 9/11 attack among the people has been pacified. Peace and security has also been restored. Above all, no terrorist attacked against America followed. Hence, the measures adopted and implemented by the government has been effective and responded to the international problem. References Andryszewski, T. (2004). Terrorism in America.New York: Twenty-First Century Books Atkins, S. (2004). Encyclopedia of modern worldwide extremists and extremist groups New York: Green wood Publishing Group. Bolt, P. J. , Coletta, D. V. , and Shackelford, C. G. (2005). American defense policy. Johns Hopkins University Press Homeland Security. (2009). Department Components. Retrieved March 9, 2009, from http://www. dhs. gov/xabout/structure/ Katzman, K. (17 August 2005). Congressional Research Service. Al Qaeda: Profile and Threat Assessment. Retrieved March 9, 2009, from http://fas. org/sgp/crs/terror/RL33038. pdf Larson, E. V. , Peters, J. E. , Arroyo Center, and Rand Corporation.(2000). Preparing the U. S. Army for Homeland Security: Concepts, Issues, and Options. New York: Rand Corporation. Mannes, A. (2004). Profiles in terror: the guide to Middle East terrorist organizations. New York: Rowman & Littlefield. Martin, G. (2006). Understanding Terrorism: Challenges, Perspectives, and Issues. New York: Sage Publications. Purpura, P. P. (2007). Terrorism and Homeland Security: An Introduction with Applications New York: Butterworth-Heinemann. Sauter, M. , and Caraf ano, J. J. (2005) Homeland Security: A Complete Guide to Understanding, Preventing, and Surviving Terrorism. New York: McGraw-Hill Professional.

Tuesday, July 30, 2019

Explain Why It is Difficult to Measure Unemployment Essay

Measuring unemployment accurately is made difficult because of imperfect knowledge. Not all instances of unemployment are recorded, and some records of unemployment may not be accurate. Because the unemployed are eligible for benefits, some individuals may work, but not disclose it, and claim benefit. Conversely, many unemployed may not bother to inform the authorities, and this unemployment goes unrecorded. The Claimant Count records those claiming unemployment benefit (Job Seekers Allowance, or JSA) and can prove they are actively looking for work. It excludes housewives and those on training schemes. The Claimant Count may not reflect the true level of unemployment in the UK economy, given that not all the unemployed will bother to claim, and some are deterred because they cannot prove they are looking for work. This is especially true of part-time employees who are much less likely to register as unemployed compared with full-time workers. While some individuals may fraudulently claim, it is generally recognised that the Claimant Count under-estimates actual unemployment levels. The labour force survey is undertaken by the International Labour Organisation (ILO) and is a more direct assessment of unemployment, rather than those who claim benefit. It is based on an interview of a sample of 60,000 households (approximately 120,000 people) and tries to measure ‘unemployment’ as a whole, rather than those simply claiming benefits. To be considered as being unemployed individuals must: Have been out of work for 4 weeks. Be able to start work in the next 2 weeks, so they must be readily available for work. Workers only need to be available for work for one hour per week, so part-time unemployment is included in the measurement, though these workers are unlikely to claim unemployment benefit. This tends to make ILO unemployment much higher than the Claimant Count.

Balanced Diet

Intake of appropriate food with the combination of all groups of foods called balanced diet. The balanced diet provides sufficient nutrition and energy to the body. It is combination of different foods such as Milk group, meat group, fruit and vegetable group and grain group. Taking of excessive food of any group refers to unbalanced diet. All groups of diet should be taken every day and three meals a day should be taken. The unbalanced diet causes many side effects in connection with body tissues, growth and development, bone and muscle problems etc.The human body consists of 63% water, 22% protein, 13% fat and 2% minerals and vitamins. Accordingly human should take food. The taking of food depends upon the age also Hormonal balance is required while taking diet. The hormonal balance can be achieved through providing low glycolic carbohydrates, enough protein and fat. The following should form the nutritional balance: The human body requires essential nutrients for which the balance d diet provides with the RDAs i. e. Recommended Dietary Allowances.The balanced diet avoids excessive calories such as saturated fats, cholesterol, sodium and sugar. The taking of balanced diet depends upon the age, physical activity, sex of the human. Hence there will be no universal prescription of the balanced diet to the humans. It differs all.WATER DIETWater is part of balanced diet. The human brain is made up of 95% water; blood is 82% and lungs 90%. Even 2% drop in our body’s water supply can cause signs of dehydration, short term memory etc. Water is important to the human body. The body cannot work without sufficient water.If adequate water is not consumed on a daily basis the body fluids will be out of balance, which causes dehydration. The minimum consumption of water per day is six to eight ounce glasses. Drinking water is essential for weight loss. Many people desired to take cup of coffee, tea or other liquids, but they forget to take sufficient water for every day. Water plays key role in the prevention of disease. Drinking of eight glasses of water daily can decrease the risk of cancer by 45% and it can reduce the risk of breast cancer. It is important to note that the intake water should be cool.But adding of ice should be avoided. When the pure and water taken as water diet, it helps to adjust the set point of the body’s metabolism. Because the cool water absorbs heat from the body and then body expends calories in order to heat the water up to body temperature. The water diet amounts to 60 calories.QUANTITY OF FOODBalanced diet provides regular supply of vitamins, minerals and other required nutrients in order to ensure optimum health. The optimum health causes increase of energy levels for physical activity and leads to weight loss also.Balanced diet contains all ingredients needed for the body in order to keep the body healthy. The balanced diet contains carbohydrate, protein, fat, vitamins, mineral salts and fiber. But these all should be used with correct proportions. Eating of healthy foods from all the groups of foods for every day. Combination of foods from all groups such as Fruits, vegetables, breads, dairy products, meat and protein and fats should be taken with such measurements. The quantity of food should be taken with the combination of all groups as follows:PRECAUTIONSBalanced diet leads to balanced life. Women need fewer calories than men. A man who has weight of 140 pound and has low level of activity can take 2,000 calories per day, whereas woman can take 1,500 calories only. Ideal balanced diet should be preferred. Ideal balanced diet means variety of vegetables and fruits that calorie limits. Vegetable such as dark green vegetables, legumes, and starchy vegetables should be consumed several times in a day. Taking of such vegetables helps the accumulation iron and zinc levels in the body. The day meal should include with grains and milk products.In respect of Non-vegetarians, they shoul d eat lean meats and fish. The permanent part of balanced diet linked with protein rich fish, beans, nuts and seeds. Taking of balanced diet increases the healthiness and also take part in respect of the weight of the body. Balanced diet contributes healthiness, physical fitness of the body. While taking the balanced food, the following precautions should be observed on regular basisRegular exercises, decrease of calorie intake.Those people who are taking the 2,000-calorie per day have to take two cups of fruit and 2 cups of vegetables per day.Three cups of fat-free milk products can be taken.Avoidance of Trans fatty acidsThe intake of cholesterol intake should not be more than 300 mg per day.The intake of total fat should not exceed 20-35% of calories.The Added sugars should be avoided.With regard to the sodium or salt, the consumption should not be more than 2,300 mg i. e. one teaspoon of salt)The consumption of one alcoholic drink for women and in case of men it is two drinks per day.REFERENCE:http://www.georgetownuniversityhospital.org/body.cfm? id=555563&action=articleDetail&AEProductID=Adam2004_1&AEArticleID=002449http://www. medhelp. org/Medical-Dictionary/Terms/1/002449. htmhttp://www. patrickholford. com/content. asp? id_Content=997http://www. drugs. com/cg/balanced-diet. htmlhttp://www. weightlossforall. com/balanced%20diet. htmhttp://www. purchon. com/biology/diet. htm#carbohydrates 7http://www8. utsouthwestern. edu/utsw/cda/dept27717/files/48315. htmlhttp://www. findyoga. com. au/articles. asp? articlesID=105

