Tuesday, October 29, 2019

Management Information Systems Essay Example | Topics and Well Written Essays - 1750 words

Management Information Systems - Essay Example Cost leadership and Differentiation focus strategy will be discussed with examples in the following section. Wal-Mart stores have successfully expanded its operations across many countries with cost leadership strategy by gaining competitive advantage through under-pricing products while maintaining decent profit margin; thanks to savings from lower costs that allows Wal-Mart to transfer savings to customers. Starbucks Corporation currently employs the differential focus strategy and caters to a specific target consumer segment with unique and distinguished products. Selling unique line of coffee and tea products to high-end customers at a high cost gives it a competitive advantage. It doesn’t aggressively market itself but the attention to detail, product quality, impeccable customer service, and ethical practices have helped position the organization as â€Å"one of the most valuable global brands†. Wal-Mart currently has a management information system that helps sto ring and sharing information from and for its world wide operations. It uses point-of-sale system to record all the sales information and telecommunication to connect with its stores worldwide to maintain stocks. Starbucks has an advanced information system in place to collaborate worldwide operations, especially focusing on direct coordination among finance, purchase, sales and marketing, and human resource department. However, both the firms need to extensively focus on information security and customer profiles in order to avoid potential security breaches and information misuse to ensure sustained success and growth. References Trevino, D. (2009, May). Starbucks Details Strategy For Profitable Growth. Starbucks Newsroom. Retrieved from http://news.starbucks.com/article_display.cfm?article_id=184 Ireland, D. R., Hitt, M. A., & Hoskisson, R. E. (2011). Understanding Business Strategy: Concepts and Cases. Cengage Learning. Retrieved from

Sunday, October 27, 2019

Marketing Profile Analysis On Pandora Internet Radio Media Essay

Marketing Profile Analysis On Pandora Internet Radio Media Essay For our Group project we will be doing a marketing profile analysis on Pandora Internet Radio. First, we will explain what the company does. Next, an in depth analysis including the site navigation, the Pandora business model, brand interactivity, the brand look, brand personality, their competitors, Pandoras metrics, what kind of consumers use Pandora, how consumers behave, and where Pandora could use room for improvement will follow. In the business model we will look at how Pandora makes their revenue through the different services they offer. Site navigation will describe where each click will take you and how to get from page to page. Brand interactivity explains how not only user can interact with Pandora, but how Pandora can interact with its users. Further, we will see how the brand looks across different formats from computer screens to mobile phones in brand look. Next, in brand personality, we will discuss what kind personalities are embedded in the brand. Also, while looking at competitors we will see how Pandora fares against their top competitors and what they do differently. Pandoras metrics will include the sites traffic, how long a consumer stays connected to a site, and its reach. Finally, when we look at consumers, we will look at how the Net gen is the majority of Pandora users, and how consumers move through the behavior model of acquisition, consumption, and disposition. What is Pandora? Pandora is a Internet radio service created by the Music Genome Project. They started up in 2000 and according to their website its the most comprehensive analysis of music ever undertaken. Users can enter a song or artist and Pandora will play music that you entered, but also music that is stylistically and auditorily similar. They have more than 50 music analyist that study and listen to the music one song at a time, collecting details on every song based on close to 400 attributes that include melody, harmony, instrumentation, rhythm, vocals, and lyrics. According to their website, the typical analyst working on the Music Genome Project has a four-year degree in music theory, composition or performance, has passed through a selective screening process, and has completed intensive training in the Music Genomes rigorous and precise methodology. Pandora never uses any bots or machines to extract data from any of the songs. The songs are always being updated and new songs are continually added to their ever expanding catalogue of titles. Site navigation Pandoras website is very easy to access. The address is http://www.pandora.com/. When the page loads, there are 3 places you can click at the top half of the page. You can register a new account, log-in with a preexisting account, or type in an artist, or song, and immediately begin listening to music. Clicking on the register hyperlink takes you to the registration page and is completely free. The only information needed is an email address, a password, the persons birth year, their US zip code, and their gender. There is a opt-out check box for personalized recommendations and tips. Once everything is complete you can click register for free of cancel. Registering for a Pandora account allows you to save you stations and access them from anywhere. If sign -in is chosen, all that is need is an email address and password. This takes you to all of your saved stations and also allows you to type in a new station or artist. Typing in an artist or song starts playing the music. The bottom half of the page is newer. There is a space where you can click to see the information about the music you are playing, view a mini feed of your profile, select music by genre, learn about how to get Pandora radio on your mobile phone and in your home, and see whats happening in the Pandora video series. Below this feed, you can view concert listings, gift a station where you can make a station and give it to another Pandora user, look at bookmarked songs, and again, go to the video series page. Business model The business model for Pandora is mostly ad driven. Consumers can register for free and begin listening to music immediately. Users are never required to pay anything because it is payed for by the advertisements. However, they have two more aspects to the business model. Once free Pandora accounts reach the 40 hour mark of listening per month, the music stops and you are required to pay 99 cents for unlimited listening for the rest of the month. You can also just come back the next month for another 40 free hours. Each month has the same choice on the limit and they never bill you after the fact of charge you. The final part of the business model is a paid Pandora One subscription account. This offers unlimited listening hours each month, plus no advertisements. It comes with a high stream quality, desktop application, extended interaction timeout, and a mini player. This can be purchased for a subscription for 36 dollars per year. Pandora also has a box through HP that you can purchase to stream music anywhere in your home. It has built in speakers and Wi-Fi connectivity. Aside from music, you can now view the Pandora vise series and look up concerts coming to areas near your town. Pandora is branching out to video and live music avenues. They also work with mobile companies through advertising and putting mobile applications on phones so you can listen to Pandora anywhere instead of just a computer or home device. Pandora allows for users to expand their musical knowledge based on their own personal preferences without requiring the user to purchase songs on a whim. The seemingly archaic days of buy before you try have ended partly because of services like Pandora. Pandora gives users the option to purchase each song multiple ways in a variety of digital formats. One of these methods is to buy a song via iTunes. While the iTunes service itself allows for the sampling of a given song, it does not give users the ability to stream the entire song prior to purchase.    Brand Interactivity Pandora is becoming more that just an internet radio player. Consumers can create a profile much like social networking sites and add friends to communicate with. Users can leave comments on other users profiles, share radio stations, and even find other Pandora listeners. With Pandora mobile applications, users can access this information where ever they are and listen to music straight from their mobile phones. Not only can you search to find song, or artist, you can also take a look at the Pandora video series, which is a video blog that contains videos about music, how the music is made, and where to hear it. Pandora also has a written blog where users can interact and comment on posts. The final point of interactivity is users can see a schedule of local live shows in their area. The list is based on your bookmarks list, thumb up and you station seeds, so the concerts that they show you are going to be based off of what your profile says you listen to and what you like. For each event, you can click on the ticket info button which takes you to the event website, to view the event and get tickets. This can also all be accessed from the mobile phone application. Brand look across formats Pandoras brand look is, for the most part, uniform across its various mediums. The page is identical no matter what browser you chose to view it on. This is extremely important for a service like Pandora. This is because a user might choose to view this content on a computer loaded with a browser that is different from the browser that they usually use Pandora on. An example of this would be a user who usually uses their windows-based computer loaded with Internet Explorer to access Pandora being forced for some reason to use a mac-based computer loaded with Safari. Because of Pandoras uniformity across platforms, this user will be able to use their Pandora on the mac-based computer without the initial learning curve often associated with using new web based services. Pandora is also able to be accessed on various broadband enabled mobile devices. Pandora has taken steps to make their service as uniform and consistent as possible across the mobile devices that might be used to access Pandora. For instance, Pandora accessed on a users Apple iPhone 