Wednesday, July 31, 2019

Capital Punishment in the United States Essay

Have you ever thought about if the person sitting next to you is a murderer? If he is, what would you want from the government if he had killed someone you know? He should receive the death penalty! Murderers and other major offenders should be punished for the crimes they have committed and should pay the price for what they have done. Having the death penalty in our society is humane. It helps with overcrowding and gives relief to the families of the victims, who had to go through an event such as murder. You may not see it as that big of a deal, but the families of the victims of these criminals have to live every day knowing that while their family member is dead, this criminal is still well and living. Usually people just want to look past this problem because they are not in the position of the families of the murder victims, but you need to look at it through the eyes of these families. Until we stop just letting these things slide, they will continue to happen. The death penalty has been around since the time of Jesus Christ. Executions have been recorded from the 1600s to present times. From about 1620, the executions by year increased in the US. It has been a steady increase up until the 1930s; later the death penalty dropped to zero in the 1970s and then again rose steadily. US citizens said that the death penalty was unconstitutional because it was believed that it was â€Å"cruel and unusual† punishment (Amnesty International). In the 1970s, the executions by year dropped between zero and one then started to rise again in the 1980s. In the year 2000, there were nearly one hundred executions in the US. On June 29, 1972, the death penalty was suspended because the existing laws were no longer convincing. However, four years after this occurred, several cases came about in Georgia, Florida, and Texas where lawyers wanted the death penalty. This set new laws in these states and later the Supreme Court decided that the death penalty was constitutional under the Eighth Amendment. There also has been the problem of overcrowding in prisons and jails. Some people say that this is a problem but having more jails built will solve this problem. Having more prisons or jails built may help solve the problem but the death penalty effectively stops draining more money from the taxpayers to give these murderers a home. These murderers get three warm meals a day; they do nothing all day, and have a place to sleep just because the taxpayers fund these facilities. Murderers on death row do not deserve to get a place to stay. They deserve to have their lives taken for the crimes that they have committed.

Tuesday, July 30, 2019

The Dilemma of Cloning

Our era is considered to be the period of discoveries focusing mostly in the spheres of technical and medical research. Some scientists even dare to call our century, as well as the end of the previous one, the new scientific revolution. Many prominent scientists and researchers gave their lives in order to be heard, in order to keep to their words and defend their views on the newly discovered essence of many things – our planet, Solar system and of course, the complexities of being a human. More so, many scientists and experts have been intrigued by the mysterious nature of human beings and out of curiosity numerous studies have been conducted as an attempt to reveal and discover new fascinating things about human beings. Other experts would go beyond the norm to see the extent of the limitations of humans as living beings. One of the most controversial and most anticipated researches on humans is cloning which is the process of creating of a duplicate genetic copy of another. In an effort to further studies about human cloning, scientists have ventured into animal cloning. â€Å"Now that a cloned cat is a reality, pet owners may wonder when they will be able to duplicate their own kitty or pooch† (Wood 1). Nowadays, people are not scrutinized or criticized based on their scientific views because the present society is far more democratic and liberal compared to previous years. However, relatively recent events connected with the research of cloning have proved that investigation in the cell domain may lead to the whole range of medical, ethical, religious and even political disputes. Present day medical science had made an extensive and significant undertaking that extended the boundaries of human knowledge but breaking the limitations can either enrich mankind with new useful knowledge or yield visible harmful effects and destructive consequences. Stem cells themselves would not have caused such a thunderstorm of critique if not for the source of their extraction. The point is that scientists believe that stem cells taken from living organisms have the highest transformational potential and can better serve as the precursors for the whole variety of cells in the living body of an animal. However, the very idea that these cells are extracted from living embryos, some people considers this a form of a murderous act. In fact, not all the people are aware of the real situation regarding embryonic cell research. It is not a secret that stem cells are taken from surplus embryos, which are more likely not going to be useful for particular purposes in the future. In the article â€Å"Where on the Web Register to Clone Your Pet† by Christina Wood, it stated that the cost of pet cloning is about $895 and up and after there is an annual fee of $100 per year. More so, people interested in cloning their pets have to pay a vet to collect the pet’s skin sample. Obviously, clones do not come cheap. â€Å"The cost, when the technology is perfected, could start at nearly $20,000† (Wood 1). It is important to stress that any science or research should be primarily useful to mankind for the present time and in the succeeding years. Animal cloning and stem cell research should be developed only if it does not harm mankind and if it generates positive changes, or at least reduces all negative effects to a minimum. According to Wood, â€Å"hundreds of people already store pet DNA with GSC† disregarding the fact that there are many stray cats and dogs in animal shelters that need to be adopted. This situation shows that people would rather pay thousands of dollars to replicate the genes of their pets (take note that pet when cloned will not be a carbon copy of the original pet which contradicts the definition of cloning) instead of caring for real animals that are in need of love and care. Furthermore, people should not forget about ethical and moral aspects of pet cloning and possible dangers of this scientific endeavor. According to ethical principles cloning is not accepted in certain countries and is restricted by some government. Although some scientists may accept the risks in order to benefit and stand up for further rapid development of stem cell research, there is no guarantee that casualties can be reduced to zero. Every science is worthy of attention and further development of it should benefit the whole of mankind. Therefore, the first and foremost objective of cloning and stem cell research should be the promotion and delivery of advantages to mankind where everyone can benefit from it.

Critical Review of the Literature of the role that Dietary Factors Play in Preventing Type 2 Diabetes Essay