Monday, July 29, 2019

Advertisement Campaign of Stanfords Master Program Essay - 1

Advertisement Campaign of Stanfords Master Program - Essay Example The advertisement to be studied is of Master’s Degree Program from Stanford University. Stanford University is one of the renowned and most respected universities across the globe. Most of the programs under this university are of high demand and students from various parts of the world come to study and gain knowledge and information. However, in order to successfully achieve 100% student enrolment as well as to ensure that the university and its programs are consistently preferred, the management needs to establish successful marketing campaigns for the same. The current media environment is extremely fragmented. It is characterized by the huge number of alternatives in media, competing for students’ time. This has also resulted in significant decline in their cognitive attention to a particular media and advertisement. For instance, Stanford University is facing the tough challenge from other universities in California, such as California University and San Diego Sta te University. The above situation has created difficulties for management committees in handling various marketing campaigns for different educational programs across universities. This increasing growth in simultaneous usage of media has a direct impact on the overall allocation of advertiser’s media money. It has become imperative for advertisers to allocate their advertisement budget into different media spaces, as focussing on only one or two media channels is not enough for the new age consumer. Apart from that, current research in media and advertisement suggests that media exposure always takes place in isolation. This means one particular medium is not in competition with other media for customer attention in a single timeframe.

Sunday, July 28, 2019

Cash Basis Accounting Coursework Example | Topics and Well Written Essays - 250 words

Cash Basis Accounting - Coursework Example The coursework "Cash Basis Accounting" talks about the cash basis accounting particularly when it is appropriate, petty cash fund and the age of accounts receivable particularly on what basis they are determined. The cash basis accounting is used by most of the sole proprietors as well as businesses without inventory. The system is considered appropriate for a small service company, cash-based business or small businesses. On the cash basis, accounting revenue is recognized once cash is received. On the other hand, in accrual accounting expenses tend to be recognized when cash is paid. Cash basis accounting differs with the accrual basis accounting in some ways. In cash basis accounting, revenues are recorded on the income statement once cash is received while in accrual-based accounting it is recorded when cash is earned. Cash earned entails cash received from customers. In cash basis accounting expenses are reported once cash is paid out while in accrual-based accounting expenses a re reported when they expire or occur. The expiry date is different from the payment period. Cash based accounting is the common mode because it is simple and provides cash flow picture more accurately. Petty cash fund is defined as the amount of cash on hand that is used in paying small amounts owed instead of writing a check. There are ways which can be employed by companies to control petty cash fund. Reporting and audit and the acceptable use are the ways which companies can employ so as to control petty cash fund.

Saturday, July 27, 2019

Assignment Example | Topics and Well Written Essays - 250 words - 303

Assignment Example Social media is operational and intertwined into the entire organization with operations, marketing, and PR all playing a role in the overall social strategy for Taco’s. Chipotle way of beating competition is recruiting top performing employees to ensure that the experience the organization provides is exceptional and highly regarded. Its restaurants are operationally efficient and pleasing. It constantly increases the company’s awareness and regards the environment highly. The company uses classic cooking methods and has a unique interior design. The corporate strategy the company has used is that it has aggressively marketed low prices to attract customers to visit more often (Mertens, p. 18). The company is interested in how food is prepared and seeks out to pay for what they recognize as better. Chipotle’s value customers and that is why they are unwilling to compromise on serving delicious foods. The company’s aims to deliver quality foods coupled with high quality ingredients. The company continuously strives to evolve in order to maintain competitive

Friday, July 26, 2019

Rhetorical_analysis_assignment_description Essay

Rhetorical_analysis_assignment_description - Essay Example Benjamin states that the conflicting idea between works of art is an indication that art is thriving in the economy and he uses some persuasive strategy to make his points clear. The rhetorical elements used in Walter Benjamin’s analysis shall be established in this paper in terms of logos, ethos and pathos. Benjamin’s Appeal to Logos Walter Benjamin’s use of solid theoretical background, which paves the way for his forthcoming arguments, is a clear indication of how he appeals to logos. Benjamin did not just make points without giving concrete evidence to back these points and his ability to do this shows that he tried to persuade his readers through his use of logical reasoning that would induce some sort of cognitive response from readers. Thus, Walter Benjamin’s analysis is effective in the sense that it appeals to logic. Benjamin makes his hypothesis as clear as possible as he uses it as a basis to develop a solid theory on the subject matter and this shows the effectiveness in his writing. Benjamin’s appeal to logos is also clear from his explanation of the theoretical framework that his study is built around. The fact that Benjamin explained the reproducible nature of a work of art, how it is reproduced in a capitalistic society, and what the meaning of this whole process of reproducing a work of art in the beginning of his essay is a clear sign of how he appeals to logos in his writing. Benjamin’s ability to differentiate between the replicas of art works made by craftsmen and replicas made by mechanical reproduction and his use of these theoretical frameworks to form the basis of his argument shows his appeal to logos. Thus, Walter Benjamin’s analysis is effective in terms of its appeal to logic. Benjamin’s ability to draw from historical analogies gives his audience the required information they need and clears the way for him to develop his arguments and concepts on the subject matter. By this a ct of rhetorical induction, a logical infrastructure is laid down by the writer which would ultimately lead the readers into a new realm of thought. All the historical facts presented by him are established facts and the only thing that he has done to prove his point is to put them in their places as if unraveling a mystery. This further emphasizes the effectiveness of Benjamin’s analysis as it is logical in all ramifications. Benjamin’s Appeal to Ethos Walter Benjamin’s open-minded presentation shows the author’s credibility as he is unbiased in his presentation and this is one of the ways that his analysis appeals to ethos. Benjamin uses a language that is appropriate to the audience and the subject alike as he is careful enough not to use words that would be too complex for the audience to grasp their real meaning. This is an essential rhetorical element that Benjamin uses in his analysis and it would make the readers willing to read what Benjamin has to say. The difference in value that exists between the works of art and its mechanical reproduction is something that the readers are also aware of and this is actually one of the ways that Benjamin respected the values and ideas of his esteemed readers. Benjamin could

Thursday, July 25, 2019

Part 2 - Health promotion edit Essay Example | Topics and Well Written Essays - 500 words

