Monday, September 30, 2019

Ethics and Gender Roles

In order for a particular product or service to be successful in the industry, it needs to be clearly positioned within its market. The positioning should reflect the needs of the customers as well as the position of the company in relation to competitors. Depending on the positioning, the marketing team can decide what attributes of the product to amplify in their campaigns and what steps will be required to form the proper connections to the customer.Furthermore, the position adopted by a firm also impacts brand equity, as in, the kinds of associations customers make to the product, their level of loyalty, and brand awareness. The main ethical issue in advertising is the depiction of men and women in their stereotypical gender-roles. Men are usually depicted as powerful, successful, driven and dignified. Women on the other hand are increasing being depicted as sexualized objects often dependent on men. One of the main ethical issues is that in many of the ads the women serve mainly as a â€Å"decoration† i. . they have no functional relationship to the product being advertised. For example, Axe is well known for its over sexualization of women in its ads to sell men’s personal care products. Another trend seems to be the use of only parts of a woman’s body in advertisements particularly a woman’s breasts and legs as stated by Jean Kilbourne in her movies â€Å"Killing Us Softly†. The implications of such practices are even greeter because of the number of ads that consumers are exposed to daily through television, newspapers, magazines and billboards.It is estimated that this number has grown from 500 ads daily in 1970 to 5000 ads a day in 2009 (Johnson, 2009). The messages imparted by ads, if they are repeated over long periods of time as in the case of gender roles in society, can distort perceptions of what is realistic as well as what is right and wrong. Since women are repeatedly cast as submissive sexual objects whose place is primarily at home or in traditional occupations of nurses, teachers, secretaries the ads in a way are telling the society what to think.The primary critical players are the consumers who are being marketed to and the secondary players are the firms marketing the product. The consumers and the society at large are deeply affected by the ethical implications of ads mainly because of the values, beliefs, attitudes, propagated by them. Implicit in these values and beliefs is some level of â€Å"standard setting†. For example: in many Vodka ads that primarily market to women, excessive drinking is glamorized and implied as a â€Å"standard† behavior wherein women alternate between â€Å"good girl vs bad girl† roles.If (and it often is) this message is subconsciously or consciously understood and adopted as a lifestyle, it can have far from positive manifestations such as a binge-drinking culture that is widespread among college students which leads to other consequences such as alcohol poisoning, accidents, and ill physical health of people who try to simulate what they learn from ads, in real life. There is also a disturbing trend of ads romanticizing sexual assault and domestic violence to sell products (Capella, 2010). This can invariably lead to a spread in unhealthy social conditions.Marketing personnel are critical players because they formulate the ads. Some campaign creators do not agree that their actions may be unethical. In fact, they state that the ads reflect consumer behavior and expectations. It is also argued that there is generally â€Å"positive† reaction to beautiful males and females placed in ads which not only increase the attractiveness of the product but also the chances of increased sales precisely because of the employment of the same techniques that are being called unethical (Reichert, T. LaTour, M. S. , Lambiase, J. I. , & Adkins, M. 2007).. The decision alternative is to essentially rethink the kind s of messages that the firm wants to put forward. It is not unethical to use healthy and reasonably beautiful women and men in ads, rather, it is the wholesome vs derogatory manner in which they are shown that makes the ad questionable. Firms should avoid focusing on the sexually provocative body parts of women (and increasingly men) to sell an unrelated product.They should avoid glamorizing undesirable social behaviors such as promiscuousness of both sexes, over-drinking, drugs, or unhealthy lifestyles. In contrast to superficial ads, they should actively seek out methods to connect with consumers on a deeper level than physical attractiveness or sexual gratification. An excellent example of this is Dove’s efforts to touch on a more genuine vein. Furthermore, firms to focus on minimizing the use of ‘decorative’ male/female i. e. here should be a connection between the product being advertised and the person advertising it. The implications for the critical playe rs are hard to quantify. Women and men have been depicted in their expected roles exhibiting their stereotypical traits for a very long time. One reason this has persisted, unfortunately, is that is a successful method. Everyone wants to beautiful, glamorous, and desired and the marketing industry has picked up these human traits to turn them into profits.Therefore, for the marketing firms, adopting an alternative strategy to work as well as the unethical methods they have been using for so long will be very challenging. However, as Dove has proved, this is not impossible especially in the face of increasing concern over how men and women are depicted by the media. In the long run, a more wholesome strategy can lead to stronger brand equity through increased brand loyalty and positive brand associations. For the consumers, a more ethical and realistic representation of men and women will lead to positive impacts.People may stop exhibiting extreme behaviors to satisfy standards set b y the marketing world and be more self-satisfied, have higher self-esteem and satisfaction with their identities. The objectification is not spread to children, particularly young girls, such as the Oh Lola! perfume by Marc Jacobs. Not only does the model look like an underage girl (which is perhaps intended) but she is sitting suggestively(Exhibit One). Therefore, it becomes necessary to clearly define what is acceptable and what isn’t. Work Cited Capella, M. L. , Hill, R. , Rapp, J. M. & Kees, J. (2010). The impact of violence against women in advertisements. Journal Of Advertising, 39(4), 37-51. doi:10. 2753/JOA0091-3367390403 Johnson, C. (2009, February 11). Cutting through advertising clutter. Retrieved from http://www. cbsnews. com/8301-3445_162-2015684. html Reichert, T. , LaTour, M. S. , Lambiase, J. I. , & Adkins, M. (2007). A Test of Medi a Literacy Effects and Sexual Objectification in Advertising. Journal Of Current Issues & Research In Advertising (CTC Press), 29 (1), 81-92. Exhibit One—Picture of Marc Jacobs Ad

