Tuesday, December 24, 2019

The Decline of Morals and Morality in America Essay examples

America is in a Moral Decline The founders of America believed that a popular government and its laws necessarily rested upon an underlying moral order that preceded both the state and man-made law. They referred to this transcendent moral order in the Declaration of Independence as self evident truths and the laws of nature and of natures god (Barr pg. 211). For a republic to work, the founders thought, the people had to internally guided by commonly shared moral values. The founders viewed themselves as launching a great experiment: Could a free people retain a moral culture that would promote the self-discipline and virtues needed to restrain corruption? We are still, in many ways, the shining city on the†¦show more content†¦scores of high school students. The debate over families and family values generally finds advocates in two camps. One camp says that a family begins when a man and woman marry. The other camp says that no one should try to define the family because the definition is very subjective. This latter position is just one example of the virus that has caused Americas sickness (Thomas pg. 44). The idea that a fixed standard cannot be established because some people might disagree is ludicrous (Thomas pg. 44). Logically, if there is no objective standard for one agenda, there can be none for any other. When there are no standards, there is anarchy. Degradation of family values is seen in the area of marriage. Until recently, marriage was largely thought of as a noble relationship (Bennett pg. 108). It seems lately though, the idea of traditional marriage has become viewed as silly or obsolete. Writing in the September 20, 1993 issue of Time magazine, essayist Barbara Ehrenreich uses the breakup of the supposedly picture-perfect marriage of actors Burt Renolds and Loni Anderson to say that we expect too much from marriage and ought to revise the system and our expectations of it. Ehrenreich goes on to offer aShow MoreRelatedMorality And Its Effect On Society855 Words   |  4 Pageshow individuals acquire morality. Some say that morality is a learned behavior, and others contribute human morality to a view of fairness, or unfairness. I believe that morality is declining in our society, and its decline has a negative effect on society. Does the passing of time change morality or will society change with the passing of time? We can seek the answer to that question by exploring different aspects of our society to determine if a decline of morality has any negative effect onRead MoreThe Main Reason For Collapsing Of Roman Empire And America843 Words   |  4 PagesRome and America are the largest empire and country in their time, there are various similarities between them. Some similarities they both have are dominant power that both of them are powerful and have huge impact on other countries in their time and cultural diversity which they both have an open society made up of many people. Moreover, moral decline was the main reason for collapsing of Roman Emperor; America suffered the decline of moral value for a long time. In 2015, the decline of the moralRead MoreThe Effect Of Decaying Morality On Society934 Words   |  4 PagesThe Effect of Decaying Morality on Society The ability to distinguish between actions that are right or wrong, is an innate characteristic designed into every person. There are many scientific theories that attempt to explain how individuals acquire morality. Psychologist say that morality is a learned behavior, and others contribute human morality to a view of fairness, or unfairness. My point is, I believe that morality is declining in our society, and its decline has a negative effect on societyRead MoreThe Decline in Morality Has Caused an Increase in Crime Essays1011 Words   |  5 PagesThe Decline in Morality Has Caused an Increase in Crime In an age where violent crime is more dominant than ever and morality is not heard of, there arise many problems that result from each other. The past thirty years, our society has been determined to secularize itself and to separate from many moral standards that root from the Bible. Since moral values were removed from schools in the 1960s, crime and immorality has steadily risen. It is evident thatRead MoreTo What Extent is Religion Essential To Society?866 Words   |  4 Pagesno longer the necessity of religion to be the basis of a moral code. Nations categorized by low degrees of social and economical security have the lowest prevalence of atheism and vise versa (high security = highest prevalence of atheism). Due to the correlation between prosperity and lack of religion, more secularly prosperous nations are moving away from sectarianism to secularism. Socio- economic well-being generally results in a decline in the social significance of religion as it’s function asRead MoreWhat Really Ails America Essays965 Words   |  4 PagesIn his article, â€Å"What Really Ails America,† author William J. Bennett presents his argument as to why America is now viewed as a country that no longer possesses a virtuous, morally sound society. According to Bennett, this change in society was brought about by an aversion to spiritual and religious things. This lack of spirituality and religion has skewed the perception of what is now considered to be ethical in this country. Bennett not only makes note of the issues, but also goes on to explainRead More The Separation of Church and State in America Should NOT Be Absolute 949 Words   |  4 Pagesseen a decline in the role of religion. With people casting shadows over their religion and putting their faith in separation of church and state, we have seen our country developing moral relativity. This moral relativity is dangerous ground. Most people are ignorant of their religion, not being able to giv e reasons for their belief. This religious illiteracy in America today has tragically developed the notion that separation of church and state should be absolute; thus creating a moral relativityRead MoreAnalysis Of Washington s Farewell Address1656 Words   |  7 Pagesthe original establishment of American policy in many areas. From setting a precedent for American neutrality during international wars to promoting the stewardship of public credit, Washington’s address has had a great influence on the paths that America has taken over past centuries and the decisions that its leaders have made throughout history. This is largely because most parts of Washington’s advice have been heeded to at least some degree, and they haven t yet been labeled completely as â€Å"archaic†Read MoreRebuilding America s Moral Christian Walls1523 Words   |  7 PagesRebuilding America’s Moral Christian Walls As it comes to many people’s attention that America’s spiritual walls have a crack in them, two of the main questions are why and how it may be repaired. There are many documented facts that present the evidence for the reader to conclude his or her own theory. After analysis of these facts and evidence, it is perfectly obvious to most people that the United States of America will be responsible for its own downfall if people do not open their eyes to theRead MoreModernization Of Morality And Manners945 Words   |  4 Pages Historians tend to attribute the modernization of morality and manners to the decade between the Progressive Era and the New Deal. The short span of time between the Progressive Era and the New Deal saw the abandonment of Victorian Era moral guidelines, coupled with a new emphasis on the individuality of women. Flappers, young free-spirited girls embracing their newfound social freedom, embodied this period of rapid change. Promiscuity flourished, female clothes covered less, and the roles of women

Monday, December 16, 2019

The Characteristics and Nature of Organisations Free Essays

THE CHARACTERISTICS AND NATURE OF ORGANISATIONS LEARNING OBJECTIVES: on completion of this topic you will have: Developed understanding of the nature and characteristics of organisations Identified generic organisational features An understanding of the different types of organisations An understanding of the role of the organisation as a ‘goals-led, open system’ An appreciation of environmental impacts on organisations Developed understanding of the process of organising Be able to distinguish between ‘formal’ and ‘informal’ organisation Introduction Organisations, or more simply, organised activities, are a central feature of every aspect of life. Indeed, it is extremely difficult – if not impossible! – to conceive of any activity which does not involve the input of one or more organisations at some or other stage. Think for a moment – most of us, for example, were born in hospitals, live in a family or other social unit, attend or have attended educational institutions, and have found, or seek, employment with an organisation. We will write a custom essay sample on The Characteristics and Nature of Organisations or any similar topic only for you Order Now Small wonder, then, that the study of organisations has attracted so much attention over the years! Every organisation differs – in terms of nature, purpose, size, goals and objectives, membership – and so on (the list is almost endless! ). However, a number of core features and characteristics of organisational life can be identified. These form the focus for the discussions within this chapter. Organisations also form the context for all management activity – in fact, it could be argued that one of the main reasons why we need managers is the fact that we engage in so much organised activity. So an understanding of the nature, type and purpose of organisations is an essential prerequisite in order to manage effectively and efficiently. How to cite The Characteristics and Nature of Organisations, Papers

Sunday, December 8, 2019

Ballads Of Today Essay Example For Students

Ballads Of Today Essay Uncle Sams song, I Dont Ever Wanna See You Again is a song about a guy who gets his heart broken by his girlfriend. In this song Uncle Sam is singing directly to a girl who was once the love of his life. He tells her that he never wants to see her again because she was a secret lover of his best friend. This song is a lot like a ballad in many ways. It uses a refrain, which is called the chorus in the lyrics. The line, I dont ever wanna see you again, is used repeatedly through out the song. Lines two and four rhyme, which is the basic format for the quatrains. It is about disappointed love and jealousy which most early ballads were written about. I Dont Ever Wanna See You Again was written to be sung like all other ballads. The French word for ballad once meant dance so people probably once danced to the rhythm of the ballads. In as many ways as it is like a ballad, there are just as many ways that it is not. I In this song there are no quatrains with eight syllables in the first and third line, and six syllables in the second and fourth. This example shows the quatrains as having six syllables in the first and third lines and five syllables in the second and fourth lines. It took me a minute, To wake up and see. What the love of my life, Was doing to me. This song does not use a narrative format because of its use of I and Me. All of the ballads we have read were told in third person. It uses no incremental repetition. The song also has parts of it where as it is not in the quatrain form, where it is only a group two lines that rhyme. At the end of this song there is a part where Uncle Sam stops singing and starts talking to the girl. In this part there is no kind of structural format. Ballads were stuck with the same format through out the whole thing. This is another reason why it is dissimilar than a ballad.