Part 2 - Health promotion edit - Essay Example Indeed, homosexuals are too vulnerable to be abused by their families, particularity because of the customs and traditions of Lebanese society, according to which people keep living with their families even when they are adult. Once might think that only women are subject to, honor crimes, but homosexuals are also victims of such crimes. Even though different charges and penalties which are issued on imposed on homosexuals and the government attempts to frustrate them, they are still fighting for their rights performing a remarkable achievements supporting LGBT on the social and political class. Indeed, many NGO’s, which call for human rights, placed the issue of homosexuality on their top list. MIRSAD is a governmental and private organization that is concerned with the issues of human rights as they aim to spread awareness on the Lebanese society in order to create democracy and equality. In one of the cases the MIRSAD defended protested against the police operation as they arrested and integrated with the owner of the one of the LGBT website. As a result the MIRSAD was not able to achieve successes as their director was also arrested for protesting (10). However, the organization did not stop supporting LGBT and human right issues. Another organization is Helem, which aim to spread awareness about sexual d isease such as HIV and STIs. Indeed, Helem mostly tend to focus on the right and health of LGBT. In fact, Helem state that their belief is to â€Å"consistently promoted the idea that knowledge is the key to openness, tolerance and acceptance† by educating Lebanese society about homosexuality and their rights. In addition, Helem educates the public and policymakers through offering real data, arranging effective dialogues, events, workshops, lectures and media. Furthermore, with the rejection of the public to LGBT individuals, they created their own private internment environments hidden from the public eyes. Besides the

Wednesday, July 24, 2019

Discussion 9 Essay Example | Topics and Well Written Essays - 500 words

Discussion 9 - Essay Example Scholars argue that although it is possible to learn about other cases through a similar case, it does not mean that cases studies are only used in making generalizations. On the contrary drawing inferences about a population from a case study is not justifiable (Creswell, 2003). Case studies are similar to other types of research and involve the identification of the problem, the collection of data and the analysis and reporting of results. As in other types of techniques, the approach and the analysis depends on the nature of the research problem. Case studies can be descriptive, interpretive or evaluative. The defining characteristics of a case study therefore are a deeper, intensive study of a single unit through detailed collection and analysis of many sources of information (Kumar, 2008:Babbie, 2010). In the first article titled â€Å"The impact of internet usage: A case study of delta state tertiary institutions† the objective of the study was to investigate and evaluate the impact of internet usage in institutions of higher learning in Delta State in Nigeria. The methodology used in this case is a case study that used questionnaires to solicit information from students and staff of four higher institutions of learning in Delta state in Nigeria. The questionnaires were randomly distributed to staff and students in four institutions of higher learning and later collected and analyzed (Ureigho, Oroke, & Ekruyota, 2006). It is possible to see a link between the research objective and the methodology taken as this study involved an in depth analysis of the impact of internet usage in institutions of higher learning. The most suitable approach to conduct this study was thus the case study methodology as it would lead to a lot of information about the problem in question. A focus group is an informal discussion among a group of selected individuals about a particular topic.

Business correspondence Essay Example | Topics and Well Written Essays - 750 words - 1

Business correspondence - Essay Example Some of the issues include stress management and communication between the workers. The reduction of pressure on the employees is also suitable in the reduction of the probability of the harmful aspects happening within the business environment. The Mediatization process refers to the process of research especially in the media mediums with the aspect of being up to date with the dealings in the real world. The procedure is crucial in the construction industry in an instance of revolutionizing the industry. The management of any construction firm is thus in a need to study on a new architecture that the new world is demanding in an attempting of attaining an additional benefit in the construction market. The perspective is also the source of all innovations in the construction industry since there is a possible fusion of the various designs that are prevalent. On the other hand, the research of the media industry gives the management of the construction the most recent changes in the prices and thus planning becomes easy. The budgeting of every activity is made easy through the process of Mediatization. The other issue is the linking of the construction business with the commercial world. The aspect involves the marketing of the services that entail the construction sector. The perspective will enable the construction management to notify the world of the gap that exists in the market and the role the construction business has in solving the problem. The instance is thus the primary procedure that determines the sales of the construction industry. The construction management should, therefore, take into consideration the need to link with other commercial institutions such as advertising agents. Furthermore, the auxiliary services such as the banking industry and the insurance are essential to the construction company since they provide finance that makes the activities of the construction firm through investment. The safety education in

Tuesday, July 23, 2019

Outsourcing in Strategic Management Accounting Essay

Outsourcing in Strategic Management Accounting - Essay Example This research will begin with the statement that the concept of migrating internal business processes or functions to an outside organization may seem quite appealing on the surface. Reducing internal resource constraints and corporate expenditures and increasing quality may make service providers a potent draw. Today more types of services are available than ever before. Among other things, we can choose to outsource our network infrastructure, e-mail services, Web applications, and collaboration activities. Over the last decade, the attitude of businesses toward outsourcing has undergone a change of opinion reflecting the need to compete globally and focus on core competencies. Most processes have traditionally been kept in-house where it was thought they could be controlled most effectively. For many companies, an outsourcing decision represents the longest and largest financial commitment the company will make. The selection of an outsourcing partner will directly affect the comp any's growth and future performance. In short, the outsourcing decision is critical to the company's future success. However, without careful planning and preparation, our outsourcing project can easily result in lost revenue, added expenses, and, potentially, litigation. In order to reach efficiency that believed can obviate company from bankruptcy, a lot of method and concept are have been developed. One of them is by doing outsourcing. However, besides promising many strategic benefits, it also brings consequence of the appearance of strategic risk. The growth of outsourcing over the last century has been driven by the ever-expanding quest to improve productivity, reduce costs, and deliver greater value to customers and shareholders. Outsourcing decision is taken by all managed to improve their company performance that is related to process business, which is not representing core competence or core business. Expected by â€Å"delivering† the management process to other co mpany (as a business partner), which is owning core business in the area, process with the optimal performance will be created.

Monday, July 22, 2019

The Life of Marlee Matlin Essay Example for Free

The Life of Marlee Matlin Essay Marlee was born on August 4, 1965 in Morton Grove, Chicago. She had normal hearing at birth, but at 18 months contracted measles. Her illness produced high fevers and serious complications that included permanently in her right ear, and 80 percent of the hearing in her left ear, making her legally deaf. Marlee’s parents educated her in their community instead of sending her to a special school. She learned sign language at the age of 5 her parents struggled to communicate with her but with time they learned sign language. They raised her with love and respect. As a child, Marlee discovered acting in a program at the Center on Deafness that brought deaf and hearing kids together. Marlee launched her career at age 8, playing Dorothy in the Des Plaines Children’s Theatre of the Deaf in their production of The Wizard Oz. She decided to put her theatrical aspirations on the back burner while studying criminal justice at William Rainey Harper College. Once she earned her degree in criminal justice from Harper College she went back on stage and began playing a minor role in the original Chicago Immediate Theatre Production of Children of a Lesser God. As time passed her community-theatre effort went professional and was transplanted to New York where Marlee was promoted to the leading role of Sara. She repeated this role in the 1988 film version of Children of a Lesser God, and in performing in it became the first deaf actress to win an Academy Award. In 1989 Marlee played a deaf woman in Bridge to Silence. From 1991-1993 she had the leading role in the television series Reasonable Doubts and was nominated for a Golden Globe Best Actress Award but her best reward in 1993 was meeting Kevin Grandalski while she was filming a scene from Reasonable Doubts series outside the studio grounds, the Burbank police department assigned Grandalski to provide security and control traffic. She went on and married Kevin on August 29, 1993. They have four beautiful children Sarah, Brandon, Tyler and Isabelle she is very devoted to her family. She also had a guest appearance in Picket fences and was nominated for the Emmy Award. In 1994 she portrayed Carrie Buck in the TV drama Against Her Will: The Carrie Buck Story she played a hearing woman for the first time and earned a Cable ACE Nomination as Best Actress. Other television appearances have been Seinfeld, The Outer Limits, ER, Desperate Housewives, CSI: NY and Law Order: Special Victims Unit. She was nominated for a Primetime Best Actress Emmy for her guest appearances Seinfeld, Law Order: Special Victims and The Practice. The following are Films or Television shows Marlee’s has portrayed a role in. Her career began in 1986 with Children of a Lesser God, Walker, Bridge to Silence, The man in the Golden Mask, The Linguinincident, The Player, Hear no Evil, Against her Will: The Carrie Buck Story, It’ my Party, Dead Silence, Freak City, Where the Truth Lies, Askari, What the Bleep do we Know, Sweet Nothing in my Ear, Celebrity Apprentice, Comedy Central Roast: Donald Trump, CSI, Family Guy, Dancing with the Stars, Nip Tuck, The L Word, CSI: New York, My Name is Earl, Desperate Housewives, Extreme Makeover: The Home Edition, Law and Order: SVU, The West Wing, The Division, The Practice, Blues Clues, Judging Amy, ER, Spin City, Reasonable Doubts and the most current television show Switched at Birth were she plays the mother of deaf son.