Critical Review of the Literature of the role that Dietary Factors Play in Preventing Type 2 Diabetes’ Introduction Type 2 Diabetes (T2D) is a rapidly growing international public health issue. It has been reported that 285 million 20–79 year olds had the disease in 2010 worldwide and this is estimated to grow to 439 million by 2030. (19) T2D has been associated with a variety of other health problems such as cardiovascular disease, blindness and shortened life expectancy. (4,40) The prevalence of the disease is associated with obesity and overweight as well as a ‘Western’ dietary pattern and lack of exercise. (17) It has been reported that approximately 80% of people who develop T2D are obese or overweight prior to diagnosis.(8) Diabetes is a preventable disease, (19) with weight loss being identified as one of the most powerful interventions. (4) Diet and physical activity (PA) are effective interventions in attaining this (25) and have also been linked with reduction in risk independently. (40) The primary focus of this paper will look at diet and review the evidence on whether diet alone can help to prevent T2D. As a secondary theme it will also look at the evidence that diet can help to prevent the development of and help to control symptoms after T2D has been diagnosed. 8 papers will reviewed, (26-33) with a purpose of identifying some practical, evidence based dietary guidelines. Dietary guidelines are easier to follow when they indicate specific foods and patterns rather than nutrients and properties of foods and greater compliance can be achieved . (29,31) For this reason the studies reviewed focus on specific foods and diet styles rather than macronutrients and or micronutrients which do not translate into dietary guidelines as easily. Literature Search A literature review using the following databases was carried out; Pubmed, Web of Science, Embase, CINAHL, British Nursing Index and Medline. The following keywords were used in various combinations; Diet, prevention, food, T2D, interventions, dietary, fruit, vegetables, nutrition. Other resources such as ‘Google scholar’ and NHS Choices ‘behind the headlines’ were also utilised. Because T2D is an international issue, papers from around the world were considered. The criteria for inclusion was less than 10 years old, the intervention had to be a specific food group or diet style, measuring new incidents of T2D, or changes is symptoms associated with T2D and adults as the sample group. Diet as a tool to prevent T2D 6 Studies looked at whether diet can prevent T2D. Please refer to Table 1 for details of all the studies. Villegas et al (26) and Bazzano et al (27) looked at fruit, vegetable and fruit juices consumption and fruit and vegetable consumption respectively. Both of the studies used women only in their sample groups, limiting the generalizability of the findings to the wider population. (5) Dietary assessment was achieved through Food Frequency Questionnaires (FFQ) in both studies. Villegas et al (26) provided evidence of their FFQ having been validated, (21) however reported using it only 3 times within a 4.6 year timeframe, questioning the accuracy of their collected data. Bazzano et al (27) data collection was retrospective in that the FFQ was designed in 1984 and followed up at 4 year intervals. The concern with such a dated questionnaire is that it has not accounted for different trends that have occurred over time, affecting the accuracy of the results. Villegas et al (26) confirmed incidence of T2D through subjects meeting the criteria set out by the American Diabetic Association.(2) Bazzano et al (27) used criteria set out by National Diabetes Data Group for all participants up to and including 1997.(16) The Criteria for participants after 1998 was set out by the American Diabetic Association. The reason for this was due to new criteria being published at this time. (2) The main difference being the plasma glucose reading changing from 7.8mmol/l or more to 7.0mmol/l or more. (9) The Criteria Set out by the World Health Organisation in 1985, (24) could have been used to confirm incidence of T2D in the Bazzano et al (27) study . It was published 1 year after baseline data was taken and would have resulted in a higher percentage of participants being diagnosed with the same criteria, increasing consistency and reliability in the results. Villegas et al (26) reported that a higher consumption of vegetables was associated with a reduced risk of T2D. Participants who had a higher vegetable intake were also less likely to smoke and have higher levels of PA, both factors that can reduce the risk of T2D questioning the causality of the reduction in risk. (4) Participants with a higher fruit intake were also less likely to smoke and have higher levels of PA. There was no association made between fruit intake and risk of T2D therefore it is possible to consider that confounders like PA and smoking may not have effected the level of risk to T2D in this study. Bazzano et al (27) reported an inverse association between whole fruit and green leafy vegetable intake. Women who had a higher intake of fruit and vegetables were older, less likely to smoke and more likely to have higher levels of PA. Fruit Juice was positively associated with incidence of T2D which could be due to high sugar content.. (22) Also participants who had the highest fruit juice intake had the lowest levels of PA which is associated with increased risk of T2D. (20)Salas-Salvado et al (28) and Martinez-Gonzalez et al (29) both studied the risk of T2D and adherence to the Mediterranean diet (MedDiet). A MedDiet is characterised by high consumption of fruit, vegetables, whole grains, olive oil, nuts, pulses, fish and reduced consumption of red and processed meats, high fat dairy refined gains and foods high in sugar and starch. (11) Salas-Salvado et al (28) compared adherence to a MedDiet supplemented with either olive oil or nuts with a low fat diet (control group). The supplemented items in the MedDiets were given to participants. Participants in the control group were given non dietary gifts to encourage adherence. There are concerns about the ethics of using incentives and gifts in research. (6)Within this study the use of gifts appears innocuous, the concern lies with how adherence to the diet is reliably measured. When participants are given vital ingredients, this will influence their dietary intake, making it difficult generalize the results. (13) The sample population in this study were older and had at least 3 risk factors relating to cardiovascular disease again making it more difficult to generalise results. Participants were given 7 goals, including;  increasing vegetable and fruit consumption, reducing red and processed meat and increasing the consumption of either olive oils or nuts. The control group were asked to reduce all types of fat. Results showed that participants in the MedDiet groups had a greater reduced risk of T2D. Risk was reduced by 51% in the olive oil group and 52% in the nut group. These findings are backed up by other studies. (38-39) Diabetes incidence was lower in those who attained ≠¥ 4 of the 7 goals. PA levels and changes in weight did not differ through all 3 groups, although the participants in the both the MedDiet groups were associated with higher levels of PA. This study was carried out on Spanish participants, who traditionally follow a MedDiet. The control group may have had a strong adherence to a MedDiet naturally, which could impact on the reliability of the results. Martinez-Gonzalez et al (29) used participants who were nurses and university graduates. Prevalence in T2D is associated with lower socioeconomic status, (1) so by using the participants from a higher socioeconomic group may bias the findings. (13) Participants were not excluded if they had Diabetes at baseline. Data was collected via FFQ which consisted of 136 items with 9 responses ranging from never to more than 6 times a day. Points were allocated to determine a score indicating level of adherence. Questions covered areas such as cooking methods, supplements and fats and oils. This FFQ goes into a lot of detail to obtain the most information it can about participants diets, increasing the validity of the data. However reliability is compromised as participants are asked to recall food intake from the previous year decreasing the accuracy of data collected. (5) The results indicated a significant reduction in risk of developing T2D in those who with strong adherence to the MedDiet after adjustment for age and sex. Participants with a score of ≠¥ 6 had an 83% reduction. Although participants in this group had the highest levels of physical activity, which is a known factor in decreasing the risk of T2D, they also had a higher baseline prevalence for increased risk factors for Diabetes such as age higher BMI and higher blood pressure. This adds weight to the findings the MedDiet can reduce the risk of developing T2D. Fung et al (30) and VanDam et al (31) looked at more generalised dietary  patterns. VanDam et al (31) used a 131 item FFQ specifying specific foods, portion sizes and frequency of intake. Over a space of 12 years data on food intake was collected 3 times. In order to make these results more reliable data collection should have occurred more frequently. The participants were all male health professionals making the sample group quite specific reducing the ability to generalise the findings to the wider population. (13) Foods were classified into groups based on nutritional profiles. Factor analysis was then applied in order to identify food patterns. Two dietary patterns were identified ‘Prudent’ and ‘Western’. Prudent was characterised by high consumption of vegetables, fish and whole grains and Western by high consumption of red and processed meat, high-fat dairy and eggs. Men with higher Western patterns were younger, more likely to smoke and did less PA. Men with higher Prudent diet patterns were older less likely to smoke and engaged in more PA. The Prudent diet was associated with a modest reduction in risk in developing T2D with wholegrain foods having the highest inverse association. Fruit and vegetables were not considerably associated with reduced risk. The Western diet was associated with considerably higher risk of developing T2D. Processed meat, other processed foods and refined grains indicating the most significant association. This could indicate that cutting out specific foods could me more beneficial in reducing the risk of T2D than increasing intake of other foods. Fung et al (30) used participants from the Nurses Health Study which was established in 1976. This is the same study from which Bazzano et al (27) took their participants. The same FFQ was used in this study with baseline also being the 1984 FFQ as this was the expanded 116 item version. The information obtained was then used and classified in the same way as the VanDam et al (31) study producing the same Prudent and Western dietary patterns. The results from this study focus mainly on the Western diet pattern. Similarly to the men in the VanDam et al (31) study, women who scored high in the Western diet pattern were more likely to smoke. The results also mirrored that of the VanDam et al (31) study in that it reported an increased risk of developing T2D and a Western diet pattern. This study investigated the characteristics of the Western dietary pattern further and found positive associations between red and processed meats and  the development of T2D. This could also add weight to the previous comment that cutting out specific foods, such as red and processed meats could be more beneficial than adding other food groups in preventing T2D. A replica study using the same FFQ and Prudent and Western diet pattern and using a sample group that consisted of both men and women could add strength to the finds of both of these studies.(5) Diet as a tool in preventing the development of and giving greater control over the symptoms of T2D Elhayany et al (32) compared a low carbohydrate Mediterranean diet (LCM) a traditional Mediterranean diet (TM) and the 2003 American Diabetic Association diet (ADA) on health parameters. Glycemic control for people with T2D diagnosis was one of the outcome measures. Participants were randomly assigned to 1 of the 3 groups, given recommendations for daily intake on nutritional elements such as calories and protein and advised to engage in 30-45 minutes of PA a week. The LCM and TM diets included only low glycemic index carbohydrates, with LCM having a lower %. The TM and ADA diets had the same % of carbohydrates but the ADA also included mixed glycemic index carbohydrates. FFQ were used asking the participants to recall the last 24hour food intake. It is felt this data will be more accurate than those studies asking participants to recall food intake from the previous year, making results more reliable. Data was collected 3 times over a 12 month period. Results showed all groups had reduced weight and BMI with no significant difference. All 3 dietary interventions reduced factors that increase glycemic control such as HbA1c and triglyceride levels. The LCM diet was the most effective in increasing glycemic control. Esposito et al (33) compared a LCM and a low fat calorie restricted diet (LFD) on glycemic control and the delay on needing to commence antihyperglycemic medication in people newly diagnosed with T2D. The LCM diet was rich in fruit vegetables and whole grains and low in red meat. There was also a requirement that no more than 50% of calories was from  carbohydrates. Complex carbohydrates rather than low GI carbohydrates were stipulated. Some complex carbohydrates can have high GI levels, which are associated with increased risk of Diabetes. (10) The LFD was based on American Heart Association guidelines. (12) Participants were randomized into 1 of 2 groups asked to keep food diaries and given guidelines on increasing physical activity. Data was collected through reviews of the diary. Food diaries could provide more reliable information than FFQ if they are filled out daily. There is still a risk that they could be filled out inaccurately, and that participants may modifies their intake as a result of keeping a diary. The study reported that both groups lost weight, but reduction was greater in the LCM. Overall there was a significant difference in the need to commence antihyperglycemic medication between the LCM and the LFD; 44% and 70% respectively. Potentially this result could have shown more significance if low GI carbohydrates were stipulated instead of complex carbohydrates. Discussion The findings coming out of this review indicate that certain dietary interventions maybe helpful in reducing the risk of developing T2D and may also help with glycemic control after diagnosis.