3G looks almost identical to Pandora accessed on another users Motorola MOTORAZR V3. Furthermore, the page layout on both devices mirrors that of Pandora accessed on the users personal computers. This is another step Pandora has taken in order to reduce any additional learning curve that might be associated with accessing Pandora service on a users mobile device. Brand Personality Pandoras brand personality includes both a mechanical passion for music as well as a passion for connecting users with music that they otherwise might not have had or wanted access to. This mechanical passion for music is made evident by Pandoras Music Genome Project. Because of this mechanical passion, Pandoras brand gives off a scientific vibe. Pandora is also very diverse because no one persons musical taste is exactly like the next person. Musical taste is something that is very unique and Pandora is trying to cater to each persons uniqueness. They know each person is different, which what makes them different from other internet radio stations. Pandora is kind of like the guy that no one really cared about, but then everyone wants to know him because they realized how cool he really is. Major Competitors While Pandora brings many new and unique features to free internet radio, it is hardly the only game in town. Last.fm, Imeem, and Grooveshark are just a few internet radio alternatives to Pandora. Each of these services offers their own take on Internet radio. Lately, Last.fm has taken the position of Pandoras primary competitor. Like Pandora, Last.fm offers users the ability to stream custom playlists based on a users personal preference. While both services share this feature, they have unique and independent ways of doing so. Last.fm employs a technique called Scrobbling to determine which songs rise or fall in popularity. This is accomplished by the user downloading software on their personal computers and ranking their streaming music. With millions of users doing this on a daily basis, this is a great way to crowdsource popularity. Pandora on the other hand is based on The Music Genome Project. This is essentially a database of artist-defined analysis of each song. This analysis is primarily based on the songs musical attributes as well as unique qualities associated with the each song. So one on hand, you have millions of laymen ratings helping to improve the listeners streaming experience, and on the other hand you have a selected group of well trained ears pouring over individual songs to produce unique playlists for the user. Which is better is left up to the individual user. Recently, one of Pandoras competitors, Imeem, has stolen a substantial amount of traffic away from Pandora. Imeem is part social networking site, part internet media service. With Imeem, users interact with each other by streaming, uploading, and sharing music and videos. Imeem also allows users to build and share custom playlists with others directly on Imeems website or via an imbedded Imeem player through external sites such as Facebook and Myspace. Other online music services such as Grooveshark compete with Pandora. Grooveshark allows users to upload, stream, and vote on content similar to Imeem. Grooveshark also incorporates a Pandora-like system for recommending content based on the users personal song choices. With all these great features, why is Groovesharks traffic almost stagnant next to Pandoras mammoth annual growth of close to three million users? Grooveshark users have provided criticism that Grooveshark does not indemnify its users against any unlicensed uploaded content. Essentially, this means that Grooveshark is not responsible for the content that they host. Pandora Site Metrics According to Alexa.com, a website that specializes in web traffic metrics, Pandora is ranked 82nd for United States website traffic. This sandwiches Pandora between Newegg.com, arguably the internets largest electronic retailer, and the United States Postal Service for internet traffic. There are many metrics with which to compare a websites e-traffic and ultimately said websites/services success. The first of these metrics and arguably the most important is a websites daily traffic rank trend. This metric compares Pandoras daily traffic against other websites accessed. According to this metric, daily Pandora traffic has fluctuated over the past year. Currently, Pandora is ranked 371. Another metric with which to compare Pandora to its competitors is the time the average user stays connected to the given website. Currently, the average Pandora user stays connected eleven minutes. In relation to Pandoras previously discussed competitors, Pandora has the longest user retention rate. This compares to Last.fm and Imeems five minute and Groovesharks seven minute user retention rate. The last metric used is Reach. Reach refers to the percentage of global internet users who visit Pandora. According to Alexa, 97.7% of Pandoras users access Pandora from within the United States. This metric shows that Pandora has a strong national user base but should look into expanding their international user base. This is not necessarily the case for Pandoras competitors. Imeem, for example, has an extremely strong user base in Thailand, having a national user base of only 42.8% United States users. Last.fm has a United States user base of 35.2% with the remaining 65% consisting of international users. Ultimately, Pandora will need to begin increasing their international traffic if they plan on sustaining their growth. Customer Profile The types of people we see using Pandora, more frequently, and more often are the Net Generation. They were typically born from 1980-2000 and are anywhere from 10-30 years old. The reason that the Netgeners use Pandora more is because Pandora is a digital product and the Netgeners are growing up in a digital world. They are different from other generation in that their lives are surrounded by digital media. (Tapscott) 73% of youths between the ages of 12 and 17 use the Internet. For most teenagers it is a way of life. So, it is only natural that we see this age demographic using Pandora services. The characteristics of these consumers are as follows according to Tapscott. They have fierce independence because they create online identities and acquire knowledge to make their own decisions. They have and Intellectual and emotional openness and view the world in a global context. They have very free expression and have strong views. They are also very innovative and have a strong desire to be more mature than their predecessors. They investigate things out of curiosity, demands real time and fast processing, are very sensitive to corporate interest, and are very trusting online. Consumer Behavior Acquisition How the consumer gets content from Pandora is that they find it. This is accomplished by typing in an artist name, or song name, and Pandora streams then the content. They also get to choose more or less what they listen too. Also creating a profile helps in the acquisition process. They also get to create stations so that they can the content that suits them best. Consumption The customer consumes content by listening to the music, reading the blogs, or watching Pandoras video series. They can also consume content by getting gift stations from other users and communicating with them through a simple messaging service. Disposition In the disposition process, consumers can bookmark and save songs to remember them later and even use the information so that they can personally own the song. The content never really goes away though. They can listen, watch, or read the duration of the content, but its always there for the consumer to go back and listen, watch, or read it again. Ideas for Growth   Ã‚              The first idea for growth, which I think will also target a larger market, is somehow incorporating their service into automobiles a little better.   Currently, Pandora can only be heard through computers and cell phone with broadband data plans. If Pandora can create a way for people to get internet radio in cars with services, they could reach a larger audience for people that either dont listen to music on their computers or dont have expensive smart phones. A way of implementing Pandora into an already well respected device would be to implement Pandora functionality into satellite radios. It would also be a safer alternative to have something compatible with a car that being distracted by a mobile device.   Ã‚           Next, Pandora needs to begin expanding into the international market. Currently, Pandora has blocked access to users outside of the United States. This clearly explains why Pandoras user base is comprised of 97.7% United States users. Pandora founder Tim Westergren spoke directly on the topic saying: As it stands now, there is still no affordable license for a webcaster to stream legally (ie. abiding by all standing copyright law and properly compensating performers and composers) anywhere outside the US. However, Pandora has publicly stated their commitment to finding a way to provide Pandora service to international users, leaving new potential users with only keep the faithà ¢Ã¢â€š ¬Ã‚ ¦ Finally, Pandora should look to advertise their paid services more. Even if they dont in publications or Ads, they need to at least start pushing it on their website more. The guess would be that they dont want to seem like they are moving to a paid service, but if they want to stay in this business, more money is what it is going to take and they need to start pushing people to subscribe, or buy products from them. Channel Mix Plan The Channel mix plan for Pandora is Internet. It is the one channel that can reach the maximum number of clients for their business model. They also use a phone application as a channel through mobile Internet service providers. The messaging with customer through both channels is all opt-in only. You will only receive emails if you check a box and any information is only sent or retrievable of you want, or ask for it. Conclusion In conclusion, we have discussed Pandoras business model in detail. It seems that once Pandora can monetize their service appropriately, they will be an extremely, financially, successful digital media venture. Furthermore, Pandora has a great deal of legitimate future growth considering they have yet to expand their service outside of the United States. Ultimately, Pandora has an extremely bright future in the internet radio market.