Sunday, July 21, 2019

Business Responses to the Global Economic Crisis

Business Responses to the Global Economic Crisis Global Economic crisis began in 2008 and has drawn a great amount of blood from the financial sector of both developed and developing economy. Under usual circumstances the fall of one will result in rise of another economy. But with GFC the mighty economies has fallen and the developing economies has reached stagnation stage in their growth. UK is one of the economies that are affected by the crisis above the moderate level but not as serious as USA. Economic recovery is taking place all around the world and UK is one among them. Beginning of British economy slowdown was marked when the Northern Rock bank was forced to apply to the Bank of England for emergency financial support on 13thSeptember 2007. The British economy went to serious slowdown in 2008 3rd quarter (Authers, 2012). The economy temporarily exited it in the 4thquarter of 2009, only to enter a double dip recession in the first quarter of 2012 (Office for National Statistics, 2012). The present statement from Bank of England regarding the robust recovery is positive news for the market. The present president of bank Mr Mark Carney has devised a good plan to bring the economy out of recession. As a result of the concentrated efforts from Bank of England the growth has shown a steady rise. The present policies taken by the policy determining panel are being analysed through the viewpoint of the banks new forward guidance† policy. This new policy has given the markets, business and individuals a control over the interest rates of coming months . The rate of interest is now kept at an all-time low in order to pump more money into the market. Another sign of recovery is the revival of housing industry, thanks to the â€Å"help to buy† policy of government. The increase found in number of mortgage approvals for house purchase is a testimony of this fact. Bank of England strongly believes that monetary stimulus is found to be considerable and the investors have started showing confidence in market and overall sentiment is confident and positive. Growth will be stable and economy will be recovering just simply with this stimulus if the economy of Britain is an isolated one. But this is not so as the economy is linked with various economies of world. The stability of trading partners is an essential prerequisite for staging a sustained growth. The imbalance between export and domestic usage of production also point towards the greater risk of a double dip as similar to one that happened in 2009-10. The present growth rate of 3% is not a high figure under normal circumstances. But considering the slow growth of allied economies tis could be viewed as a robust growth According to Mark Carney new policy unemployment reduction is target of the current policy. The interest rates will be kept low till the unemployment drops from 7.7 to 7%. The recovery of economy is greatly dependent on the financial stability of both workers and companies. HRM policies have a significant role to play in this resurrection of economy. Studies show that half of the working population are into the job not because they love doing the present job but because they do not have another job to pursue. Hence when the economy is recovering they will move out in search for better job. This leaves their primary employer stranded. Good HR Management strategy is to be kept in place to ensure that the best are retained and worst are laid off as the economy recovers. This is a critical role of HRM in recovery period of economy. The productivity of employee determines the profitability of a company. The salary paid to an employee during recession time was above the contribution made by him in monetary terms. This could hamper the growth prospects of economy because with such a structure of pay he will be spending more than what he produce giving rise to economic instability. It is the function of HRM to bring out parity between the productivity and income so that growth of economy will not be affected. Similarly another factor that determines the production level of every employee is the motivation levels. Prior to recession time companies have spent well on employee engagement programme. During the recession time they had to cut down the cost and this was an area that became scapegoat of cut down. In the recovery period it is essential to keep employees from different cultures motivated. This can provide sufficient propulsion for growth programme. HR team has to look for cost cutting but viable option like flexible working time for its employees so that operational cost can be brought down significantly. Research shows that during the recession time the stress level of employees were very high. The permanency of their job was a concern for all of them. The stress levels need to be brought down to normal level in order to get the best output from each of them. This will help a lot in improving recovery rate of economy. Another contribution needed from HR team for a recovering economy would be to manage the sudden demand from employees for salary hike. A company based out of UK will find it difficult to hike the salary of their employees in another country which is not it by recession as the parent company lies in a recession hit economy. The pay of many employees was frozen for a long period. The employees who shared the pain of recession expect that they will be rewarded for their sufferings with a serious hike. But the growth rate of 3 % is not that robust enough to facilitate a pay hike for all of them. This will result in elevated level of grievance. Negative sentiment created in the mind of work force can create reduction in productivity which ultimately affect growth rate. It is the role of IHRM team to contain the angst of these people, in UK and abroad, and make them realise the situation and bring them to the main stream of production without any angst. Skill shortage among employees is a serious area of concern in this period of economic recovery. But no significant investment is, made on training front as measure of cost cutting. The concentration on skill development needs to be improved to stage good performance in recover period. Britain’s economy as well as world economy is on a recovery mode and the new policy implemented by new president of bank of England is taking the economy in the right direction. The HRM activities have a significant role to play in improving the economic conditions. The productivity is directly related to man power and their mind set. Keeping them ready and fit for growth is the task in the hands of HRM teams all around the globe. Reduction in human capital cost without compromising on motivation level would be the target of HRM teams all around the world. Inflation and interest rates are closely related and determine the health of economy. Too high levels of both the factors portray the poor health of economy. Inflation always follows good economic growth. Theoretical speaking inflation is caused when too much money is chasing too few goods in market. The money inflow into the market takes place when the population of a country is paid well. Inflation rate will be low in an economy where employment levels are low. The new policy of bank of England to keep a control over the hike of interest rates has shown good sentiments in market. The bank is planning to keep the interest rate on borrowings fixed at all-time low of 0.5 % till the level of unemployment fall to 7%. This ensures that sufficient money is available for entrepreneurs to invest and there by generating more employment. If things goes as expected more employment will produce more salaried person and hence more spending. This will set up the ideal stage for inflation to enter the economy. Under usual circumstances the enhanced money flow into the market will create a condition where domestic production is low but expenditure is high. All this boils down to too much money chasing few goods. The vicious circle of inflation is kicked off by these events. Increased money flow in the market will force the controlling financial institution to hike interest rate. The hike in interest rate will dampen economic growth .as the above mentioned e vents unfold the economy gets crippled and falls back to period of under growth. The bank of England’s feels that the possibility of an inflation-induced, economy-crippling rise in interest rates over the next couple of years is not in line of sight. According to them there are plenty of gaps it the economy and this will prevent setting up of the vicious circle of inflation. By definition, output falls in a recession. At the same time, it is common for some people to lose their jobs or to reduce their hours of work. The path of labor productivity in a recession is determined by the relative sizes of the falls in output and total hours worked. The bank strongly believes that the productivity and efficiency of workers will improve and the extra demand for goods and services could be met by the same working population producing more in for same salary. The data of Britain’s productivity do not justify bank of England’s claim. Off late in Q2 and Q3 0f 2013 productivity failed to touch 100%. This is a point of concern. Many reasons are there for the fall in productivity. Usually under periods of recession employees are supposed to work more in fear of termination. But the companies have preferred to hold on to nonperforming employees in order to avoid rehiring and retaining