Saturday, November 30, 2019

Spontaneous Human Combustion Essays - Combustion, Forteana

Spontaneous Human Combustion Spontaneous Human Combustion The world is full of the unexplained and mysterious, but is spontaneous human combustion truly spontaneous caused by the paranormal, or just simply human combustion? Most people think of spontaneous human combustion, or SHC, as ...the reduction of an otherwise normal, healthy human body to a pile of fine black ash, the consistency of which is finer than that of a cremated corpse (Spontaneous). This is simply not true. First of all, it is not complete consumption because in most cases extremities and internal organs remain because the high temperature outside the body does not penetrate internally. Secondly, the fact that the ash is so fine is often used by SHC proponents as to why the fire must by paranormal. They say that the fire has to be extremely hot because even in a crematorium calcified bones often remain, but this fine ash can also be attributed to simple combustion. To learn more about SHC and how it works we must take a look at the victims. Victims of SHC are mainly elderly females that smoke. Almost all the victims have weight problems. They are often at least overweight. It must be understood that no well-documented cases of infant SHC have ever been reported. Some researchers say that there is ...a fairly equal representation of the sexes among the victims, with ages ranging from infancy to 114 years; many were abstemious and thin (Mysteries 80). To get a personal opinion on this matter, one must research this kind of information for themselves since much of it can be misconstrued. Some may believe the SHC phenomenon has only been around for the past few decades but ...spontaneous human combustion (SHC) began to appear in medical reports as far back as the 17th century... (Mysteries 80). Rare and abnormal deaths caused by fire were just as common back in the eighteenth and nineteenth centuries as they are nowadays. To find a logical explanation scientists looked for a common thread in the cases. This common thread seemed to be alcohol. During this Victorian era, an evil of the Christian society was drink. SHC ...was viewed as a sort of a moral punishment for drunkenness (Cohen 195). Since the cause of SHC was believed to be drinking, many had oral remedies for SHC. In Germany the common people had great faith in liquid manure as a preventive for spontaneous combustion... (Bondeson 7). If you lived in Scandinavia at that time you may have had heard of an even more unlikely preventive. Swedish and Norwegian folklore prescribed human urine, preferably freshly void ed by a woman, to be thrown into the mouth of a flowing drunkard... (Bondeson 7). During this Victorian era SHC became popular in literature. Mark Twain was one writer who popularized SHC in his book, Life on the Mississippi, during early America. Jimmy Finn was not burned in a calaboose, but died a natural death in a vat of a combination of delirium tremens and spontaneous combustion. (quoted in Cohen 192). Charles Dickens also wrote about SHC in his book, Bleak House, and he attributed it to alcohol. Dickens described the death of the drunken man, Krook, in the following manner: Here is a small burnt patch of flooring; here is the tender from a little bundle of burnt paper, but not so light as usual, seeming to be steeped in something; and here is- is it the cinder of a small charred and broken log of wood sprinkled with white ashes, or is it coal, O Horror, he is here! and this, from which we run away, striking out the light and overturning one another into the street, is all that represents him. (quoted in Cohen 193) Dickens was so avid about the topic that when the book was reprinted, a slip was added that quoted Dickens on his support of SHC. It can only be believed that alcohol would have only attributed to the death but did not directly cause it. There has been a lot of paranormal phenomenon that has been used to explain alleged spontaneous human combustion. Cases of individuals capable of generating explosive bursts of electrical energy by manipulating internal organs appear throughout the world and... amongst the Chinese and Pacific

Tuesday, November 26, 2019

Whitman and Lincoln Essays

Whitman and Lincoln Essays Whitman and Lincoln Essay Whitman and Lincoln Essay The advantage of a brief speech at Gettysburg was that it stunned people.   In doing that, he captured their attention and so they took note of what was said.   The fact that the speech was brief meant that Lincoln had to be extremely careful with his word choice because his meaning had to be clear.   Both Lincoln and Jefferson knew that the phrase â€Å"We hold these truths to be self-evident,† was necessary for a government that was to be governed by the people.   The war in Lincoln’s day was fighting for the same principles as the on in Jefferson’s day. The first symbol on the poem When Lilacs Last in the Dooryard Bloom is â€Å"great star† which represents Abraham Lincoln who was a great star in American history.   The second symbol is the lilacs.   They bloom in the month of April and therefore, they will always symbolize the sadness and mourning of the assassination of President Lincoln.   The narrator will alway s be reminded of the assassination when the lilacs bloom.   Then the last is the birds that symbolize nature and how the assassination disrupted the natural order of what should happen in the world. The poem gives the impression of deep mourning and hope.   Whitman uses descriptive language.At first the bird seems to have a god’s eye view of the earth, and is embracing what it sees from above.   Then it detects death and the tone changes to one of deep sorrow. Whitman changed poetry forever by doing several things in his writing.   He told his poems in prose which became popular with many other poets.   He used odd symbolism dealt with topics were about things that people were not used to discussing in public before.   He spoke of prostitution, sexuality, and death in Victorian times. The grass symbolizes the common things that unite people.   Grass is something that is universal.   It grows all over the earth, and rejuvenates itself continually as people do. Song of Myself is a true democratic poem.   He shows that anyone and anything is fair game for subjects of poetry.   The poem is an American Epic where middle class working people of Whitman’ s day of all types of occupations are the subjests/

Friday, November 22, 2019

What You Need to Know About Biomes

What You Need to Know About Biomes If you want to learn about ecology, the first thing you need to understand is how all of living organisms in the world live with one another. A biome is an ecosystem or group of ecosystems that can be characterized by its vegetation, plant  and animals life, climate, geology, elevation, and rainfall.   Biomes are large ecosystem units. So while a puddle may be considered an ecosystem, the Pacific Ocean would be considered a biome. In most cases, the plants and animals in a biome will have special adaptations that make living in that community most successful.   So when ecologists study a particular plant or animal, they generally study its entire biome to have a better understanding of the role that species plays in its community. There are five basic types of land biomes and two categories of aquatic biomes. Each biome can then be broken down into a number of sub-biomes or zones that all have their own unique set of  geographic characteristics. Here are the defining characteristics of the worlds biomes: Land Biomes Tundra: A tundra is a treeless biome that is characterized by long, cold winters and short tepid summers. The word tundra  comes from the Russian word for uplands.   The cooler temperatures and shorter growing season limits the types of plants that are found in tundras to grasses, mosses, lichen, low shrubs, and a few flowering plants.   The three main types of tundra are the arctic tundra, alpine tundra, and Antarctic tundra.Grassland: As the name suggests, grasslands are characterized by the predominance of grasses and grass-like plants, such as sedge and rush.   Savannas are a type of grassland that also include a few scattered trees. Grasslands can be found on every continent in the world except for Antarctica.Forest:  In the forest biome, large groups of trees live together in close relationship with each other and with the other living things in the environment.    In general, the trees in a forest are so abundant that their tops touch or overlap, shading the ground .   Tropical rainforest, boreal forest,  and temperate forest are a few  types of forest biome. Desert:  Rainfall -  or the lack of it- is the defining characteristic of the desert biome.   Deserts get less than 10 inches of rainfall per year.   Because of this, many deserts have little to no vegetation while others have a few scattered low shrubs or grasses. Deserts are usually classified as hot or cold or  semi-arid or coastal.   Ã‚  Mountain: Every continent on Earth has a mountain biome.   Mountains are land masses that are usually found in groups called chains or ranges although some do exist on their own.   A single mountain may have many ecosystems  within it, starting with a desert at the base, changing to a forest as the elevation rises, and topped off with a tundra.   Ã‚  Ã‚  Ã‚   Aquatic Biomes Water biomes make up over 75 percent of the Earths surface. They consist of freshwater ecosystems such as  ponds and lakes, streams and rivers, and wetlands, as well as marine regions such as  coral reefs,  oceans,  and estuaries.Marine biomes are distinguished from freshwater by the presence dissolved compounds - usually salts - in the water. The amount of salt - or salinity - varies within each of the marine ecosystems.  Ã‚   Biomes play a critical role in the understanding of ecology because they help scientists study not only a specific plant or animal but also the role it plays in its community and the characteristics that it has developed to live in its environment.

Wednesday, November 20, 2019

Managing Financial Resources in Health and Social Care Essay - 3

Managing Financial Resources in Health and Social Care - Essay Example Financial Management is therefore an important aspect which refers to the effective and efficient management of funds (money) in such a way that the objectives and goals of the organziation are accomplished. The department of finance requires the specialist functions that are connected with the top management at hierarchal ladder. Financial Management has been defined by Joseph Massie as the operational activity in a business organization which serves the purpose of obtaining the funds and utilizing them in an effective manner for the efficient business operations. Weston and Brigham describe this term as a domain of financial decision making that harmonizes the enterprise goals and individual motives (Weston, Fred and Brigham, Eugene, pp. 25-46). It is evident from the definitions that researchers and financial experts have recognized the purpose of financial management as an activity which pertains specifically to the planning, obtaining, monitoring, controlling and managing the funds or money in a business. It is a domain of business management activities within an organization that is dedicated to the careful selection and utilization of the capital and sources of finance for enabling a business organization to proceed into the direction of goal achievement (Weston, Fred and Brigham, Eugene, pp. 25-46). Thus, financial management involves the raising and allocation of capital judiciously. In order words, it is directly related to the concept of capital budgeting. Finance is the lifeblood of any organization. The financial management, until the period of 1960s, was considered to be of a descriptive nature in all industries along with its key role being to secure the financial requirements for fulfilling the operating objectives of the business. However, in the present era, the capacity of financial management contributes vitally to the management of any organization irrespective of its nature and structure. Now, the key

