Thursday, August 27, 2020

WE 3 CRJ 545 rESPONSE Essay Example | Topics and Well Written Essays - 250 words

WE 3 CRJ 545 rESPONSE - Essay Example Posting of the bodies associated with the wrongdoing scene examinations could likewise be basic (Gardner, 2011). Attributable to the multifaceted nature and divergence in different violations, it is basic for the CSI groups and other criminological professionals to have a very much developed way to deal with the remaking of a Crime Scene, so as to find out the mode in which the specific wrongdoing happened (Gardner, 2011). The essayist depicts immense attention to the procedures that happen in the wrongdoing scene remaking. The deliberate methodology of wrongdoing scene remaking from the appraisal to examination of gathered proof appears to be engaging (Gardner, 2011). Be that as it may, the essayist should incorporate the convention saw in the reproduction of different wrongdoing scenes. The morals saw in wrongdoing scene recreation is likewise huge (Gardner, 2011). As showed, wrongdoing scene documentation is basic in the remaking of the scene, or for the use as proof in the courts. The essayist has an away from of the noteworthiness of wrongdoing scene documentation, along these lines featuring the significant data to be archived, while leaving irrelevant data (Gardner, 2011). The devices and methods of documentation are additionally engaging. Be that as it may, the author isn't comprehensive on the innovative methods of the scene’s information assortment and documentation. In addition, it will likewise be significant to feature the conventions and morals associated with wrongdoing scene documentation (Gardner,

Saturday, August 22, 2020

Monologue of a Serial Killer Free Essays

How was I expected to realize this wasn't right, when it felt so right? Everything my dad has trained me is wrong†¦ He shown me not to cherish, showed me not to feel, have no sympathy for other people. How†¦how could this not be right, as long as I can remember a falsehood; that’s what it was, that’s what I could decrease it to, an untruth. Where had my mom been the point at which my dad had been showing me these things? Where had aunties, uncles, grandpas, grandmothers, cousins†¦ educators, anyone been to instruct me, to show me that†¦that the entirety of this wasn't right. We will compose a custom paper test on Monolog of a Serial Killer or on the other hand any comparative point just for you Request Now Wrong†¦that word doesn’t appear to be genuine now, and it will never really appear to be genuine, in light of the fact that I’ve known nothing else. I sound like I’m attempting to bear the responsibility yet I’m not, I’m genuinely not; I just†¦I felt so acknowledged by him, and cherished, so adored that I didn’t truly need anybody else†¦you know, the sort of adoration where†¦where anything could occur, and that one individual would at present be there; still there tuning in to all that you ever need to state, any issues and they state single word, two words, a sentence and everything is better†¦everything is fixed. My dad is the sort of individual I generally wished I was; solid, skilled, a genuine man†¦a genuine man†¦someone I could never be. My dad says my mom held me a lot of when I was a kid; he needed to get me away from her rapidly, so†¦so he discovered something to bond us together, discovered something that my mom would never be a piece of, could never be a piece of. What's more, my mom, my mom didn’t appear to see how I changed. I changed so definitely in the space of around 5 months; my point of view on life changed, out of nowhere I began to see everybody as a casualty, as a pariah, and in the long run the main individual I could trust was my dad, the main individual I accepted was him; my dad, my closest companion, my accomplice, my guide, the one individual who I could go to, who I knew would never judge since his wrongdoings are more regrettable than mine, much more awful. I’m told that I’m a casualty in the entirety of this; a survivor of my condition, an item made by my dad for his own methods. How might I accept that? How†¦how would that be able to be valid in the wake of all that he stated, everything we’ve done together, in every case together. I disclosed to him we shouldn’t have taken her, that last one; she was needed, she had companions, she had a family, she had a future, she†¦she was somebody†¦loved. Be that as it may, he needed to have her and I couldn’t let him know no, he was the ace he’d state, and I was his student†¦a understudy still following 12 years, 12 long years loosening up behind me. When I take a gander at those years now I see there was no adoration there, how would he be able to ever cherish anything over what he did to those young ladies? He was alive when I watched him do that; his eyes, they shone and twinkled in the night. I attempt to recollect when I’ve seen him glad like that with my mom and I can’t†¦I can’t. I’ve seen him grin, clearly I’ve seen him grin, yet joy is something a youngster should observer from a parent in typical circumstances†¦but on the other hand what’s ordinary? They state typical is cultivating, cooking, cleaning, washing, golfing†¦perhaps driving, following, watching, getting the hang of, getting, cutting, executing, digging†¦burying†¦none of that is ordinary, so I’ve been told. My mind†¦my mind is stirred up and everything I can hear is my mom crying†¦crying attempting to persuade herself that she didn’t recognize what was happening. I need to see my dad, however I’m not permitted. As though anything he could state would impact me more than he has done as of now; there’s nothing they can say presently to cause me to admit, to talk an awful word about my dad. I am his†¦forever his†¦but he will never be mine. The most effective method to refer to Monolog of a Serial Killer, Papers

Friday, August 21, 2020

How to Write Your Dissertation?

How to Write Your Dissertation?Do you need help with dissertation writing? Most people assume that it is not a very complicated task. In fact, when most of the hard work is done and the words are on paper, most people do not really understand the process of dissertation writing, but it is not very difficult at all.Getting the subject of the research paper is the easiest part of the whole process, but how it is written is definitely the most important and that is the person's mind. People are naturally inclined to choose words that they know well and words that they are comfortable with. Not only this, there are various sources of information available in the internet that can help dissertation writers for different types of papers. This will surely help them to write their essay or dissertation without any kind of difficulty. The first thing that should be done is to research on the subject and find out what kind of information is required.From there, it becomes easy and the simplest method is to use Google to look for information on the topic and get it from any of the reliable sources available online. Reading up on various websites and articles are highly recommended because it will help you to obtain an insight on the topic, thus increasing your knowledge of the topic. You may have to buy the reference books or even register for the internet or learn other methods to make yourself familiar with the subject or the topic.The research paper is really vital to your career because not only do you write it in order to earn a degree, but this will also provide you with some experience and help you gain some extra knowledge on the topic. This will enable you to provide all the necessary information to the reader while it is written in a perfect manner.There are many different types of research papers and some of them may take a long time in the entire process. If you want to finish the process in a short period of time, then you may hire an experienced dissertation writer who will help you with the process of writing. However, before going for it, it is essential that you ensure that the person whom you hire has some experience as he will be handling the same.The dissertation writers are individuals who know how to communicate well and can express his or her thoughts without having to go through any kind of difficulties. It is the duty of the student to ensure that the research papers are well researched and written in an accurate manner so that the material written is relevant to the topic that has been researched. He or she should also ensure that there is no unnecessary use of personal opinions on the material that has been written.They should be able to provide answers to the questions and queries on the material and should answer the same completely. They should be able to complete the entire process without any problems.Since there are various people who will be helping you with this job, it is necessary that you are able to identify th e right person for the job. One should always go for a fresh start when it comes to writing the dissertation. It is also better if the writer is from the same university and at the same time, it is best if the dissertation is related to the chosen topic of study.