(26-33) Some food groups and dietary patterns provide more consistent evidence than others. The results regarding fruit intake and risk of T2D are inconsistent within this review with Villegas et al (26) reporting no association between fruit and risk reduction, where as Bazzano et al (27) did. High consumption of fruit and vegetables are a major component in the Mediterranean diet and the Prudent dietary pattern, both of which were associated with an inverse association. Vegetables are more consistently associated with a reduced risk, in this review and a recent meta-analysis, (3) particularly green leafy vegetables. (27) More research studying the effects of fruit and vegetables separately is needed. This inconsistency is reflected in other studies and systematic reviews. (7) High intake of fr uit and vegetables has often been associated with higher PA levels within this review, (26-29,31) which is a risk reducing factor in itself. Part of the problem could be that many studies that look at dietary interventions are prospective cohort studies and  although they can provide an association they can not prove whether the cause is due to the dietary item or another factor such as PA or weight loss. More experimental designed research is needed so that a direct cause between diet and the reduction of T2D can be established. (13) While it is unclear the exact role that fruit and vegetables play in reducing the risk of T2D there is an abundance of evidence that a diet rich in fruit and vegetables is beneficial in overall health (34-35) and weight reduction, (23) so including them as part of a healthy diet may indirectly help to reduce the risk of T2D. Red and processed meat has been more consistent in its positive association to developing T2D. Fung et al (28) and VanDam et al (29) found strong associations between consumption and increased risk of T2D. One of the characteristics of The Mediterranean diet is the absence or reduction of red and processed meats, and this diet has been associated with reduced risk. These findings were backed up in a recent meta-analysis paper (18) studying 3 cohorts who’s conclusion suggests that red meat consumption, particularly processed red meat is linked to higher risk of developing T2D. Meta-analysis produces level 1 evidence, providing increased confidence in the conclusions and good grounding for providing evidence based information such as dietary guidelines.(13) Diets high in red and processed meats are linked to high cholesterol (14) which is one of the leading causes of death in people with T2D (15) and other serious health conditions such as cancer and cardiovascular disease. (36) So while increasing fruit and vegetable intake may have a more beneficial and holistic effect on health, the same could be said for reducing the intake of red and processed. Salas-Salvado et al (28) produced higher level evidence being a randomised control trial giving more weight to their findings;(5) following a MedDiet can reduce the risk of T2D. One of the studies that looked at the effect of diet after diagnosis, (32) was also a randomised control trial providing the same level of evidence and weight to their findings that LCM can delay the need for hyperglycaemic medication therefore having a positive beneficial effect on T2D. Although these two studies looked at the effect of diet after diagnosis it could be reasonable to suggest that following the dietary  patterns associated with these findings, prior to diagnosis could help prevent T2D as they are similar dietary patterns to two of the other studies.(28-29) While the findings from this review indicate that making changes to ones diet may help to reduce the risk of Diabetes occurring, it also suggests that implementing the same kind of dietary changes may help with glucose control after Diabetes has been diagnosed, preventing the further development of the disease and the need for antihyperglycemic medication. (32-33) One study has implied that dietary changes in the form of energy restriction can actually reverse beta cell failure and insulin resistance, symptoms found in T2D. (37) It is a very small study and the dietary intervention is severe energy restriction making it difficult to generalise to the wider population, but it is a controlled study and could provide interesting findings that further research could be built upon, that dietary interventions may be able to reverse the symptoms of T2D. Collating this information together it seems reasonable to suggest that making positive changes to dietary habits could have benefits pre and post T2D diagnosis. Dietary Guidelines The findings from the 8 studies in this review can not all be discussed in detail due to word limitation. However recurring themes seem to be occurring, providing information on which to base a set of guidelines. Going by these findings the following guidelines are recommended: Reduce intake of red meat and processed meat (all colours) Substitute these with white meats and fish Reduce intake of other processed foods Reduce intake of refined grains Reduce intake of high sugar foods and drinks including fruit juices Carbohydrate intake should be based on items with a low GI score Increase intake of olive oil Increase nut intake Increase intake of pulses Increase wholegrain intake Increase vegetable intake especially green leafy vegetables Increase fruit intake A Mediterranean style diet is characterised by much of this advise and is therefore a recommended diet style to follow. Conclusion The prevalence of T2D is growing around the world. It has been associated with many other health problems and reduces quality of life and life expectancy. It is a preventable disease and diet is one of the ways in which this disease can be combated. Dietary guidelines have been recommended from the findings of this review, based on following a Mediterranean diet, reducing intake of red and processed meats and other processed foods and increasing intake of foods such as fruit and vegetables, wholegrains and olive oils and nuts. While it has been acknowledged that more research needs to be carried out to further examine the cause and effect between diet and T2D, it is reasonable to suggest that one may find these dietary changes beneficial in helping to reduce the risk of T2D and other areas of health, possibly helping to indirectly reduce risk of T2D. It is also reasonable to suggest that a change in diet may bring beneficial changes once diagnosis has been given. Table 1 Reference list 1. Agardh E, Allenbeck P, Hallqvist J, Moadi T and Sidorchuk A. Type 2 Diabetes and Socioeconomic Position: A Systematic Review and Meta-analysis. International Journal of Epidemiology. 2011: 40(3) 804-818 2. American Diabetic Association Report of the Expert Committee on the Diagnosis and Classification of Diabetes Mellitus. Diabetes Care. 2000: 23(1s) 3. Carter P, Gray LJ, Troughton J, Khunti K, and Davies M. Fruit and vegetable intake and incidence of Type 2 Diabetes mellitus: A Systematic Review and Meta-analysis. British Medical Journal. 2010: 341:c4229 4. Davis MJ, Tringham JR, Troughton J, Kunit KK. Prevention of T2D mellitus. A review of the Evidence and its Application in a UK Setting. Diabetic Medicine. 2004: 21: 403-414 5. Gerrish K and Lacey A. The Research Process in Nursing. 2006 5th Edition. Oxford: Blackwell Publishing. 6. Grant RW and Sugarman J. Ethics in Human Subjects Research: Do Incentives Matter? Journal of Medicine and Philosophy. 2004: 29(6) 717-738 7. Hamer M, Chida Y. Intake of Fruit and Vegetables and Antioxidants and Risk of Type 2 Diabetes. A Systematic Review and Meta-analysis. Journal of Hypertension. 2007: 25:2361-2369 8. Hensrud DD. Dietary Treatment and Long-term Weight Loss and Maintenance in T2D. Obesity Research. 2001:9(4 supplement):348S-353S 9. Hickner RC, Brunson MA, McCammon M, Mahar MT, Garry JP, Houmard JA. Diabetic Groups as Defined by ADA and NDDG Criteria have a Similar Aerobic Capacity, Blood Pressure and Body Composition. American Diabetes Association and National Diabetes Data Group. Diabetologica. 2001: Jan 44(1) 26-32 10. Hodge AM, O’Dea K, English DR, and Giles GG. Glycemic Index and Dietary Fibre and the Risk of Type 2 Diabetes. Diabetes Care. 2004: 27(11) 2701-2706 11. Kastorini MC, Milionis HJ, Esposito K, Giugliano D, Goudevenos JA,Panagiotakos. The Effect of Mediterranean Diet on Metabolic Syndrome and its Components. Journal of the American College of Cardiology 2011: 57(11) 1299-1313 12. Krauss RM, Eckle RH, Howard B, Appel LJ, Daniels SR, and Deckelbaum RJ. AHA Dietary Guidelines: Revision 2000: A Statement for Healthcare Professionals from the Nutrition Committee of the American Heart Association. Circulation. 2002: 102:2284-99 13. LoBiondo-Wood G. and Haber J. Nursing Research. Methods and Critical Appraisal for Evidence Based Practice. 2006: 6th Edition. Mosby: Missouri 14. Micha R, Wallace SK, and Mozaffarian MD. Epidemiology and Prevention. Red and Processed Meat Consumption and Risk of Incident Coronary Heart Disease, Stroke and Diabetes Mellitus. A systematic Review and Meta-Analysis. American Heart Association. 2010: 121 2271-2283 15. Heart Disease and Stroke: The Nations leading Killers. At a Glance National Centre for Chronic Disease Prevention and Health Promotion. Division for Heart Disease and Stroke prevention. 2011: CS217229-AI 16. National Diabetes Data Group Classifications and Diagnosis of Diabetes Mellitus and Other Categories of Glucose Intolerance. Diabetes. 1979: 28 1039-1057 17. Neild L, Summerbell CD, Hooper L, Whittaker V, Moore H. Dietary Advice for the Prevention of T2D Mellitus in Adults (Review) The Cochrane Collaboration. 2008: Wiley 18. Pan A, Sun Q, Bernstein AM, Schulze MB, Manson JE, Willett WC and Hu FB. Red Meat Consumption and Risk of Type 2 Diabetes: 3 Cohorts of US Adults and an Updated Meta-analysis. American Journal of Clinical Nutrition. 2011: 94(4) 1088-1096 19. Shaw JE, Sicree RA, Zimmet PZ. Global Estimates of the Prevalence of Diabetes for 2010 and 2030. Diabetes Research in Clinical Practice. 2010:87:4-14 20. Sigal RJ, Kenny GP, Wasserman DH, Castaneda-Sceppa C and White RD. Physical Activity/Exercise and Type 2 Diabetes. A Consensus Statement from the American Diabetes Association. Diabetes Care. 2006: 29(6) 1433-1438 21. Shu XO, Yang G, Jin F, Liu D, Kushi L, Wen W, Gao YT, Zheng W. Validity and Reproducibility of the Food Frequency Questionnaire Used in the Shanghai Women’s Health Study. European Journal of Clinical Nutrition. 2004:58:17–23 22. Shulze MB, Manson JE, Ludwig DS, Colditz GA, Stampfer MD, Willet WC, and Hu FB. Sugar-Sweetened Beverages, Weight Gain, and Incidence of Type 2 Diabetes in Young and Middle-Aged Women. The Journal of the American Medical Association. 2004: 292(8):927-934 23. Tohill B, Seymour J, Serdula M, Kettle-Khan L, and Rolls BJ. What Epidemiological Studies Tell Us about the Relationship between Fruit and Vegetable Consumption and Body Weight. Nutrition Reviews. 2004: 365 -374 24. WHO Study Group on Diabetes Mellitus. Diabetes Mellitus: Report of a WHO Study Group. Geneva: World Health Organisation: 1985 25. NICE Public Health Guidance. Preventing Type 2 Diabetes: Population and Community Interventions. National Institute for Health and Clinical Excellence. 2011: Issue 35 26. Villagers R, Shu OX, Gao YT, Yang G, Elasy T, Li H and Zheng W. Vegetable but Not Fruit Consumption Reduces the Risk of Type 2 Diabetes in Chinese Women. The Journal of Nutrition. 2008: 138 574-580 27. Bazzano LA, Kamudi JJ, Hu FB, and Li TY. Intake of Fruit, Vegetables and Fruit Juices and Risk of Diabetes in Women. Diabetes Care. 2008: 31(7) 1311-1317 28. Salas-Salvado J, Bullo M, Babio N, Martinez-Gonzalez MA, Jurado NI, Basora J, Estruch R, Covas MI, Corella D, Aros F, Gutierrez VR, and Ros E. Reduction in the Incidence of Type 2 Diabetes With the Mediterranean Diet. Diabetes Care. 2011. 34:14-19 29. Martinez-Gonzalez MA, Fuente-Arrillaga CDL, Nunez-Cordoba JM, Basterra-Gotari FJ, Beunza JJ, Vazquez Z, Benito S, Tortosa A and Bes-Rasrollo M. Adherence to Mediterranean Diet and Risk of Developing Diabetes: Prospective Cohort Study. British Medical Journal. 2008: 336:1351 30. Fung TT, Schulze M, Manson JE, Willet WC, and Hu FB. Dietary Patterns, Meat Intake and the Risk of Type 2 Diabetes in Women. Archives of International Medicine. 2004:164:2235-2240 31. VanDam RM, Rimm EB, Willet WC, Stampfer MJ and Hu FB. Dietary Patterns and Risk for Type 2 Diabetes Mellitus in US Men. Annals of Internal Medicine. 2002:136: 201-209 32. Elhayany A, Lustman A, Abel R, Attal-Singer J and Vinker S. A Low Carborhydrate Mediterranean Diet Improves Cardiovascular Risk Factors and Diabetes Control Among Overweight Patients with Type 2 Diabetes Mellitus: A 1-year Prospective randomized intervention Study. Diabetes, Obesity and Metabolism. 2010: 12:204-209 33. Esposito K, Maiorino IM, Ciotola M, Palo CD, Scognamiglio P, Gicchino M, Petrizzo M, Saccomanno F, Beneduce F, Ceriello A and Guigliano D. Effects of a Mediterranean-Style Diet on the Need for Antihyperglycemic Drug Therapy in Patients with Newly Diagnosed Type 2 Diabetes. Annals of Internal Medicine. 2009: 151: 306-314 34. Van Duyn MAS and Pivonka E. Over view of the health benefits of fruit and vegetable consumption for the Dietetics Professional. Journal of the American Dietetic Association. 2000: 100(12) 1511-1521 35. Anderdson JW, Baird P, Davis RH, Ferreri S, Knudtson M,Koraym A, Waters V,and Williams CL. Health Benefits of Dietary Fibre. Nutrition Reviews. 2009: 67(4) 188-205 36. Sinha R, Cross AJ, Graubaed BI, Leitzmann MF, and Schatzin A. Meat Intake and Mortality. A Prospective Study of Over Half a Million People. Archives of Internal Medicine. 2009 169(6) 562-571 37. Lim EL, Hollingsworth KG, Aribisala BS, Chen MJ, Mathers JC and Taylor R. Reversal of type 2 Diabetes: Normalisation of Beta Cell Function in Association with Decreased Pancreas and Liver Triacylglycerol. Diabetologica. 2011: 54:2506-2514 38. Jiang R, Manson JE, Stampfer MJ, Liu S, Willet WC, Hu FB. Nut and Peanut Butter Consumption and Risk of Type 2 Diabetes in Women. Journal of the American Medical Association. 2002: 28(20) 2554-2560 39. Riserus U, Willet WC, and Hu FB. Dietary Fats and Prevention of Type 2 Diabetes. Progress in Lipid Research. 2009: 48(1)44-51 40. Tuomilehto J, Lindstrom J, Eriksson JG, Valle TT, Hamalainen H, Ilanne-parikka P, Keinanen-Kiukaanniemi S, Laakso M, Louheranta A, Rastas M, Salminen V and Uusitupa M. Prevention of Type 2 Diabetes Mellitus by Changes in Lifestyle among Subjects with Impaired Glucose Intolerance. The New England Journal of Medicine. 2001: 344(18) 1343-1350