them once recession ends. This is presently creating a class of lazy work force. The real wages of employees are falling and this prompts the employer to move forward with more labor intensive methods of production and hence affecting the productivity. Data from Office of National statistics reveals an alarming picture of Britain’s working population. It shows that British workers are less productive than before the recession. In 2012 the countrys output per worker was 19% below the average for the rest of the major industrialized economies, while output per hour was 16% lower. The present policy of increasing the rate of interest rate when unemployment falls under 7% needs to be scanned properly. If the percentage of unemployment is the driving force for deciding interest rates the there is a serious problem at hand. With the present system economy is relying on falling real wages rather than improved productivity. The percentage of unemployment is falling and this is not by virtue of growth of economy but due to falling real wages. The reduced cost of hiring has led the employers to hire more thereby reducing unemployment percentage. According to above discussed data the number of employed person are increasing without productivity improvement. This will result in inflation as consumption is increased due to more umber of salaried person at the same time no improvement is achieved in the productivity. The reduced level of unemployment along with inflation will prompt bank to increase interest rate. Data shows that in 2013 the indebtness of British people is 140% of their salary and the debt is not distributed evenly among working population. Any hike in interest rate will result in many of the borrowers defaulting their payments on mortgages. Finally this will result in dampening of economic growth as the hike in interest rate is based out of unrealistic assumption of reduced unemployment. The HRM has a great deal to do in order to direct the scenario to the one expected by Bank of England. The wages and productivity of working class are the contrasting factors that influence the inflation. More salary along with low productivity will result in supply demand imbalance and will trigger inflation. If the wages are at par with the productivity levels then the economy will be able to stage growth. Working class will not acknowledge the fact that economy is growing unless it reflects in their pay pack. So to create a sentiment of growth the pay package need to be improved. This improvement should be accompanied by parallel improvement in productivity standards. The HR system in any firm has to devise clear steps to facilitate tis symbiotic activities of rise in wages and improved productivity. The HRM system has a significant role to play in economic growth of Britain. The trend of hiring while the real wage falls is giving a wrong feedback to policy makers. The unemployment falls without contributing to productivity. This result in the chain reaction of increased inflation which further leads to increase in interest rate that ultimately result in weakening of economic growth. The focus of HRM should be reducing unemployment at the same time improving productivity proportionately with the increase given in wages. Economic growth could be defined as an increase in value of goods and services provided or produced by a country over a period of time. Long term expansion of productive potential of an economy results in economic growth. It is measured using GDP and per capita income. Growth of an economy will not happen in isolation. As the economy is globalized events happening in one country will have detrimental effect on growth prospects of another country. For e.g. ban on import of agricultural product into a developed country will have serious impact on economy of developing country whose main source of income would be the agricultural exports. The drivers of economic growth of any economy whether developed or developing are the same. The contribution of each driver may differ depending on the type of country at hand. The drivers could be listed as a) Growth in physical capital stock b) growth in size of labor population c) Growth in quality of human d) technological growth that improves productivity e) Institutions of state f) Demand for goods and services (both domestic and eternal trade). Growth is in brief adding more value to your activities. Off late developed countries have moved out of concept of growth and started to focus on sustainability and stability. Developing countries are still after growth as small investment in capital could produce greater returns. This is in line with the â€Å"neo classical† theory of growth. For developed countries like UK major driver of growth is growth in quality of labor population and technological growth that improves productivity. The level of capital stock of developed country is high and has reached a stagnation state. The source of improvement for these countries comes from the technology development and improved quality of labor population. Technology improvement will demand for employees with enhanced skill. The employment level in a developed country will research a saturation level and the number of opportunities could not be further improved. There is a limit to how far the employment rate can be improved in the long term in developed countries.in such economy the growth for long term is driven primarily by productivity. Further the two improved productivity the growth will be pushed by increased employee participation and engagement in the business. Employee engagement is a critical part of growth and productivity in developed economy. The employee is les s motivated by the monetary benefit and looks for motivation in the role they handle. The involvement of the employee to the job makes him to deliver more which in turn results in improved productivity. In UK Tesco has realized this and incorporated employee engagement as a part of their HRM strategy. The GDP of developed countries rose during early periods as the demand existed for consumable products. With improved productivity of these products the growth rate was high. But once the product demand reached stagnation further improvement in productivity will not add to GDP. Hence new product segments need to be identified. For UK the prospects will thus be stronger in more knowledge-intensive manufacturing and services. The UK’s relative specialization in Publishing, Finance, Business Services, Communications, and Computer and Information Services is likely to persist for some time, supported by the increasing exportability of services and increasing demand for services as global incomes continue to rise. However, these are likely to continue to become more specialized, with some lower value added activities outsourced or offshored. Hence HR should focus on improving specialized kills and Innovative mindset of their work force. In developing countries focus is more on improving the quantity of employable population. The set of skilled labor is very low and hence the primary target of HRM system was to improve the number of employable population. Many IT companies in India have hired people with basic qualification and imparted training to them in order to induct them to their work force. This improved the human resource base of the firm and helped them in executing big foreign orders. These activities eventually pumped n more of foreign currency into Indian market and hence aided ion economic growth. The opening yup of Indian economy to the world in 1992 forced many of the companies to change the way they managed their human resources. HR functionality in developing countries like China and India is still evolving. Till a few years back the HR function was just limited to administrative functionalities like recruiting and dismissal, paying taxes and benefits. Talent acquisition, training, skill improvement were new concepts. . They had to make a way around the redundant work culture that prevailed in the country. Focus had to be shifted to more productivity than more employment. Another major HR intervention required in developing economy is regarding the wage and incentive. It includes remuneration system and also the system of appraisal, promotion and career advancement. The incentive factor implemented as part of the new system motivated employee to produce more resulting in improved productivity. The implementation of incentive system on base of quantity propelled the production and hence improved the GDP of these economies. The quality was compromised in this policy and China and India succeeded in capturing the price conscious market around the world. Sustainability of this mode of growth is being questioned and the concept of quality has to be introduced to the scheme. There is a need for a paradigm shift in mind set of working population for this transition. The HRM system in these developing countries has to come forward and contribute in this front to facilitate easy transition. The growth of every economy is determined by the influence of various driving forces in the economy. Human capital is a significant part in it no matter it is a developed or developing economy. The role of HR function is to improve the quality of human capital. Method deployed for this is different in these two types of economy. In the developed economy more focus is given to enhanced kill development and employee engagement where as in developing economy the focus is on production based incentives and expanding the employable population base.