Thursday, May 14, 2020

The Conflict Resolution Of Sri Lanka - 1374 Words

The occurrence of conflict is an issue that societies have faced since the genesis of human beings. Take, for example, the country of Sri Lanka. For years, Sri Lanka has been torn apart by the conflict between the Buddhist Sinhalese, who constitute the majority of the population, and the Hindu Tamil, who are the minority of the population. The country gained independence from the European rule in 1948. Since then, the country became a symbol of economic prosperity, political stability and harmony, particularly amongst third world countries (Peace Direct 2015). However, this glory was short-lived as the prevalent tensions between the two ethnic groups tore the country apart. The country has endured over three decades of political unrest, armed conflict and societal disruption accrued to this conflict (Peace Direct 2015). Sri Lanka is but an example of the many disastrous impacts of conflicts within the society. The devastating and often recurring consequences of conflicts have resulte d in the formulation of several theories regarding conflict resolution. Researchers have often sought to identify the cause of conflict in the society. As a result, there are several theories set up to address the emergence of conflict and thus provide effective solutions on reconciliation. According to Kriesberg and Dayton, a societal conflict such as revolutions, civil rights and struggles, arise when two groups in the society are driven by the belief that they have incompatible objectivesShow MoreRelatedSri Lanka Conflict Resolution Case Study1660 Words   |  7 PagesIntroduction The conflicts that plagued Sri Lanka for twenty-seven years of civil war can be traced back to the time when the country was decolonized by Britain. Although the conflict in Sri Lanka is ethnic in essence, the evolution of the conflict over that extended period of time added layers of grievances that resulted in intractability. This paper will try to identify some of the most important sources of conflict before and during the civil war in Sri Lanka. These sources will then be definedRead MoreViolent History and The Future of Sri Lanka Essay examples1681 Words   |  7 PagesAfter decades of civil war, Sri Lanka is a war torn nation on a path for rebuilding and establishing itself on the world stage. Senior Enlisted leaders should be familiar with Sri Lanka, because of the diplomatic, military, and economic relationship Sri Lanka has with the United States. This paper will discuss the background, government, strategic importance, and the future direction of Sri Lanka. Background The country of Sri Lanka is located in Southern Asia 18 nautical miles to the south eastRead MoreSri Lanka s Struggle For Freedom For The Victims Of The War1539 Words   |  7 PagesSri Lanka failed to give justice and freedom for the victims of the war. One of the most lasting ethnic conflicts took place in Sri Lanka. The civil war lasted for around 27 years, which finally concluded in 2009. In Sri Lanka, 74% consists of Singhalese and 26% consists of Tamils. Even though the war was declared to be over in 2009, there are still on-going conflicts. From the time Sri Lanka gained its independence, which was in 1848, the Sinhalese population were in power. Successive SinhaleseRead MoreThe Conflict Between Tamils And Sinhalese953 Words   |  4 Pagesof all. Sarvodaya is a grassroots organization that starts with the individual, the village, the nation, and hopes to affect the world. This essay will analyze the conflict between Tamils and Sinhalese and how Sarvodaya actively works to affect positive change. First the essay will map out the conflict through the use of the Conflict Wheel, and then critically analyze it, followed by a reflective analysis for future practice. Next, the perspectives, emotions, and world view of each party is analyzedRead MoreSri Lankas Continual Civil War962 Words   |  4 PagesSri Lanka’s Continual Civil War The ethnic tension between Sri Lanka’s majority and minority populations, the Sinhalese who are mostly Buddhists being the majority and the minority being mostly Hindu and are called Tamil, has been going on for many of years. Finally in 1983 the ethnic tensions finally spilled over into civil war. The civil war has been mostly between the government of Sri Lanka and the militant organization called the Liberation Tigers of Tamil Eelam. The LTTE are fighting forRead MoreTheories Of Change For Peacebuilding Differ With Equity, Institutional Development And Public Attitudes Theory807 Words   |  4 Pageschange in general help conflict mediators with understanding personal assumptions, assuring actions align with the intended goal, and identify opportunities for change (Church and Rogers n.d.). Sarvodaya already implements the Grassroots Mobilization Theory and the Economics theory, but in places like Kabithigollawa conflict between Tamils and Sinhalese is still prevalent. Sarvodaya should implement the following three theories of change to inform future conflict resolution processes: The healthyRead MoreIndia’s Territorial and Non-Territorial Disputes in her Neighbuorhood List of India’s3400 Words   |  14 PagesIndia-Pakistan Territorial And Non-Territorial Disputes a. Kashmir problem b. Siachen issue c. Sir creek crisis 3. India-Bangladesh Disputes a. Border enclaves dispute b. New Moore/ South Talpatty/ Purbasha island c. River water dispute 4. India-Sri Lanka Maritime Dispute a. Khachatheevu Island 5. India-Nepal Border Dispute a. Kalapani dispute Territorial Dispute with China Introduction China is India’s largest neighbour with about 2000 km shared land border. At present, a land area of aboutRead MoreSaarc Failure Reasons1722 Words   |  7 Pages FAILURE REASON OF SAARC Introduction    1. SAARC (South Asian Association for Regional Cooperation) was stablished on 8th December,1985 by seven countries of Asia named as Pakistan, Bhutan, Bangladesh, Maldives, India, and Sri Lanka, while Afghanistan joined this association later in 2007. The headquarters of SAARC are Katmandu and Nepal. Initially SAARC was established to retreat and up hold the peace in the south Asia region and create the opportunities of interaction between member countriesRead MoreUnderstanding Conflict and Violence Essay example2908 Words   |  12 PagesConflict as a socio-political phenomenon is inherent in any society. He is one of the manifestations of the political process, method of resolving its contradictions. The important role of conflict marked already the ancients who asserted that the source of the movement of all things lies in the formation of opposites and their struggle. Conflict as a social phenomenon was first studied in the writings of Georg Simmel, G. Hegel, Marx, A. Smith, A. Tocqueville. Isolation of political conflicts inRead MoreThe Impact Of Theravada Buddhism On Myanmar1288 Words   |  6 PagesTheravada Buddhism is one of two major sects of Buddhism and is practiced primarily in Southeast Asia. Its practice began in Sri Lanka and spread to Laos, Myanmar, and Cambodia, and has influence in the West today. In the eleventh century C.E., King Anawratha established The Myanmas kingdom, it was at this time that he converted to Theravada Buddhism, despite a large Tantric Buddhist population in the kingdom. From then on, Myanmar has been known as a Theravada Buddhist country. As with most religions

Wednesday, May 6, 2020

Human Trafficking Searching for a Solution - 1437 Words

Thailand is very well known for its high proportion of human trafficking. The men and woman are constantly sold for their resources. Labor and prostitution are the most common cases. In Thailand there has been an uprising of human trafficking on the fishing boats or trawlers. On the trawlers many men are forced to work without pay under the impression that they owe money. The men come from neighboring countries of Cambodia and Burma. Among many boats, abuse is a normal practice to keep the men detained and to continue forcing them to work. There are many issues surrounding the human trafficking on trawlers, but with the issues there are solutions and restrictions to the forced labor of the men on these boats. Thailand’s labor protection†¦show more content†¦This example displays the treatment of human trafficking as not a high importance of the Thailand’s government where Tomasi argues it needs to be. The laws are endorsed to be strict because there are many i mmigrants that agree to migrate in the search of work, where factory owners assure that they have a job for them. Factory owners then move these men around until they are told and tricked into believing they owe a large amount of money and are then put to work on these ships as illegal workers. If the government can stop the illegal immigrants then they might be able to decrease the amount of men trafficked on these boats. To improve human trafficking and decrease the immigrated men, the neighboring nations need to work together to improve laws and economic growth. The economic growth of a country is important to preventing or causing a decrease in the trafficking of men into labor. If the country becomes more prosperous this can open up more opportunities of employment. When the opportunity for employment increases, fewer men will migrate to look for job opportunities. When the needs for a job are met they do not need to migrate, as the migrated men are the ones that become tricked and sold to the trawlers. In Blacktown’s (2013) article it is stated that, â€Å"2 million Burmese migrants have come to Thailand in search of better paid work†. Increasing the job opportunities in Burma can lower the migrants of Burmese people. If we canShow MoreRelatedThe Problem Of Human Trafficking1080 Words   |  5 Pageshonestly did not want to think about it but the due date was inevitable. The thoug ht of writing my essay was frightening enough but deciding on a topic and searching for sources was a completely different story. After a few sleepless nights, I finally decided on my topic, human trafficking. I chose this topic because I believe human trafficking is a problem not only in America but worldwide and needs to be taken seriously. My strong dislike for research papers is not something to hide but I am hopingRead MoreHuman Trafficking : An Illegal Movement Of People1396 Words   |  6 Pagesheadline will be news of a loved one. It reaches a point where everything feels as if it has collapsed inside and there is no fix. Human trafficking is one out of many of those issues, but with the help of those who feel lost and weak because of it, we can try to scare off any further occurrences by taking action and battling the figurative evil in this world. Human trafficking is defined as an illegal movement of people for purposes of forced labor and commercial sexual exploration. It began in the earlyRead MoreThe Topic Of Sex Trafficking1518 Words   |  7 Pagesabout the topic of sex trafficking. My research process involved searching for information on sex trafficking and also human trafficking as a whole. I investigated a great deal of different sources and used many websites of organizations dedicated to spreading awareness on sex trafficking and working toward hindering it. I also researched using non-fiction books regarding sex trafficking, including works sharing the experiences of real victims and survivors of trafficking. A common frustration thatRead MoreHuman Trafficking : An Effective Solution1260 Words   |  6 Pages it. Human trafficking can play a deviating role on both the victim and their family. I want to inform you about the circumstances and the pain caused by human trafficking. Human trafficking is a broad issue and focuses on many areas of abuse and power over another human being. In order for me to inform you more about human trafficking and how to put a stop to it, (1) I need to inform the audience why these acts are done. I can show you how and why other humans do this to one another. (2) I wantRead MoreHuman Trafficking : The Issue Around The Globe1532 Words   |  7 Pagesbeing used in human trafficking. Human trafficking is a topic that too many in society ignore, and it is arguably that ignorance that serves as a bigger conundrum than the topic itself. Human trafficking, also known as slavery, is when humans are sold to the highest bidder at an auction or used in businesses as slaves, and all too often these slaves are used for sexual purposes. Roughly 79% of slaves are sexually exploited according to The United Nations Protocol against Trafficking in Persons. DictionaryRead MoreLove Bomb : The Musical, Produced By Donna Spencer And Directed By Renee Iaci926 Words   |  4 Pagesfollows: A concert of emotion rips through Justine’s (played by Sara Vickruck) first performance in years, and all because of one uninvited guest, Lillian (played by Deb Pickman), her music takes on a life of its own. Lillian is a desperate mother searching for her missing daughter while Justine is hiding a secret that could kill her career. As the musical’s storyline developed further, it was clear that a sensitive topic was the underlying issue: Prostitution. In the production, Lillian comes to discoverRead MoreThe Need Of Organ Transplants Essay1530 Words   |  7 PagesMedical Ethics) The United States is not the only nation plagued with such long waiting lists. The problem of having a shortage of organs needed for transplants has taken its toll throughout the entire world. This global issue is in need of a solution. How do we reduce the numbers of patients awaiting organ transplants? Also, at what cost are people willing to pay for an organ that is so desperately needed? Kidney transplants are the fastest growing surgical procedure that the world is in needRead MoreTighter Border Restrictions Will Reduce Illegal Immigration Essay1677 Words   |  7 Pageslife. However, time and time again, that idea is proven to be at least partially false. Drug trafficking, a serious and growing problem in the U.S.A., is tied to illegal immigration. An estimated twenty- seven percent of immigrants have come to participate in the buying and selling of many unlawful drugs that takes place in our nation (Clark â€Å"Illegal Aliensâ€Å"). Along with drug trafficking, people carrying illnesses and various disease agents, which are normally stopped by properRead MoreSex Trafficking And Eastern Europe2063 Words   |  9 Pages Sex Trafficking in Eastern Europe â€Å"Trafficking in human beings is all around us, closer than we think† as stated by EU Affairs Commissioner Cecilia Malmstrom (Chappel 1). Sex trafficking is a form of modern- day slavery, in which women and children are forced into an industry that degrades and dehumanizes these victims, reducing them into objects used for sexual exploitation. Sex trafficking is a term than encpompasses many froms of sexual abuse; such as commercial sex work, forced sexual favorsRead MoreThe Underground Economy Concerning The Illicit Sales Of Organ Retrieval Services Essay1658 Words   |  7 Pagesselling of organs for money, which never in a million years will equal to human life. The game is to prey on the weak and poor by alluring those that sacrifice organs, an illusion of promises, perks or monies are the tactics used. When a person is preyed upon because of financial status or poverty struck, then the attraction is far greater for the seeker and the challenge is to retrieve the o rgan at any cost. What’s the solution for poverty stricken people who decide to sell, trade, or donate organs