Monday, July 29, 2019

Public Relations Plan for McDonald's UK Essay Example | Topics and Well Written Essays - 5250 words

Public Relations Plan for McDonald's UK - Essay Example This discussion declares that for an organization of the stature of McDonald’s, it is extremely important for the managers to design its campaign strategies in an effective manner. This is precisely because of the fact that McDonald’s has a much enhanced brand image all over the world and therefore it is primary responsibility of the managers to uphold this image among the consumers. The underlying reason behind that is any wrong step taken by the managers in terms of their public relations can severely tarnish the company’s reputation. Moreover, given the fact that one of the critical success factors for the company has been its image to the public and the relationship based on trust and respect with its customer base, it is crucial for the managers to make sure that the public relation tactics are highly narrowed towards enhancing the brand image and strengthening the relationship.According to the report findings it is extremely important for the managers to ma ke sure that these objectives are in complete alignment with the organizational objectives. In that way they will be able to make sure that each and every organizational objective are being approached with equivalent emphasis. The word public over here is a generic term which refers to the public who has to be communicated through various public relation tactics and strategies that are directed towards enhancing the brand image of a company.  Ã‚  

Sunday, July 28, 2019

Managed Care Essay Example | Topics and Well Written Essays - 500 words - 3

Managed Care - Essay Example Accreditation is the significant process that Managed Care Organizations (MCOs) need to pass in order to prove their credibility and quality. Both, service providers and customers consider the certification as highly important because it indicates that an organization has attained the standard of quality defined by the accrediting agency. The major Accrediting Agencies in the United States are ABQAURP, NCQA & HEDIS, The Joint Commission, AAAHC & AAAASF and URAC. Although the criteria for accreditation vary depending on the type of Managed Care Organizations and the accrediting agency, there are certain common factors that are applicable in the review. The Agencies usually consider the â€Å"MCO’s quality management program and its impact on operations, at utilization management and how it is carried out, at the MCO’s treatment of members and so forth.† (Kongstvedt., 2003 p. 239). TRICARE is a managed care option of Civilian Health and Medical Program of the Uniformed Services (CHAMPUS) initiated by Department of Defense (DOD). The service has been delivered through its worldwide Military Health Service System (MHSS). DOD provides Tricare civilian health benefits for military personnel, military retirees, and their dependents through its 11 health service regions. It has also established a new administrative structure to supervise the delivery of health care. (Kongstvedt, 2003 p.1131). Tricare Standard (Fee for Service Program), Tricare Extra (Preferred Provider Option), Tricare Prime (HMO Option), US Family Health Plan, and Tricare Reserve Select (TRS) are some of the major plans of Tricare. As compared to other managed care services in the United States, Tricare offers more steady high quality health care benefits and reduced costs. Tricare service is accessible according to the priority of the beneficiaries as follows; active duty members, family members o f the active prime members, retirees and their family members, family

Saturday, July 27, 2019

US Cultural Wars Gone Global Article Example | Topics and Well Written Essays - 250 words

US Cultural Wars Gone Global - Article Example In this article, the issues of cultural differences have been featured in two main ways. The first aspect is the American culture versus Ugandan culture. Secondly, is the concept of Sexual minorities, which include LGBT versus the sexual majority. In the article, Emily Cody discusses the move that was made by the Sexual Minority Uganda (SMUG) to file a case against American Minister Scott, with the assistance of the Alien Tort Statute. In the subsequent sections of the paper, the author illustrates the legal brief of the case and how they have experienced discrimination on all meaningful parts of their lives. The article resonates with the current occurrences in Uganda and some other parts of Africa. In Uganda, homosexuality has been criminalized. This law stems from the understanding that such sexual orientations are not Africans and therefore are not acceptable in African society. The article brings about the concept of validation and how some of the religious concepts by individual Americans are used to promote hatred towards the Sexual minorities. In the article, one is able to understand the legal red tapes that validate oppression of the LGBT. The references being created by the oppression is drawn from the legislative measures that have been taken by the Ugandan government which condemns gays and lesbian on the grounds of cultural intolerance.

Friday, July 26, 2019

Staff Retention Strategy Assignment Example | Topics and Well Written Essays - 4000 words

Staff Retention Strategy - Assignment Example They are the customers for jobs. If managers do not prepare a good foundation, they cannot expect them to stay. Employees will no longer endure what they do not like in their employment situation. They have power in the knowledge of their abilities and confidence in their value in the marketplace. With greater loyalty to their career and their skills than to their employer, they move on. Current paper provides discussion of proper strategies that should be applied for keeping employees who are the greatest assets of any organization. Using the case of London Housing Association, I will emphasize strategies of retention employees in this organization while basically examining job descriptions, recruitment, selection, and orientation, looking at the employees' perspectives on the issue. Keeping good help productive and on the job is the keystone of management. It is an everyday, continual process. It represents not one single problem with one single solution but rather a maze of simple and complex problems each with several possible solutions. Successful management deals with each problem and chooses among the alternative solutions. Management is, perhaps, problem solving and decision making. In dealing with problems the manager would do well to keep in mind an old rule "If you are not part of the solution, then you must be part of problem... If you are part of the solution, you are probably part of the next problem." (Campbell, Campbell, & Chia, 132) The problem of high turnover seems more evident in some businesses than in others. The manager who faces this problem should be aware that there is no simple solution, only intelligent choices. In making these choices the manager needs a basic understanding of people and why they do what they do or why they don't do what you would like them to do. The choices management makes in these decisions should be predicated upon the goals of the organization. The results of such decisions may actually be a test of the validity of organizational goals. Realistic goals which have been developed and accepted by all segments of the organization will prove to be a much sounder base for management decisions than goals developed from a narrow perspective of any one segment of the organization. Both the organization and the employee are beginning a relationship that will not last if there is a mismatch between the position requirements and the new hire's skills. It makes no difference if the mismatch is due to managers' unawareness of what they need, not having the right person in candidate pool, not selecting the person who can do the work, or not launching the person hired on the right track. The results are, on either side, unfruitful. For the organization: loss of productivity because work is not getting done or not getting done right; burnout of overworked employees; the often hidden cost of management time to fix the problem. For the employee: frustration due to not being able to use one's skills; investment of time and energy to find another position. In London Housing Association retention is interrelated with recruitment and employee relations. Each impacts the other, and all three are related. London Housing Association begins its retention efforts by centralizing its recruitment efforts. Through its recruitment centers it provides better-quality applicants for managers to

Thursday, July 25, 2019

Judea Declares War On Germany Essay Example | Topics and Well Written Essays - 250 words

Judea Declares War On Germany - Essay Example Germany at that time was going through an economic crisis so the declaration was really a surprise. I was also surprised to see such a document which is a facsimile of the original British newspaper. First, I never realized that Jews were very powerful during that time- financially and politically. Imagine, thousands of Jews in the US forming assemblies to bring down Germany on its knees through an economic boycott. The thing that shocked me was the fact that Jews were always represented as poor, helpless people on movies about the Holocaust. This piece of information in history actually confused me because it changed my ideas about the Jews. Another thing that I can say about this article is that the way the news was written seems biased. The news did not seem to report only the facts because it was followed by articles with words about â€Å"Hitler’s terror†. If I were reading that newspaper that time, my opinion against the Germans would also be influenced negatively because I would feel that they are bad people. The lesson that I can learn from this article is that people should be conscious of their accusations against another group of people because they may not want the consequences later.