Friday, October 25, 2019

Advancements in Computers in the Last Ten Years :: Essays Papers

Advancements in Computers in the Last Ten Years Computers date back all the way to 300B.C. with the invention of the abacus. This was a calculating devise to do math and it made the people of that time lives a lot easier. That is what the computers of today do but so much more. I will start at the basics of computers while trying not to boar you. The first real computer that actually made calculations was the ENIAC that was made by the government in 1943. It costed $500,000, weighed over 30 tons, had 19,000 vacuum tubes, and consumed almost 200 kilowatts of electricity (computer chronicles 8). Now we have advanced to laptops that are one inch thick and 15 inches wide and can do a lot more than the ENIAC could. There have been thousands of advancements and new technology in computers in the last ten years but I am only going to skim the tip of the iceberg. In 1990, there were tons of new computers and new software but the big issues were the new processors that were super fast for their time. They could go at speeds up to 33mhz, which is how fast your computer brings things up on the screen. In 1991 Microsoft come out with a version 5.0 MS-DOS mode which gave computers more space to run their programs. Also in 1991, Intel introduced a 50mhz microprocessor, which kill its other 33mhz processor of last year. Then a few months later MIPS Technologies come out with a 100mhz processor which started to make the processor group of the computer a very competitive area to come up with new technology for. In addition Hewlett-Packard Co. made the very first color scanner that could scan whatever you wanted and put it into your hard drive. 1991 was a big year for new technology in computers but that’s not all. Pixar began to work with Walt Disney Company to make a film that was completely computer animated and eventually come up with the movie toy story. In 1992 there were three major changes in computers and the technology. First Microsoft stock reached a record high for a computer stock ever and peaked at $113 a share that year. Next Microsoft shipped its 3.1 version of window and it is a big hit and was the most abundant program on the earth.