Tuesday, May 5, 2020

United Leadership model Boss Subordinate Relationship

Question: Discuss about the United Leadership model for Boss Subordinate Relationship. Answer: Introduction In the current century, effective management of human resources in any organization is vital to the success of the organization. Undoubtedly, human resources serve as one of the most vital resources that plays an indispensable role in the success of an organization. However, management of human resources has posed a hydra-headed dilemma to the management of most organization because of the complexity of managing people from different cultures, attitude, skills and experience, motivations, goals and objectives, and different levels of education. Although there exist an array of leadership models that serve to provide a guideline for the management of human resources, none of the models is without its drawbacks owing to the areas of departure that exist between different organizations, environment, and the people themselves. It is undeniable that the world has evolved to a new corporate village characterized by globalization and cross-culture working. As such, it has become necessary t o revise the traditional leadership models to reflect the current developments in the corporate world. The essay seeks to provide a succinct summary of a personal leadership model and how it would fit in an organizational set-up. Research have established that the main source of conflict and resistance among employee to change implementation stem from the lack of involvement of employees in decision-making (Yukl, 2012, p. 3). Consequently, the employee feel looked down to and undervalued and may turn hostile against the organization. As a leader, I would involve the employees in the decision-making at different levels to solve this problem. However, its undeniable that there exist some decisions which should be privy to the top management and employees should have no access to such information. Therefore, the inescapable conclusion at this point drawn from the psychological nature of employees would be to make such decisions in the absence of the employees; however, this would assure the organization of failure caused by employee resistance (Peng, 2012, p. 6). It is at this critical point that I would adopt the popular leadership model by direct involving the employees in medium level and operational decision s and partial involvement of employees in major and strategic decisions. Main organizational ideas in democratic leadership As a leader adopting a democratic leadership model, I would prefer working in a manufacturing company in which every employee is allocated a specific duty in a specific department such that he/she is accountable to the departmental head in that department . Further, in this system, one employee or a group of employees should be responsible for a specific level/stage of product processing. I would leave employees to make certain decisions on matters affecting them. I would delegate authority to make decisions such as when to break for a rest to the employees but not without oversight. After making the decisions, the employees should communicate the decision to me for the final approval. If I fails to agree on the employees decision, I would negotiate with the employees and reach a unanimous agreement. According to the human behavioral theory, though the decision I leave in the hands of the employees involve minor issues, the employees would have a feeling of belonging and feel self-actualized (Grint, 2000, p. 12). The leadership model would further encourage a good interpersonal relationship between the management and the subordinates. The leadership model would serve to eliminate the boss-subordinate relationship and create a team member relationship between the senior management and the junior employees. Important traits and skills of an effective leader As Adair (1973, p. 52) argues, to some extent the capacity to effectively lead is innate. However, we cannot overlook the fact that being a more effective leader lies within ones grasp. Given the difference in culture, age, tastes and preferences, levels of education, and economic background just to mention a few factors, I believe that the most fundamental trait of an effective leader include; The ability to respect and understand the employees. As it is often said, respect and understanding serve as the pillars of humankind. Integrity in leading the employees (Gronn, 1995, p.26). Excellent communication skills- Various studies have established that famous and effective leaders possess excellent communication skills which immensely assist them, particularly when negotiating with employees or external parties such as the suppliers on behalf of the organization. Self-confidence and positive attitude. Self-assessment- Bergmann et.al, (1999, p. 87) argues that effective leaders periodically stop to conduct a self-assessment. The constantly stop to take stock of their dire weaknesses and strengths. Such an act allows the manager to establish which duties to delegate and which to handle himself (Burns, 1978, p. 60). Core values that my model of leadership (democratic leadership) would emphasis on Teamwork among the employees. Innovation and creativity in finding suitable solutions to the problems affecting the organization. Integrity and honesty Prudence Passion and enthusiasm to instill a feeling of self-confidence in the employees. Such a value would assist the employees in building their dreams and using their current experience as a touchstone for more prosperity in their career (Bass, 1990, p. 76). Good interpersonal relationship between the management and the subordinates. What the leadership model practiced in united leadership is seeking to achieve United leadership model primarily seeks to create a sense of belonging to the employees. By leaving some operational decisions in the hands of the employees (but not without oversight). According to behavioral theory, the fact serves to increase job satisfaction and self-actualize the employees. The model further seeks to create teamwork and improve the interpersonal relationship among the employees to boost the organizations performance. As Blake and Mouton (1964, p.117) argues, such a model would motivate the employees to engage not only their mind but also their heart and soul for the benefit of the organization Benefits of united leadership to the organization As a result of involving the subordinates in the day-to-day management of the organization, the latter would benefit immensely in several ways. It would create a feeling of value in the associates; consequently, they would raise their level of commitment, effort, and dedication to meet organizational objectives. It would enable the employee improve their analytical skills and make better day-to-day decisions as well as create a strong bond of responsibility in decision making. By delegating some of the decision to the subordinates, I would free up myself to focus on major issues affecting the organization (Belbin, 1993, p. 209). Organizational culture that would exist in united leadership The leadership model would create an adhocracy oriented culture given its core value of innovation and creativity. The adhocracy oriented culture appeals to entrepreneurship and creativity (James and Posner, 1987, p. 31) to solving the problems facing the organization in a manner that assists achieving organizational objectives. Differences between the united leadership model and other leadership models Unlike the old school models that merely involved employees in decision making, united leadership model seeks to assign specific decision-making authority to the employees. However, owing to the limited skills of the employees and lack of proper expertise, the model advocates for oversight of the employees decisions. As such, employees would develop decision-making skills and find innovative ways of solving the problems facing the organization. Further, unlike in other leadership models where a boss-subordinate relationship exists, united leadership model advocates for team players leadership where the subordinates feel they play a special role in the management of the firm. They further feel they can negotiate with the management of the issues affecting them. How to personally implement the united leadership model To implement the leadership model I would create a work environment in which the employees share a meeting of joint decision making with the senior management particularly the departmental heads. I would delegate some of the decision-making authority to my subordinates and leave them to discuss and reach a decision after which the former I would review the decision and either approve it or engage the subordinates in a discussion to adjust the decision to reflect organizational goals. As Rowe (2007, p. 37) notes, such an act would serve to boost the subordinates confidence and create an air of trust between the management and the subordinates. Conclusion Human resource serves as one of the main determinants of organizational success. As such, they must be handled with due care and alertness owing to their sensitivity. However, managing/leading people is inarguably one of the most complex processes and no qualities, standards, or values of leadership can perfectly reflect the nature of leadership that would make one organization successful and another unsuccessful. Therefore, an effective leader should adapt his managerial and leadership skills to suit both the nature of the organization and the nature of the situation. Leadership primarily seeks to generate goodwill among the employees such that they can willingly work with a lot of commitment with little or no supervision. Such employees are often highly motivated, committed, focused, and have a sense and feeling of belonging. They feel they are working for their greater advantage and not to solely benefit the organization. Given these crucial facts, a leader must exploit all method s that would serve to boost the employee's morale and self-drive. One of the main methods to do so is by involving them in decision-making process especially on the issues affecting them. References Adair, J., 1973. Action-Centered Leadership. New York: McGraw-Hill. Belbin, R. M., 1993. Team Roles at Work. Oxford: Butterworth-Heinemann. Bergmann, H., Hurson, K. and Russ-Eft, D., 1999. Everyone a Leader: A grassroots model for the new workplace. New York: John Wiley and Sons. Blake, R.R., and Mouton, j. S., 1964. The managerial grid. Houston TX: Gulf. Burns, J. M., 1978. Leadership. New York: Harper Row. Grint, K. C., 2000. Literature Review on Leadership. Cabinet Office: Performance and Innovation Unit. Gronn, P., 1995. Greatness Re-visited: The current obsession with transformational leadership. Leading and Managing 1(1), 14-27. James, M.K., and Posner, B.Z., 1987. The Leadership Challenge. San Francisco: Jossey-Bass. Peng, A.C., 2012. Embedding ethical leadership within and across organization levels.Academy of Management Journal,55(5), pp.1053-1078. Rowe, W. G., 2007. Cases in Leadership. Thousand Oaks, CA: Sage Publications Bass, B., 1990. From transactional to transformational leadership: learning to share the vision. Organizational Dynamics, 18, (3), winter, 1990, 19-31. Yukl, G. A, 2012. Effective leadership behavior: What we know and what questions need more attention.The Academy of Management Perspectives, 26(4), pp.66-85.