Wednesday, July 24, 2019

Phase 2 Individual Project Assignment Example | Topics and Well Written Essays - 1500 words

Phase 2 Individual Project - Assignment Example Main Responsibilities of Each Role End User The role of end users especially in information technology (IT) system based development is much vital as they are considered to be the ultimate users of new software on a daily basis. It is the end-users who are aware of the data present in the legacy systems. The primary responsibility of the end-users is to directly interrelate with different computer workstations or terminals in order to effectively conduct their assigned work. The end-users are quite able to differentiate between the formal description and constraints among others for performing their work along with informal practices. Furthermore, they are able to convey relevant valuable information to the users’ representatives relating with the process. In addition, end-users may require participating in the activities concerning Quality Assurance as well. Most importantly, periodically developing functional departments is also viewed to be the other prime responsibilities of the end users (Damodaran, 1996, pp. 363-377). Business Analyst The primary function of the business analysts is to develop means in order to cultivate confidence and respect from both the IT and the business aspects of the organizations. A business analyst is required to understand the stakeholders, employees and customers and their needs ought to be served effectively. Contextually, the most frequent responsibility of the business analysts has been viewed to resolve various problems concerning with the processes and the functions within the organizations while dealing with legacy system development. Furthermore, business analysts are required to combine various functions in order to utilize effective technologies for developing the overall operational procedures. A business analyst is liable to monitor the new IT system after its full implementation (Hernandez, 2012, pp. 1-4). Team Leader The role of a team leader is extremely crucial relating to the aspect of project management . Accordingly, it is necessary that a team leader is flexible in managing his/her team members for successfully completing a project. It has been ascertained that a team leader should perform his or her tasks based on the situations rather than being rigid in following his/her own managing style. Moreover, team leaders should be capable of motivating and encouraging his/her project team. The team leader should be able to control the behavior of his/her project team and support them while performing their respective tasks. The team leader should also be able to promote healthy affiliation among the team members and promote effective communication in order to smoothly achieve the organizational goals. It is worth mentioning that smooth completion of a project largely depends upon the activities that perform by an efficient team leader (Roman, 2011, pp. 1-5). Skills Necessary for the Respective Positions Skills Necessary for End-Users Concerning with end-users skills, high level compet encies and experience are required for adopting as well as exploiting effectual decisions. Moreover, the end-users must possess proper knowledge, know-how and power in order to shape the improvement in accordance with the needs of the organizations. At the same time, the end-users should have the willingness and enthusiasm during the course of the IT development in order to seek

Art homework Essay Example | Topics and Well Written Essays - 1000 words

Art homework - Essay Example There are curved lines that are used to draw the tentacles of the animal. Swirling lines have also been used in the piece of art. The lines do occur at the edge where the color and texture change. Subject matter: the second painting is an oil painting that portrays three people on horses. This is evident as the artist drew the three people from the back side and you can see the back side of the horse. Based on the dressing by the three people , they seem to be from Mexico. What the artist had in mind was drawing three people who were riding their horse in a large field most probably the large coca plantations ( Reza 38). This is evident with the vanishing point that is evident in this piece of art. The piece of art has bright colors. a) Color – the colors that the artist used in drawing this kind of art were red, yellow and green. These are colors that are on can see in the real world. The dominant colors in this picture were bright colors. b) Lines – there are different types of lines that the artist uses . There are curved lines that are used to draw the people on the horses and the mountain. Swirling lines have also been used in the piece of art. The lines do occur at the edge where the color and texture change. Subject matter : The third painting is an oil painting that portrays a family. There is a man, woman and a child at the center. The horizon that connects the man is a resemble of the connection between the two (Reza 37). The flower just besides the child means that when and woman are in love they can get married and give birth to a child. The objective that the artist had in his mind while drawing this picture was drawing a complete family and add some artistic feature like the clouds and the flowers. The picture has bright colors. a) Color – the colors that the artist used in drawing this kind of art were yellow and green and the rainbow colors. These are colors that are on can see in the real world. The dominant

Tuesday, July 23, 2019

Networking Topic Research Paper Example | Topics and Well Written Essays - 500 words

Networking Topic - Research Paper Example To begin with wireless networking, the first thing needed is a â€Å"high speed internet connection at the place where you want to use wireless networking† such as digital subscriber line (DSL) or WI-FI (Software Reviews). Other requirements include wireless networking adapter or a PC card adapter, a modem and a network hub. In case of wide-ranging wireless networking, it is always sensible to use an HP Network Assistant â€Å"to validate your wired and wireless network settings† (Hewlett-Packard Development Company). Wireless networks are based on IEEE 802.11 standards which is a set of standards developed by IEEE (Institute of Electrical and Electronics Engineers) to carry out WLAN technology with specifications or protocols like 802.11a, 802.11b, 802.11g, 802.11n having frequency bandwidth of 2.4, 3.6 and 5 GHz. Three main types of wireless networks are WLAN, WPAN and WMAN. Wireless Local Area Networks (WLANs) enable a user to connect to a local area network through wireless networking, like a small network in a house or an office. WLANs use radio waves for information transmission and are based on IEEE 802.11 standards. An example is Wi-Fi which is a fast speed wireless technology connecting devices for quick file sharing. Wireless Personal Area Networks (WPANs) connect two devices which are present close to each other or within personal reach. An example is Bluetooth which can â€Å"transmit at relatively low power and have a range of only 30 feet or so† (Bradley). Wireless Metropolitan Area Networks (WMANs) cover a larger geographic area and interconnect WLANs to one another. Another name used for WLANs is WiMAX (Worldwide Interoperability for Microwave Access) which is a digital telecommunication technology based on IEEE 802.16 standards and supplies broadband wireless access cov ering a very large area. To maintain security of wireless networks is a bit difficult as compared to wired networks. The reason for this is that it is easier to

Monday, July 22, 2019

Capital Budgeting Process Essay Example for Free

Capital Budgeting Process Essay Capital budgeting is one of the most important financing tools used to examine expenditures and future projects in the capital spending and to budget for projects and all other analysis of spending for the future. This gives a heads up for healthcare managers to control their spending not only for capital expenditures but other spending such as payments and utilities for the organization. Capital budgeting is a large process that takes many different aspects to run. While capital budgeting is one of the most important aspects in healthcare finance, it is also a broad topic. A bond is a financing tool that is used when an issuer gives a statement to the payee for money and an interest payment is made to the payee at certain times. When an organization goes through the process of issuing a bond, they go through six major steps to accomplish bond issuing and determine whether this is the best decision at the time. Before issuing a bond, the issuer examines their capital plan and determines whether a bond is needed financially. Next, the issuer looks at the options for payees within bond issuance and is then examined by a credit rating agency to see if their credit score is high enough to issue a bond. After being examined by the credit rating agency, the bond itself is examined by the agency and after it is approved, the borrower is given terms and conditions to accept from the borrower. The last step that an organization must go through to issue is to sell the bond. These are sold to the payer where they give the money needed for the specific amount. While bonds are a great way to manage debt and become financially secure, leasing is another way that healthcare facilities manage their debt. Leasing refers to a contract where the lessee pays the owner rent or money for assets for a contracted time where the contract can be renewed and reinstated for longer term usage of those assets. Leasing is undertaken primarily because they don’t have to take care of the maintenance that comes with leasing assets. The owner of the machinery, facility, equipment or anything else that can be leased must continue routine maintenance saving the facility money on expenditure amounts within the spending area. If a facility is struggling for money, there are options such as bonds and leasing to decrease costs and increase the needed funds. There are two major types of leases that healthcare facilities must understand which are capital leases and operating leases. A capital lease, or financial lease, is used to lease assets for as long as the asset will remain available and running. The lessee is required by the contract of the lease to pay for the assets being used as long as the lease is in motion. Operating lease is almost the opposite of a capital lease. Operating leases are used for terms that are usually breakable and shorter than the assets given period of operation. Short term borrowing is a term used to describe when a company is in debt for a term of one year or less. These debts are usually paid back in that year and are usually short term bank loans that are used to finance a company. Long term financing is the exact opposite of a short term loan. It is used when a company needs to be financed for longer than one year or will not be paid back within that year. It can be from a single loan or multiple loans and is used when there are no plans or availability to have these loans paid back within the year. Equity financing sources for nonprofit organizations include internally generated funds, philanthropy, and government grants. These are used to finance and support organizations that are non profit and that help those in need. Today, more and more organizations are becoming nonprofit and are used by their own money, grants and loans and stocks and bonds. These are all primary sources for nonprofit organizations to keep serving communities in the healthcare world. Capital Budgeting process does occur in several extensive stages that include many different objectives for projects and programs for healthcare organizations. These generally include expenditures and the budget that comes along with those steps. These are used so that there are different views of the budget and what needs to be completed and examined in order to see the direction headed. Three discounted cash flow methods that are used include net present value, profitability index and equivalent annual cost. Net present value is the amount of the investment compared to incomes after the discount has been applied. (Cleverley, 529). The profitability is the ratio of the NPV and investment costs. (Cleverley, 533). This is used to compare rates of return on capital budgeting. Finally, the equivalent annual cost is the spending of the project compared to the capital spending and the operation costs when not leased but fully owned.