Tuesday, November 19, 2019

New world Essay Example | Topics and Well Written Essays - 750 words

New world - Essay Example According to Christine Rosen, â€Å"The connected screen will replace the disconnected book† (Rosen 278). An individual might be of the understanding that the requirement of e-readers and other forms of technology to connect to the internet in order to access much of the information that might otherwise be printed in books is necessarily a fatal flaw and drawback to this particular medium. However, due to the fact that an internet connection is almost omnipresent in most locations, this particular drawback is not quite as profound as one might first assume. Moreover, whereas the ease of picking up a book is intuitively obvious, the learning curve in order to integrate with an e-reader or any other application that is able to provide a similar experience to reading a book is not quite as high as one might expect; rather, the learning curve for these different applications and hardware has been decreasing the longer that these devices and programs have been around. An added benefit that technology has as compared to the printed word is the fact that printed books are constrained to the fact that they are almost immediately out of date and uninformed with regards to the up to the minute nature of our current world. By means of comparison, e-books and the sources of the printed word that exist within the electronic format are able to be changed and updated with the never ending stream of new information that continually prompts updates and revisions. One need look no further than the way in which traditional newspapers have to issue reprints and former apologies for misquoted or incorrect cited information to realize the damage that this traditional approach can have to the credibility of the news entity. However, with respect to news websites, these entities are readily able to revise, change, and ultimately delete entire news stories if they find that these are not in

Saturday, November 16, 2019

Learning styles Essay Example for Free

Learning styles Essay Overview 1. What are learning styles? 2. Why learning styles are important? 3. What are the different learning style classifications available? 4. What are the similarities and differences between different learning style classifications? 5. What is/are your learning style/s? 6. What is/are the most appropriate learning method/s for your learning style/s? 1. What are learning styles? ? Learning style is an approach to learning ? It is not how you learn; i. e. not the method of learning ? It is, rather, how you prefer learning; i. e. what are  the broad strategies of learning that you prefer Which of the following two statements illustrates a learning style? I like lectures – this is not a learning style, but a preference for a method I like to gain knowledge by listening to others – this is a learning style; preference for an approach 2. Why learning styles are important? ? Matching learning methods to learning styles ? Developing a learning organisation/network in which students adapt change learn ? Developing individual learning plans ? Self-development for individuals? Assessing suitability for specific training courses ? Training the trainer ? Team building, looking at team strengths weaknesses ? 360 degree appraisal 3. What are the different learning style classifications available? ? There are more than half-a-dozen learning style classifications ? This shows that there is no one-best way to learn ? Rather, based on the individual needs and the personality traits, the approach that one takes to learning differs ? Out of the many learning style classifications, there are two that are commonly used 1. VARK classification 11. Classification based on Kolb’s cycle I. VARK learning styles Visual learner Auditory learner Reading/writing Kinaesthetic learner Action-oriented Thinkers II. Kolb’s learning styles Reflector Theorist Activist Pragmatist 4. What are the similarities and differences between different learning style classifications? ? All classifications aim at a common cause/outcome – so, to this extent, there cannot be major differences ? However, there are differences related to the orientation of learning or the angle through which learning is viewed. VARK – based on the sensory input for learning / how we capture learning Kolb’s – based on the cognition/ how we understand VARK vs Kolb: an approximate comparison Theorists Reflectors Pragmatists Activists 5. What is/are your learning style/s? 1. Go to: http://www. varklearn. com/english/page. asp? p=questionnaire 2. Answer the questionnaire and get a score 3. Interpret the score to find out your dominant learning styles 6. What is/are the most appropriate learning strategies for your learning style/s? 1. Form groups that have similar dominant learning  styles. 2. Individually make a list (in priority order) of your preferred learning methods 3. Compare your list with the others in the group 4. Find out the three most preferred learning methods of the group (in priority order) Summary 1. What are learning styles? Approach to learning 2. Why learning styles are important? To know the best learning method to adopt 3. What are the different learning style classifications available? VARK / Kolb’s 4. What are the similarities and differences between different learning style classifications? VARK – sensory input based; Kolb’s – cognition based 5. What is/are your learning style/s? Usually a combination of learning styles 6. What is/are the most appropriate learning method/s for your learning style/s? Though broadly similar, methods may differ even within the same learning style References †¢ Fleming, N. D. (2001). Teaching and learning styles: VARK strategies. Christchurch , New Zealand : N. D. Fleming. †¢ Kolb, D. (1984). Experiential learning: Experience as the source of learning and development. Englewood Cliffs , NJ : PrenticeHall.

Thursday, November 14, 2019

Sexually Transmitted Diseases :: essays research papers

Sexually Transmitted Diseases Sexually Transmitted Diseases STDs, a.k.a venereal diseases, infectious diseases passed from one person to another during sexual contact. STDs are the most common infections known. More than 12 million people in the United States, including 3 million teenagers, are infected with STDs every year. The United States has the highest STD rate in the world about one in ten Americans will contract an STD during his or her lifetime. People who do not know they are infected risk infecting their sexual partners and, in some cases, their unborn children. If left untreated, these diseases may cause pain or may destroy a woman's ability to have children. Some STDs can be cured with a single dose of antibiotics, but AIDS cannot be cured. Those most at risk for contracting STDs are people who have unprotected sex—without using a condom, people who have multiple partners, and people whose sex partners are drug users who share needles. Static’s show that A mericans between the ages of 16 and 24 are most likely of catching STDs than older adults, because younger people usually have multiple sexual partners than an older person in a long-term relationship. Teenagers may be embarrassed to tell their sexual partners they are infected Teenagers may also be embarrassed or unable to seek medical attention for STDs. This means that they only more likely to pass the disease to other young people and have a greater risk of suffering the long-term consequences of untreated STDs. STDs are transmitted by infectious bacteria, viruses, parasites, fungi, and single-celled organisms called protozoa that live in warm, moist parts of the body, like the genital area, mouth, and throat. Most STDs are spread while having sex, but oral sex can also spread disease. Some STDs are passed from a mother to her child while pregnant, when the disease enters the baby's bloodstream, during childbirth as the baby passes through the birth canal, or after birth, when t he baby drinks infected breast milk. AIDS can be transmitted by blood contact such as open wounds, between people who share infected needles or received through an injection of infected blood. Some people believe that STDs can be transmitted through shaking hands or other casual contact, or through contact with inanimate objects such as clothing or toilet seats, but they can’t. Chlamydeous, is from trachoma is bacterium, is the most commonly transmitted STD in the United States.

Monday, November 11, 2019

The tale of Beowulf

The tale of Beowulf begins and ends with the funeral of great kings. The funerals represented in this tale are decorated with rites that derive from the cultural traditions of the kings being laid to rest. Scyld Scefing is entombed within a barge decorated with signs of his accomplishments, while com/beowulf-as-an-epic-hero/">Beowulf is enshrined within a barrow filled with relics of his rule. Yet within these traditional burials one can find traces of the men themselves as each makes requests that lead to the distinctiveness of their burials.This allows the funerals to become particularly distinctive as the author makes use of the elements, such as earth, fire, and water (Smith). Each funeral defines the symbolic ideas of motion versus grounded-ness represented in the lives of these two men, and the method in which each is carried out emphasizes the opposite ways in which they entered their lands and mounted their thrones. The funerals of both men are representative of their persona lities as shown through their deeds and the ways in which they lived their lives. Though both men were valiant warriors and kings, their lives as youths and kings appear to be very different.The movement characteristic of Scyld Scefing’s funeral represents a continuation of the boldness and vigor with which he sailed through life. His life was continually one of forward motion from low to high estate, and he does not cease this motion in his death. The poem continues, â€Å"Forth he fared at the fated moment, sturdy Scyld to the shelter of God† (lines 26-27). His clansmen and subjects seem determined that their king should keep moving though he has been cut off from life, as they immediately â€Å"bore him over to ocean’s billow† (line 28).He is placed on a barge that is taken by the floods to an even higher and more celebrated place, and the words used by the author to describe this continue this motif of motion to an even higher estate. Such words and p hrases as â€Å"outbound† highlight this motion, and as â€Å"No man is able to say in sooth [†¦] who harbored that freight,† his burial demonstrates that his resting place could mean yet another promotion for this king who had risen from foundling to royalty. The funeral given Beowulf differs greatly from that granted Scyld Scefing.Beowulf’s rites represent that of a more grounded king who had been home grown and bred specifically to become royalty. His funeral demonstrates no great motion, as his lineage is anchored and steeped in royalty. The rites take place within the land of his birth, and his tomb is laid upon a foundation of the soil upon which his ancestors walked. The writer establishes this in his recounting of the events: â€Å"They fashioned for him the folk of Geats firm on the earth a funeral-pile† (line 2821). The firmness with which this tomb is established upon the earth symbolizes the strength of Beowulf’s roots within his h omeland.Around this is erected a wall, and this further strengthen’s Beowulf’s position as a foundational leader of his land. The monuments given to house this leader are built into the ground of the kingdom and given foundations akin to the roots that one finds in Beowulf’s lineage. His burial is akin to burying treasure (gold and precious stones), â€Å"trusting the ground with treasures of earls, gold in the earth† (2850), and this is in essence an act of giving back to the earth the treasure it has afforded. The funerals of Scefing and Beowulf also differ in the elements that attend each.According to critic George Clark in his essay â€Å"Beowulf’s Armor, † â€Å"Each funeral places the final offering of arms and armor and treasure in the context of one of the elements, water, fire, or earth† (429). While water is the dominant element in Scefing’s funeral, fire is used to herald the burial of Beowulf. The significance of th e water for Scefing derives mainly from his history, as he was borne to the Danes on a small vessel as an abandoned infant. The water represents the deep, the void from which the king came and to which he is allowed to return.The story comes full circle for this king, as he is again borne away at the end of his life, given back to the water that offered him to the Danes. This is done on purpose by his clansmen, and highlighted by the narrator who writes, â€Å"No less these loaded the lordly gifts, thanes' huge treasure, than those had done who in former time forth had sent him sole on the seas, a suckling child† (lines 43-46). He is again sent by himself â€Å"on the seas† into the unknown belly of the flood which had offered him up as a child.The fire for Beowulf is the opposite of this water, and this might also be seen as a reference to difference in his birth and youth. However, the narrative continues, â€Å"Wood-smoke rose black over blaze, and blent was the ro ar of flame with weeping (the wind was still), till the fire had broken the frame of bones† (2827-30). While the water takes Scefing away from the land, Beowulf’s fire offers up incense that rises and, as the ashes fall, remains forever mingled with the soil in the land of his birth.The narrator mentions that the wind was still, emphasizing the idea that no part of Beowulf’s burnt body or ashes is allowed to fly beyond the land of his birth and rule. He utterly belongs to this land, and the roaring of the fire becomes a dirge that rises and mingles with the sound of his subjects’ weeping. Yet the reader gets the feeling that Beowulf is not lost to his people. This fire is allowed to burn beyond Beowulf’s bones, consuming his flesh and, as â€Å"the smoke was by the sky devoured† (2838), the fire sends up Beowulf’s essence as a protection and covering for his land and people.Though the lives of Scefing and Beowulf were similar in many w ays, they also differed in some very significant areas that have to do with how they came to be king. While Scefing begins life as a foundling and sustains upward motion that raises him to the estate of ruler, Beowulf is born a prince whose roots are grounded in his homeland. The elements used to represent these two men are also representative of their origins. Water is used to symbolize the rootless Scefing, while fire and earth symbolize Beowulf’s grounded ancestry.Both men are treasured by their people, yet allowed to fulfill their destinies by drifting or remaining rooted as has been their custom. Works Cited Beowulf. The Harvard Classics, Volume 49. Frances B. Grummere (Trans. ) 1910. P. F. Collier & Son, 1993. Clark, George. â€Å"Beowulf’s Armor. † ELH. Vol. 32. No. 4. Dec. 1965. pp. 409-441. Smith, Jennifer. â€Å"Paradise Lost and Beowulf: The Christian/Pagan Hybrids of the Epic Tradition. † Department of English. Long Beach: California State University. http://www. csulb. edu/~jsmith10/miltbeow. htm