Tuesday, April 7, 2020

Web Advertising Essays - Marketing, Digital Technology,

Web Advertising annon Web advertising, not to mention the Internet itself, finds itself in a stage of relative infancy and therefore provides marketers with novel challenges and situations which need to be dealt with caution . The realm of Web advertising is unchartered terri tory! In terms of South Africa, the country finds itsef somewhat behind technologically. However, this may not prove to be a disadvantage as the uncertain nature of Web advertising may make a policy of 'watching and learning' most viable. What implications will this new technology have for marketing? What is the nature of Web advertising? How can a business use the medium effectively? Where is all this going ? These questions appear to be most pertinent in the process of understanding interact ive marketing on the Internet. The qualified opinion of John Matthee, a Web site designer employed by Adept Internet (an Internet service provider), was sought in accumulation of a large sum of the following data. This seems appropriate as the novelty of Web advertising at this stage h as led to generral lack of academic data in the practicalities of advertising via this medium. 2) THE INTERNET: AN INTRODUCTION 2.1) Original development of the Internet What was originally created by the US military to provide a secure means of communication in case of nuclear war, which has now become known as the Internet, has metamorphosed into the strategic global communications tool of our era. The end of the cold w ar left this massive installed structure - initially dubbed ARPANET- without much of a purpose. Soon universities, major corporations and governments began to piggyback on to the global framework, extending its reach and commercialising it. Known as the N et to aficionados, the Availability of cheap, accessible and easy-to-use Net access points throughout the world has seen the number of global Internet users increase dramatically each month. While the convenience of electronic mail was initial catalyst for Internet growth world wide, it's the emergence of the World Wide Web (WWW) multimedia interface that has captured the attention of prospective users across the globe. The resources available on the WWW are as varied as they are extensive. There hundreds of thousands of sites which can be broadly categorised under topics such as sport, entertainment, finance and many more (Perlman, 1996). 2.2) Development of Internet in South Africa Perlman (1996, p 29) ventured that 'South Africa is major global Internet player. It currently rates in the top 15 in the world terms of Internet growth rates.' Local user numbers are certainly fueled by universities, companies and schools. The genesis of South Africa's rapid Internet growth seems to stem from UniNet, the Internet service offered to the countries major tertiary institutions and steered from Rhod es University. This explains the phenomenon whereby the majority of local Internet entrepreneurs - many of them are under thirty and already multi-millionaires - come from tertiary education backgrounds where they were weaned on readily available Internet access. Popular 'browser' client software for navigating the multimedia WWW includes Netscape and Microsoft Internet Explorer. On the other end, there exist approximately 30 local companies which call themselves ISP's (Internet Service Providers), which operate in similar fashion to a cellular company such as Vodacom, providing either dial-up connections to the Internet and/or leased line connectivity to companies. This has led to the explosion of a number of related ventures, such as companies who speci alise in producing multimedia web pages (such as Adept Internet), Internet commerce, cable companies and modem suppliers (Perlman, 1996). 2.3) Technological Implications for Marketing Joseph (1996, p. 29) concisely described the situation as such: ' Marketing, like most business disciplines, is undergoing a period of change as a direct result of the information revolution. The rapidly declining costs of and increasing power of information processing technology is altering the in which customers and businesses relate to each other. Marketers, however should be cautious not to attempt a quantum leap from more traditional meth ods as this is sure to bring issues such as lack expertise to the fore which could prove disastrous (Steyn, 1996). Essentially, the point is that as a marketing drive, the additional services supplied by technology provides the marketer with the opportunity to gain an edge in the race to win the consumer. More and more, new technology appears to be focusing on the add ition of value. On an individual level, for example, the marketer may use the technology to make himself more accessible to the consumer thus adding to his service levels. A company may realise added value by investing in expensive multimedia kiosks

Monday, March 9, 2020

The Charge Of The Light Brigade and Exposure Poem Essays

The Charge Of The Light Brigade and Exposure Poem Essays The Charge Of The Light Brigade and Exposure Poem Paper The Charge Of The Light Brigade and Exposure Poem Paper Essay Topic: Literature A more experienced poet known as Alfred Lord Tennyson wrote the Charge Of The Light Brigade. He was born in 1809 and died of old age in 1892. He wrote The Charge Of The Light Brigade in response to a Newspaper Report from the Times, which was written by W. H. Russel, so his understanding of the war was from second hand knowledge, he was removed from the action. Unlike Wilfred Owen, who wrote Exposure. Owen was born in 1893 and died at a very young age in 1918. The reason for his young death was, he was a participant in the war and died during battle, so his was writing from his own experiences. Although Owen was a less experienced writer, his poems only really became known after his death, as he had a less authorative voice. The main similarities between the two poems is that they are both writing about wars, however both wars are from a different time and so are fought in completely different ways. Tennyson wrote The Charge Of The Light Brigade about the Crimean war, which was originally between France and Russia but Britain joined because she worried about her security. The Crimean war was fought on horseback, which meant that it would be over fairly quickly. I think this because it would have been one charge, this battle would then have gone on until all the soldiers in one side were injured or dead. He was very far removed from the action, as he didnt even witness the war, so his poem written is third hand. Where as Owen wrote Exposure from first hand experience. For these reasons I may be able to place more value on Wilfred Owens poem. The First World War was fought over several years and the soldiers spent a lot of that time in trenches. The mood, tone and language in each poem are completely different from the other. In The Charge Of The Light Brigade the mood is very light and gives the feeling that all the soldiers, were excited about what they were doing. This is helped by the fact that Tennyson doesnt go into the atrocities of the war, instead writing of When horse and hero fell. Here he is basically saying that they have been shot down, but the way Tennyson puts it, its like its not that dramatic, when it is. In The Charge Of The Light Brigade it doesnt really distinguish those soldiers that died in battle and those that lived, Then they rode back, but not the six hundred. This is what I think plays a big part in making the mood of the poem so light, as it avoids death, which is upsetting. Where as in Exposure the mood is very depressing and dismal as Owen is constantly saying how the soldiers were being attacked in different ways. He mentions the weather attacking them, which can be seen from in the merciless iced winds that knive us. As well as things like the barbed wire in front of the enemies trenches, Like twitching agonies of men amongst its brambles. However the poem doesnt mention soldiers attacking them, which may indicate that the weather and other things were more threatening and chilling, then the enemy. In Exposure Owen speaks of the soldiers pain and this is what I think makes the poem so disheartening to read, because he is trying to show how war causes suffering and reduces the soldiers. Unlike Tennyson who is trying to honour and glorify the soldiers and so making the poem seem more pleasant. However in some ways the poems are similar as the language used indicates that poets generalise and universalise all the men in the war. The Charge Of The Light Brigade is a lot more structured then Exposure. This is because in Tennysons poem he talks about the different stages of the battle, where as Owen doesnt really mention battle, its more about the soldiers suffering. In The Charge Of The Light Brigade Tennyson goes through each stage of the battle, within each individual stanza. So in the first stanza the soldiers have been ordered to start their charge. The second stanza is quite an important part of the poem, as we discover that the soldiers had been given the wrong order. However because they are so disciplined and loyal to their country, no one questions it. Tennyson is trying to glorify and honour the soldiers so he simply says, Not though soldiers knew, someone had blundered. In the third stanza the soldiers are in range of the enemys guns and in stanza four, the soldiers are forced to turn back because so many men have been killed. Even though at this point the British soldiers are being defeated Tennyson emphasises their bravery. That takes the readers attention off the fact that they are losing so badly. An example of this is, Sabring the gunners there. The word sabring has been used very cleverly as it gives the reader the impression that the British soldiers were hacking away at the Russians, because Tennyson was writing the poem to honour The Light Brigade. In stanza five the British soldiers are still not out of danger despite turning back, as more Russians have come in behind them, so even more soldiers get killed. Stanza six is simply Tennyson reflecting on their bravery. In Exposure there isnt such an obvious structure. In stanza one Owen talks about the soldiers being attacked by the weather and in stanza two they are being attacked by the enemys barbed wire and it goes on like this. The weather is continually being described in different ways, one very effective way is when Owen uses alliteration, Dawn massing in the East her melancholy army. There is no real progression to the poem because it mirrors what is going on in the war, as they are stuck in trenches. The rhythm in each poem is completely different form the other. The Charge Of The Light Brigade has a very lively and energetic feel to it, this is due to its incredibly fast pace. In contrast Exposure has a very slow rhythm like the progress of the war. However in the third stanza there is a change in pace and it picks up just a little bit. This is due to the rhythm sounding like the bullets being described in the stanza, Sudden successive bullets streak the silence like the shells being shot in The Charge Of The Light Brigade. But the pace returns to its gloomy rhythm in the next stanza. In The charge Of The Light Brigade the rhythm of the poem sounds very much like the rhythm the galloping horses would make, this can be seen from Half a league, half a league onward, all in the valley of death rode the six hundred. I also think that the discipline of the British soldiers shows in the discipline of the rhythm. Each poem gives a completely different image of war, because they were written for different purposes and from different points of view. In The Charge Of The Light Brigade Tennyson uses a lot of similes and metaphors to create tension in the poem. He also uses similes to give the reader a better image of the battle and to show how heroic the soldiers were. Where as in Exposure Owen uses similes and metaphors to show how much the soldiers around him have been reduced, and the only thing they have to keep them going is happy memories. In The Charge Of The Light Brigade the first noticeable and most repeated image is All in the valley of death. I think that Tennyson choose to describe the charge like this because death is a very moving word. The word all unites the soldiers and due to the image of the extreme danger, given by the word death, shows the soldiers bravery, it also gives the idea of a big sacrifice. Not only do we get the feeling of danger, but Tennyson also discreetly describes sounds, through the use of onomatopoeia, Volleyed and thundered. I think that this is really clever, as it adds realism to the poem. When Tennyson uses alliteration, the words he uses sound like the hissing of the artillery on the battlefield. An example of this is Stormed at with shot and shell. Tennyson uses euphemism to describe the British soldiers killing the enemy; he uses words like flashed and sabring. The British soldiers are basically killing people, but the way Tennyson describes it, its as if they are doing it elegantly and almost gracefully. All of these images give the main picture that the war was glorious. The reason we get this image of the war is because Tennyson hides the realities behind euphemism, unlike Owen who shows the war for what it really is. Right from the first word our we immediately know that it has been written from the point of view of the narrator. Owen gives a very chilling image to the war because he has experienced it, he can say what he has seen and felt. The use of personification shows how the soldiers looked on the outside: Attacks once more in ranks, on ranks of shivering grey. Here Owen is talking about the weather attacking the soldiers, because the soldiers looked so grey and dull. Owen also adds shivering to the sentence, which could show that not only were they shivering because they were cold, but because they feel cold in their hearts like theyve been forgotten. Owen uses alliteration to emphasise that the men have no luxuries, unlike Tennyson who used alliteration to show the excitement of the war. In Exposure the uses of alliteration gives the reader the image that its as if the weather is trying to find them to put them through more distress, this can be seen from Pale flakes with fingering stealth come feeling for our faces. However I think Owen saves the most moving image for the end, unlike Tennyson who reflects on the heroism of the men during the battle, Owen shows just how terrible it is. In the final stanza Owen creates a very strong image, Pause over half-known faces. All their eyes are iced. To begin with it seems as though Owen is talking about the dead soldiers eyes being iced, because they are dead, but he is also talking about all the soldiers who are still alive and have to look at them. Owen is saying that in order to cope with what the soldiers have to face out in the trenches their eyes have also iced over, as they have no feeling any more. In Exposure we get the impression that it is probably easier to be dead, as you have gone to a better place and the pain and suffering stops, as soon as your spirit leaves your body. When I read Charge Of The Light Brigade I didnt feel very much inside, because the images that were given through the use of personification and other things were glorious. In Exposure the image seemed very real, because the poet was really writing from the heart and it made me feel quiet and lonely inside. Exposure and The Charge Of The Light Brigade both use repetition to show the reader that there have been casualties in the war. In The Charge Of The light Brigade different words are repeated to highlight different things. To emphasise the courage of the charge Tennyson repeats, Forward, the light brigade and The valley of death, which gives the idea that there is no turning back. In stanza two, three lines begin with their. This is used to show the discipline of the soldiers, that not one of them is questioning the wrong order. At the end of the first three stanzas Tennyson is still repeating, Rode the six hundred, this use of repetition gives the idea that the soldiers are still alive. However the final line of stanza four, Not the six hundred shows that not all the soldiers were going to come back from the valley of death. In stanza five some of the lines from stanza three are repeated, Cannon to the right of them, this gives the idea that even though they are on their way back the danger still surrounds them. At the end of stanza five Tennyson has said, Left of six hundred. He is still repeating six hundred, but has changed the words in front of it, to give the idea that the number of losses was more then the number of survivors. Exposure doesnt have has much repetition in as The Charge Of The Light Brigade, but it too has the majority of its repetition at the end of each stanza. The repetition of But nothing happens in three of the stanzas and the final stanza, give the image that the soldiers are almost waiting to die. The use of repetition in this ways indicates that they feel forgotten, because they have gone out to the trenches to do a job, and they are unable to do that job properly. In stanzas five, six and seven Owen repeats, dying at the end of each stanza. By doing this I get the impression that not only are the soldiers dieing because they are being attacked, but their spirits are dying as well as their love for things, its like they have lost themselves in the strong winds that surround them. So in both poems the use of repetition sums up the casualties of war, in Exposure they are shown in a more harsh way, then in The Charge Of The Light Brigade. Both poems are completely different in the way they portray the war, in that Exposure uses realism and The Charge Of The Light Brigade uses euphemism. The reason for there being such a lot of euphemism in The Charge Of The Light Brigade is because Tennyson wants to praise the soldiers. He also uses euphemism to hide behind the grim realities of life. A very good example of euphemism in the poem is, Sabring the gunners there. It is basically saying that the British soldiers were hacking away and killing the enemy, but it isnt described like that because the aim of Tennysons poem was to honour the soldiers. The word sabring makes the British soldiers sounds elegant and sophisticated, as if they arent doing anything wrong. So in order to honour the Light Brigade Tennyson hides behind euphemism. In contrast Owen uses realism in his poem because he wants to show war for what it really is. In everything he says he is very blunt and relates even the simplest things to every day horrors. By using realism Owen shows the reader that the only thing the soldiers have to keep them going are memories, an example of this is, Slowly our ghosts drag home: glimpsing the sunk fires glozed. This emphasises that the soldiers have no luxuries and how now they take nothing for granted, because they now realise it isnt always going to be there for them. The reason for The Charge Of The light Brigade using euphemism and Exposure using realism, is because each writer is trying to give a different image of the war, for different reasons using these methods. In conclusion both poems appear to be very similar when I first looked at them, however the only thing they have in common is that they are both about wars. The reason they only have this in common is for two reasons. The first reason is that both wars were completely different types of wars. The second reason and the most important, is that the writers show different attitudes towards war. In Charge Of The Light Brigade Tennyson wrote the poem to honour and glorify the soldiers that fought in the war. So the way he presents the poem, its as if Tennyson is saying that war is good thing to part of. I think the other reason for him putting such a positive image on the war was because he didnt fight in it, therefore there are no feelings included in his poem. So because Tennyson approves of the soldiers loyalty there are no signs of irony. Where as in Exposure Owen, who fought in the war, is able to include feelings. Due to having such a horrible time in the trenches, these feelings are sad and seem painful, putting war in a completely different light. Unlike Owen, Tennyson believed that no good could come from war, and although Owen is against war Exposure isnt an anti-war poem. However the one attitude that both writers show in their poems, is that you have to fight sometimes to preserve what is good.