Sunday, July 21, 2019

Formulate And Conduct Monetary Policy In Malaysia Information Technology Essay

Formulate And Conduct Monetary Policy In Malaysia Information Technology Essay The selected company for this paper is the Hongkong and Shanghai Banking Corporation. The organization is popularly known by its widely accepted acronym HSBC. To-date, this multi-national company is a giant financial conglomerate that operates from more than 7,500 offices spread across 87 countries world-wide with more than 330,000 employees (www.hsbc.com). Briefly, the historical background of Hongkong and Shanghai Banking Corporation (HSBC) was that it was founded in 1865. Its formation was to cater to primarily for the China trade. In 1876, it opened its Singapore branch followed by the Penang branch in 1884. The main banking activities then during the turn of the century in the Straits Settlements were to cater for trading activities in China. As the British presence in the Malay states in the Malay Peninsular grew through tin mining and during the later stages through rubber cultivation as well as other commodity plantations such as cocoa, tobacco and spices, Hongkong bank grew larger as demand for banking support to the business communities grew (HSBC. Its Malaysian Story, text by Douglas Wong, Editions Didier Millet, 2003). The financial industry in Malaysia has demonstrated a vibrant development since its announcement to open up the industry for foreign participation via increased equity and to hold a major stake in insurance companies, investment banks and commercial banks. Amongst the foreign players that has made a big inroad into the financial industry of Malaysia is HSBC, Standard Chartered and Citibank. (www.chinapost.com). The industry is controlled by the central bank of Malaysia known as Bank Negara Malaysia (BNM). BNM formulates policies, sets out controls for the banking lending activities in the country and implements the Banking Financial Institutions Act 1989. Its main primary functions are:- Formulate and conduct monetary policy in Malaysia; Issue currency in Malaysia; Regulate and supervise financial institutions which are subject to the laws enforced by the Bank; Provide oversight over money and foreign exchange markets; Exercise oversight over payment systems; Promote a sound, progressive and inclusive financial system; Hold and manage the foreign reserves of Malaysia; Promote an exchange rate regime consistent with the fundamentals of the economy; and Act as financial adviser, banker and financial agent of the Government. (www.mida.gov.my) The major competitors to HSBC in Malaysia comprises of the foreign banks in Malaysia such as Standard Chartered Bank, Citibank, OCBC Bank and UOB Bank. The local banks that competes with HSBC are larger in terms of branch network, customer accessibility, capitalization, systems, loan spread as well as human capital. Part 2 The early era of modernization in the bank is through implementation of accounting machines in 1959 with the use of National Cash Register Corporation (NCR) Machine called NCR Class 32s for the general ledger and current accounts in Hongkong banks branches. The savings accounts were done using the NCR 42. The NCR 32 were later replaced by NCR Postronic machines in the larger branches in Malaya. The second phase of mechanization or early computerization in Hongkong bank started in 1976 through out to 1980. This phase involved the use of IBM mainframe such as IBM 360 which cost USD450,000 in 1977, Philips terminals, Racal modems and telecommunication provide by Telekon Malaysia. By 1988-89, the Philips banking terminal has been replaced by a Unisys system used by the HSBC group worldwide (HSBC. Its Malaysian Story, text by Douglas Wong, Editions Didier Millet, 2003). The Data Management and Storage system of HSBC are based mainly on its mainframe system that has been retained largely from its era of computerization in the 1976 era up until mid 1984/5. The mainframes are its key machines in storage of data and information which comprises of customer information, loan advances, staff information including its compensation payroll data. The Windows NT server is one HSBCs key data management and storage system. Another system in HSBCs data management and storage is its Windows 2000 SP4 server and Windows 2003 SP1 server. These three systems forms the core data management and storage for HSBC. The advantages of these systems are their storage capacity that is large enough for HSBCs customer information. The dependability of these systems has proven stable and dependable against unnecessary data losses. The IT Support teams constantly provide cumulative security update such as its Outlook Express. The flexibility of these three systems can be demonstrated in the series of pack and patches that was downloaded for the Windows 2000 SP4. Among those patches to address the system are:- Vulnerability in the Web View to allow Remote Code Execution. Vulnerability in HTML Help to allow Remote Code Execution. Vulnerability in Remote Desktop Protocol could allow denial of service. Vulnerability in the Microsift Data Access Components (MDAC) Function Could Allow Code Execution. (HSBC Intranet) The ability of the server to accommodate the above patched identified from the list of Microsoft Service Pack and Patches for Windows 2000 SP4 demonstrated the flexibility of the server to take patches in the system. These are aimed to ensure the server remains stable to support the banks requirement in data management and storage. In addition to the data management, the operating systems platforms are based mainly on Microsoft Windows. (www.hsbc.com.my) The bank placed high importance to ensure its operating systems are sound, dependable to its business needs, safeguard customer information, enables continuous product enhancement as well as maintaining employees information which are considered sensitive and crucial. Policies on internet usage for HSBC are highly regulated. The banks policy on the usage of email and internet is regulated and the policies can be found in the banks intranet accessible by all staff. The usage of email and internet is based on conditions laid down in the banks group policies. Its usage is for business correspondences and is to be conducted in a business-like and professional manner. The use of email and use of external computer access over the internet is subject to the banks policies and Code of Conduct. (HSBC Intranet). The networking and telecommunications aspect of HSBC is controlled and careful attention is given to the access to internal software and hardware of the organization. This manner of control is reflected in the organizations LAN security where all software installation is authorized through formal procedures. This would include LAN administrator guide strictly enforced, service patches on latest Microsoft updates are monitored and using approved anti-virus software (inclusive of updates). In terms of controlling the organizations network, strict password usage and control is enforced. This is evident in the organizations policy on placing ownership and accountability on individual user of their password. This includes frequent changing of password every 60 days (HSBC Intranet). In broad terms regarding consultants, system integrator and vendors, HSBC maintains strict regulations on outside equipment by consultants and vendors. In addition, the bank enforces strict controls on third party data transfer, maintenance of customer and staff personal data within the mainframe system and serves are not accessed by third parties such as external consultants and contract employees without proper clearance (HSBC Intranet/PC Security Guidelines). These strict controls are put in place to protect customer and staff data privacy as well as data security from being compromised by external or third parties that comes in contact with the banks systems or servers. In terms of the banks computer hardware platforms, these equipments are maintained through tight policy and guidelines that governs administration of the banks IBM servers, the computer hardware especially PCs and laptops used by the staff, comprising mainly of IBM machines (HSBC Intranet). Part 3 This report will proceed to present the concept on cloud computing, outlining its key features, current trends, future developments and consider its benefits to business (making direct reference to banking) and the cost of cloud computing to HSBC. Cloud computing comes into focus only when companies think about the IT needs/requirements. Companies started to explore ways to increase capacity or add capabilities on the go with business-as-usual operations without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends ITs existing capabilities (www.infoworld.com) (Based on an article by Eric Knorr Galen Gruman adapted from Infoworld). Prior to the availability of cloud computing, the traditional business applications have been complicated and expensive. The amount and variety of hardware and software required to run these applications and systems are daunting. The organization requires a whole team of experts to install, configure, test, run, secure, and update them. When the organization begins to multiply this effort across dozens or hundreds of applications, it is easy to observe the reason why the biggest companies with the best IT departments are not getting the applications they require. Given this reality, the small and mid-sized businesses will obviously face even bigger challenges (www.salesforce.com). While the concept of cloud computing was recognized to be spearheaded by Salesforce.com, there has been other companies that have dived into the business of providing CRM solutions in the form of software-as-a-service. A Google search produced several key service providers in cloud computing such as Gogrid, ORACLE, IBM, SAP cloud computing.com, vads.com and rimuhosting.com. The published benefits of cloud computing are the ability of the concept to leverage on cost while providing customized options to the subscribers. The list of benefits provided by cloud computing given the fundamental infra structure of cloud computing is as follows:- The level of Web-services integration has been proven. Cloud computing technology has demonstrated itself to be much easier and faster to integrate with the organizations existing enterprise applications (both traditional software and cloud computing infrastructure-based), whether third-party or applications that has been developed internally by the organization. Advanced service delivery. Cloud computing infrastructures offer greater scalability, complete disaster recovery, and demonstrated an impressive uptime figures. Lack of requirement to install additional hardware or software: There is no requirement for additional hardware or software in a fully cloud computing infrastructure. The positive features of cloud computing technology is in its overall simplicity and it requires significantly fewer capital expenditure to set up and get the whole system running. Faster and lower-risk deployment. The organization can set up and run the whole system much faster with a cloud computing infrastructure. It also saves the organization substantial expenses and allows employees/users to log into the new solution quickly. The cloud computing technology applications are live in a matter of weeks or months, even with extensive customization or integration included. Support for deep customizations. Cloud computing infrastructure allows deep customization and application configuration and it also preserves all those customizations even during upgrades. In addition, cloud computing technology is ideal for application development to support the organizations evolving needs. Empowered business users. Cloud computing technology allows on-the-fly, point-and-click customization and report generation for business users. As a result, IT is not required to spend a large amount of time and resource making minor changes and running reports. Automatic upgrades that dont impact IT resources. Cloud computing infrastructures put an end to a huge IT dilemma: If the organization upgrades to the latest version of the application, the organization is required to spend time