Thursday, October 24, 2019

Sylvia Plath Theme of Honesty

Jade Bevan Word count: 2821 ‘Plath uses honesty in the character or ‘Esther’ to reflect her personal anxieties’. Explore the theme of honesty in ‘The Bell Jar’ by Sylvia Plath and Emily Dickinson’s ‘Selected Poems’. In the course of your writing show how your ideas have been illuminated by your response to ‘Catcher in the Rye’ by J. D. Salinger and other readings of both texts. The theme of honesty is one that is echoed throughout all three of the authors writing, but is expressed in different ways. Sylvia Plath’s character ‘Esther Greenwood’ in ‘The Bell Jar’ is much like J.D. Salinger’s character ‘Holden Caulfield’ in ‘Catcher in the Rye’. Both characters have a cynical tendency to constantly reveal their inner most opinions about the society around them, discussing their feelings about personalities and appearances. Plath and Salinger were both born in the early twentieth century, despite this had completely opposing backgrounds and upbringings. Plath experienced a quiet and subtle early life in Winthrop Massachusetts, a small seaport town. Whereas Salinger endured a mainstream, fast paced and fashionable beginning in the city of New York.Both these places can make a person incredibly sociable or utterly isolated. Emily Dickinson’s ‘Selected Poems’ also reveals honesty and she confesses her depression very openly and concisely. Being born in the nineteenth century, Dickinson often expresses her opinions of the social placement of women and their restricted lives. She is unlike the ‘stereotypical woman’ of her era, and retaliates in her writing against the inequalities between the sexes. Many critics believe her to be a feminist.Throughout the ‘Coming of age’ novel ‘The Bell Jar’, Greenwood, the protagonist narrator, is constantly breaking down situations, people an d objects around her, like saliva to food. She over analyses the nature of society all around her, and enjoys criticising. When Greenwood first introduces the reader to ‘Doreen’, the mischievous opposite to Greenwood, she contradicts her description beginning with ‘I guess one of my troubles was Doreen’. This statement makes the reader begin to build a negative, unpleasant personality in their minds. However she concludes her escription with ‘a mysterious sneer, as if all the people around her were pretty silly and she could tell some good jokes on them if she wanted to’. This statement shows a clear admiration for Doreen, differing from the initial introduction, however also shows Esther expressing her opinion of Doreen being a mean kind of person, but likes that about her. This could be considered to be a hidden metaphor, for Greenwood’s slow decent into depression and madness, beginning with confusion and uncertainty, typical signs of insanity, which reflects the rest of her story. This is an upfront and honest introduction to the novel.This shows a friendship between the two characters, but a kind that is of a girlish jealous nature. Greenwood clearly admires Doreen’s personality but envies her social power at the same time. Plath also reveals Greenwood’s detachment and alienation from others throughout the novel, isolating her character. This could be to remind the reader of her insane self compared to the sane society and people around her. This can be explained through Greenwood stating ‘I felt myself shrinking to a small black dot against all those red and white rugs, and that pine-panelling.I felt like a hole in the ground’, in this short description of her feelings, she shows vast indications of isolation and depression. The use of the words ‘shrinking’ and ‘small’ reflect her feelings of disappearing and becoming non-existent to the world. Also, descri bing herself as ‘black’ compared to the ‘red and white rugs’ is a use of juxtaposition in the colours, which show how uninteresting she finds herself, being dull and dark in comparison to the bright vibrant rugs, which could imply the rest of society around her. This identification of herself could be considered an honest view of how others perceive her.Another character that is slated by Esther’s criticism is Dr. Gordon. She belittles him by saying ‘How could this Dr. Gordon help me anyway? With his beautiful wife, and his beautiful children, and his beautiful dog, haloing him like a Christmas card’. Dr. Gordon is the psychiatrist who made a mistake during Esther’s electroshock therapy in a terrible way. As the patriarch of the ideal American family, Dr. Gordon seems to represent American society, punishing Esther for going against social expectations, rejecting marriage and family.This shows her honesty and awareness of her soci al differences and views with the rest of society, and is mocking them for being so stereotypical. Her repetition of the word ‘and’ reminds the reader of a list, almost as though Esther is expressing that there are endless differences between society and herself. J. D. Salinger uses the character of Holden Caulfield in parallel with Plath’s character Greenwood, a first person, and protagonist narrator. Holden also suffers with the illness of contradiction, alongside insanity of course, this is another similarity the two characters share.The reader is introduced to an upfront, confident Holden, whom from the setting of the novel, is obviously tense with the topic of family, and starts by stating ‘I don’t feel like going into all of it’, then continues to ‘go into it all’ by describe how annoyed his parents would be if he disclosed any personal information, ‘Especially my father’. He is building a personality of his fat her without realizing, showing a particular conflict with his father, more so than other members of the family. He is also separating himself from his family in that he would openly discuss their issues, whereas his family would not.Essentially, the readers receive an immediate separation and self alienation from his family, and recognise Holden’s critical personality from the start. It is clear that throughout ‘The Bell Jar’, the character of Esther is used by Plath to explore the theme of sexuality, and the effect the 1950’s attitude towards sex had on the women of that time. ‘Then he just stood there in front of me and I kept staring at him. The only thing I could think of was turkey neck and turkey gizzards and I felt very depressed. This description of Buddy’s penis does not only reveal Esther’s criticisms of other further, but we begin to see her real attitude towards sex and Buddy himself. The general theme between Esther and Bud dy is that of sexual tension and virginity, however, although Esther is supposed to be ‘in love’ with buddy, it’s quite clear that she is not attracted to him and is not very fond of him altogether, we see this at the point where she is supposed to be at her most happy or intimate, when Buddy becomes naked in front of her, she feels ‘very depressed’.This may not be completely down to the appearance of Buddy’s private parts, but may be Esther’s attitude towards sex altogether, that she is only so eager to lose her virginity because it was the social norm, and wanted to be ‘part of a great tradition’. Esther shows her honest view upon societies attitude towards sex and its sexist inequalities towards sex when she says ‘I couldn’t stand the idea of a woman having to have a single pure life and a man being able to have a double life, one pure one not. ’ Plath is trying to portray through Esther her rebelliou s opinions towards sexual inequalities between men and women.In the novel, Esther discovers that sexuality is divorced from any expression of love and passion. Sex for women is only a necessity within marriage to have children, and has no relevance with romance or intimacy, Esther could be showing the reader her honest feelings of wanting to have a double life like the men of her era, and be able to experience sexual encounters out of passion and love, no just for starting a family, without being judged. However could also be suggesting her view that all people should remain celibate until marriage, both men and women, but on both interpretations, she is yearning for equality amongst the sexes.With Emily Dickinson’s unconventional style of writing and rebellious grammar, it is not a surprise that her poems do not meet the same literacy concepts as Plath and Salinger. Her poem ‘A Narrow fellow In the Grass’ reflects her individuality and opposing touch of honesty towards sexuality in every stanza. The literal and logical interpretation for the poem is her longing to see a snake in the grass, but only being able to glance at sections of the snake. However, Luann Suhr claims that the poem ‘is in fact about the fear a virgin has towards sex’.This differs from Plath and Salinger’s habit of blurting constant criticism of others, and shows a clear self aggravation and criticism. There are many literary devices used to allude to its sexual theme. Dickinson shows the fear of a virgin by knowing the naturalness of sex yet still being afraid of it. This is accomplished through the literary devices of personification, metaphor, and visual imagery. In the first line of the first stanza, by using the word â€Å"fellow† in her description of the snake she alludes to the snake in regards to man. In colloquial terms, the word snake is often used with regards to male genitalia.A â€Å"narrow fellow† can therefore be read as the male penis. This could also relate to her opinion of men being sneaky like snakes towards the concept of sex, compared to the expectations of a woman to remain celibate, showing her honest neglect of the sexist attitude that society has to sexuality. The second stanza ‘The grass divides as with a comb- Aspotted shaft is seen- And then it closes at your feet and opens further on’ Dickinson has purposely used opposing adjectives to represent her curiosity about sex, how one moment she is captivated by the idea of losing her virginity, then the next her mind closes’ her imagination because she knows she must remain celibate until marriage. It could also represent a previous sexual encounter that was never fulfilled, she is giving the reader an insight into her mind and how ‘dividing’ her mind like this could cause her mental illness to thrive. Once she has captured a small snippet of understanding ‘Aspotted shaft’, her sub conscious â⠂¬Ëœcloses’ her out. Dickinson’s confusion is clear, it sounds almost as though she is at war with herself, insanity, society and again differs from Plath and Salinger in that she does not alienate herself from society, but from her own emotions and desires.Despite this, she carries on fantasizing about this sexual encounter by saying â€Å"sudden is† Dickinson is stating that this male is quick to ejaculate. This can be further proved by the line before which says, â€Å"you may have met him†. The word â€Å"met† can be referring to the sexual meeting, and therefore puts a sexual connotation to the next line. When Dickinson reaches for this thing that scares her so much, it disappears. In the end of stanza four, she says, â€Å"it wrinkled, and was gone†. This is the visual imagery of a penis becoming flaccid.This man she is describing may represent her constant need to please, and fit in. Her honest desperation to communicate her frame of mind seeps through, when the reader finishes the poem to discover, that not even in the final stanza, does she reveal the root of the poem or what its meaning is, leaving readers to feel her confusion, to have a sense of what it would be like to suffer from mental illness, not knowing why or understanding the thoughts she has. Her complete sincerity leaves the reader, in a state of confusion, reflecting her everyday agenda.An aspect of honesty which can be related to all three authors is the honesty with the self and self reflection. Sylvia Plath uses the character of Esther Greenwood to portray her own personal attributes that she struggled to express in reality. We see this when greenwood describes her drink as ‘wet an depressing’, the very statement that a drink is depressing shows how irritating her character is, in the sense that she complains and reverts anything and everything she sees or touches to seem as depressing as she is.This could be Plath expressing thro ugh Greenwood that she is irritated by herself and her own character, the illness is not only discovered, but it irritates her, revealing a full acknowledgement of its existence. This honest analysis in itself portrays that Greenwood sees herself as an irritation to society and this could explain her isolated behaviour, a fear of not being accepted. Another self reflective part of the novel is stage in which Esther begins to lose touch with herself worth, ‘I started adding up all the things I couldn’t do’†¦ I felt inadequate’. Up until the summer before Esther’s senior year, she had done a good job at being a student of literature. However the thought of entering the real world terrifies her. The world she lives in seems to have no place for the literary ideals that she cherishes, which of course is her being pessimistic. This could be forcing her to doubt herself, and self worth towards the world, which may represent Plath attempting to portra y Esther as feeling worthless and useless.Or, another view could be that Esther sees herself as being too complex and misunderstood for the simple minds and dreams of the typical American girl of that era. Emily Dickinson shows honesty with the self and self reflection in the poem ‘The soul has Bandaged moments’ which explores through symbolism, an internalised spiritual and psychological state of experiences of the soul. Which is personified as a woman, and some may interoperate the personification to be Dickinson herself. In the first stanza it says ‘The soul has bandaged moments’ which shows a physical and abstract outlook and insight of the soul.It also implies injury and pain that could metaphorically mean that the soul being personified as Dickinson, she is hurt by her mental illness and attempts to heal herself when ‘she feels some ghastly fright come up to stop and look at her’. This could represent her soul searching and not being fond of what she finds in her mind, or it could alternatively represent her mental illness of depression creeping up on her, it has a sinister feel and may be considered that the mental illness is trespassing, on the privacy of her soul and self.She views this as a form of psychological assault and molester by using words in stanza two such as, ‘caress’ and ‘hovered-o’er’. These bring feelings of uncomfortability and helplessness to the reader. Dickinson is trying to express the mercilessness of insanity. This shows Dickinson’s fear of herself and her capability, some may view it as a panic towards her ever-growing stronger insanity and her ever-growing weaker free will against is. To conclude, a critic once claimed that ‘Writers, who suffer with mental illness, are likely to revolve their writing around complete honesty of their mind.Which, in a sense, creates more emotional and believable connections with the reader, making the insanity se em normal, and allow the reader to feel an attachment with the author’, some may consider this statement to be complete nonsense, however, the analytical evidence shows that there may be some truth in this observation. One may find the ability for Plath, Dickinson and Salinger, all of different era and lifestyle, to have managed to create such personalities and mind wondering scenarios with just the use of a single concept of honesty to be greatly admired.