Website For Malaysian Insurance Institute

Website For Malaysian Insurance Institute INTRODUCTION: The project aim is to setup a website for Malaysian Insurance to allow insurance agency leader to enroll their candidates for the Pre-Contract Examination. In phase 1, the author will conduct a few studies related to the electronic commerce to allow insurance agency leader to pay for the exam fees. Furthermore, additional security features to protect the website and the user will also be study to enhance the security of the website. FINDINGS: Background Study of Malaysian Insurance Institute Malaysian Insurance Institute is a non-profit organization that founded in 1968. This organization is a leading insurance institute that provide insurance knowledge, training and offer all kinds of qualifications that recognized by the international insurance company such as insurance, financial planning and risk management. MII is known as the primary insurance knowledge provider in Malaysia. It works together with other insurance company in the industry with supports and helps from the Bank Negara Malaysia and Regulator to guarantee the provided education is up to date and fulfill the changes in the insurance industry. Figure 1.1: Malaysian Insurance Institute Website 1.1 MII AS EDUCATIONAL AND TRAINING BODY An average of 300 training programs is organized by MII to educate the brokers, insurers, reinsurers, adjusters and regulators. In each training program, there are about 10,000 participants from all other countries including Malaysia. These outstanding records make MII a place in the Education Board of the Federation of Afro Asian Insurers and Reinsurers (FAIR) that based in Egypt. Besides that, MII also help general and life insurance agents by providing training to them. These training will help them to provide a better service to their customers. For agency leaders, MII is ally with LIMRA (USA) to organize the Agency Management Training Course (AMTC) to upgrade their leadership and professionalism. There are two primary professional programs provide by MII. They are the Diploma of The Malaysian Insurance Institute (DMII) and the Associateship of The Malaysian Insurance Institute (AMII). These two programs are the basic requirement for the insurance industry and also for the emerging markets. 1.2 MII AS EXAMINATION CENTRE MII act as a guardian to monitor the education standards of insurance exam. Besides that, it is also the authorized exam center to conduct insurance examination. MII offers 32 major examinations that attract over 60 thousand candidates for the insurance industry in a year. Because of the outstanding management and good reputation as an education and exam centre, MII is consigned to be the primary place to conduct some others examinations that organize by others examination bodies such as The Institute of Risk Management (UK), Chartered Institute of Loss Adjusters ( UK), The Insurance Institute of America ( USA), The Society of Actuaries (USA) and others. 1.3 MII AS INSURANCE INFORMATION CENTRE MII is proud to have their own library that specialized in the insurance industry and others related industry. Besides that, all kind of collection of books, magazines or journals that related to insurance is also collect by the library for public use. Moreover, MII also has an electronic library portal that publish information to the public such as online newspapers, electronic journals, links to others insurance companies, associations, regulators, university and other related sectors. 1.4 MII AS CONFERENCE ORGANIZER There are around eight conferences that conducted by MII in a year which was planned to fulfill the needs of the emerging insurance industry. Most of the conference receives massive response from all kinds of business industry from local and international. These conferences not only provide experience and knowledge to the public but also provide a chance to each other to build up their networking with other industry. 1.5 AFFILIATION WITH INTERNATIONAL BODIES MII has a firm belief in collaborating its efforts and resources together with other reputable insurance education bodies throughout the world so as to maximize and leverage on each others strengths. MIIs commitment to deliver the best quality standards in education is reflected in its international links with major insurance institutions, universities and relevant organisations. Among the collaborations that MII has established are with The Chartered Insurance Institute (UK), Australasian Institute of Chartered Loss adjusters (AICLA), Chartered Institute of Loss Adjusters (CILA), Australian New Zealand Institute of Insurance and Finance (ANZIIF), LOMA (USA), Institute of Risk Management (UK), LIMRA (USA) and others 1.6 INTERNATIONAL PRESENCE While addressing the domestic needs will always remain as a main focus and priority, MII has also spread its wings into the international scene, particularly in fulfilling the needs of the emerging markets. This is in line with its vision to be the preferred Institute for training solutions, education and information in insurance in Malaysia and the emerging markets. The increasing numbers and wide range of international training participants and conference delegates is a testimony of the recognition and regard for the relevant and high quality programmes being offered by MII. MIIs presence in the emerging market, particularly within the ASEAN region is quite significant. When the 10 ASEAN insurance regulatory authorities formed the ASEAN Insurance Training Research Institute (AITRI), MII was given the honour to lead as the secretariat for AITRI. AITRI is a non-profit organization to provide regional research, insurance education and training support for the regulators as well as the industry of the ASEAN member countries. Its activities are featured in international publications and have gained great recognition and international support such as the World Bank (USA), International Association for Insurance Supervisors ( Switzerland), Office of the Superintendent of Financial Institutions ( Canada) and others. 1.7 INTERNATIONAL AWARD MII won a title named as Professional Service Provider of the Year 2007 Award at year 2007 from The Review Worldwide Reinsurance Association in London, U.K. MII show up as the first winner that come from Asia after 14 years when the award is started. MIIs effort and their compliance for the training and the education was the reasons for them to receive the award. 1.8 List of Certification and Professional Programs The list below is the certification or professional programs that offer by Malaysian Insurance Institute. These certification or professional programs are recognized by all the insurance company in Malaysia. The agent of an insurance company must possess the related certification or professional programs to promote or sell the insurance to the customers. Diploma of Financial Services Associateship of the Malaysia Insurance Institute (AMII) Associateship of the Malaysia Insurance Institute (AMII) International Diploma of the Malaysia Insurance Institute (DMII) Diploma of the Malaysia Insurance Institute (DMII) Life Certificate of MII Insurance (CMII Insurance) Pre-Contract Examination for Insurance Agent (PCEIA) Certificate Examination in Investment-Linked Life Insurance (CEILLI) International Certificate in Risk Management (CIRM) Basic Agency Management Course (BAMC) Registered Financial Planner (RFP) Basic Certificate Course in Loss Adjusting (BCCILA) Intermediate Certificate Course in Loss Adjusting (ICCILA) Basic Certificate Course in Insurance Broking (BCCIB) Intermediate Certificate Course in Insurance Broking (ICCIB) Certificate in General Insurance Actuarial Practice (CGIAP) 1.9 Conclusion MII is a powerful organization that provides high quality education to the insurance industry and others related field. Besides that, MII is also recognized by international organization for their quality services and excellent programs. Literature Review This chapter discusses about the online electronic commerce system and the security features that plan to implement on the registration website such as on screen keyboard, multi step authentication and secure socket layer. 2.1 Electronic Commerce Electronic commerce is known as any transaction or payment that occurs through the internet. It includes a wide range of area such as auction website, retail website, registration website, banking website, and etc. The content of electronic commerce can be goods or services. It has become important with the emerging of the internet and World Wide Web. Since electronic commerce is conduct on the internet, so the customer can ignore the barrier of distance and time. The electronic commerce is growing frequently since five years ago and it is expected to growing in faster rate. When electronic commerce is conducted, it means online payment will be conduct during the transaction. There are several of payment method are available online such as credit card, PayPal, and Google checkout. (Networksolution, 2010) Credit card is the most popular payment method used by most of the electronic commerce website. A marketing research shows that an electronic business will lost 60 to 80 percent of potential customers if credit card payment is not implemented in their electronic commerce system. With credit cards payment enabled, it makes the customer has the impulse to purchase an item at anytime and also ensure the legitimacy of the electronic business to the customers. (EasyStoreCreator, 2010) Another popular online payment method is PayPal. The benefit of PayPal is it allows the merchant or customer to make online and offline transaction at anytime. Furthermore, PayPal is well known for its ease of use and no verification bounding of credit rating. The users of PayPal only need to verify their electronic mail address and their accounts personal information. Payment can be easily directed to the PayPal account with the tied electronic mail address like [emailprotected] Additionally, Google checkout is also a preference of some electronic business merchant. Google checkout fast enough to become popular is because the provided service of this system is user friendly, very stable and reliable. Another benefits of Google checkout is it charge lesser merchant fees compare to PayPal and this makes it grow at a rapid rate. (Arora.n, 2010) 2.2 Types of Electronic Commerce There are multiple types of electronic commerce that are available on the internet. Among all kinds of electronic commerce, there are 4 popular types that occupy most of the electronic commerce website. They are business-to-business (B2B), business-to-consumer (B2C), consumer-to-business (C2B), consumer-to-consumer (C2C). Out of these popular types, there are also some others electronic commerce are used by those electronic business merchant such as business-to-employee (B2E), government-to-government (G2G), government-to-employee (G2E), government-to-business (G2B), business-to-government (B2G), government-to-citizen (G2C), citizen-to-government (C2G) and etc. (DigitSmith Embroidery and Screen Printing, 2006) 2.3 On Screen Keyboard On screen keyboard is a software or application that shows on the monitor of the computer. It allow user to input any kind of text by mouse or the monitors touch screen. On screen keyboard can help those mobility impairment people or those people that cannot type. Besides that, on screen keyboard also can help users to bypass those virus, Trojan or key logger to steal data (Microsoft Corporation, 2010). Figure 2.1 shows an example of on screen keyboard. It is a default application that comes with the operating system provide by Microsoft. msosk.jpg Figure 2.1 Microsoft on screen keyboard 2.4 Multi Step Authentication The single factor authentication such as the username and password process is widely used by a lot of website in the World Wide Web. Due to the demand for more security during login, an ideology named multi step authentication has been create to fulfill the public demand. Multi step authentication is a process of login and authenticates users in multiple webpage. The first step of the authentication is verify the username entered by the user. If it is match with any name inside the database, then the user will be redirect to the second step. Second step required the user to enter their password and if it is correct, then the system will redirect the user to the services they login to. (Agilewebsolutions, 2010) Besides that, this feature also block any malware that using form robot to capture password entered by the user because there is two different login processes is performing. 