and resources to rebuild their customizations and integrations. Cloud computing technology doesnt force an organization to decide between upgrading and preserving all its applications, because those customizations and integrations are automatically preserved during an upgrade. Pre-built, pre-integrated apps for cloud computing technology. The involvement of more companies in providing cloud computing infrastructure and applications will be able to multiply and provide more applications in either pre-built or post-built requirement to suit clients requirement. (www.salesforce.com). Malaysias IT infrastructure. The availability of better infrastructure compared to other countries in the region such as the availability of broadband indicates that the country is a suitable platform to embrace cloud computing with the assurance and support from the government. An example of this support is the entrance of Microsofts full range of cloud computing capabilities in Malaysia as well as other established parts in this region. (www.nst.com.my). While the concept and published reports and opinions have advocated various benefits from cloud computing, there are obvious down side to the concept compared to the more established traditional business applications that are more supported by the applications provider. One of the major online company that adopted cloud computing is Amazon.com. Recently, there have been technical problems and interruptions by the company starting on 21 April 2011. This has prompted industry analysts and observers to ask organizations to seriously reconsider relying on remote computers that are beyond their control. Matthew Eastwood, an analyst for the research firm IDC has called this incident involving Amazon.com as a wake-up call for cloud computing. The incident has started discussion on the concerns for cloud computing as such:- The amount organizations are required to pay for backup and recovery services. This concern also covers other areas, including paying extra for data centers in different locations. That is because the companies that were apparently hit hardest by the Amazon interruption were start-ups that, analysts said, are focused on moving fast in pursuit of growth, and less apt to pay for extensive backup and recovery services. (www.nytimes.com). The actual flexibility of cloud computing. While cloud computing has demonstrated its flexibility in terms of adaptability to organizations requirement and cost, there is a real concern amongst industry analysts on the claim of actual infinite elasticity of cloud computing. Arising from the recent Amazon.com interruption, there are serious concern on the ability of cloud computing to provide stability beyond the security from the traditional business applications provider that has seen proven reliability. This will be severe for what the analysts are concern for larger industry such as the entertainment industry (http://cloudcomputing.sys-con.com). Taking this argument a step further, this report also raises the concern arising from the Amazon.com incident to the banking industry. Would HSBC depart from the major players in banking to embrace cloud computing given this latest discussion in the IT industry. Part 4 In my analysis of the present structure of HSBC, the idea of adopting cloud computing needs to be pursued with a certain degree of caution and optimism. I am recommending the following options for your consideration in adopting cloud computing into the applications support, maintenance and storage for HSBC:- Limited participation in the Virtual Private Cloud (VPC) by putting in the new applications via cloud computing whilst keeping the existing applications to be enhanced, supported and stored by the existing system. The bank will continue to work our vendors and system support providers to maintain the existing applications. This dual approach is aimed to venture quickly into cloud computing and at the same time in assuring senior management, Asia Pacific Group IT as well as the Global team on our prudence to continue maintain the existing system for our current applications. This recommendation is to maintain status quo in our level of customer service with any unexpected disruption to our clients arising from technical problems. In addition, the VPC is relatively simple to implement and the cost of the subscription to SKALI Cloud Servers a minimal fee while having pre-build features which HSBC can use immediately. (www.skalicloud.com). This approach also eases up our GTLM (subsidiary providing IT support to HSBC) who is having attrition of IT personnel and simultaneously struggling to backfill the vacancies. In considering the IT infrastructure of our competitors, our proposed investment into cloud computing would be timely to ease off more capital investment into applications management and storage. The savings can be channeled to other IT requirement such as upgrade of our servers and other interface channel to the front end to give better support to our users. This will enable faster turnaround time and increase productivity of backroom / support staff and also better customer service for our sales service staff to our clients. Our overall business strategy under the Medium Term Outlook (MTO) three year plan from 2010 to 2012 emphasize the importance of improving productivity and cost savings to complement the bigger business revenue aim for the bank. Under this plan, the proposed adoption of cloud computing is to enable HSBC to have a quick support for its application support, minimize over dependence on staff, service providers and vendors. Many banks have spent time and money building an internal infrastructure. Such large infrastructure investment makes it difficult to cost justify moving for such infrastructure to be moved to an outside provider. There may be long-term savings but in the short-term, the difficulty is justifying the large investment into a cloud computing arrangement. In addition, moving the whole application systems from internal to eternal source via a cloud-based platform has a certain cost in itself which makes it even less attractive and even more difficult to justify. (http://thefinanser.co.uk) Issues with regulators. A recent report appearing in the UK Financier highlighted that Microsoft is often asked about Security by share holders as well as regulators. Companies would naturally due to their interest in protecting data privacy, will be determined to know how organizations protect their data. Among the questions posed to the organizations is the location of the cloud, the standards used by the organization in selecting the cloud that is located remotely away from the host country. In this respect, Microsoft is heavily geared towards security and is one of the largest firms in the development space in this area. Some issues do arise however with regulators in key markets, particularly in finance. For example, in Turkey, they regulate that data must be held on bank premises. Thats hard to overcome but is a key reason Microsoft continues to provide on premise solutions banks can implement while regulations catch up. (http://thefinanser.co.uk) Security of the information maintained within the cloud that is located away from the bank. In view that the cloud is not part of the banks organization or a subsidiary where the bank has partial or majority ownership, there remain questions on the control the bank has over the information, data or applications stored in the cloud (Interview with Mr Peter Ng, Manager IT Development/Support Office Automation on 12 April 2011). In addition, there is a provision within the Banking And Financial Institutions Act 1989 (BAFIA) that prohibits any director, employee or agent appointed by the bank who has access to the banks information made available such information to any other person or parties (S.97 of the Banking And Financial Institutions Act 1989). The concern raised by Mr Peter Ng is amplified by the fact that banks information, data or applications stored in the cloud outside the management purview of the bank. In view that the facility and commercial ownership of the cloud does not come under the definition of an agent appointed by the bank, there is no locus standi on the part of the cloud being accountable for any legal action that can be taken in the event there is a breach of S.97 of BAFIA. Section 97 of BAFIA states as follows:- 97.  Ã‚   (1)  Ã‚   No director or officer of any licensed institution or of any external bureau established, or any agent appointed, by the licensed institution to undertake any part of its business, whether during his tenure of office, or during his employment, or thereafter, and no person who for any reason, has by any means access to any record, book, register, correspondence, or other document whatsoever, or material, relating to the affairs or, in particular, the account, of any particular customer of the institution, shall give, produce, divulge, reveal, publish or otherwise disclose, to any person, or make a record for any person, of any information or document whatsoever relating to the affairs or account of such customer. (Banking and Financial Institutions Act 1989). Part 5 In summary, HSBC has a complex IT system that has been build over the years of our existence in Malaysia since the computerization of our banking system. The availability of cloud computing as an alternative in our on-going challenges in application management should be carefully considered in terms of expanding our IT capabilities to move into bigger areas of banking. This will provide HSBC with the opportunity to have better flexibility in managing our overall applications system to be able to provide better support to our users. This will in turn, enable our staff to provide better customer service and engagement. The adoption of cloud computing by the bank can be implemented with the following strategies:- Adopting a hybrid cloud where major vendors such as IBM, ORACLE and Hewlett Packard offers hybrid delivery with their existing technology to manage complexity of HSBCs diverse application systems that caters to different business groups where different applications for business segments such as Personal Financial Services, Commercial Banking, Treasury and Global Banking are different. The dedicated servers and applications can be better managed through public cloud (for lower cost applications storage with medium or low risks) and managed dedicated servers (for higher risks applications and data) that can be managed in partnership with the major vendor. This combined approach mitigates risks portfolio for the bank in terms of spreading evenly its storage in cloud computing where external parties and vendors cannot be fully controlled compared to internally managed servers and storage facilities (Interview with Mr Lim Wei Hup, Senior Manager IT Operations/Support conducted on 14 April 2011). Co-venturing into cloud computing by adopting a strategic partner to mitigate risks as well as leverage on common areas and different technical expertise to harness effective teamwork for selecting external applications from various clouds. An example of a recent tie-up and cooperation in the financial industry is the venture of Polaris Software Lab, one of the leading global financial technology companies announced a strategic investment in IdenTrust, a global financial institution. IdenTrust is one of the premier service providers of digital identity authentication services to several key banks such as Citibank, Bank of America, Deutsche, HSBC and even Barclays Bank. (www.siliconindia.com). The concern of being the first bank in Malaysia to embrace cloud computing need not arise as the government has provided ample support, key service provider such as Telekom Malaysia has been upgrading its broadband services and the availability of fiber optic infrastructure will ensure adequate bandwidth and speed. HSBC has always been a pioneer in various aspect in banking be it technology, products and services and even bringing environmental issues into part of its global commitments. With our rich history and forward optimism, venturing into cloud computing is an option management seriously need to consider in view our future growth strategy.