Wednesday, October 23, 2019

Technology For People With Dementia Health And Social Care Essay

Around 570,000 people are enduring from dementedness in England and this figure is expected to lift drastically over following few decennaries. The people age 65 and above are more prone to dementia, and the opportunities of developing dementedness additions with older age. There are four different types of dementedness, Alzheimer ‘s disease, vascular dementedness, dementedness with Lewy organic structures and fronto-temporal dementedness. Fronto-temporal dementedness is the rarest type of dementedness while as Alzheimer ‘s disease is the most common type. Though dementia affects critical procedures like thought, understanding and memory, self attention is extremely recommended for such people. Apart from ego attention and support from the household, organisations like NHS provide specialised support to the patients ( NHS Choices, 2009 ) . Rolling – a term used to mention to walking behaviors that represent a hazard for an person ( Banty et al. , 2010 ) enduring with dementedness. Such people are difficult to take attention of. Apart from occupational healers, recent advanced in engineering have seen assistive engineering being developed for the people with dementedness. The assistive engineering has sparked a argument amongst the research workers. While some support it and see it as a measure frontward to healthcare of people affected from dementedness, many see it as an violation to the patients ‘ liberty. How successful this assistive engineering proves to be, nevertheless, remains to be seen. â€Å" The usage of the term ‘technology ‘ in relation to dementia attention provokes conflicting reactions. For some, ‘technology is a Jesus, the manner to paradise? ? ? ; others are profoundly leery of engineering and size up its advocates carefully for any tell-tale Markss of the Beast? ? ‘ † ( Cash, 2003 ) . Dementia costs the UK over ?17 billion per twelvemonth. Apart from the consequence this unwellness has on the economic system, the affect on the lives of the people that have dementia and the people associated to the sick are reeling. It has a serious impact on communities. With increasing figure of aged people in the society, the figure of people enduring from the unwellness besides increases. The figure is estimated to be over a million by 2025. This can overpower the wellness and societal attention services, which are already unable to get by with the challenge posed by dementedness ( Alzheimer ‘s Society, 2007a ) .Literature ReviewThe figure of older people aged 65 and over is lifting at an accelerated gait, it is the fastest turning section of the population worldwide and life anticipation is increasing every bit good as length of service over clip. Whilst people are populating longer, the sustained growing of the older population brings every bit considerable wellness, ec onomic and societal challenges ( Li et al, 2007 ; Kinsella and Wan, 2009 ) . Harmonizing to the World Health Organization – WHO, 2001 dementedness presents an unprecedented challenge to the society and is one of chief causes of disablement in ulterior life, impacting chiefly older people. At present, there are about 700,000 people with dementedness in the United Kingdom and this figure is predicted to lift by 154 per cent to over 1.7 million people by the twelvemonth 2051 ( Alzheimer ‘s Society, 2007a ; 2009 ) . The National Dementia Strategy for England – published in 2009 – set up 17 cardinal aims to better the quality of dementedness attention through intervention and direction of the disease. One of the aims highlights the demand for commissioners to see the proviso of options such as assistive engineering to assist people with dementedness to populate independently in their communities and to assist the direction of hazard every bit good as to detain the demand for intensive services including admittance to residential or nursing places ( Department of Health – Do, 2009 ) . In dementedness attention, assistive engineering can be described as a scope of devices and systems taking at back uping persons to keep their independency and authorising clients and carers to pull off more efficaciously their activities of day-to-day populating – ADL ( i.e. , functional mobility ) every bit good as their instrumental activities of day-to-day populating – IADL ( i.e. , community mobility and wellness direction and care ) every bit good as heightening wellbeing. ( American Occupational Therapy Association, 2002 ; Alzheimer ‘s Society, 2007b ) With the execution of specific intercessions including the proviso of assistive engineering, occupational healers may non merely lend to better wellbeing and independency of clients with dementedness, but besides to cut down dependance on their carers, and to protract independent life and detain the demand for intensive or inpatient services including admittance to residential or nursing places ( Graff et al, 2008 ; Chakraborty, 2009? ? ? ) . Dementia is a chronic and progressive organic encephalon upset taking to the diminution of cognitive working including memory loss, troubles with information processing, perceptual experience, spacial consciousness, every bit good as emotional and behavioral alterations ( WHO, 2001 ; Perrin et Al, 2008 ) . Rolling – a term used to mention to walking behaviors that represent a hazard for an single – is one of the most ambitious symptoms of dementedness. It is estimated that rolling occurs between 15 to 60 per centum of people with dementedness. While walking is a good activity, persons can go forth their places ( unnoticed ) and non be able to happen their manner back. Banty et Al ( 2010 ) highlights the hazards associated with rolling including hypothermia, desiccation and even mortality. It can convey hurt and anxiousness to both clients and their carers and it can take to the usage of physical restraint such as persons with dementedness being locked into their places, pharmacological traditional intercessions every bit good as an early admittance to residential attention places. ( Alzheimer ‘s Society, 2007b, Robinson et Al, 2007 ; Banty White et Al, 2010 ; Hope and Fairburn, 2004 ) Safer walking engineering – an alternate term used by Alzheimer Society in the United Kingdom – United kingdom which encompasses ‘electronic surveillance, labeling and tracking engineering and it will be used throughout this survey – might enable people with dementedness to keep their independency, to prosecute their occupational activities to increase liberty whilst understating hazard, accordingly lending to their wellbeing. These engineerings comprise of dismay and surveillance system which alert carers when a user cross over a set boundary within their environment, and tracking devices which enable a user to be located at any clip and topographic point ( Alzheimer ‘s Society, 2007b ) . Despite several progresss in research, evidence-based surveies back uping the efficaciousness of this engineering for people with dementedness with rolling behavior remains limited and inconclusive. ( Cash, 2003 ; Adams and Clarke, 2001 ) The writer of this survey intends to reexamine four recent research findings related to safer walking engineering and people with dementedness life in the community. In visible radiation of demographic, social-economic tendencies, the UK authorities is making enterprises and policies with the purpose of protracting independent life for people with dementedness in the community ( DoH, 2009 more mentions ) . Non-statutory administrations such as Alzheimer ‘s ‘ Society support the usage of this engineering. Both sectors nevertheless, strongly highlights the demand for farther research and evidence-based on the clinical effectivity of the usage of this engineerings ( DoH, 2009 ; Shoval et Al, 2008 ) . While there are possible positive and digesting benefits from utilizing safer walking engineering for people with dementedness and their carers ; there are nevertheless, of import factors to be considered such as ethical considerations and the hazard involved in utilizing and supplying these engineerings. In drumhead, there are an increasing figure of surveies on safer walking engineering which highlight the common subjects presented on their findings including the benefits and hazards for users and carers on utilizing its devices and systems every bit good as the ethical issues involved in the usage and development of this advanced engineering. The surveies besides greatly emphasise the demand of farther researches with the engagement of users and their carers ( Robinson et al, 2007 ; BMJ, 2007? ? Where is the mention? / ; Shoval et Al, 2008 ; Landau et Al, 2009 ) .Literature Review HighlightsRobinson et Al. ( 2007 ) say that the recommendations by the current authorities in England suggest a national attack to put on the line direction. But, in a litigious society, the balance between hazard direction and the person-centred attack in dementedness attention is difficult to keep. While rolling behavior in people with dementedness can be helpful, it is chiefly harmful and generates emotional hurt in the carers. The struggle between bar of injury and easing the individual ‘s right to autonomy frequently puts the carers into a quandary. The related issue is highlighted through the usage of assistive engineerings such as electronic tracking devices. The patients feel that these engineerings place them at greater hazards, i.e. as a mark to larceny. The patients besides express concern over their independency. There is a demand to develop practical tools for pull offing hazard within dementedness attention which allow both hazard direction to be managed and all other position negotiated. BMJ ( 2007 ) assesses the cost effectivity of community based occupational therapy compared with usual attention in older patients with dementedness and the caretakers. â€Å" Community occupational therapy intercession for patients with dementedness and their attention givers is successful and cost effectual, particularly in footings of informal attention giving. † Dementia is one of the major causes of disablement in aged people. The disease is degenerative and causes memory and behavioral upsets. It besides consequences in loss of independent operation, concluding and opinion. This causes jobs to the ill and load to the household and the caretakers. Occupational therapy tends to convey about an betterment in the day-to-day operation of the people with dementedness. It may besides cut down health care costs because of improved independency in patients and an enhanced sense of competency in the attention takers. Shoval et Al ( 2008 ) stress on the most common behavioral manifestations of upsets related to dementia, i.e. jobs with out-of-home mobility. Attempts have been made in the yesteryear to accomplish a better apprehension sing the mobility behavior. But, all the observations are based on the institutionalised patients and health professionals. There is a demand to do a significant part to basic every bit good as applied and clinical facets in the country of cognitive damage and mobility research. Landau et Al ( 2009 ) examined the attitudes of the household and professional health professionals towards the usage of electronic tracking for patients with dementedness. The health professionals were caught between caring for the safety of the patients and patient ‘s liberty. Family health professionals favoured the electronic trailing devices like the Global Positioning System ( GPS ) and the Radio Frequency Identification ( RFID ) . Both household and professional health professionals believe that determination on tracking the patients with dementedness should be an intra-family issue. These electronic devices are really of import for rolling patients as these people may non be recollect their memory to happen their manner back place. For older people with dementedness, rolling can be a potentially life endangering behavior. Sing the demand for assistive engineering for the roving patients, it is necessary to happen an reply to the undermentioned inquiry: What is the position of the occupational healers on the proviso of safer walking engineering with dementedness? Hence an interview to research ‘occupational healers ‘ position on the proviso of safer walking engineering for people with dementedness with rolling behavior in the community ‘ is both appropriate and feasible. To reply the above inquiry, the proposed research aims are: to look into participants ‘ consciousness of safer walking engineering to understand the importance of technological aid in safe walking techniquesResearch MethodologyDescription and Justification of Research DesignThe purpose of this survey is to research the occupational healers ‘ position on the proviso of safe walking engineering for people with dementedness with rolling behavior. For the intent of a deep survey into the issues, a qualitative research method was used. Qualitative research seeks to explicate the universe instead than step it. Qualitative research is holistic and blatantly interpretive. This sort of a research design trades chiefly with words ( Iorio, 2004 ) . Qualitative research workers examine the texts and artifacts in their work while entering everything they find in authorship or otherwise. These records are so analysed and interpreted to analyze a research job and happen suited decisions. A constructivist grounded theory research design was applied to come up with a conclusive statement. Constructivism is a theoretical attack to societal scientific discipline. The theory is based on the premise that people create their ain societal universe and acknowledges multiple worlds. It recognises the common creative activity of cognition by the research worker and participant. Therefore, constructivist attack necessitates a relationship with participants in which they can state their narratives in their ain footings while listening with openness to feeling and experience is every bit of import ( Charmaz, 2000 ) . Grounded theory is an attack to data aggregation and analysis ab initio developed by Glaser and Strauss in the sixtiess. The purpose of the grounded theory research is to develop theory from the informations collected by the research worker ( Halloway 1997 ) . A constructivist attack to anchor theory requires following a place of mutualness between the research worker and participant in the research procedure which requires a rethinking of the grounded theoretician ‘s traditional function of nonsubjective perceiver ( Mills et al. , 2006 ) . Position is ‘a mental position of the comparative importance of things ‘ ( oxford lexicon, 1990 ) , a subjective construct which can non be quantifiable, hence a semi-structured interview will be the chosen method of informations aggregation. Halloway ( 1997 ) says that interviews are the favoured method of qualitative research. While roll uping all the necessary