Saturday, November 9, 2019

Help with safeguarding children and young people Essay

Outline current legislation , guidelines , policies and procedures within own UK Home Nation affecting safeguarding of children and young people. . There are many policies and procedures within the UK that outline the current legislation and guidelines to help with safeguarding children and young people. The Children Act 1989 The important part of this act is to maintain the child is at the forefront of decisions; the best option in relation to the child’s welfare will be taken into account when deciding the best course of action for the child/young person’s upbringing – creating a partnership between parents and multi-agencies. Alongside this, the requirement of parental responsibilities is outlined e.g. their rights, duties and powers and achieved a balance between the need/welfare of the child and the right of the parent/carers. It gives a clear definition for what is meant by ‘harm’ in relation to safeguarding children – for example introd ucing abuse as ‘ill-treatment’ and how the impairment of health can also be a contributing factor to abuse. Following this, the framework of courts was restructured to ensure consistency of decisions in relation to family court proceedings. Children’s Act 1999 The Children’s Act came into existence in the year 2000; it was to form a guideline that included a list of people deemed unsuitable to work with children and young people (e.g. paedophiles). Any person wanting to work with children/young people/vulnerable adults now has to complete an enhanced Criminal Record check (CRB). It is through databases such as the Criminal Records Bureau, that will safe-guard children and young people from contact with inappropriate adults. Children Act 2004 As a direct response to a very serious case review involving a girl named Victoria Climbie, this young girl was abused and after times of social workers not looking into her injuries and cancelling home visits , Victoria was in and out of hospital with burns , scabs , then Victoria was rushed into hospital she was suffering from malnutrition and hypothermia, doctor’s later transfer her to intensive care at another hospital where she died . Victoria’s body was examined and they found about 128 injuries and scars.  The government reviewed its approach to safeguarding and published a new green paper known as the Children’s Act 2004. The initial change was the introduction of the Child Protection .this act is linked to different agencies like , social-workers , child protection teams and SENCO, are able to look into cases and if they feel there are any concerns of a child is suffering from any harm / abuse they can apply for care orders and take them to safety in t heir best possible care homes. How national and local guidelines, policies and procedures for safeguarding affect day-to-day work with children and young people. There are many policies and procedures within the settings that cover the range of safeguarding children, the policies are Health and Safety policy, outings policy and Safeguarding policy. They are all put into place to ensure that all children / young people are cared for in the way they should be. The children and young people’s health and safety are important also is the welfare of the children in the settings/ schools.Social workers have to implement local procedures in Working Together. In some cases there will be reviews , they will look back into cases like Victoria Crimble, Bichard he murdered to young girls in Suffolk , Bichard work at the girls school. The case of baby ‘P’ He was treated like a punch bag after months of being harmed he died †¦betted to death social worker missed the signs. Now policies have changed to en sure that no more cases happen like these again. Safeguarding children’s policy; Our aim is to safeguard and promote the welfare of children. To ensure that the Rochdale Borough Safeguarding Board Child Protection procedures together with guidance described in the booklet ‘ What to do if you are a worried child being abused’ and the Children’s Needs and Response Framework are adhered too. Procedure: Our setting is registered on the Early Years register and we have a duty to comply with the welfare requirements of the Early years Foundation Stage which includes Safeguarding. We take seriously our responsibilities to ensure the safety and promote the welfare of children our care in line with the procedures laid out by the Rochdale Borough Safeguarding Children’s Board. We have developed a structured procedure to be followed in the case of a suspected abuse which is regularly reviewed and updated. We are committed to working in partnership with parents and ensure that we involve parents/ carers to  the highest degree, wherever possible, whilst maintaining the focus on the best interests of the child. The Rochdale Borough Safeguarding Children’s Board procedures have been agreed by all member agencies (R.B.S.C.B.)and must be followed whenever a concern exists about harm or potential harm to a child. The Children’s Needs and Response Frameworks has b een agreed through both the Children’s Trust and the Safeguarding Children’s Board and is to be used in all setting’s by all organisations that provide services for young children and young people . The Framework describes the levels of children’s needs and how as professionals we must respond to and meet those needs. Bullying / Behaviour Management Policy : Our aim is to create a safe and secure environment for all children that promotes and encourages acceptable behaviour and respect for others. To ensure behaviour strategies are consistent and developmentally appropriate, respecting individual children’s level of understanding, individual needs and maturity. Our procedure: Share with parents/ carers the rationale of boundaries and expectations to maintain a joint approach. ‘All adults ‘ role model good behaviour and positive strategies and language at all times. Bullying in any form will not be tolerated. Staff will respond positively to all parents/carers concerns regarding bullying ,and listen to all concerned. Help children to challenge bullying , harassment and name calling .Bullying is always distressing for the victim and can have serious consequences. Whistle Blowing policy: Every nursery has a whistle blowing policy and procedures these policies are put in place to pr ovide protection for the person against victimisation or reprisals from another member of staff. If any of your concerns are about malpractice or misconduct in the setting about another staff member to a child this must be reported to the named Safeguarding Officer in the setting. If concerns are raised then there are certain procedures to follow. .The whistle blower must write their concerns down and think what they saw, what happened and by who, was there any witnesses, the dates if it has happened more than once, the child’s name and place it took place. .Concerns must be reported to the named Safeguarding officer . .Al l information will be kept confidential and is investigated discreetly by Data Protection Act. Although whistle blowing may be a daunting and frightening experience to act  upon , the safety and well being of a child may depend on another person’s actions, subsequently all aspects of whistle blowing are to be thought over with the best intentions of children/ young people in mind in our setting. CONFIDENTIALITY POLICY: Our policy is to ensure that all those working or learning within the setting has a clear understanding of the meaning and importance of maintaining confidentiality. All parents/carers should be aware that information divulged about their family will be treated in confidence. No information regarding the family will be discussed with any third party without consent of the responsible adult and their agreement, except in the case of safeguarding children . We will respect confidentiality in the following ways: .As part of their induction, all staff are reminded of their responsibility to maintain confidentiality. .Staff will ensure that discussions regarding families will not take place in presence of children: such discussions will only take place in private to maintain confidentiality. . Care will be taken with informal records such as dairy notes, telephone messages etc: and these are also treated with sensitivity. .Any evidence relating to a child’s personal safety will be kept in a confidential file . Information about individual children will be shared between staff on a need to know basis. .Parents are welcome to access information on their child which has been recorded by staff, but we are unable to share information recorded by other professionals without their permission. Parents/carers will not have access to any information about any other children. .Children/ young people may wish to have access to their own files, However, it must be recognised that there may be inform ation in their file that parents have requested not to be shared with their children . .All records will be stored in a locked cabinet. Access to this cabinet is restricted to named personal. .Any confidential information will be shredded and disposed of appropriately. .Information which is stored on a computer will be password protected. COMPLAINTS POLICY: We aim to deal with complaints and concerns as quickly and effectively as possible in line with the Early Years Foundation Stage. It is of paramount importance that The Willows runs smoothly and parents and  staff work together in a spirit of co-operation and in the best interests of the children. Children and parents are entitled to expect courtesy and prompt, careful attention to their needs and wishes, we always ensure that parents views and opinions are listened to and taken seriously. Procedure: In the first instance if you wish to make a complaint please speak to your child’s key worker or another member of staff – team who will try to resolve the issue. If this does not have a satisfactory outcome please speak to one of the managers / deputy manager of the setting. You can make your complaint verbally or in writing .We will always complete one of our settings complaints record forms. All complaints will be acknowledged within 48 working hours of receipt. Compla ints will be investigated and an account of the findings of the investigation will then be acted on , the result of the action of the complaint will be put in writing within 28 day period. However if we cannot resolve your complaint or you are not happy with the outcome, due to the nature of the complaint you may wish to speak to our regulator ‘OFSTED’ you can contact them: we will give you their address, LEGISIATION: Children Act 1989 is a law that relates to children to provide for the local authority services to protect children in the event of allegations of signs of child abuse. The law is put in place for the safety of these children with organised children’s homes, fostering childminding ,adoption and day care settings for young children. The Childs Act 1989introdued the concept of parental responsibility, this act aimed to ensure that children’s welfare was dominant, whilst in partnership with the parents/carers. It is there to strengthen the child’s legal position, to give the child legal rights, feelings ands wishes. WORKING TOGETHER TO SAFEGUARD CHILDREN 2006: This revised version of the act sets out how organisations and individuals work together to safeguard and also to promote the welfare of children/ young people in accordance with the children’s act 1989. It is important that all practitioners within the settings and environments in childcare , must know their responsibilities and duties in order to safeguard the welfare of the children and young people by following their policies and procedures, especially in the light of THE LAMING AND BICHARD INQUIRIES; The children act 2004: Many professionals involved in cases remarked that they had big workloads and a low pay , and their morale was low . Communication was not good between teams and agencies. This inquiry made a number of improvements to departments and this led to Children’s Act 2004. The Data Protection Act 1989 This act came into force in early 1999 and covers how information and details about adults, children and young people are kept. The act is required that all organisations, environments and settings must keep all information and details of families filed and locked in cabinets . All confidential information that is kept on computers should be protected by passwords. EVERY CHILD MATTERS: This Act was formed in 2003 The with Lord Lamming report resulted in a green paper, ‘Every Child Matters’ to make sure that children could get help to be save, There are five outcomes : *Be healthy *Stay safe *Enjoy and Achieve *Make a positive contribution These are the main focus areas of early intervention, and a shared sense of responsibility , sharing of information and integrated services. CRB: Stands for Criminal Records Bureau, these are checks made by the settings , the police national computer has all criminal records and details stored in them . CRB checks are made for anyone working within a children/ young people’s environment or old person/ mental disabled environment .To ensure that you are legible to work in these environments and be responsible for children/young people and mental disabled people. If you are a volunteer / student you still have to have a CRB check done. Vetting and barring scheme were created to help safeguard children and vulnerable adults by introducing these new measures including monitoring and registration requirements following the Bichard inquiry.