2.5 Secure Socket Layer Protocol(SSL) Secure Socket Layer is a well known protocol that uses to provide a secure connection between the server and the client. The purpose to secure a connection is to protect the integrity of data, privacy and authentication. SSL protect data by encrypting a plaintext message to ciphertext. Ciphertext is meaningless to everyone if someone captured the data packet try to crack it. A pair of key is used to encrypt the data. They are named public key and private key. Public key is used to encrypt data that send from the client and the private key is used to decrypt the data that received by the server. To ensure the server side is the real owner of the service provider, a digital certificate will be issue by a third party certificate authority such as GeoTrust and VeriSign. This process is to identify the domain is maintain by the recognized owner and it is legal. Figure 2.2 shows an example of digital certificate. (GeoCerts, 2010) cert.gif Figure 2.2: Digital Certificate Netscape introduced the SSL Protocol in 1994 due to the concern for the security over the internet was rising. At first, SSL is develop to secure the connection between the server and the client but modification was make to fit it in to other services such as TELNET, FTP, Email and etc. (Martz. C, 2010) 2.6 Conclusion Security feature is an important session to keep a website safe from any threats. All the features discussed is planned to implement into the website to work with the electronic commerce system and the website security. Electronic Commerce System Security It is a big challenge to maintain and securing an electronic commerce system as the internet world is emerging every day. It is important for electronic merchant to implement security for their electronic commerce website. 3.1 Components of Electronic Commerce Security There are 5 components of electronic commerce security that is important to electronic commerce website. The first component is containment that uses to prevent all kinds of attacks. The second component is compartmentalization that uses to avoid unauthorized access to the website system. Besides that, it prevents collateral damage deal to the website during attacks. The third component is continuity that guarantees website system to keep running even during DOS attacks or even during the equipment failure. The fourth component is recovery that frequently starts the recovery operation during external attacks or malicious internal activity. The fifth component is performance that ensures the network performance is not reducing due to the others security operation. 3.2 Electronic Commerce Vulnerabilities The fearful of online transaction threats has been increase with all types of attacks. Multiple vulnerabilities will be discussed to understand their characteristic. 3.2.1 SQL Injection SQL injection is a technique that inserts the SQL meta character into the user input. This technique allows the attacker to force the back-end database to execute the command entered into the system. To check whether the website is vulnerable to this attack, a single quote () character will be send into the database. An invulnerable website will return an error message which exposes the technology being used at the host machine. These information is enough for the attackers to perform further attacks to the restricted area or the operation system. SQL injection attack can be different depends on the types of database. If the attack is conduct on the Oracle database, it needs the UNION keyword to execute and it is harder to capture compare to Microsoft SQL server. (Mookhey. K. K, 2004) 3.2.2 Price Manipulation This is a new threat that threatens the payment gateway and the shopping cart. In the common case, the total price that needs to pay by the customer is saved in a hidden HTML field. A web application proxy such as Achilles can modify these figures when the information is send from the users browser to the website. The figure 3.1 is taken from one of the Symantec article showing that the price can be modify by the attackers to any value. Then, this information will be send to the merchants payment gateway. (Mookhey. K. K, 2004) achilles.jpg Figure 3.1: Achilles web proxy 3.2.3 Buffer Overflows Bad consequences will be happen when massive number of bytes is sent to an application that is not set up properly to handle these bytes. According to K. K. Mookhey, the path of the PHP functions is exposed when he sent in a very large value in the input field. Figure 3.2 shows that when a large value is sent in and the PHP script cannot process the value, the returned error message expose the location of the PHP functions. This error message reveals the admin folder that allows attackers to conduct further attacks. (Mookhey. K. K, 2004) phptimeout.jpg Figure 3.2: PHP timeout error 3.2.4 Cross-site Scripting Cross-site scripting is primary concentrated to the end user and also leverages two factors, the weak input output validation of the web application and the trust gain from the user to the well known website name. This attack required the website to take in user input, process it and shows the result together with the original user input. This sequence is commonly found in the search system. The attacker conducts the attack by embedding the JavaScript into the user input as part of the input. Then, a link will be created which contain this JavaScript and the victim will be persuaded to click on it. For example, the URL will looks similar like this: http://www.vulnerablesite.com/cgibin/search.php?keywords=alert(OK). This example will pop up an alert box that shows the text OK. The attacker can place the script they want into this link to conduct the attack. Usually, the attacker will use this method to capture the victims cookies that may contain victims sensitive information. Besides that, the JavaScript can be also use to redirect the victim to the website that contain malicious code and conduct the attack at there. 3.2.5 Weak Authentication Authentication system that does not block multiple fail login can lead to unexpected consequences. An attacker may use some brute force software to guess an accounts password by sending all kinds of combination to the server to validate the password. Another weak authentication is when the website uses basic authentication but does not transfer it through SSL. Attacker can sniff the traffic packet and discover the user information inside the packets. 3.3 Pros and Cons of Electronic Commerce System Although electronic commerce provide a lot of benefits to electronic business and the consumer, but there are also some consequences that affect both merchant and the consumer. The benefits of electronic commerce are it save the users time compare to shopping at any shops or markets. Everything transaction is conduct on the internet and just a few clicks, consumer can buy everything they want and pay it. Compare to shopping at regular shop, consumer have to travel to the shop, park the car, walk to the shop, browse the shop for the item, then pay it and that is wasting a lot of time. Electronic commerce is cheap compare to the product selling at regular shops and markets. This is because every electronic merchant does not need to pay for the rental and utilities expenses like the physical shop. That is why they can sell cheaper product when they do not need to cover these expenses. Besides that, lowering the product price is one of the marketing skills to attract customers to buy from their electronic shop. (Finnila. J, 2008) Most of the electronic commerce is supported with credit cards paying method. With this method enable, consumer does not need to download or install special plugin to make a transaction. Besides that, consumers with credit cards are always fill with impulse to buy something during every visit. Furthermore, the electronic merchant can keep the customer transaction information for future use such as follow up sales or advertise product. (Nightcats Multimedia Productions, 2010) The disadvantages of electronic commerce are the competitor is all around the world. Electronic merchant have to keep generate new marketing strategy to attract customers or keep the customers to visit them again. As the internet world is changing rapidly, there are a lot of new traps appear to steal information from the consumer such as phishing website and malicious scripts. For any electronic commerce user that unaware to these internet threats will expose their personal confidential information to those scam owners. (Finnila. J, 2008) From the point of view of most of the customers, it is an abuse to the customers personal information when the electronic merchant keeps the information for future use. The customer may want to keep their personal information in private and it is better to request for their permission before their information is used. Besides that, the customers also worry that their personal information may leak out to the public in any accident. It is a benefit for the merchant but a disadvantage to the customers. (Nightcats Multimedia Productions, 2010) 3.4 Conclusion It is important to electronic merchant to secure their electronic commerce system to prevent all kinds of incident that cause unexpected losses to the business. CONCLUSIONS: The author successfully completed objective one to three in the phase 1 of the project. The author learns how MII works in daily operation and their roles and responsibilities. Besides that, the author also learn how those additional security features works to protect the website and the users. As a proof of meeting objective one to three, the reference list below shows various information from different sites. REFERENCES (BACKGROUND READING MATERIALS): About MII (Online) (Cited 20 MAY 2010) Available from: http://www.insurance.com.my/mii2010/about.html MII Vision and Mission (Online) (Cited 21 MAY 2010) Available from: http://www.insurance.com.my/mii2010/about_vision.html Certification and Professional Programmes (Online) (Cited 22 MAY 2010) Available from: http://www.insurance.com.my/mii2010/certification.html What is Ecommerce? (Online) (Cited 23 MAY 2010) Available from: http://www.networksolutions.com/education/what-is-ecommerce/ Choosing a Merchant Credit Card Processing Vendor To Meet Your ecommerce Credit Card Processing Needs (Online) (Cited 25 MAY 2010) Available from: http://www.easystorecreator.com/choosing-vendor.asp Different Payment Methods in E-Commerce Website (Online) (Cited 26 MAY 2010) Available from: http://ezinearticles.com/?Different-Payment-Methods-in-E-Commerce-Websiteid=2073803 Ecommerce definition and types of ecommerce (Online) (Cited 26 MAY 2010) Available from: http://www.digitsmith.com/ecommerce-definition.html Handling Financial Web Site Tricks (Online) (Cited 28 MAY 2010) Available from: http://help.agile.ws/1Password3/multi_step_logins.html Two-Step Authentication Method For Online Banking (Online) (Cited 30 MAY 2010) Available from: http://priorartdatabase.com/IPCOM/000126859 Handling Financial Web Site Tricks (Online) (Cited 30 MAY 2010) Available from: http://help.agile.ws/1Password3/multi_step_logins.html Turn On and Use On-Screen Keyboard (Online) (cited 31 MAY 2010) Available from: http://www.microsoft.com/windowsxp/using/accessibility/oskturnonuse.mspx SSL Secure Sockets Layer (Online) (Cited 1 JUNE 2010) Available from: http://www.birds-eye.net/definition/s/ssl-secure_sockets_layer.shtml How SSL Works (Online) (Cited 1 JUNE 2010) Available from: http://www.geocerts.com/ssl/how_ssl_works Pros Cons of E-Commerce (Online) (Cited 2 JUNE 2010) Available from: http://ezinearticles.com/?Pros-and-Cons-of-E-Commerceid=1481356 Pros and Cons for consumers when shopping online (Online) (Cited 2 JUNE 2010) Available from: http://www.nireland.com/e.commerce/Pros%20and%20Cons.htm Beginners Guide to Ecommerce (Online) (Cited 2 JUNE 2010) Available from: http://www.nightcats.com/sales/free.html 5 Essential Components of E-Commerce Security (Online) (Cited 3 JUNE 2010) Available from: http://www.intruguard.com/E-commerceSecurity.html Common Security Vulnerabilities in e-commerce Systems (Online) (Cited 4 JUNE 2010) Available from: http://www.symantec.com/connect/articles/common-security-vulnerabilities-e-commerce-systems ***END OF REPORT***