Torts and Negligence Case Study

Torts and Negligence Case Study Sajesh Maharjan Introduction Anna, a cafà © owner, went to the tour Honey Bee Nature Appreciation Tours operated by Trevor and had injured her knees after stumbling down the hill side. She got treatment in the hospital and fully recovered in a month. Now Anna decides to enforce tort law against Trevor who is not only the operator but also the sole owner of the tour company for negligent act and seek 12 months earnings in lost income and punitive damages. In this regard, Anna is the Plaintiff who has suffered personal injury and Trevor is the Defendant who will have to compensate for damages to the Plaintiff if proven guilty in the court. However, the burden of proof lies with Anna and she must establish following three things on the balance of probabilities that the Defendant owed Plaintiff the duty of care, the Defendant breached their duty of care and the Defendants actions have caused the Plaintiff to suffer loss or damage. Trevor has contributory negligence as a part of the defence against Anna. Duty of Care The issue is whether the Defendants conduct/actions could cause harms/injury to Plaintiff during the time of tour. In other words, Anna is required to prove that the personal injury suffered by her was reasonably foreseeable and was a result of the act(s) or omission(s) of the Trevor in order to establish the duty of care. The neighbor principle laid out by Lord Atkin in Donoghue v Stevenson [1932] is dominantly used in testing whether the Defendant owed Plaintiff a duty of care. According to that principle, the Defendant is said to owe a duty to take reasonable care of the Plaintiff where the Defendant would have reasonably foreseen the injury to the Plaintiff by the Defendants action or carelessness. Evidence of the duty of care is more easily recognized in cases involving established categories such as Parents and their children, employers and their employees, doctor and patients, teachers and students, manufacturers and consumers, etc. These established categories can be easily found in cases such as JD v East Berkshire Community NHS Trust and others [2005], Smoldon v Whitworth [1997] etc. Honey Bee Nature Appreciation Tours is solely owned and operated by Trevor. He takes maximum of six people (paying trekkers) once per week on a six hour walk during daylight to in bird watching and similar activities. The established category of a Professional and their customers can be applicable to the case of Trevor and Anna since Trevor provides professional service of walking tours and bird-watching activities and Anna pays for that service. Moreover, it is reasonably foreseeable that his activities and carelessness have impacts on those who attend his walking tours and owe duty of reasonable care to the paying trekkers. This is supported by the case of Smoldon v Whitworth [1997] where facts were similar. Therefore, it is evident that Trevor had duty of care over Anna who attended the walking tour. Breach After duty of care has been well established, the next issue is whether the Defendant breached the duty of care over Plaintiff. Alternatively, the next step is to identify whether Trevors act(s) or omission(s) failed to meet the standard of care required by the law. A Defendant will be held liable for negligent conduct that falls below the legally accepted standard of care for the significantly foreseeable risk of injury. It is stated in the s9 (1) of Civil Liability Act 2003 (QLD) that a person is not said to have breached the duty to take precautions against the risk, unless the risk was foreseeable, the risk was not insignificant and a reasonable person in the similar position and circumstances of the Defendant would have taken precaution. Section 9 (2) of Civil Liability Act 2003 (QLD)   lists out the factors that are taken into considerations for determining whether a reasonable person would have taken preventive measures against risk of injury which are as follows: the probability of occurrence of injury/harm without precaution the likely seriousness of the injury the burden of taking precautions to avoid the risk of injury the social utility of the activity that cause the risk of injury These factors are applied in determining the standard of care that a reasonable person would have taken by balancing the first two factors against the second two. The risk of harm/injury is compared against the practicality of taking precautions to avoid the risks. Before the tour, Trevor advised the tour participants to wear sensible shoes and clothing and that all the walks are conducted during daylight. He also notified regarding several fall injuries in the past because of trips during night time. He also mentions that the participants will be provided with the water and sandwiches during the trip. One of the important facts presented in the case is that he left the tour participants (trekkers) on their own during the break so as to scout for a new location. Moreover, he gets lost in his work and takes much longer that he expected which delayed the return trip and compelled to walk during dark. A reasonable person in Defendants position would not have left the participants unsupervised for such a long time. The facts do not disclose whether Trevor instructed to the participants that the alcoholic beverages were allowed during the trip. However, a reasonable person would have clearly indicated whether the alcoholic beverages were allowed during the trip besides sensible shoes and clothing. Similarly, a reasonable person would have scouted new places before the trip. And if the scouting has to be done during the trip, a reasonable person would have taken the note of time and wouldnt delay the return. The only thing which wasnt foreseeable for a reasonable person is that someone would change into high heel shoes in the middle of the trip during bird observation. Therefore, it can be concluded that Trevor has breached his duty of care from the given facts. This is reinforced by the case of Vaughan v Menlove [1837] where the Defendant did not acted as a reasonable person would h ave. Damage The major concern here is whether the breach of duty by Trevor has caused injury to Anna. Anna has to demonstrate to the court that Trevors negligent action was the main cause, though not necessarily the sole cause, of her damage. Section 11(1)(a) of Civil Liability Act 2003 (QLD)clearly states that the breach of duty was a necessary condition of the occurrence of the harm. This calls for the but for test which examines would the Plaintiff have suffered the damage but for the defendants negligence. In addition to the cause, Plaintiff is also required to prove that the damage incurred was within the scope of liability. Anna has to show that her injury was a foreseeable consequence of Trevors negligence. The question here is whether Trevors negligent action of leaving the tour participants unsupervised during the break, scouting for new location without keeping track of time have caused the Anna to suffer injury. It is true that the Trevors negligent act has caused the Anna to incur personal injury. Firstly, had the Trevor not left the group unsupervised, he could have been able to find that Anna had brought wine for the trip and he could have taken actions which would avoid Anna to consume half the bottle of wine by herself. Secondly, if Trevor had kept track of time and while he went for scouting location, they could have made the return trip during daylight before sunset when the forest was not dark. Thirdly, Trevor knew that there is risk of fall injuries during the trip made in night or when the forest is dark. Therefore, Trevors negligent act was the cause of Annas injury which is supported by the case of Strong v Woolworths Ltd [2012] and Annas personal injury was a reasonably foreseeable consequence of Trevors negligence as in the case of Hughes v Lord Advocate [1963]. Defence After the Plaintiff has established the necessary duty, breach and damage, then the Defendant can institute any defences in order to reduce or eliminate their liability. The common defences are contributory negligence and voluntary assumption of risk. The issue regarding this case is whether Anna contributed to her loss/injury and voluntarily assumed the risk. For contributory negligence, it is mentioned in the s 23 (2) of Civil Liability Act 2003 (QLD) that the standard of care of the Plaintiff is that of reasonable person in the position of the Plaintiff and what the Plaintiff knew or ought reasonably to have known at that time. In this case, Anna drank half a bottle of wine during break and changes her runners into high heel shoes during the return walk. Anna had also offered the wine to other people who walked the tour but everyone refused. A reasonable person in Annas position would not intake alcoholic beverages during walking tour and would not have changed their runners into high heel shoes. Moreover, when Anna got injured, she was under the influence of alcohol. Section 47 of Civil Liability Act 2003 (QLD) states presumption of contributory negligence if the person who suffers harm is intoxicated. Therefore, Anna has definitely contributed towards her injury. Voluntary assumption of risk arises in cases of recreational sports/activities which involves obvious and inherent risk. It is stated in the case that the bush tracks used for walking tours of Bushland surrounding the Bunya Mountains are not particularly strenuous. Thus, there is no voluntary assumption of risk in this case. Remedies The key concern at this point is whether the damages sought by the Plaintiff recoverable. The issue here is whether Annas claim for 12 months lost in income and punitive damages for Trevors negligence are fully recoverable. Section 52 of Civil Liability Act 2003 (QLD) explains that a court cannot award punitive damage in relation to personal injury damages unless the act that caused personal injury was unlawful intentional act to cause personal injury or an unlawful sexual assault or misconduct. Similarly, it is mentioned in s 54 of CLA 2003 (QLD) that the maximum award a court may make is for an amount equal to the present value of 3 times average weekly earnings per week for each week of the period of loss of earnings. Moreover, according to the s 24 of Civil Liability Act 2003 (QLD),In deciding the extent of a reduction in damages by reason of contributory negligence, a court may decide a reduction of 100% if the court considers it just and equitable to do so, with the result that the claim for damages is defeated. We are provided with the facts that Anna is transported to the hospital and recovered fully in a month. Despite full recovery from the injury, Anna closed her cafà © and decides to claim for 12 months in lost income and punitive damages. The facts presented in the case and the prevailing legislation suggest that she would not be awarded for punitive damages since Trevor had no intention of causing damage/harm to Anna. Moreover, she would also not be getting her claim of 12 months earnings since she fully recovered in a month and a court could provide a maximum award of 3 times average weekly earnings per week for the period of loss of earnings. Therefore, she may be entitled to benefit of maximum of 3 months earnings with reduction up to 100% because of her high contributory negligence. Conclusion Finally, it can be concluded that Trevor had a duty of care over Anna, breached his duty of care and caused serious knee injury to the Anna. After being fully recovered in a month, Anna decides to close down the cafà © and sue Trevor. Anna is likely to be awarded with 1months earnings or even less for lost income because of her high contributory negligence. References Legislation: Civil Liability Act2003 (QLD) Section 9(1) Civil Liability Act2003 (QLD) Section 9(2) Civil Liability Act2003 (QLD) Section 11(1) (a) Civil Liability Act2003 (QLD) Section 23(2) Civil Liability Act2003 (QLD) Section 24 Civil Liability Act2003 (QLD) Section 47 Civil Liability Act2003 (QLD) Section 52 Civil Liability Act2003 (QLD) Section 54 Cases: Donoghue v Stevenson [1932] AC 562 JD v East Berkshire Community NHS Trust and others [2005] 2 WLR 993 Smoldon v Whitworth [1997]PIQR P133, CA Strong v Woolworths Ltd [2012] HCA 5 Hughes v Lord Advocate [1963] AC 837 Vaughan v Menlove [1837] 132 ER 490 (CP)

Saturday, July 20, 2019

Everymans Journey Essay example -- Plays Literature Medieval Essays

Everyman's Journey Everyman, a short play of around 900 lines, portrays the best surviving example of the Medieval Drama known as the morality play, which evolved side by side with the mystery plays, although written individually and not in cycles like the mystery play or ritual play. The morality play was a form of drama that was developed in the late 14th century and flourished through the 16th century in British Literature. The characterizations used in the works were typically based on the personifications of good and evil engaged in a struggle over the morality of the soul. Everyman is every man’s journey to the spiritual unknown and the eventual reflection of one’s positive and negative actions in life, which dictate the offering of everlasting redemption. The play uses the literary technique of allegory to present the reader or audience a representation of man’s universal confrontation with the moral struggle that Christianity’s beliefs present to each individual. The traditional religious beliefs or moral structures are emphasized in parable form symbolizing life and investigating the qualities within every man, whether they be good or bad. Everyman challenges the means to the destined end of unrighteous and the failure of man’s nurturing of the spiritually cleansing good deeds, which in essence pulls man’s fate from the good to the bad or vice versa. The play has been speculated to be a written product of an unknown author from around the end of the 15th century, however, its origin is still debatable among literary scholars because of the play’s similarities to other written works, orality characteristics, noetic economy and universality with the European socio-religious culture. According to literary scholars... ...s. This particular piece is a valuable step toward textuality. It test the barriers set by orality and attempts to expand the act of story telling by incorporating traits, which were further developed with the increase of textuality and later printing. For example, the development of characterization and the use of narration progression or multiple narration bring forth-new avenues of psychological roundness of characters in junction with traditional "heavy" and "flat" universal appeal. The play Everyman has established itself in the progression of literature and the word by its incorporation of hearing dominance, rhyme scheme progression (memory), characterization, and performance based manuscript production. Everyman is for everyman that wants to understand where the word has come from (orality) and how it has come to the point of print existence (textuality).

Friday, July 19, 2019

photography after 1917 :: essays research papers

Analysis of a photography after 1917. AUBREY BODINE. â€Å"BUILDERS IN LINE†. (1961) Aubrey Bodine's photographic career began in 1923 when as an office boy with the Baltimore Sun he was a newspaperman covering all sorts of stories with his camera so this gave him opportunities to travel throughout the region and learn about it in every tide, wind, weather and season and out of this experience came amazing pictures of farming, oystering, hunting, soap boiling, blacksmithing, clock making, bricklaying and dozens of other occupations he a true American original, combined reportage with the creative eye of an artist. Bodine believed that photography could be a creative discipline, and he studied the principles of art, the camera and the dark room equipment were tools to him like the painter's brush or the sculptor's chisel. He was always experimenting with his tools, but hardly ever made a mistake. Some of his best pictures were literally composed in the viewfinder of the camera. In other cases he worked on the negative with dyes and intensifiers, pencil marking, and ev en scraping to produce the effect he had in mind. He added clouds photographically, and made other even more elaborate manipulations. Bodine's rationale for all these technical alterations of the natural scene was simply that, like the painter, he worked from the model and selected those features which suited his sense of mood, proportion and design. The picture was the thing, not the manner of arriving at it. He did not take a picture, he made a picture. Bodine's work includes pictorialist images as well as "straight" story-telling photojournalism and are also creative works of great originality. From his photographs I choose the image named â€Å"Builders in Line†, a a perfectly balanced image bathed in natural light. a captured moment of history that intrigue me, amaze me, and makes me want to discover the way he could get such a piece of art. It is a construction or a structure being built and he captured the moment in which two builders are walking trough and even though the image of them is far I can almost see their faces walking so tired like robots just doing their job. This high-gloss, high-contrast print reminds me like a typical day in a builder life. He made an amazing use of light and darkness and that way he balanced the composition between the structure that we can