Thursday, November 7, 2019

The conventional method of shopping over e-shopping. Essays

The conventional method of shopping over e-shopping. Essays The conventional method of shopping over e-shopping. Essay The conventional method of shopping over e-shopping. Essay With the introduction of the Internet, the world has become a smaller place. Buying and selling items through the Internet can be done in seconds. At the click of mouse and in the blink of an eye, billions of dollars are exchange via banks, from country to country, across the oceans. In the face of such excitement, one wonders whether the conventional method of shopping will continue to exist for long. I feel that although e-shopping is slowly becoming popular, it cannot take over the conventional method of shopping. Firstly, human beings are complex creatures. It is very difficult to satisfy them. They need to look at products, and feel and try them before they decide to buy. They will go from one shop to another to compare prices, and ask for opinions before they finally decide on a product to buy. This cannot be done through e-shopping. When the goods are delivered, you have to accept them whether you like them or not. E-shopping does not allow for easy refunds and repairs. When you look at a product on the Internet, you do not know how efficiently It will function. If you discover it does not work when you receive It, you will have to go through a tedious process to return it. If you had bought the product from a shop, It would be easier for you to have it repaired or replaced or to get a refund. Furthermore, when you e-shop, you do not know how reliable you seller Is. You do not know where he works, what he looks like, whether he can be trusted or whether such a company really exists. The conventional method of shopping does not give room for such doubts. The seller Is there In person to persuade you to buy a product ND to stand guarantee for the quality of the product. E-shopping also encourages credit card fraud. Since you normally have to pay through credit cards, unscrupulous people can hack Into the website, get access to your account number and use your credit card. You also run the risk of not getting your product even after paying for It. The traditional method of shopping allows females to get together for an outing and enjoy a meal later on. It encourages family unity and family harmony. E- shopping, on the other hand, can be a lonely affair. The shopper has to sit In front of silent tube and Walt for the products to flash on the screen. In conclusion, I believe that e-shopping will not replace the traditional method of shopping. The conventional method of shopping over e- By WYSIWYG product on the Internet, you do not know how efficiently it will function. If you discover it does not work when you receive it, you will have to go through a tedious process to return it. If you had bought the product from a shop, it would be easier for Furthermore, when you e-shop, you do not know how reliable you seller is. You do room for such doubts. The seller is there in person to persuade you to buy a product E-shopping also encourages credit card fraud. Since you normally have to pay through credit cards, unscrupulous people can hack into the website, get access to your product even after paying for it. The traditional method of shopping allows families to get together for an outing shopping, on the other hand, can be a lonely affair.

Monday, November 4, 2019

A Business analysis of Sony Ericsson

A Business analysis of Sony Ericsson Sony Ericsson is a joint venture owned equally by the telecommunications leader Ericsson and Sony corporation- the consumer electronics powerhouse. It was established in the year 2001 with a capital of 100,000,000 Euro and released its first product in the year March 2002.The management team of Sony Ericsson is based in Hammersmith in London. It is the fourth largest manufacturer of phones in the world as of 2009. It has around 8450 employees with over 2500 contractors worldwide. It has a 6.788 billion revenue and the profit of 836 million in last year. Globally, its market share dropped from 9.4% to 7.9% in Q1 2008.(Wikipedia.com,2010) Sony Ericsson is a global provider of multimedia devices such as phones, PC cards and accessories. The products with its powerful technology and innovative applications result in mobile imaging, entertainment, communications and music. In areas of music, design and applications the products from Sony Ericsson have a universal appeal. It uses communic ation technologies such as 2G and 3G platforms in its products, increasing the offerings to the market. In this assignment our focus will be on the following arguments: Sony Ericsson’s phone, model number W910i, which is in a declining stage Reasons for declining of W910i Situational analysis of Sony Ericsson and W910i mobile phone A marketing plan for the rejuvenation of Sony Ericsson W910i The Argument Structure Sony Ericsson W910i was one of its kinds. It is a slider phone and was branded as the Walkman phone. It had features such as shake control which enable music track change by just shaking the phone, it also had video games based on Java ME and JP-8. It is available in six different colours and included a 1GB or 2GB memory card. It can also play FM radio using the RDS and TrackID service. On the 14 Feb 2008, this phone was awarded the Best Handset 2008 award by the GSM. Despite all these features the phone had stability issue which led to its decline. The ph one used to crash and switch off intermittently and as of November 2009, to fully resolve these issues the company is yet to release a version of software. The other instability issue which it has includes screen complaints and system freezing, button input failures and restarting. Due to these issues, the phone has received a lot of criticism in many forums and reviews and eventually leading to its decline in the market. Situational Analysis of Sony Ericsson and its Mobile Phone W910i Strengths Sony Ericsson has diversity in its products. The other major strength is Sony as a brand name. Sony Ericsson W910i was branded as Walkman phone. It was the first phone which replace the File manager which is seen in older models to the present Sony Ericsson Media Manager. It had a large number of features such as Java based video games and applications, shake control feature, was available in six different colors. On account of all these features it was awarded the Best Handset Award in 2008 Weakness Lack in customer preferences understanding, uuser-centereddesigns and brand awareness globally. It had less technology advancement. Sony Ericsson W910i had many stability issues such as crash and intermittent switching off. Other issues included system freezing and button input failures.

Saturday, November 2, 2019

The Essence of Humanism Seen Through the Villa Rotunda Essay

The Essence of Humanism Seen Through the Villa Rotunda - Essay Example The Renaissance period also gave birth to the phenomenon of learning from the nature that became the base for the revival of classical letter and teachings. This ideology was backed by the belief that these learning can guide the humans towards the right path of the life. The humanism theorists believe that the human being can seek for assistance from nature in each and every facet of their lives. When it comes to arts, the humanists believe that an artist should reflect the perfection and balance that he found in different creatures of nature. In this way, an artist can also emulate the perfection and balanced beauty of the natural creations (Petrosyan, 1972, p98). The main objective of the following discussion is to explore the humanism through the analysis of an architectural work done during the Renaissance period. In this regard, the essay strives to explore the essence of humanism in one of the finest buildings of Renaissance period; Villa Rotunda that was built by an eminent humanist architect of that time Andrea Palladio who was the chief architect of Venetian Republic. This building is chosen because Palladio is among the prominent humanists of his age and the focus upon one of his major accomplishment could be a significant way to apprehend the values of humanism reflected through the art pieces. Palladio was among the most influential architects of the Renaissance era whose work is a great source of inspiration even for the architects of modern time (Hopkins, 2002, p43). He has designed twenty villas in Venetian Mainland during his lifetime and almost all of them are regarded as beautiful example of renaissance arts; however, the vill a rotunda possesses a distinguished position among all of his works and it has been regarded as the finest and subtle artwork of Palladio that is alive even after centuries (Howard and Deborah, 1980, p224).

Thursday, October 31, 2019

GoTo Statement Essay Example | Topics and Well Written Essays - 500 words

GoTo Statement - Essay Example A goto statement is a constituent of many languages like C, C++, COBOL, Pascal, Algol and others, especially of assembly languages. Nevertheless a goto statement is not popular in all higher-level languages of programming. Thus in Java goto statement is a reserved statement at present (Tribble 3). During the period of early stage of structured programming development many experts in computer science arrived at a conclusion that in programs it is better to use "structured flow-control commands", for example, loops and "if-then-else statements" rather than a goto statement (Tribble 5). Though there are experts who consider that despite the fact that "goto statement considered harmful", there exist some problems in a great number of programming languages that can't be directly decided without a goto statement, like, for instance, exception handling or breaking out of nested loops (Knuth 268). "There are few good uses for a goto statement. It is not uncommon for the class instructor to ban goto statements altogether. But the traditional legitimate use for a goto is to allow the programmer to escape from deep nesting when a special case (usually an error) has been encountered. For Pascal programmers, this means that, on rare occasion, you may want to goto'' the end of a subroutine in order to exit.