theoretical informations, interviews give the research worker a opportunity to obtain positions of the participants/interviewees by giving them a opportunity to show their ain ideas and feelings. Interview method allows an in-depth history of participants ‘ experiences ( Domholdt, 2005 ) and their positions analysed for elicited subjects and classs associated to the relevant research inquiry. A semi-structured interview method is deemed appropriate for this survey, as it can be seen as a flexible attack to let possibility to research beyond the replies and potentially to come in into natural two-ways conversation with the participant. For the selected method, a set of open-ended inquiries ( Appendix 2 ) purpose to let for participants to give their sentiments without being restricted as deemed when utilizing structured interview or questionnaire methods to informations aggregation. While interview is the suited method for this survey, in peculiar in a semi-structure format where participants can research in deepness their position on safer walking engineerings and their positions on the incorporation of electronic surveillance of the patients ; there are restrictions including clip ( questioning, transcribing and analyzing informations ) , limited geographical distribution due to costs and clip, low dependability and possible prejudice ( Domholdt, 2005 ) . The research procedure would be completed in eight hebdomads ( Appendix 1 ) . Literature reappraisal is an of import portion of this research and it would be of import to maintain update of the new developments over the class of this research. The experimental design would be finalized in hebdomad 2 and 3 and submitted for ethical blessing of the concerned governments. Week 3 and 4 will see the enlisting of the practicians for the interviews, and the interviews will be held in hebdomads 4 to 6. The informations obtained from the interviews will be analysed and a study prepared by the terminal of 8th hebdomad.Indication and Justification of Required Number of ParticipantsAs the research is comparatively little graduated table, merely 10 participants will be interviewed. They will be qualified occupational healers with changing grades of station measure uping experience, employed by the National Health Services – NHS within Community Mental Health Teams – CMHT who work wi th people with dementedness for at least two old ages.Administration of Access to and Recruitment of Possible ParticipantsThe choice of the participants will be conducted utilizing a purposive sampling. This type of trying involves witting choice of certain elements by the research worker ( Grove, 2005 ) . The research worker will enlist the contact inside informations of all older people-community mental wellness squads ( CMHT ) in the greater London country. After ethical blessing has been gained from all relevant organic structures, the research worker will seek contact with service directors of each squad to obtain permission to reach occupational healers as possible participants to this survey. Additional permissions and blessing of the CNHT would be required to carry on these interviews within their office installations.Inclusion Exclusion Criteria of ParticipantsThe inclusion standards require that participants are qualified occupational healers, working with people with dementedness for at least two old ages in an older people mental wellness community squads. The participants might work as occupational healers specific and as a care-coordinator. The clip restriction will guarantee that research worker will derive a richer in-depth history of their experiences and position of s upplying or sing the proviso of safer walking. Geographic distribution will be limited to participants working in a NHS trust within the greater London country parametric quantities. The exclusion standards require that participants to hold no managerial place. The current state of affairs requires a direct interaction with the professionals involved in the attention of the people with dementedness. The sample will be chiefly guided to interview operational healers presently working straight with the patients.Indication of Ethical Issues Relevant to the ProposalThe undertaking would be submitted to the moralss commission of the Brunel University for their blessing. After acquiring the blessing from the university, the proposal would be submitted to the research ethical commission ( REC ) of NHS for their blessing.Discussion of Ethical Considerations Related to Participation and ConsentAn informed consent would be required from the occupational healers prior to the enlisting for this undertaking. If necessary, permission would be taken from the organisations like NHS the practicians are involved with earlier enlisting. The practicians ‘ would be kept good in formed about the work and its results.Indication of Any Risks and Benefits to Participants and/or ResearcherIn relation to the two out of four most of import ethical rules prolonging ethical pattern in most countries of wellness attention beneficence ( making good ) and non-malfeasance ( non making injury ) ( Beauchamp and Childress, 2001 ) ; the research worker, by questioning, and deriving information on the position and sentiments of participants in relation to the proviso of safer walking engineering to service users, endeavoured to advance the well being of the participants and to guarantee that no injury was experienced by them. Although this is a little survey with comparatively low risked involved, measuring the possible benefits against the hazard to both participant and interviewer will be an on-going consideration during the research procedure. Harmonizing to College of Occupational Therapists ( 2003 ) , â€Å" Research must hold intended value for participants, research workers, the profession, the research community and/or society. † While there is no direct benefits to take part in this survey, participants will hold an chance to show their sentiment about the issue of safer walking engineering where research is thin within occupational therapy and lending to the addition of research capacity within the profession ( College of Occupational Therapists, 2010 ) .Consideration of issues of confidentiality and informations securityThe results of the interviews would be kept confidential. While in some interviews it is of import to uncover the inside informations, nevertheless, the participants can take to stay anon. in this instance ( Driscoll, and Brizee, 2010 ) .Comprehensive description of ProceduresOccupational healers willing to take part in the research will have full information prior to make up one's minding to take part. After having informed consent signifiers back, participants will be contacted by telephone to set up a suited clip for interview every bit good as for booking an interview/meeting room at their office premises. Interviews will last about 60 proceedingss, nevertheless, it will be agreed with participants that interview/meeting room must booked for 90 proceedingss. The participants would be given all the inside informations of the research methodological analysis. Furthermore, the research worker will explicate to participants the processs for the interview including confidentiality issues. Measures would be taken to do certain that this research does non harm the participants in any mode. If necessary, names or any designation will be removed from records. To avoid personal sentiments impacting the result of the interviews, researched would be accompanied by his or her coach.Description and justification of the proposed pilot survey that would be carried out prior to induction of the full surveyA pilot interview will be conducted with one the occupational healers within the chief sample of participants. This step can supply an chance for the researcher/interviewer to reflect on and measure on his/her interview, verbal and non-verbal communicating every bit good as the participant reaction to the interview. In add-on, a pilot interview will ena ble the researcher/interviewer to obtain participant feedback on the suitableness of the informations aggregation methods including lucidity of the inquiries every bit good as become accustomed to the use of the recording equipment and informations security processs ( Domholdt, 2005 ) . To understate prejudice, the researcher/interviewer will work under his/her coach supervising. The feedback informations will be evaluated and analysed by both researcher and coach. Whether minor or major alterations are required, the research worker will set the original set of inquiries or either to supply a new set of inquiry harmonizing to the findings. The pilot interview will be incorporated into the chief survey if no alteration is needed otherwise the stuff relevant to the pilot interview will be destroyed.Justification of chosen method of Data analysisData analysis was coincident to the informations aggregation. For the analysis of informations, the grounded theory attack of Strauss and Corbin ( 1990 ) was used. As informations collected through qualitative research is constantly unstructured and frequently text based, the qualitative research worker has to supply some construction and coherency to the big sum of informations while retaining a clasp of the original histories and observations from which it is derived ( Holloway, 1997 ) . To ease this, the model analysis designed by Richie and Spencer ( 1994 ) was used. This method portions common characteristics with thematic analysis. Framework analysis is designed to ease systematic analysis of the information. It is an inductive attack and uses the changeless comparative method which is a cardinal characteristic of grounded theory. This attack was chosen because it is systematic, easy to follow and consistent with a constructivist position. Five cardinal phases to the procedure are identified: familiarization, placing a thematic model, indexing, charting and function and reading ( Ritchie and Spencer, 1994 ) . It is possible either for all the informations to be collected before analysis occurs or every bit for informations aggregation and analysis to happen at the same time. The changeless comparative attack was used so that in line with the constructivist nature of the enquiry some of the findings from earlier interviews could be fed into subsequent interviews by a procedure known as the hermeneutic rhythm ( Rodwell, 1998 ) .Appraisal of Resources required, including a Timetable for the Proposed Research.Cost will include travel disbursals within Greater London country with the usage of an oyster card ; printing and letter paper stuff and postage ; purchase of a new sim card to be used on the research workers ‘ Mobile phone. Fundss to cover the above costs will be provided by the research worker. Digital recording equipment, rechargeable battery and a laptop computing machine with suited applications including package for uploading the collected stuff are properness of the research worker ; hence no cost will be incurred on the use of the above equipments. The research worker intends to carry on interviews in an interview/meeting room at participants ‘ CMHT offices. Therefore no costs will be incurred on leasing installations for the intent of this survey. Human resources include both researcher and tutor clip and handiness.DecisionDementia affects the mental ability of the people enduring from it adversely. It is responsible for impairment of the cognitive abilities like opinion and apprehension. In many instances, dementedness leads to a status called roving, where the patients go on lone walks and bury the manner back because of the medical status. The debut of electronic surveillance and community based attention are recent developments in the field of dementedness attention. Dementia is one of the most cost incurring diseases in the UK. The new facets of attention claim to admit the comparative issues of the disease and do it economically feasible. Although new schemes are being devised and implemented on a regular basis, dementedness continues to be a serious economic and wellness attention job. There have been claims of rolling being good to the wellness of people holding dementedness ; the grounds is non strong ( Robinson et al, 2007 ) . The electronic trailing devices are wild put to inquiry by the professional health professionals for attaching on the personal liberty of the people holding dementedness. This signifies a displacement towards a more person-centred attack to the direction of rolling. This displacement towards the individual centred attack may besides be reflected in the hereafter research surveies and the result steps selected to measure the effectivity of new schemes and intercessions. There is a demand to choose the result steps which are more meaningful to people with dementedness and their carers, such as quality of life, physical and emotional well being and serious inauspicious events alternatively of t rying to mensurate existent behavior ( Robinson, 2007 ) . This survey capitalizes on the positions of the occupational healers to spot a demand for individual centred attention in the hereafter. It has been established that there exists a demand to explicate a state of affairs specific tool for measuring all assortments of hazards. The survey has found that this aforesaid tool demands to non merely be a hazard estimating method but should besides function the demand for embracing a myriad of positions that will so be taken into history, evaluated and catalogued as mention stuff every bit good. Te survey highlights the function of helpful engineerings in authorising individuals get bying with assorted signifiers of dementedness and enabling them to populate a self-sufficing life. Adept sentiment dictates that while measuring the importance, utility and farther range of electronic devices aimed at helping people enduring from dementia the primary deciding factor should be the positions and sentiments of the people themselves, followed by find ings derived from scientific and academic researches.Appendix 1Figure 1. A Gantt chart explicating the timeline that would be followed during the class of the researchAppendix 2QuestionnaireHow serious is the issue of rolling in people with dementedness? How can this job be overcome? What is more of import – safety of the patient or patient ‘s liberty? Positions on assistive engineering. Does assistive engineering pose a serious menace to a patient ‘s liberty? How of import is patient ‘s consent for usage of assistive engineering? Keeping the drawbacks of the assistive engineering in head, how can this engineering be improved to do it more patient friendly? What is better – a patient centred healthcare installation or engineering based health care? Taking the pros and cons of rolling into history, is rolling good for people with dementedness? What is more of import – research on societal attention or research on engineering?