Saturday, July 20, 2019

The Use of Force Essay -- Health Care

The Use of Force, written by William Carlos Williams is a story about a conflicted unnamed doctor using physical force to determine a diagnosis. The question that is brought up is whether or not the doctor’s use of force was one of ethical duty or infuriating violence. The doctor makes it his duty to save the patient, Mathilda as she does not cooperate he makes a choice to go on and use force to open her mouth to determine her diagnosis. The choice of using force isn’t necessarily the questionable part, the motive on using physical force is debatable. The ultimate question that the short story, the Use of Force asks is whether or not the doctor’s motives become one of dutiful compassion or desirable violence. As the story begins, the unnamed doctor is introduced as one who appears to be strictly professional. â€Å"Aas often, in such cases, they weren’t telling me more than they had to, it was up to me to tell them; that’s why they were spending three dollars on me.† (par. 3) The doctor leaves the first impression that he is one that keeps his attention about the job and nothing out of the ordinary besides stating his impressions on the mother, father and the patient, Mathilda. Though he does manage to note that Mathilda has a fever. The doctor takes what he considers a â€Å"trial shot† and â€Å"point of departure† by inquiring what he suspects is a sore throat (par. 6). This point in the story, nothing remains out of the ordinary or questionable about the doctor’s methods, until the story further develops. The doctor contains his professionalism, but as it goes on, pieces of frustrated irregularities begin to surface. As the doctor learns that the parents say no, that the girl says she doesn’t have a sore throat, he purs... ...der what motive? He had to justify his motives, perhaps to add some morality to ensure what he was doing was ethical. He would flip that thought, perhaps to try and downplay his desire to unleash his violent frustration onto the girl. He ultimately saved Mathilda’s life in a sense, but under which motive? I believe the this is the question William Carlos Williams’ The Use of Force has the reader ask themselves. Under a emergency situation the human condition can be torn between a code of ethics or a dominance of dark desire. No doubt in The Use of Force, the end of the situation turned out well as the girl could be saved, but the method to find out was ambiguous. How well would the case between doing the right thing and doing what you desire turn out in any other situation? I believe this is the question that William Carlos Williams wanted the reader to think about.