Tuesday, October 29, 2019

Personality Essay Example | Topics and Well Written Essays - 750 words - 8

Personality - Essay Example Analyzing individual’s personality necessitates evaluation of cognitive and behavioral aspects and entails collaboration of various disciplines such as psychodynamics, biology and humanities, evolution and sociology just to mention a few. The information from these fields are then analyzed in an empirical dimensional approach principled on various multivariate statistics and evaluation based on sociologically or psychologically modified framework such as factor analysis, theory development and other evaluation platforms (Furr, 13). Myers- Briggs framework also known as Myer- Briggs Type Indicator [MBTI] is an assessment questionnaire that seeks to understand the psychological preferences in how people make decisions, react to other non-decisive phenomenon and how they generally perceive their surroundings. The framework involves psychometric analysis with focus on human behavior and personality with emphasis on extraversion and introversion; inborn or acquired traits that influence individual’s experience and perceptions in terms of sensation, feeling, intuition and thinking aspects. These aspects are further grouped into conceptual approaches of rationality and irrationality with typing based on either extraversion for sensing, thinking and judgment or introversion for intuition, feeling and perception. The evaluation is based on four dichotomies of introversion and extraversion; sensing and intuition, thinking and feeling, judging and perception, in a bid to indicate one’s reference over the ot her. Psychologically, individuals are born with and/ or develop certain preferred ways of deciding and perceiving the environment or phenomenon in the society and with guidance of MBTI framework this paper will analyze the personality of Warren Buffet and evaluate how his personality has impacted on his daily activities and as a leader in the business arena. Warren Buffet can be described as a business mogul with vast interests in

Sunday, October 27, 2019

Wireless Network Security

Wireless Network Security There is a growing need to find lasting solutions on how to deal with security issues involving with wireless networks, in order to make them as secure as possible. The growth of the Internet has been an explosive since inception, and this has lead to a great increase in the number of portable/mobile computing and communication devices such as notebook computers and mobile phones, in recent years. As manufacturers constantly improve on the features, and general capabilities of mobile devices, the Internet also continues to get bigger and to improve, even at a faster rate than these mobile devices. In fact, the market for mobile computing and telecommunications is likely to overtake the market for fixed (conventional) computing and telecommunications, in the near future. This is because there has been a consistent growth in the demand for mobile devices for computing and telecommunications. [1] Without a doubt, wireless technology was has been a very relevant and vital breakthrough in the computer and telecommunications world, and the Wireless third generation (3G) network is proving to be increasingly beneficial to many users of various networks. The main advantages of the 3G networks are that they provide a lot more interconnectivity and, a better and wider reach. Wireless Local Area Network (WLAN) has also been advantageous. Some of the advantages of WLAN include the use of Broadband service with low costs and wide-reaching technology. Therefore, integrating 3G wireless networks with wireless local area network was invented, naturally, so as to get the best of both words of3G wireless network and WLAN. [1] http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf Background. WLAN and 3G are two key mobile/wireless technologies, which have been identified to have great potential in terms of value to the customer. While 3G is a standard that defines technology that can provide high bandwidth wireless access over a large area and supports various services such as roaming, WLAN is a disruptive technology that provides higher bandwidth within small areas. With WLAN getting integrated to 3G networks, there are several security threats that need to be considered. These are threats that are unique to such an integrated network as well as threats due to the vulnerabilities inherent in each network. The 3rd Generation Partnership Program (3GPP) has defined the standards for the integrated WLAN-3G network. The organisation takes into consideration several security issues, as part of its standardisation efforts. However, there are still some gaps in the security that can adversely affect service delivery and vulnerability. From the security point of view, the network architectures are defined for both Roaming and Non-Roaming inter-working scenario. Additional components are specified to the 3GPP network architecture to facilitate inter-working such as Packet Data Gateway (PDG) and WLAN Access Gateway (WAG). The inter-working is based on UMTS Authentication and Key Agreement (AKA) authentication method. This requires a user equipment to run the USIM application. This means that WLAN user equipment is equipped with capability to use UICC smart cards. The inter-working mechanism enables a 3G mobile network subscriber to access WLAN networks operated by different service providers. This also supports roaming scenarios. Wireless local area network (WLAN) and 3-G devices enable users to carry their computers and communication devices around within their offices and homes, without having to handle any wires and without having to disconnect from the network when moving around. There is greater flexibility with these devices, due to less wiring, thereby increasing overall efficiency, and also reduced wiring costs. For instance, networks that use Bluetooth technology can be used for synchronization of data with network systems, and enable the sharing between of computer applications between devices. With Bluetooth functionality, there is no need for printer cables and some other connection equipment for peripheral devices. 3G network based security threats. The key threats for 3G networks in perspective of integration of networks are: Wireless LAN customer who does not have access to 3G networks get access to 3G services without subscription. WLAN user gains access to 3G network and creates issues such as Denial of Service WLAN user gains access to 3G network and uses impersonation for using the service but charging other customers. Manipulation of charging when services like calls are transferred from one network to another. Application and Data related threats. Collection of login details and personal details that are transmitted over the network by using sniffing tools and mechanisms, especially when sufficient transport security is not set. Manipulation of information used for user authentication or service access to gain access to unauthorised services or manipulation of billing. Extracts personal information that are used at other places such as credit card information. Obtain information about user such as permanent identity in the network. Virus attacks from WLAN devices to other devices in the network Trojans and malicious software passed from one end-device to another. For volume based charging model, a rogue partner can flood the user with garbage packets to increase the invoiced amount. Malicious programs on the user terminal that increases the traffic to certain sites or content to illegally increase the traffic. Security Considerations for 3G-WLAN Integrated Networks. The security framework for 3G-WLAN integrated networks consists of various layers. Each security layer is independent of the other layers. However, there needs to be an overall security scheme that connects all the security requirements together. Also, since some of the vulnerabilities can happen at multiple layers, a holistic approach and framework is required to address all the risks of the special network. Authentication security at the user terminal. The authentication scheme in the case of 3G-WLAN should be based on a challenge response protocol similar to the existing mobile communication authentication scheme. This requires that the authentication details in the user terminal to be stored securely on UICC or SIM card. This should support mutual authentication and security mechanisms such EAP. Signalling and User Data Security. The subscriber needs to have the same level of security as the mobile access that is specified for the 3G networks. This means that the WLAN authentication and re-authentication mechanisms must be at the same levels as for 3G USIM based access. It needs to support the maintaining session key verification and maintenance. Also the 3G systems should provide the required keys with sufficient length and levels of entropy that are required by the WLAN subsystem. WLAN key agreement, distribution and authentication mechanism should be secure against any attacks by middlemen. The WLAN access technology between the user equipment and the access point/ network should be able to utilise the generated session keying material to ensure the integrity of the connection for authentication. Privacy of User Identity. The keys used by 3G AAA function that are used for the generation of temporary identities that is used for the communication between the network element and the user terminal should not be possible to recover. If it is possible to retrieve the keys, the permanent identity can be derived from any of the temporary identities. Also it should be possible to mask the different temporary identities corresponding to the permanent identity. Security of the access interface. The access interface between the user equipment and the network element should be protected against eavesdropping and all attacks on the security-relevant information. Sufficient cryptographic mechanisms should be employed to ensure adequate security, and at least 128 bit encryption keys should be used for the security system. The interaction between the different endpoints of the local interface should be properly authenticated and authorised. Also the keys used for the security should not be shared across the local interface links and each interface should use unique keys. Access of the user terminal and SIM remotely should be monitored such that the user can choose to allow or disallow the connection. Displaying of the information should be provided to the user to enable the user to take the decision. Further, the USIM information should be secured when it is transferred across different networks such as 3G core network, WLAN network or any other networks involved. Link Level Security. Wireless link can be classified as the most vulnerable interface among all the interfaces in the 3G-WLAN integrated network. The link layer security provided by the WLAN network should be used for ensuring security at this layer. At this layer, the confidentiality and integrity of user data should be protected. In addition, any signalling information between the user equipment and the access point should also be secured. Another area of vulnerability is the key distribution, key validation, key freshness and key ageing. Security of any Tunnelling. UE can tunnel information to other devices in the Visited PLMN or the Home PLMN. When such tunnelling is employed, the data origin should be authenticated and integrity checks should be supported. Also the confidentiality mechanisms should be in place between the systems. As the 3G systems have defined security roles in tunnelling, the decision on allowing tunnelling is a function of the 3G network. It is essential to implement the right decision parameters such as level of trust in the WLAN access network or the Visited PLMN involved, capabilities supported in the WLAN user equipment in terms of security in tunnelling and whether the user is authorised for such services. Privacy of User Identity. User identity privacy ensures that none of the permanent subscriber identification information is send across the network in clear. This is based on temporary identities such as pseudonyms or re-authentication identities. Sufficient security procedures should be followed in generating, distributing, using and updating these identities. Also the period of maintaining a temporary identity is also important to prevent tracing of the identity. Various scenarios need to be considered for design of such a system such as: WLAN UE receiving more than one temporary identity from the AAA server Tunnel establishment If the identity privacy support is not activated by the home network Confidentiality Protection. The confidentiality protection should consider different scenarios and network access options. The key scenarios are: In WLAN direct IP access: Here the function is implemented using the WLAN access network link layer. In WLAN 3GPP IP access: Here the integrity of IP packets that is sent through the tunnel between the user equipment and the network should be protected. Research Points. Authentication, Authorisation and Accounting are the most important factors in ensuring network security. There are various techniques available in various types of network available for AAA. One example is UMTS-AKA in 3G network and EPA in wireless networks. Each of these techniques are suitable for the respective types of networks and considering the security requirements. With the integration of networks, the characteristics expected of the integrated network are a combination of both networks. The integrated network is expected to work with the same simplicity and efficiency as a WLAN network but with the security implementations of a 3G network. However a 3G-network security introduces overhead on the network resources that are not desirable in the integrated network. Also when there is an access from one network to another, the overall security profile of the integrated network is that of the weaker part of the network, in this case, the WLAN network. There is a need for the use of the AAA method, which is simple in operation in terms of the message handshakes required and delay introduced and at the same time secure enough to match the 3G network security requirements. The objective of this research is to: Evaluate the current AAA mechanisms available in terms of its capability, Recommend the best option for WLAN-3G network in terms of the efficiency and the security effectiveness. Methodology The methodology for identification of suitable AAA function involves the following: Evaluation of the currently selected methodologies used UMTA-AKA, WLAN-EAP These protocols are evaluated in terms of the overhead required to handle the mechanism and strength of the method infrastructure required to support the system in terms of network elements. Identification of other methodologies used in other technologies and networks Profiling of the different technologies in terms of the capabilities, limitations and characteristics Establishment of minimum requirements of 3G-WLAN network Comparison of profile to the minimum requirements established and selection of methodologies Recommendation of modifications required in the methodologies to suit to WLAN-3G environment. Research Tools. Various tools and resources will be employed during the course of this research, including: Reference implementations of AAA functions. Simulation software for evaluation of the robustness and strength of the AAA functions. Standardisation documents that provide evaluation of the AAA methodologies. Commercial products that employ AAA functions; such as WLAN access points and WLAN user equipments. Software protocol analysers for checking the message flow and function. Expected Results. This research will aim at providing guidance to operators and vendors, on the use of AAA functions for 3G-WLAN networks. Specifically, the following results expected at the end of this research: Identification of suitable AAA function for use in integrated WLAN-3G networks Recommendations of modifications required for the current implementation of the AAA function. References. A Guide to Wireless Network Security: White Paper. http://techlibrary.networkcomputing.com/rlist/920045790_12/sort_by/doc_type/IP- Networks.html Wireless Networks Evolution, Vijay Garg, 2002, Prentice Hall. http://www.cs.columbia.edu/~charles/publication/ft-concept.pdf http://fiddle.visc.vt.edu/courses/ecpe6504-wireless/projects_spring2000/report_sathyamoorthy.pdf http://csrc.nist.gov/publications/nistpubs/800-48/NIST_SP_800-48.pdf http://compnetworking.about.com/od/wirelesssecurity/tp/wifisecurity.htm http://www.pcstats.com/articleview.cfm?articleID=1489 http://www.practicallynetworked.com/support/wireless_secure.htm http://www.windowsecurity.com/articles/Wireless-Network-Security-Home.html http://computer.howstuffworks.com/wireless-network.htm http://netsecurity.about.com/od/hackertools/a/aa072004b.htm http://netsecurity.about.com/cs/wireless/a/aa112203_2.htm http://www.networkworld.com/topics/wireless-security.html Home 3GPP TSG Services and System Aspects, 3G Security: Wireless Local Area Network (WLAN) Interworking Security (release 6), Technical Report, 3GPP TS 33.234 V6.5.1, (2005-6), December 2005. 3GPP TSG Services and System Aspects, 3G Security: Security Architecture (release 6), Technical Report, 3GPP TS 33.102 V7.0.0, December 2005. 3G and WLAN Interworking Security: Current Status and Key Issues, International Journal of Network Security, Jan 20063GPP TSG Service and System Aspects, Feasibility Study on 3GPP System to Wireless Local Area (WLAN) Interworking (release 6), Technical Report, 3G TS 22.934 v. 6.2.0 (2003-09), Sept. 2003.