Tuesday, October 22, 2019

Intellectual Property

Intellectual Property Introduction This paper discusses the inception of intellectual property (IP) and its associated features. The concept of Intellectual property emerged after the foundation of the â€Å"World Intellectual Property Organization† (WIPO) in 1967. There is increase use of this term by diverse groups seeking to safeguard their intellectual knowledge and cultural heritage.Advertising We will write a custom essay sample on Intellectual Property specifically for you for only $16.05 $11/page Learn More This paper also examines the recent â€Å"Wai 262 claim before the Waitangi tribunal† in order to identify the issues at stake (Waitangi Tribunal 2011). Furthermore, it presents the advantages and shortcomings of using Intellectual property model in protecting local people’s traditions and knowledge. Additionally, it presents the possible alternatives to the language of intellectual property. These discussions focus on New Zealand and the citizenâ €™s relation with Maori people due to their cultural distinctiveness. The Wai 262 claim before the Emergence of Waitangi Tribunal The Waitangi Tribunal recorded the claims on 262 occasions. This gave rise to the name Wai 262 claim. The preliminary recording took place on 9 October 1991 and the petitioners included six people. This is in addition to the iwi who were complaining against the New Zealand Crown (Waitangi Tribunal 2011). The claim was referred to as the living things claim because of the underlying issues. Furthermore, it had extensive coverage of additional issues regarding civilizing and intellectual property. The claimants recognized the existence of the New Zealand decrees and the government rules but questioned the place of Maori people’s customs, distinctiveness, and customary knowledge within the setting (Waitangi Tribunal 2011). Furthermore, the claimants wanted to know the entities that would manage Maori cultural art and the unique surrounding that cr eated Maori identity. The claim was also concerned with questioning the place of Maori cultural importance in New Zealand especially the responsibility of the natives towards guarding their culture (Waitangi Tribunal 2011). Further, claimants wanted to know the responsibility of the natives in caring for the valuable cultural materials that determined their identity including artwork, historic sites, vegetation, and animals. Issues at Stake in the Wai 262 Claim The petitioners argued that certain legislations enacted by the government contravened the Waitangi Treaty. This diminished chances for Maori to implement their political right basing on indigenous knowledge and environment. Further, it also limits their rights regarding traditional knowledge and intellectual property (Zogfaros 2010, pg. 66).Advertising Looking for essay on intellectual property? Let's see if we can help you! Get your first paper with 15% OFF Learn More They argued that foreign powers affected the Maori through legal guidelines, which were contrary to the Waitangi Treaty provisions. These issues were evident in the decision-making process that influenced commercialization, management, and conservation of diverse ecological resources. Issues entailing the integration of the Maori people in the determination of cultural rights in the application of the original environmental endowments were evident (Zogfaros 2010, pg. 67). Further, the Maori required opportunities to conserve, improve, and transmit the indigenous knowledge systems (IKS) basing on environmental materials (WIPO 2011, pg. 8). There was an issue concerning the right to ecological sustainability that was possible through sustainable use of customary resources. The Maori also needed to participate and achieve benefits basing on contributing opinions on the application, improvement, and trade of indigenous environmental endowments (Zogfaros 2010, pg. 67). There were also concerns on the associations that existed between Maori and the Crown. Furthermore, the significance of improving the relations in the presence of emerging regulations was at stake. Discrimination basing on racial relations also existed between the Crown and Maori because of the native’s cultural identity (Waitangi Tribunal 2011). This necessitated the search for ways of resolving historical conflicts that emerged because of the way that the New Zealanders handled the Maori. This resulted into relationships that awarded governance rights to the Crown over Maori cultural pieces while the natives held their power (Waitangi Tribunal 2011). The Maori also noted that enacted decrees marginalized them against exercising full management rights over their original resources. There was also an ongoing unlawful exploitation of Maori intellectual property and related resources. Intellectual Property The emergence of Intellectual Property (IP) coincided with the founding of WIPO in 1967. IP concept gained escalated appli cation over the recent years in protecting people from losing their original creations. According to the â€Å"New Zealand Ministry of Economic Development†, IP means a nonspecific term for the variety of property privileges that safeguard knowledge (MED 2008).Advertising We will write a custom essay sample on Intellectual Property specifically for you for only $16.05 $11/page Learn More WIPO argues that IP entails original creations that emerge from people’s minds including â€Å"inventions, literary and artistic works, symbols, names, images, and designs†, which are used in trade (WIPO 2011). Furthermore, IP differs in two classes including industrialized property together with copyright. The industrial property includes â€Å"patents, trademarks, and industrial designs† (WIPO 2011). Copyright property includes literary, creative materials and drawings. The cultural expressions that fall under fictional and creative works inclu de novels, poems, plays, films, musical works, and artistic works that entail drawings, paintings, photographs, monuments among others. Intellectual property rights (IPRs) include the privileges that people who invent or create new things enjoy because of the protection they receive. These rights offer control over diverse processes that may be used by other entities (MED 2008). However, such privileges last for a short period. The privileges and rights are defended by the idea that creators and inventors of ought to profit from their activities. Further, the owners of such property receive incentives for generating ideas or property that would have not taken off (MED 2008). The benefits that emerge because of inventions compensate for the costs incurred by societies. Intellectual property is linked to the affairs of the indigenous people. This is because of their cultural, knowledge and environmental resource endowments, which generate certain intellectual property characteristics. WIPO differentiates these aspects of IP regarding indigenous people according to traditional cultural expressions (TCEs) and TK (WIPO 2007, pg. 7). These are differentiated according to their relations with IP among native communities. It is noteworthy that indigenous people have diverse TCEs that are protected as their IP. These TCEs includes productions that contain characteristic essentials of the cultural inventions developed and preserved by indigenous communities (WIPO 2007, pg. 8). The cultural expressions occur in diverse forms including verbal, musical, and activities among others. The inventive heritage of indigenous people has substantial social, belief, and cultural functions. Furthermore, they are also exploitable for commercial functions.Advertising Looking for essay on intellectual property? Let's see if we can help you! Get your first paper with 15% OFF Learn More Native people also have diverse knowledge systems collectively named TK. These include knowledge regarding customary methodological know how, conventional environmental resources, scientific or health understanding (WIPO 2007, pg. 6). These knowledge systems can also be linked with TCEs. This is because some conventional pieces that symbolize TK can also refer to inventive expressions. This uniqueness makes different groups of indigenous people argue that TK and TCEs are indivisible (WIPO 2007, pg. 7). Furthermore, IP advocates require rule makers to recognize the inseparability of TK and TCEs basing on their significance to different aspects of indigenous peoples livelihoods and cultural identity. The economic importance of indigenous people awareness and TCEs cause their exploitation by third parties. In some scenarios, these exploitations occur unlawfully thereby necessitating their protection as IP. IP in Relation to Indigenous Peoples using the Waitangi 262 Claim Maori who are indigenous people of the New Zealand advanced the Wai 262 claim. It contained concerns regarding IP of their green resources including living things. Furthermore, it also concerned seeking responsibility for the management of Maori TK that entails arts, sculpture, history, verbal expressions, music, and traditional healing systems and surroundings management. Collectively, these were named taonga because their continuation and improvement signified continued Maori uniqueness and well-being. According to Waitangi Tribunal (2011), Maori IP included their TK and aspects of culture that signified their identity. The continued undermining of Maori by the New Zealand Crown necessitated their claim actions that were necessary for safeguarding and maintaining their IP. The inappropriateness of the IPRs that protected Maori conventional knowledge and cultural wealth marginalised the natives from their indigenous property. Furthermore, the idea that IP offers owners privileges to determine th e use of their materials and Maori was not available in this provision (Waitangi Tribunal 2011). They had complications in gaining IPRs that would facilitate their interest in preserving or economically exploiting their conventional knowledge. This is because the existing rights had inconsistencies with the native’s property (WIPO 2007, pg. 7). The native’s interest included preserving their property against third party exploitations while rights limited the period and provisions for public disclosure (Zogfaros 2010, pg. 67). The requirements that include originality and recognition of certain individuals or companies as inventors limit Maori’s protection since it culminates in marginalization. The claimants noted that the rights are unfavourable to indigenous people’s traditional information, cultural materials, and green endowments. This means that third parties can obtain rights regarding certain inventions. This means they can apply them commercialisa tion processes (Zogfaros 2010, pg. 67). Furthermore, certain rights eventually result into successful trade activities, but the claimants recognised that they might not benefit because of inadequate sharing. The claim called for the patenting of diverse fauna and petitioning unlawful registering of brands using Maori pictures or writings. Intellectual property is a form of legislation and the New Zealand’s enactments together with other global requirements affected Maori rights (Zogfaros 2010, pg. 67). Advantages of using the Language of IP for the Protection of Indigenous Knowledge and Culture The recognition that indigenous people’s customary and cultural wealth is significant for their livelihoods and identity necessitates protection of these aspects (WIPO 2007, pg. 13). This is because the protection avoids their erosion and ensures that indigenous people continuously enjoy their endowments (Waitangi Tribunal 2011). Furthermore, it enables owners of inventions to b enefit economically and preserve native’s cultural materials and ideas. The monetary benefits occur when owners apply their inventions in generating commercial outcomes or through sharing gains (WIPO 2007, pg. 8). Cultural resources and ecological materials generate financial development through enterprises creations, skills development, and tourism expansion. Safeguarding IP also facilitates continuity of cultural wealth and environmental endowments. This leads to escalated information access and safety. Further, IP protection ensures that future generations appreciate aspects of their preserved culture (Zogfaros 2010, pg. 69). It enables native people to utilize their knowledge systems in encouraging sustainable exploitation of their cultural expressions and ecological endowments. Disadvantages of using the Language of IP for the Protection of Indigenous Knowledge and Culture Using intellectual property for the conservation gives rise to inconsistencies regarding ownership and exploitation tactics for such endowments. Additionally, it does not offer genuine solutions to the predicaments faced by indigenous people in protecting their wealth (Zogfaros 2010, pg. 67). Further, the related concepts also affect the preservation and improvement of cultural and environmental materials among some native groups. It rarely facilitates maintenance of indigenous people’s valuable materials under conflicting legislations and customary awareness systems. Furthermore, inadequacy of distributing benefits poses disadvantages to inventors of original materials or indigenous groups. The idea of collectively referring to aspects of native and ecological materials as intellectual property interferes with their safety. This is evident in the holistic nature of this group. Evidently, within such collections, certain beneficial aspect are not preserved (Waitangi Tribunal 2011). The ineffectiveness of enforcing legislations is disadvantageous to minor individuals or ind igenous groups. Incorrectness of IP Joining diverse aspects of culture that are related and referring to them as intellectual property is erroneous. Instead, single cultural and ecological aspects ought to be labeled as distinct issues. Lumping â€Å"trademark, copyright, and patent† laws and referring to them as IP also displays incorrectness (Stallman 2011). This is because these laws emerged disjointedly, advanced differently, possess diverse provisions, and are concerned with separate public policy matters. The use of intellectual property generates different meaning in separate situations (Stallman 2011). This is because specialists in these knowledge areas understand the varied dynamics. The use of intellectual property also lies about key issues regarding inventions. Furthermore, the concept instills distorted thinking’s among people making them focus on harmony other than individual guidelines (Stallman 2011). IP also causes issues generated according to unders tanding of diverse laws to disappear. This is because people tend to disregard issues that are fundamental to different laws. Alternatives of IP The notable alternative to Intellectual property is evident when indigenous people initiate new property models and reject the current provisions and designs (Stallman 2011). The efficiency likely to arise from this tactic is evident in diminishing bio-colonization by civilized societies. The inconsistencies regarding intellectual property, culture and related aspects makes it difficult for indigenous people to preserve their resources (Zogfaros 2010, p67). The alternative to this situation would entail endorsing parallel worldviews that facilitates continuation, improvement, and transfer of these knowledge systems to emerging generations. Furthermore, achieving political independence can also free indigenous people from disguised protection through intellectual property (Stallman 2011). The exploitative intellectual property should embrace processes that enable them protect native people from abuse. Conclusion In summary, intellectual property is use in protecting inventive people from third parties interested in exploiting their creations. The concept also protects indigenous community’s cultural identity through preserving their values, customary expressions, and ecological endowments. Maori marginalization by New Zealand Crown in the control of environmental resources, customary knowledge, and cultural expressions contributed to claims. The Wai 262 claim focused on resolving these issues basing on the IP legislations that New Zealand had enacted. Application of IP in the preservation of the traditional understanding and cultural aspects exude different advantages and shortcomings. Furthermore, intellectual property is an incorrect term because it lumps different society’s innovations and refers to them as IP. This presents challenges in the protecting communities’ traditional understanding and cultural identity materials. List of References MED 2008, What is Intellectual Property. Web. Stallman, R 2011, Did you say intellectual property? It is a seductive mirage. Web. Waitangi Tribunal 2011, Time to Move beyond Grievance in Treaty Relationship  Tribunal Says, Web. WIPO 2007, Intellectual Property and Traditional Cultural Expressions/Folklore, Web. WIPO 2007, Intellectual Property and TK. Web. WIPO 2011, What is Intellectual Property. Web. Zogfaros, D 2010, Intellectual property, and traditional cultural expression,  Cheltenham:Edward Elgar Publishing.