Friday, February 21, 2020

Human Nature & Sexuality Essay Example | Topics and Well Written Essays - 1500 words

Human Nature & Sexuality - Essay Example Even though the author clearly stated the differences between the sexuality and reproduction of female animals and human beings in the sense that the human sexuality is free from hormonal dictation4 which is contrary to the case of female animals, discussing the female sexuality and reproduction of the different animal species such as rhesus monkeys, baboons, rats and chimpanzees among others in the book could cause some of the readers to initially think that the author is trying to stress or point out some similarity between the animals and humans by trying to make a comparison between the case of the female animals and human beings in terms of their physical, For instance, the author included in her example that female monkeys are also capable of mounting other monkeys in order for these monkeys to experience orgasm by getting enough stimulation from the other monkeys without the need for copulation.5 Similar to these monkeys, men and women are able to experience sexual orgasm by simply stimulating their genitalia (penis and clitoris) without going through any sexual intercourse.6 Although the author did not directly mention the similar acts of humans with the animals’ sexual behaviour, providing these two examples in her writings is nonverbally suggesting that there is in fact a similarity between the two by nature. The fact that the author discussed some observational explanation on the sexual behaviour of these animals makes the validity of her statement questionable considering the fact that human beings would not accurately know whether or not the female animals are indeed experiencing orgasm such as in the case of some women who tries to fake their orgasm in order to please their husbands or mate.

Wednesday, February 5, 2020

ICE Paper Essay Example | Topics and Well Written Essays - 500 words

ICE Paper - Essay Example ty in Facebook continues to increase after the guarantee that Facebook is on the lookout for security lapses and always striving to enhance privacy controls. The fact that Facebook works with other security experts to ensure that its privacy controls are updated is proof that the company puts the privacy of its users in the forefront. In the article Our Commitment to the Facebook Community, Zuckerberg says, â€Å"We also work with regulators, advocates and experts to inform our privacy practices and policies† (Tow 1). Consequently, Facebook pursues new privacy monitoring standards as reviewed by the industry players. There are also agreements that Facebook participates in which create frameworks on how internet services company ought to approach security concerns in the U.S and other countries around the globe. It shows that Facebook recognizes the need to keep alert as the internet is prone to changes that may make privacy controls at one time outdated. There is a need to lia ise with other industry players and experts so as to identify the privacy loopholes and devise ways to handle them appropriate. In the end, the biggest beneficiaries are the users as their privacy concerns are taken care of. Facebook has the privacy concerns of its users every time. It conducts security and privacy access checks every day to enhance the experience of the users. Zuckerberg asserts, â€Å"We do privacy access checks literally tens of billions of times each day to ensure were enforcing that only the people you want see your content. These privacy principles are written very deeply into our code† (Tow 1). It is the concern of the user that the material he or she posts be only accessible to intended people. There emerge loopholes that hackers explore to access materials that users want to keep private. The privacy checks are meant to identify these loopholes and acts immediately to seal them. Facebook conducts the checks on a daily basis to handle any emerging problems as early as