Friday, October 25, 2019

Characteristics of Magical Realism in If Dinosaurs Were Cats And Dogs :: Dinosaurs Were Cats And Dogs Essays

Characteristics of Magical Realism in If Dinosaurs Were Cats And Dogs      Ã‚  Ã‚   "If Dinosaurs Were Cats And Dogs" is a short story written by Colin McNaughton. "If Dinosaurs were Cats And Dogs" was published in 1981. It is classified under the fantastic sublime. However, based on the analysis of "If Dinosaurs were Cats And Dogs" one would believe that magical realism is a genre of the sublime.    While reading "If Dinosaurs Were Cats And Dogs", one comes upon the illustrations in the book. Through out all of the illustrations, the people are on a smaller scale then the animals. Scale is a sign of a sublime work. It creates a mood of nature being more important than humans or anything else for that matter. Scale, when used in sublime works, sets a universal or macroscopic tone.    I would confidently maintain that nothing contributes so decisively to the grand style as a noble emotion in the right setting, when it forces its way to the surface in a gust of frenzy, and breathes a kind of divine inspiration into the speaker's words (Longinus 109). Longinus is explaining how a moment in a story line becomes clear to the reader out of a turbulent setting. It is considered by Longinus to be a perfect specimen of the sublime. In the short story "If Dinosaurs Were Cats And Dogs", many examples of the emotion force their way to the surface in an uncontrollable frenzy. A good example from "If Dinosaurs Were Cats And Dogs' would be this excerpt: " This snake is over ten miles long, which makes it very hard to steer. When people shout, "Look out! Look Out! Its head's too far away to hear"(McNaughton 21). In the excerpt from the story, when it is explained that even though people are shouting for the snake to watch where it is going, the snake can't hear because the it's head is ten miles away. This is a brilliant examples of sublime literature.    Although "If Dinosaurs Were Cats and Dogs" is classified as fantastic sublime, the story has many examples of magical realism within its pages. The way in which the animals in the story are humungous is one of the many examples of magical realism. A parrot that is twenty-nine feet tall is extraordinary. Even more extraordinary is a snake that is ten miles long.