Monday, October 21, 2019

Que and Other Relative Pronouns of Spanish

Que and Other Relative Pronouns of Spanish Relative pronouns are pronouns that are used to introduce a clause that provides more information about a noun. Thus in the phrase the man who is singing, the relative pronoun is who; the clause who is singing provides further information about the noun man. In the Spanish equivalent, el hombre que canta, the relative pronoun is que. Que Tops List of Spanish Relative Pronouns Common relative pronouns in English include that, which, who, whom and whose (although these words also have other uses). In Spanish, by far the most common relative pronoun is que. As can be seen in the following sentences, it usually means that, which or who. Los libros que son importantes en nuestra vida son todos aquellos que nos hacen ser mejores, que nos enseà ±an a superarnos.  (The books that are important in our lives are all those that make us be better, which teach us to improve ourselves.)Comprà © el coche en que à ­bamos. (I bought the car in which we rode.)El politeà ­0smo es la creencia de que hay muchos dioses. (Polytheism is the belief that there are many gods.Mi hermano es el hombre que salià ³. (My brother is the man who left.) In some cases, que isnt translated as a relative pronoun in English because the two languages structure the sentence differently: Necesitamos la firma de la persona que ayuda al paciente. (We need the name of the person helping the patient.)No conozco a la nià ±a que duerme en la cama. (I dont know the girl sleeping in the bed.) Other Relative Pronouns If youre a beginning Spanish student, you likely wont need to use the other relative pronouns of Spanish, but you certainly will come across them in writing and speech. Here they are with examples of their usage: quien, quienes - who, whom - A common mistake by English speakers is to use quien when que should be used. Quien is most commonly used following a preposition, as in the first example below. It can also be used in what grammarians call a nonrestrictive clause, one separated by commas from the noun it describes, as in the second example. In that second example, que also could be used instead of quien. Es el mà ©dico de quien le dije. (He is the doctor whom I told you about.)Conozco a Sofà ­a, quien tiene dos coches. (I know Sophia, who has two cars.) el cual, la cual, lo cual, los cuales, las cuales - which, who, whom - This pronoun phrase must match the noun it refers to in both number and gender. It is used in formal writing more often than in speech. Rebeca es la mujer con la cual vas a viajar. (Rebeca is the woman with whom you are going to travel.)Conozca los principales riesgos a los cuales se enfrentan las organizaciones en la era digital. (Know the main risks which organizations are facing in the digital age.) el que, la que, lo que, los que, las que - which, who, whom - This pronoun phrase must match the noun it refers to in both number and gender. It is often interchangeable with el cual but is somewhat more informal in usage. Rebeca es la mujer con la que vas a viajar. (Rebeca is the woman with whom you are going to travel.)Hay un restaurante en los que los meseros son robots. (There is a restaurant in which the waiters are robots.) cuyo, cuya, cuyos, cuyas - whose - This pronoun functions something like an adjective and must match the noun it modifies in both number and gender. It is used more in writing than in speech. It normally isnt used in questions, where de quià ©n is used instead, as in  ¿De quià ©n es esta computadora? for Whose computer is this? Es la profesora cuyo hijo tiene el coche. (She is the teacher whose son has the car.)El virus se autodistribuye a los contactos del usuario cuya computadora ha sido infectada. (The virus spreads itself to the contacts of the user whose computer has been infected.) donde - where - The Spanish and English words as relative pronouns are used in much the same way. Voy al mercado donde se venden manzanas. (Im going to the market where apples are sold.)En la ciudad donde nosotros vivimos existen muchas iglesias. (There are many churches in the city where we live.)

Sunday, October 20, 2019

Old Guard and Young Turks

Old Guard and Young Turks Old Guard and Young Turks Old Guard and Young Turks By Maeve Maddox Both terms, Old Guard and Young Turks, have been adopted for various purposes. According to the Wikipedia disambiguation pages, the terms have been applied to everything from a magazine and Internet news service to a street gang. In a general figurative sense, the terms are ideological opposites. Originally, the term Old Guard had military connotations, but now it is used in reference to any type of group. It refers to the older and most conservative faction in an organization. Aversion to change is the old guard’s most salient characteristic. The term Young Turks originated with the civil conflicts that racked Turkey at the beginning of the 20th century. It referred to opponents of the sultan’s absolute monarchy. They formed the Committee of Union and Progress and seized power in 1913. Nowadays the terms represent opposing models of leadership. The Old Guard want to keep things as they were. The Young Turks want to change the way things are done and don’t want to do it gradually. Here are some uses drawn from different countries and different types of organizations. Tea party vs. old guard in GOP Senate rift (Headline, The Denver Post) Old guard and young turks combine for stunning  victory (Headline for a story about an Australian cricket match) A storm is brewing within the MDC-T dominated Bulawayo City Council (BCC) as the party’s â€Å"young turks† who were elected as councillors in last month’s elections feel the â€Å"old guard† had failed the local authority. (Sunday News, Zimbabwe) [In a book about the C.I.A.] he traces the bitter fights between Langley’s old guard and Young Turks over whether the agency should use the new armed Predator drones to hunt and kill even Osama bin Laden. (New York Times) Army rifts: Is the old guard taking on the young Turks? (Headline, (Daily Monitor, Uganda) The majority which would control the vote would be a coalition between the â€Å"old guard† Democratic Party establishment, and the â€Å"young turks,† recent graduates of the University of Hawaii Law School. (Fighting Tradition: A Marine’s Journey to Justice by Bruce I. Yamashita) Santa Cruz Sierra Club: Old Guard vs. Young Turks (Headline, Santa Cruz Patch) Another â€Å"guard† expression is used when new leaders take over from the previous crew: changing of the guard. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Expressions category, check our popular posts, or choose a related post below:45 Synonyms for â€Å"Food†75 Idioms and Expressions That Include â€Å"Break†15 Names and Descriptions of Effects

Saturday, October 19, 2019

Architects Guide to Running a Job Research Paper

Architects Guide to Running a Job - Research Paper Example Many people have recognized the benefits of the construction industry to the public and thus engaged in it. The plan that the team has come up with on the site redevelopment includes the recommendations, identifying any possible issues with regards to the site and the design of developments intended to secure savings for the client for more than 20percent of what would be the capital cost. The proposed design offers favorable conditions in relation to the market conditions with the main challenge being the delivery of significant volume and its implementation. The work of the team was able to come up with a design that will meet the client’s expectations with regards to the timescale for completing the redevelopment, provide recommendations in each step of the project, give the client value for his money and provide a positive contribution to the construction industry. Business improvement sites have been associated with commercial and industrial property clients within commercial areas that have been specified. Some of the clients end up teaming up with an aim of stimulating their business. The team’s role is to provide both coordination and recommendation roles during such redevelopment projects (Larson, 2002, p. 45). A particular area that needs redevelopment is a site in the Dundas Street located between the Landsdowne railway line and Bathurst. The location is vibrant and mixed with small and retail business. The site is also ethically-mixed thus attracts immigrants from the first generation and other participants in th e construction industry. This makes the site a wide income area and also has a mixture of occupants in terms of culture and ethnicity. It is among the areas in Downtown West where there is affordable residential and commercial rents are still offered (Larson, 2012, p. 78).

Friday, October 18, 2019

Marketing and Marketing Strategy Coursework Example | Topics and Well Written Essays - 1250 words

Marketing and Marketing Strategy - Coursework Example In light of this, this paper is a marketing strategy for a hypothetical new business. 1. NAME, LOCATION & NATURE. Sequrex Security Services will be a service provider for security and related provisions’ solutions that will cover a wide spectrum of security needs. It will be located at Inglewood in Los Angeles, California. This choice of location is calculated and purposed. The market there is un exploited and there are many avenues for growth and diversification. Sequrex Security Services will be a security provision business. It will specialize in an array of inter related security Services. At the roll out, it will specialize in commercial and residential guarding, consultancy and events security. With time and growth, the company will expand its operations to GSM alarm installation, CCTV, private investigation, dog training and executive/ VIP protection. This should be in the second growth tenure. Lastly, the company should grow to offer information security, which will in volve coding for computers, phones, internet portals and virtual stores and offices. 2. SELF-ANALYSIS Ensure that the self-analysis is relevant to the proposed service and that you make the comparisons. Security is a personal take due to the influences of the environment. I have researched widely on security from a personal interest to understand the key components of such a business. My fascination with security systems and creations has aroused my interest and eventual understanding of a business that has a potential market that has not been exploited fully. To run a security services business, one ought to have a number of skills, abilities and competencies. It is hard to find all these traits in a single individual but for the lack of them, employment of qualified complementary individuals should have a fully functional team. I am well placed to run such a business because the security business requires verbal and spatial aptitudes. I am also flexible and attentive to detail. Th e use of the important critical thinking and decision making is also imperative in management and running of the business. The knowledge of the market and the information acquired from previous observation and research has also put me in an apt place to deliver in the business. The security service business however requires leadership, firmness and general managerial skills which I lack. This predisposed the business for failure but with the employment of a manager, this will be taken care of. The potential market requires competitiveness and abrasiveness; it is a business for the tough. It requires knowledge of the changing security services, creativity to lure customers and the innovativeness to keep them. Previous experience is important as it is expediency for start-up and growth. The market also looks up to the service providers for deployment of guards who have a set of expected ethics and who can conduct themselves properly and sensibly in the line of duty. This therefore cal ls from leadership and role modeling. It also means that enforcement of discipline on the workforce is key. As I am not endowed with such competence and skill, I will source an experienced manager who should oversee operations and human resource. This will cater for my lack of prior experience and also have the effect upon the employees to give guidance and set an example. The leadership of such an individual will be the back that the reputation of the company will ride on. California has a set societal