Tuesday, January 28, 2020

Ipsec implementation

Ipsec implementation There are many methods to IP Security. In the Microsofts Windows 2003 the server version, there are many such techniques and tweaks which are useful to help provide a secure base to the system. The operating system is very good in protecting the system from attacks which may be active attacks or in some cases passive attacks. The procedures for IPSec are placed properly into the system which helps it tackle such attacks. This is possible by providing a secure packet filter for packet transport and also using cryptography. This technology is very in high use for communication types like host to host, router to router, gateway to gateway, site to site and also in virtual private networks. Some other places for successful implementation are secure servers. The IPSec comes as a basic Group Policy controlled by Dos Prompt commands and it also has user interface with custom programs installed. The implementation of IPSec involves these steps: Overview of IPSec Deployment Determining Our Internet Protocol Security targets Preparing a Internet Protocol Security Policy Implementation of the designed policies Overview of IPSec Deployment: There are many techniques such as usage of cryptography and authentication software to secure the communication in a network. The connection may be between two parties or between a group of users. Security is to make sure that the communication is not broken, the communication is not intervened and the data is not altered. The Internet Protocol Security has some features which help running a secure transmission. IPSec has set procedures which help achieve these ends. Today there are many companies and it is getting harder day by day to ensure the security of such humungous networks with a heavy workload on the networks. It is also very hard to track any attacks on the network in millions and millions of request. Using firewalls to protect a network did work for some days but it has proved to be impractical as it has no proper rules to detect intrusions or attacks. The advent of IPSec is a leap in computer and network security. This protocol has a wide spectrum of features which are strong enough to contain such high volume of network requests and also handle intrusions. The Internet Protocol for Security is not a versatile detection protocol. It is capable of managing most of the policies to grant or reject, block and negotiate the traffic in a network. This can also be permitted to a specific set of addresses or in some cases protocol and also a different policy to each port. It is recommended that we use ICF (Internet Connection Firewall) when we are in need of a firewall which is capable of providing a network interface for very big networks. This is because the internet protocol for Security has a very strict and a very stern strategy which is based on static filtering based on IP addresses. But this is it is totally different in the case of the Internet Connection Firewall. The ICF has policies which has a set of filter for all the addresses which are capable of being accessed. The Internet Protocol for Security can be used when the restriction is only to a particular set of addresses or the communication between a group of computers. There are many ways to use IPSec in a network but the best way is bye using a directory with all the domains and also a GP when needed. Some areas of interest when implementing IPSecurity: The decision of where we must secure computers and how on our network which can be done by running a group of systems in a directory which is also called as the Active Directory Organisational Units or OUs. The next step is to determine the strength of the policies we assign. Determining Our Internet Protocol Security targets: The first step in deploying IPSec on our server or the network can be done properly by deciding which set of systems are in dire need of security. There are surely some places on the network which are in a need of higher security than the other sections. It is for sure that IPSec is capable of providing optimal security but the problems starts when the network slows down due to the excessive data to be processed and also a large number of systems for IPSec to follow and maintain. In some cases, there are systems which are not upgraded to be able to support the IPSecurity. Determining Your IPsec Needs In beginning of the protocol design procedure, proper planning should be done to make sure that our current network environment available for use. It is always helpful to have a set of the network topology with all of its hardware and software components. This procedure is of high importance mainly in the designing procedure. IPSecurity is highly vulnerable to a network topology. There are many network topologies in which IPSec is not well suited. Preparing a Internet Protocol Security Policy: As said earlier, there are many network topologies which are not suitable to the default structure of the IPSec policies. There is a need to develop a custom IPSec set of policies well suited for the current network. Some organisations can run their network with a small set of policies. But in companies with a very huge network, there are many policies which are to be implemented properly and also a stringent structure is to be maintained. Steps below shows how IP Sec policies work. Designing IPsec Policies There might be some cases where the company or the organisation is interested in implementing a policy which sets a secure communication between two specified computers. This can be done by restricting all traffic and adding exceptions which relates to these two systems. This method can be done vice versa. A network can be setup with policies to allow all requests and block specific ports or computers. To implement such exceptions, a thorough analysis of the network is clearly needed. Computer roles: Security for Data Transmission: Security needs are different from each and every data packet transmitted. The security policies are also very different. There are many levels in this instance. When considering encryption, there are many types such as AES, DE5, RSA and many more. RSA is the best encryption software available presently. These programs can be used to secure files on transmission, on a network or even in the system. Operating System Computers: IPSecurity is a very unique technique used to implement security in a network. There are many operating systems which are not so advanced to implement IPSec. There is no support for IPSec. But there are many operating systems which are capable of running IPSec in transport mode. Some other cases, the policies are stored locally which makes it easier to decide as the implementation doesnt take long enough. In some cases, IPSec policies are implemented through the Group Policy. General IPSec Policy Settings General IPSec policy settings must be specified whether we want the policy to provide packet filtering or end-to-end networks. IPSec Rules IPSec rules determine which traffic is affected by an IPSec policy and which actions take place when that type of traffic is encountered. Table6.5 describes the contents of IPSec rules that two computers use to establish a secure, authenticated channel. Specifies a named list of filters. Each filter in the filter list specifies the types of traffic to which the filter action is applied. Filters can be defined to match specific IP protocols, source and destination TCP and UDP ports, and source and destination IP addresses. The filter list name might include the version number, the last update time, and the administrative owner. Each computer discards the filter list name during policy processing. Filter action Specifies whether a packet is permitted, blocked, or secured. If packets are to be secured, specifies how they are secured. A list of security methods specifies the security protocol, cryptographic algorithm, and session key regeneration frequency. Request Security Authentication methods One or more authentication methods, which are specified in order of preference. Available options are KerberosV5, certificate, or preshared key. Specifies whether to use tunnel mode and, if so, the tunnels endpoint. Specifies whether the rule applies to LAN connections, remote access connections, or both. Assigning IPSec Policies: As a domain administrator, we can configure IPSec policies to meet the security requirements of a user, group, application, domain, site, or global enterprise from a domain controller. IPSec policy can also be implemented in a non-Windows2000-based domain environment by using local IPSec policies. Deploying Our IPSec Solution: After scoping our needs, building IPSec policies, and determining our strategy for assigning the policies to specific OUs, test the IPSec policies in a lab environment and conduct a pilot project before rolling them out for production use. To ensure that IPSec policy functions as expected and provides the appropriate level of security, test specific IPSec policy configurations on clients and servers in a lab environment, and then conduct pilot or beta tests in a limited operational environment before conducting a full-scale deployment. A Cryptographic Evaluation of IPsec: Even with all the serious critisisms that we have on IPsec, it is probably the best IP security protocol available at the moment. We have looked at other, functionally similar, protocols in the past (including PPTP [SM98, SM99]) in much the same manner as we have looked at IPsec. None of these protocols come anywhere near their target, but the others manage to miss the mark by a wider margin than IPsec. This difference is less significant from a security point of view; there are no points for getting security nearly right. From a marketing point of view, this is important. IPsec is the current best practice, no matter how badly that reects on our ability to create a good security standard. Our main criticism of IPsec is its complexity. IPsec contains too many options and too much exibility; there are often several ways of doing the same or similar things. This is a typical committee efiect. Committees are notorious for adding features, options, and additional exibility to satisfy various factions within the committee. As we all know, this additional complexity and bloat is seriously detrimental to a normal (functional) standard. However, it has a devastating efiect on a security standard. It is instructive to compare this to the approach taken by NIST for the development of AES [NIST97a, NIST97b]. Instead of a committee, NIST organized a contest. Several small groups each created their own proposal, and the process is limited to picking one of them. At the time of writing there has been one stage of elimination, and any one of the five remaining candidates will make a much better standard than any committee could ever have made. The Complexity Trap: Securitys worst enemy is complexity. Complexity of IPsec In our opinion, IPsec is too complex to be secure. The design obviously tries to support many difierent situations with difierent options. We feel very strongly that the resulting system is well beyond the level of complexity that can be analysed or properly implemented with current methodologies. Thus, no IPsec system will achieve the goal of providing a high level of security. IPsec has two modes of operation: transport mode and tunnel mode. There are two protocols: AH and ESP. AH provides authentication, ESP provides authentication, encryption, or both. This creates a lot of extra complexity: two machines that wish to authenticate a packet can use a total of four difierent modes: transport/AH, tunnel/AH, transport/ESP with NULL encryption, and tunnel/ESP with NULL encryption. The difierences between these options, both in functionality and performance, are minor. The documentation also makes it clear that under some circumstances it is envisioned to use two protocols: AH for the authentication and ESP for the encryption. Modes As far as we can determine, the functionality of tunnel mode is a superset of the functionality of transport mode. (From a network point of view, one can view tunnel mode as a special case of transport mode, but from a security point of view this is not the case.) The only advantage that we can see to transport mode is that it results in a somewhat smaller bandwidth overhead. However, the tunnel mode could be extended in a straightforward way with a specialized header-compression scheme that we will explain shortly. This would achieve virtually the same performance as transport mode without introducing an entirely new mode. We therefore recommend that transport mode be eliminated. Recommendation 1 Eliminate transport mode. Without any documented rationale, we do not know why IPsec has two modes. In our opinion it would require a very compelling argument to introduce a second major mode of operation. The extra cost of a second mode (in terms of added complexity and resulting loss of security) is huge, and it certainly should not be introduced without clearly documented reasons. Eliminating transport mode also eliminates the need to separate the machines on the network into the two categories of hosts and security gateways. The main distinction seems to be that security gateways may not use transport mode; without transport mode the distinction is no longer necessary. Protocols The functionality provided by the two protocols overlaps somewhat. AH provides authentication of the payload and the packet header, while ESP provides authentication and confidentiality of the payload. In transport mode, AH provides a stronger authentication than ESP can provide, as it also authenticates the IP header fields. One of the standard modes of operation would seem to be to use both AH and ESP in transport mode. In tunnel mode, ESP provides the same level of authentication (as the payload includes the original IP header), and AH is typically not combined with ESP [KA98c, section 4.5]. (Implementations are not required to support nested tunnels that would allow ESP and AH to both be used in tunnel mode.) One can question why the IP header fields are being authenticated at all. The authentication of the payload proves that it came from someone who knows the proper authentication key. That by itself should provide adequate information. The IP header fields are only used to get the data to the recipient, and should not afiect the interpretation of the packet. There might be a very good reason why the IP header fields need to be authenticated, but until somebody provides that reason the rationale remains unclear to us. The AH protocol [KA98a] authenticates the IP headers of the loour layers. This is a clear violation of the modularization of the protocol stack. It creates all kind of problems, as some header fields change in transit. As a result, the