Thursday, October 24, 2019

A Social Worker

Social work is a profession in which it is important to have a set of rules to follow while working with clients. In the social work field, the code of ethics, values and use of supervision are important keys in how licensed social workers should handle their clients' private documents and other information in association with having skilled attitudes towards their work as well as in their personal life. The code of ethics is a set of rules set by the National Association of Social Workers made order for a social worker to follow while being a professional. These principles could also be considered universal in social work practice across the nation. Furthermore, these principles are further explain the six core values that licensed professional social workers understand must be upheld daily in their career. According to NASW (1996), the six core values are service, social justice, dignity and worth of the individual, importance and centrality of human relationships, integrity and competence (NASW, 1996). The value of service highlights the ethical principle of serving the community by addressing social issues that may be seen in certain communities. An example of service while being a social worker would be to helpa client who may be homeless find resources to enable him or her to get back on their feet. This could entail assisting the client with being put on the Housing Authority waiting list. The value of social justice is in relation to being an advocate for a client who may be treating unfairly and getting them into a situation in which he or she may have equal rights as others do. As a professional social worker, I feel like that it is only right to be a part of at least one organization that would assist me in learning how to take be an advocate and stand up against various laws that can work against the progression of the community that I may be serving as a professional social worker. By joining educational organizations, I won't just be able to join in activities that would educate and bring awareness to such issues but I would also be building my continuing education that a social worker take part in. The ethical principle defined by the National Association of Social Workers, for dignity and worth of the person is being able to respect clients no matter his or her situation. I believe that this is important as a social worker because this will help in building trust and a relationship with the client. This shows a client that just because they are the ones needing help that they will still be treated with dignity and respect. By being respectful and treating them as a person and not as someone who is looked at as being a bad person would open the door for more opportunities and resources that could be beneficial to the well-being of the client and situation. The importance of human relationships as an ethical principle is understanding that relationships are important while being a professional. This would help the client in building new relationships and build a social worker's expertise to be able to work more effectively with their clientele. Human relationships allow a person to be able to bond and grow more. Integrity and competence is a social worker understanding that he or she must act in a professional way and continue learning daily. As a licensed social worker and student, I am expected to become educated through professional development workshops and attending conferences. Within the State of Alabama, a social worker is to uphold these core values and ethical standards while practicing in the field. The use of supervision is not only an obligation but it is quite beneficial to a licensed social worker. In order for a social worker to keep his or her license, he or she must undergo hours of required supervision. Supervision is beneficial in that it assist a social worker in their ethical conduct. Under State of Alabama laws, a social worker would have to experience a minimum of 4 hours monthly for a continuous period of 24 months within a 36 month timeframe. Supervision would occur starting with having an occupation. Supervision is only completed by licensed professionals who are qualified as a Licensed Master Social Worker or Licensed Independent Clinical Social Worker. The first requirement of supervision is for a Licensed Bachelor Social Worker. If a social worker decides to no longer practice in a specific area, then he or she must complete a minimum of 4 hours monthly for a period of 6 months. Supervision is discontinued upon records and a contract is signed stating the type of supervision and conditions. Social Work Licensure and LawsWhile researching Social Work Licensure and Laws, I learned more about how the state of Alabama follows a standard guideline for the licensure and laws of social work. According to to the Alabama Legislature (1977), Title 34 Section 30 states that a person is not able to give themselves the title or practice social work unless they have been licensed and passed the social work exam (Alabama Legislature, 1977). In order to apply to take the exam, a candidate must be a graduate of an accredited BSW or MSW educational program. The applicant must be 19 years of age, have paid the initial examination fee of $250, passed the examination, signed a notarized statement and sworn of the professional code, and meet any additional requirements based on the level of licensure. In the state of Alabama, there are three types of licensure that are given to those who meet the above requirements. A person can be licensed as a Bachelor Social Worker, Master Social Worker, or an Independent Clinical Social Worker. In order to receive a license for BSW, a person has to have a bachelor degree from an accredited college or university. Furthermore, a person has to show that he or she has a completion of the social work major and completed two years of continuous full-time employment in a social work position under supervision. If a person does not have a Bachelors in social work, a person who has a Bachelor's in a related field, such as sociology, rehabilitation counseling, psychology and guidance counseling is eligible to apply for a MSW program or have a social worker job but will not be titled a social worker. In order to receive an LMSW, a person must have completed the Master or Doctorate of Social Work from an accredited or approved college or university. An exclusion to this requirement is a person who has candidacy that is granted by the Council on Social Work Education. After I graduate with my MSW, I will be seeking my LMSW. I believe that by going further in my education will not only make me more marketable in the social work field, but it will allow me to be more knowledgeable as how to work with clients. To become a LICSW, a person would need either a master's or doctorate of Social Work. A person would also need at least two years of supervision by after graduation, and be a U.S. citizen with appropriate documentation. When and if a person is issued a license from another state, he or she would be required to meet state requirements if qualifications from the other state are not equal to the qualifications of Alabama. However, this is with the exception that the application fee and exam has not been paid or passed. Those persons who are seeking exemption from the Board's examination must meet all qualifications for that specific license and also have completed six years of continuous supervised full-time employment approved by the Board or seven years of continuous full-time employment with a public agency on or before May 1, 1977. In the State of Alabama, a social work license must be renewed every 2 years. The fee for a license renewal is $100. If applicant fails to renew within a 60-day time frame of the expiration date, then the license is either terminated or suspended. Per state of Alabama law, any licensed professional who is actively practicing social work cannot be denied for license renewal. If the applicant would like to remain inactive, then that person may write a request to the Board Examiners to be placed on the inactive list. Social Work Practice Stages The Social Work practice stages are also known as the Generalist Intervention Model (GIM). According to Miller, Tice and Hall (2008), the Generalist Intervention Model is a method of practice that integrates casework, group work, and community organization, and focuses on the interaction between persons and their environments (Miller, Tice and Hall, 2008). The GIM uses engagement, assessment, intervention planning and implementation, evaluation and termination as a way to better assist clients to planned change. An example of utilizing the GIM would be first greeting and welcoming the client. For the purposes of this assignment, we will call the client- Client A. Client A is a female coming to a social worker in efforts of having planned change from her addiction of abusing alcohol. In efforts of demonstrating engagement, the social worker would use proper body language to show that he or she is listening to the client, using appropriate hand gestures and making good eye contact. The social worker would ask Client A to tell her what she thinks her needs are and what resources in the community may be beneficial to assisting her with changing. This would allow Client A to provide detailed information about her current situation and what she thinks about her surroundings. It is important for the social worker to take notes to assist Client A after the initial meeting. However, before taking notes, the social worker should ask Client A for their consent before taking notes. After asking open-ended questions through engagement, the social worker should go over with Client A how the social service agency works and the services that we will provided. Any questions that may be asked of Client A will assist the social worker with assessing Client A's needs. During the assessment portion, the social worker should assess Client A's mental/emotional state, appearance/ mobility, ability to perform her activities of daily living, her environment, health, economic status, education status and transportation needs. The social worker could utilize the tool of an Ecomap to assist her in assessing Client A's needs. For planning and implementation, the social worker should work with Client A regarding a plan that is real and attainable. Client A must believe that the plan will work and must desire to reach goals that will be made together with the social worker. The social worker should prioritize the importance of change and helping Client A understand that change is a good thing. The social worker should assist Client A in understanding how this could benefit her socially. Once the goals are established, the social worker should address the objectives of each task given and how to proceed with actions towards those goals. Since client A is struggling with alcohol abuse, the social work should assist Client A with establishing the goal of: Lessening her urge to drink alcohol. The objective would be for her go to an Alcoholic's Anonymous support group once a week for 6 weeks. The social worker will encourage Client A to keep a journal of her progress and Client A must write in her journal after each support group session and describe her experience. This will assist Client A as well as the social worker in understanding her growth.As a form of evaluation, the social worker will obtain Client A's journal that she has been writing her experience in and Client A will also complete a questionnaire on her progress. Client A would complete the questionnaire two weeks before her last appointment. The questionnaire would ask her about how she thinks she has progressed, services that were rendered, and about the social worker's expertise. Once she has successfully completed her goal, the social worker will talk with Client A about termination two weeks after the last meeting. During this, the social worker will also discuss with Client A her progression. The social worker should encourage Client A to continue with the progress she has made. If needed, the social worker should refer Client A to additional services that may be beneficial to other issues that she may face following termination. It is important for the social worker to follow-up with Client A once services are terminated. Follow-up can help Client A from relapsing or even coming back for services. However, the social worker should give Client A the phone number to the agency in case services may be needed again.Intervention and Developmental Theories for Direct Practice with Individuals, Families and GroupsThere are several theories that are used to explain the behaviors of an individual, and has provided the framework for various models and interventions. One theory that can be utilized is Conflict Theory. Conflict Theory focuses on the structure in an individual's life. This theory would showcase issues that could have occurred through a power struggle between family members or friends as well as in various stages of the individual's life. The conflict theory would then consider the familial structure, and if there is a continuous cycle that may be from the past. There is also the Systems Theory. According to Gibson (2016), Systems theory, also called social systems theory, in social science, is the study of society as a complex arrangement of elements, including individuals and their beliefs, as they relate to a whole (Gibson, 2016). The Systems Theory would show how the individual interacts with others and if there is any correlation between the influences in the client's life and their behavior. The last theory is practice models that focuses on creating an intervention through consultation and assessment of the individual. There are an array of interventions that may be completed, such as the Solution-Focused model, Crisis model, Task-centered model, and the Problem-solving model. The practice models would require more interaction with the client. Life stages would play an important role in each model especially when it comes to understanding what to focus on and what not to focus on. For example, a 50 year old is not at the same stage as a 20 year old because the 50 year old is more experienced with life. Therefore, it is key that the social worker understand this before using the practice models. Diversity/ Social Justice/ Advocacy/ Rural and Urban Communities Diversity, social justice, advocacy for rural and urban communities are at the core of social work. I believe that diversity is more important in urban communities rather than rural communities because individuals are looking for employment and better opportunity for school, homes, and the quality in urban areas. As a social worker working mostly with the older adult population, I work in both urban and rural areas. I observed that the services are limited in rural areas and is especially harder for my clientele to receive the necessary resources, such as transportation to and from their doctor's appointments. I observed that there is a need for more rural social workers to assist clients in obtaining more resources to a better quality of life. Social justice in both rural and urban communities is beneficial as there are most likely political and social issues faced by persons who live there. Some people in rural areas may not even have an opportunity for their social injustice issues to be addressed due the scarcity of resources. As a social worker, it is important to be an advocate for those who may not be heard. Advocacy for rural and urban communities varies due to the resources that the community may be lacking. Sometimes a social worker will have to be an advocate for those living in a rural area for there to be more resources, such as additional transportation for the aging to be able to get to their doctor's appointments that are located in urban communities. The lack of services delays certain individuals from getting the appropriate assistance, and as a result can place the community in a mentality that they are not able to be helped and their voices will never be heard. Policy and Policy Analysis Policy and policy analysis refers to the guidelines that are set to uphold the welfare and good of the clients. Policies are ever-changing and revised in accordance with time. An analysis is completed before a policy is written. The analysis helps in the development of the policy that is brought forth through careful research, surveys, case studies and other tools. It is crucial to have an analysis completed because it provides a thorough evaluation of any revisions or changes that need to be made. It also shows how useful the policy is to the population that is should protect. Understanding the efficiency and the worth of a policy helps lawmakers and other important decision makers. Research, Program Evaluation/Needs Assessment Research, program evaluation, and needs assessment are mainly targeted, not at the needs of one client, but of a client base. A single subject design is conducted for understanding the needs of an individual. In order to conduct research on a specific group of people, there must be an Institutional Review Board. The IRB is also known as a human subject committee is used to oversee research to ensure that it is following the proper guidelines set forth to be able to conduct the research. According to Royse, Thyer, and Padgett (2016) the guidelines include: the research participants must be volunteers, the participants should be given sufficient information about the study to determine possible risks or discomforts as well as benefits, no harm shall result from the study, and sensitive information should remain protected (Royse, Thyer and Padgett , 2016, pp. 45-46). According to Royse, Thyer and Padgett (2016) A program evaluation is conducted to understand if the services are really helping the clients that they are intended to serve (Royse, Thyer and Padgett , 2016, p. 1). During this process, information is gathered to see if the social worker and/or agency are the best fit for the client. According to Royse, Thyer and Padgett (2016), The mission of program evaluation in social work is to provide information that can be used to improve social programs (Royse, Thyer and Padgett , 2016, p. 2). Evaluation can range from a series of open-ended questions to observation of the client base in various environments. According to Royse, Thyer and Padgett (2016), Needs assessment are attempts to identify and document unmet needs, gaps in services, or problems in a community (Royse, Thyer and Padgett, 2016, p. 63). The assessment used would be dependent on how severe the clients' needs are and the type of resources that can be used to assist the clients. The individual conducting the needs assessment can utilize tools, such as surveys, personal interviews, focus groups and etc. to perform a needs assessment.