AH protocol needs to be aware of all data formats used at loour layers so that these mutable fields can be avoided. This is a very ugly construction, and one that will create more problems when future extensions to the IP protocol are made that create new fields that the AH protocol is not aware of. Also, as some header fields are not authenticated, the receiving application still cannot rely on the entire packet. To fully understand the authentication provided by AH, an application needs to take into account the same complex IP header parsing rules that AH uses. The complex definition of the functionality that AH provides can easily lead to security-relevant errors. The tunnel/ESP authentication avoids this problem, but uses more bandwidth. The extra bandwidth requirement can be reduced by a simple specialized compression scheme: for some suitably chosen set of IP header fields X, a single bit in the ESP header indicates whether the X fields in the inner IP header are identical to the corresponding fields in the outer header.2 The fields in question are then removed to reduce the payload size. This compression should be applied after computing the authentication but before any encryption. The authentication is thus still computed on the entire original packet. The receiver reconstitutes the original packet using the outer header fields, and verifies the authentication. A suitable choice of the set of header fields X allows tunnel/ESP to achieve virtually the same low message expansion as transport/AH. We conclude that eliminating transport mode allows the elimination of the AH protocol as well, without loss of functionality. We therefore recommend that the AH protocol be eliminated. IPSEC methodology using different operating systems: IPSEC is a framework for security that operates at the Network Layer by extending the IP packet header. This gives it the ability to encrypt any higher layer protocol, including TCP and UDP sessions, so it offers the greatest flexibility of all the existing TCP/IP cryptosystems. While conceptually simple, setting up IPSEC is much more complex that installing SSH, for example. IPSEC also has the disadvantage of requiring operating system support, since most O/S kernels dont allow direct manipulation of IP headers. Linux IPSEC support (the FreeS/WAN project), for example, isnt included in the standard kernel distribution for this reason, and has to be applied as an add-on. Furthermore, putting the cryptography in the kernel isolates it from the application, making it more difficult to code crypto-aware software. Using SSL, for example, simply requires linking a library into the application and allows the application to easily query what certificates have been used to authenticate a client. IPSEC defines a Security Association (SA) as its primitive means of protecting IP packets. An SA is defined by the packets destination IP address and a 32-bit Security Parameter Index (SPI), that functions somewhat like a TCP or UDP port number. SAs can operate in transport mode, where the IPSEC data field begins with upper level packet headers (usually TCP, UDP, or ICMP), or in tunnel mode, where the IPSEC data field begins with an entirely new IP packet header, ala RFC 2003. Furthermore, SAs can be encapsulated within SAs, forming SA bundles, allowing layered IPSEC protection. For example, one SA might protect all traffic through a gateway, while another SA would protect all traffic to a particular host. The packets finally routed across the network would be encapsulated in an SA bundle consisting of both SAs. A common use of IPSEC is the construction of a Virtual Private Network (VPN), where multiple segments of a private network are linked over a public network using encrypted tunnels. This allows applications on the private network to communicate securely without any local cryptographic support, since the VPN routers perform the encryption and decryption. IPSEC is well suited for this environment, more so than tunneling PPP over SSL or SSH, since it operates directly on the IP packets and preserves a one-to-one correspondence between packets inside and outside the network. In the case of tunneling PPP over an encrypted TCP connection, any packet loss in the public network would trigger a TCP retransmission, stalling the link until the packet was delivered. In particular, running Voice Over IP (VoIP) traffic through a TCP/PPP tunnel would largely defeat the RTP protocol used for VoIP; IPSEC is better suited in this case. IPsec Development for Linux: In the Linux IPv4 IPsec world, a lot of people use FreeS/WAN projects implementation. It consists of an inkernel IPsec processing part, Key Exchange daemon Pluto and some utility commands/scripts. To run Pluto with small changes on our IPsec kernel implementation and reduce impact for user who use FreeS/WAN implementation, we have decided to keep compatibility with FreeS/WANs IPsec programming interface between kernel and userland. For this, we use the same PF KEY interface which FreeS/WAN project extended. In kernel IPsec packet processing part, we developed AH, ESP, SAD and SPD from scratch. PF KEY interface PF KEY(v2), which is described in RFC2367, is key management API mainly for IPsec. PF KEY is used for handling the IPsec Security Association Database. Additionally we have to handle the IPsec Security Policy Database, but there is no standard for the IPsec Security Policy management API. In FreeS/WAN implementation, PF KEY interface is extended to manage the IPsec Security Policy Database. Our kernel 2.4 IPsec implementation also uses the same PF KEY interface as FreeS/WANs one. It is important to be able to run the FreeS/WANs userland application (e.g., Pluto) with small changes. Encryption and Authentication algorithm We provide HMAC-SHA1 and HMAC-MD5 for authentication, NULL, DES-CBC, 3DES-CBS and AES for encryption. We thought encryption and authentication algorithm is not only used by IPsec and there are many algorithms so that we consider encryption and authentication algorithm and those interface should have good modularity. We adopted cipher modules which provided by CryptoAPI Project. Security Association and Security Policy SA and SP themselves dont depend substantially on the IP version. FreeS/WAN project architecture depends on their special virtual network interface for IPsec because it might focus on IPv4 tunnel mode (Their implementation also provides IPv4 transport mode). Their SA, SP, SAD and SPD also depend on their special virtual network interface. We considered and decided it was not suit to IPv6 because the IPv6 stack needed the neighbor discovery and the auto address configuration in its basic specification. If we had implemented IPv6 IPsec stack with their architecture, we had to implement those basic specification in their special virtual network interface. Therefore we implemented our own SAD and SPD in order to handle both IPv4 and IPv6. To improve the system performance, Each database will be locked by smallest granularity. And in many cases we use the read lock. SA and SP are managed by the reference counter to prevent used SA from removing by accident. IPsec Packet Processing Output There are various packet output paths from the IP(v4/6) layer to the network driver layer in Linux kernel networking stack (TCP, UDP/ICMP, and NDP[10] for IPv6). The packets which may be applied IPsec will go through these paths. We had to add IPsec functionality for these output paths, e.g, in IPv6 ip6 xmit() for TCP, ip6 build xmit() for UDP/ICMP and ndisc send ns()/ndisc send rs() for neighbor discovery packets. Output process is as follows): check IPsec SP lookup the IPsec SA by the IPsec SP apply IPsec processing to the packet output the packet to the network driver layer To reduce SA searhing time, we link the SP and the found SA after lookup from the first time. Input At input, there is only path for IP packets. We added IPsec processing part in ip6 input finish. Input process is as follows: receive the packet lookup the IPsec SA by SPI(which resides in AH/ESP header) check integrity and decrypt check IPsec Policy. IPsec Tunnel mode We are using IPv6-over-IPv6(and IPv4-over-IPv4) virtual tunnel device to implement IPsec tunnel mode. This implementation can avoid to duplication code of encapsulation/ decapsulation outer IP header compairing with having these code in the IPsec processing part itself. The virtual tunnel device is not different from the normal IP-over-IP virtual tunnel device in Linux. 4 IPsec implementation for kernel 2.6 The most important difference between ours and them is SAD/SPD part. They thought the whole SPD/SAD mechanic should be flow cache based lookup system shared by IPv4 and IPv6. One month later, they introduced the new network architecture called XFRM to Linux kernel 2.5. At first their developing code lacked IPv6 IPsec only for IPv4 IPsec. In order to suport IPv6 IPsec, we have implemented IPv6 IPsec code based on XFRM (and discarded our original code). PF KEY interface The PF KEY interface of Linux kernel 2.6(and 2.5) is compatible with KAME[3] PF KEY interface. We can use setkey command for configuring SA and SP and Racoon for IKE. Additionally we can add IPsec Policy each socket via Netlink3. They have suported only IPv4 in their first code, we have added IPv6 support. Security Association and Security Policy On the XFRM architecture, IPsec SP, which is represented as xfrm policy structure, will be bound to the routing flow cache (and IPsec policy will point IPsec SA bundle) and IPsec SA, which is represented as xfrm state structure, is included in destination cache, dst entry structure. The chaining destination cache means IPsec SA bundle. IPsec Packet Processing Output The output part of the XFRM architecture is placed between the IP layer and the network driver layer. In general, non IPsec packet will be passed to the network driver layer by a single destination output function, which is resolved routing lookup. But IPsec packet will be need to apply some IPsec processing (e.g., encryption, hash). XFRM functions make a chain of destination output functions (We call Stackable Destination, as shown in Figure3). Each function match each IPsec processing (AH, ESP and IPcomp[11]). To be more specific, in order to pass a packet to the network driver layer we have to do as follows. lookup routing table to decide output function by ip6 route output lookup IPsec Security Policy lookup IPsec Security Association(s) suitable for IPsec Security Policy and create destination chain to apply IPsec, pass a packet to the destination chain Input The input part of the XFRM architecture is simpler than output. The XFRM input function is handled as same as upper layer protocols like TCP, UDP, etc. In IPv6, IPsec headers are defined as IPv6 extension header but IPsec input functions are handled as an upper layer protocol handler. As the result of introducing IPv6 IPsec input processing in Linux. kernel, inconsistencies existed between IPsec headers and other IPv6 extension headers. In order to resolve this, we moved to the other IPv6 extension header handler functions to upper layer protocol handler. In detail, we registered IPsec header (both AH and ESP) handler functions with upper layer protocol handler array inet6 protos. Incoming IPsec packet processing flow is as follows: process IP packet from IP header in sequence process IPsec part (check integrity and decrypt) if founded check IPsec Security Policy pass IP packet next handler IPsec Tunnel mode Linux kernel 2.6 IPsec tunnel mode doesnt use the virtual tunnel device to create tunnel. The IPsec stack builds the outer IP header during IPsec processing by itself. IPSec Best practices Best practices IPSEC in transport mode has some serious advantages over other solutions. Compared to other technologies, IPSEC is built into to the Linux kernel. In other words there is nodaemonrunning in the background. Better yet, IPSEC does not require port-forwarding; some people elect to useSSH, stunnel, and other technologies that rely onport forwarding. With IPSEC, you simply have to run a program and its configuration file. After running it,encryptionbetween hosts is mandatory. Connections will be refused if the other connection does not have the appropriate keys. Groups of computers can share the same key, and it can even be done on a per-port setting (for example securing VNC, etc). Downsides? IPSEC in transport mode does have a couple draw backs. In transport mode you cannot have any dynamic setups where the IP addresses change from time to time. In other words, IPSEC is usually insufficient for workstation environments or dynamically assigned networks. Also, if you want to do a per-port setup the configuration becomes harder. Security Implications A very astute user can use IPSEC to bypass firewalls and other security measures. Since IPSEC uses cryptography, information is passed between machines in encrypted format. If the keys are not known, there is no practical way to decrypt the information (it is virtual impossible due to the sheer amount of time it would take). Machine-to-Machine IPSEC installations should be considered as Virtual Private Networks (VPNs) for security considerations. Please check with yoursystem administrator, business policies, and laws and regulations of your locality in order to establish whether or not to institute IPSEC. Requirements ipsec-tools package static IP addresses for each machine Configuration file The configuration file, /etc/setkey.conf, contains the information about the IPSECpolicy. Below is a sampleconfiguration policy(i.e. dont implement this policy because it is insecure). These lines are the actual keys and the encryption that will be used. The first block has the keys that will be used for authentication. In this case, it is the hmac-md5algorithm. The second block contains the keys that will be used for privacy, and the method of encryption. In the example, AES-CBC will be used, which is probably stronger than should be required; the key that we will be using is 194bits, meaning that it is good enough for US Government Secret and below classifications. The final block includes the actual policy. This is where you can put port numbers and even define whether it will be TCP orUDP. Generating the keys The more random the key, the better. Obviously, the example above is insufficient to secure a network. The following command will generate a random key. While running this command, youll need to wiggle the mouse to make it run faster. Or, if you are using a terminal use/dev/urandom instead. dd if=/dev/random count=16 bs=1| xxd -ps Depending on the size of the key that you want, adjust the count (16 will produce a 128 bit key, 24 will produce a 196 bit key, and 32 will produce a 512 bit key) The size of the key is important. If you really paranoid or just haveCPUcycles to

Monday, January 20, 2020

Persuasive Essay: The Holocaust :: Persuasive Writing

My reaction to the Holocaust was devastating. It is one example of bad things happening to good people. The mass murdering of so many Jews is just disgusting and also because it was done for basically no reason. As this was a true event many sources or witnesses are available to express their views, feelings and emotions of themselves and those who survived this terrible tragedy. I will demonstrate examples of Jews who have survived what they have been through and what they think about God. It is really hard to go through all of this and still believe that God exists. The holocaust should not change our theology on God. It is said to be that the Holocaust was a temporary "Eclipse of God".[1] This is supposed to be when God is away from earth beyond any reason or explanation. People trying to respond to this problem of believing that there is a God after witnessing the terrible event have either succeeded or failed. I will introduce three people who have survived the Holocaust and have tried responding to this problem. The three people included are Primo Levi, Richard Rubenstein and Emil Fackenheim. I think a big impact on the life of Jews would be their belief in God because many of them have tried responding to this problem and have changed the ways in which they think about him, their views on how good or powerful he is, how they express him and why they still believe in him. I will introduce the problem of evil to the Jews that have survived the Holocaust and their problems of belief. I will also say which of the three Jews the most are convincing to me. The holocaust presents a problem for the Jews and changes their belief in God because now some Jews think "God is Dead" [2] Their reason to thinking this is because God is supposed to be omnipotent and almighty he could not have let something like this to happen. If there was a God, surely this event would not have taken place.

Sunday, January 12, 2020

Wounds, Meds and Complex Care in Nursing Practice

1. The preoperative checklist on what needs to be done to take care of a patient can be found on the patient’s chart, usually under the doctor’s orders and/or the patient’s notes. 2. The National Institute for Clinical Excellence recommends that blood tests should be taken prior to having a surgery regardless of patient’s healthy condition, unless contraindicated. This is done to provide information about conditions that could affect the treatment that a patient would need (Lab Tests Online, 2004). Blood tests to be included in this routine preoperative testing are a full blood count, blood clotting tests, blood typing, blood gasses, blood glucose, and a sickle cell test (Lab Tests Online, 2004). A full blood count will measure haemoglobin and the number of other types of cells in the blood (Lab Tests Online, 2004). Blood typing is for blood transfusion, in case needed. Blood clotting test to determine if blood clots normally and how long it takes to clot (Lab Tests Online, 2004). Blood gasses, measures the amount of oxygen and carbon dioxide in the blood, as well as its acidity, and blood glucose to check for diabetes. Sickle cell testing if the patient has risk factors. 3. The registered nurse is responsible for reporting any discrepancies in the lab results of the patient to the physician in charge. 4. Preoperative education should include orienting the patient with the surgery that she is going to go through. Ask what she understood from the physician and answer her questions for further clarification. Afterwards, explain the patient what to expect during her recovery period, and what are her postoperative exercises. Also, enlighten the patient on the risks of post-op recovery like pulmonary embolus, DVT and UTI, and the possible ways on how to avoid these, through deep breathing exercises and wearing of anti-embolic stockings (University of South Australia, 2000). Finally, inform her of what other procedures are to be done after the surgery, for example, utilization of catheters and IV therapy. 5. A preoperative shower employs the use of a 2% chlorhexidine gluconate polyester cloth in scrubbing the patient’s body as a preventive preparation aimed at reducing the patient's skin colonization before the incision is made (Bjerke, 2001). . The anaesthesiologist is the one to administer the anaesthesia. 7. A general anaesthesia will make Mary unaware of what is happening during the operation, it will make her not feel anything, it will even put her to sleep (Rashiq, 2007). Penthidine is the analgesic of choice postoperative; to not feel pain (JBC Handbook, 1997). 8. An epidural anaesthesia is called an epidural block and requires the injection of anaesthetics in the epidural membrane that surrounds the spinal cord (Sarafino, 2006). Epidural blocks are most commonly administered during labour and delivery (American Pregnancy Association, 2007). . Marking the legs preoperative is done traditionally by estimating the position of the hip joint by palpation of the greater trochanter (The, 2006). 10. Epidural infection, nerve damage, backache, headache and urinary retention (Faure, 2000). 11. a. Ensure patient’s tag is the same with her chart. b. make sure patient is not wearing any metals, jewelleries, etc. c. ensure is certain about undergoing the operation d. ensure that patient has gone through all the necessary diagnostic tests e. ensure that patient is still on NPO. 12. The patient’s chart, diagnostic test results, patient’s consent. 13. Vital sign assessment has to be done every 15 minutes for the first hour and special attention will be brought to the patient’s respiration, due to the anaesthesia, and circulation and sensation of the extremities especially in the affected areas. Output is also monitored. Patient still on NPO until anaesthesia wears off totally. 14. No, this is a common postoperative effect. Continue monitoring output. 15. Decrease in urine output is common postoperative due to opioid drugs, immobility, and decreased oral intake (Merck, 2005). The physician may order Crede’s manoeuvre to be implemented and Betanechol can be administered (Merck, 2005). 6. Neurovascular checks are important to determine if there was nerve damage or internal bleeding and a circulation problem, or even infection, which could have been caused by the surgery. The neurovascular check is comprised of the five P’s, namely pain, paralysis, paraesthesia, pulses, and pallor (Judge, 2007). Check for thes e in the patient’s limbs. 17. Loss of pedal pulses might mean lack of arterial flow (Judge, 2007). This should be reported immediately to the registered nurse or the physician, whoever is readily available. 18. Any deviation from the normal baseline data regarding neurovascular checks should be reported immediately to the physician to avoid amputation of the affected extremity. 19. Log roll patient with abductor hip in place. To prepare the patient, she should be placed on one side of the bed, and rolled like a log to the unaffected side of the hip replacement. 20. A postoperative wash will make the patient feel comfortable and refreshed, also it will minimize infection. 21. Her pain might increase or decrease and this can signal a change in the source of pain. Also, the narcotic’s infusion rate can be changed if pain is lessened. 2. Two or more nurses to ensure that the correct rate is delivered. 23. As a student nurse, I cannot change infusion rates for narcotic pain relievers because I do not have the license yet that will make me accountable for any unpleasant consequence that might arise from the situation. Even under the watchful eye of my instructor, I cannot do it. 24. Na rcotics have to be watched for their side effects, especially respiratory depression. Observations that can be noted when a patient is with a narcotics infusion include clients respiratory rate, confusion and drowsiness (BP Cancer Agency, 2008). 5. Heparin injections are administered as a prophylaxis for blood clots (Science News, 1988). 26. Bleeding can be a complication of heparin use because it prevents clotting. Be wary of the following signs: black, tarry stools and bleeding from gums when brushing or flossing teeth, continued redness or pain after an injection, nosebleeds, red urine, unusual bruising coughing up blood (Drug Information Online, 2008). 27. Positive nitrate may indicate bacterial contamination, and traces of protein and blood are not alarming (Eccles Health Sciences Library, 2008). 28. Yes. This is because catheter removal will help in eradicating any possible bacterial contamination. 29. A urine specimen should be sent for a culture and sensitivity test to determine what bacteria is infecting the patient’s urinary tract. Sample should be sent to the laboratory immediately. 30. The needed equipment shall be gathered. After washing one’s hands and explaining to the patient what procedure is to be done and what the rationale behind it is, the drainage tubing directly below the aspiration port will be clamped with a rubber band or clamp (Integrated Publishing, 2007). This is to ensure that an adequate amount of urine for a specimen can be taken. A syringe will be used to aspirate the urine specimen. After gathering enough urine, the clamp shall be removed. 31. Inserting an indwelling catheter requires that the equipment needed be gathered first. Then the procedure is to be explained to the patient. She should be placed in a dorsal recumbent position. Using the sterile technique, the patient should be draped with sterile dressings. Sterile gloves will then be worn. Catheter tip is to be lubricated and placed on the sterile catheter tray. The labia are to be separated with the thumb and forefinger and a swipe of a swab with sterile povidone-iodine shall be done from the meatus toward the rectum. This shall be done thrice discarding each swab after one swipe. Catheter is to be inserted two to three inches into the urethra, and an additional inch once there is urine flowing. Balloon will be inflated once it is inside the bladder. Traction is gently applied to the catheter and drainage is taped to Mary’s thigh. (Kaplan, 2007) 32. To remove an indwelling catheter, a small syringe is attached to the inflation port on the side of the catheter and all the fluid is drawn out (Moore et al, 2007). Afterwards, slowly pull the catheter out (Moore et al, 2007). 33. Patients are on strict monitoring of fluid balance because they are receiving fluids through their IV therapies and postoperative patients are still weaning off from their anaesthesia, making urine retention a side effect. A positive fluid balance occurs when intake is greater than output, and a negative fluid balance happens when intake is lesser than output. 34. Fluid overload can bring about fluid and electrolyte imbalance, dysrhythmia, high blood pressure, non-pitting oedema, diarrhoea, projectile vomiting, among many others (Williams, 2008). Osmotic diuretics can be administered per doctor’s orders, patient should be on strict I&O, IV fluids should be checked hourly, fluids should be restricted (Williams, 2008). 35. The medications should also be reflected on the output of Mary if it is working. 36. total intake: 500ml IVF + 2160 ml tea and Milo + 360ml water = 3020 total output: 1400ml urination + bowel The patient is in a positive balance.