Sunday, September 29, 2019

Measuring Training Effectiveness Through Kirk’s Model Essay

If you deliver training for your team or your organization, then you probably know how important it is to measure its effectiveness. After all, you don’t want to spend time or money on training that doesn’t provide a good return. This is where Kirkpatrick’s Four-Level Training Evaluation Model can help you objectively analyze the effectiveness and impact of your training, so that you can improve it in the future. In this article, we’ll look at each of the Kirkpatrick four levels, and we’ll examine how you can apply the model to evaluate training. We’ll also look at some of the situations where the model may not be useful. The Four Levels Donald Kirkpatrick, Professor Emeritus at the University of Wisconsin and past president of the American Society for Training and Development (ASTD), first published his Four-Level Training Evaluation Model in 1959, in the US Training and Development Journal. The model was then updated in 1975, and again in 1994, when he published his best-known work, â€Å"Evaluating Training Programs.† The four levels are: Reaction. Learning. Behavior. Results. Let’s look at each level in greater detail. Level 1: Reaction This level measures how your trainees (the people being trained), reacted to the training. Obviously, you want them to feel that the training was a valuable experience, and you want them to feel good about the instructor, the topic, the material, its presentation, and the venue. It’s important to measure reaction, because it helps you understand how well the training was received by your audience. It also helps you improve the training for future trainees, including identifying important areas or topics that are missing from the training. Level 2: Learning At level 2, you measure what your trainees have learned. How much has their knowledge increased as a result of the training? When you planned the training session, you hopefully started with a list of specific learning objectives: these should be the starting point for your measurement. Keep in mind that you can measure learning in different ways depending on these objectives, and depending on whether you’re interested in changes to knowledge, skills, or attitude. It’s important to measure this, because knowing what your trainees are learning and what they aren’t will help you improve future training. Level 3: Behavior At this level, you evaluate how far your trainees have changed their behavior, based on the training they received. Specifically, this looks at how trainees apply the information. It’s important to realize that behavior can only change if conditions are favorable. For instance, imagine you’ve skipped measurement at the first two Kirkpatrick levels and, when looking at your group’s behavior, you determine that no behavior change has taken place. Therefore, you assume that your trainees haven’t learned anything and that the training was ineffective. However, just because behavior hasn’t changed, it doesn’t mean that trainees haven’t learned anything. Perhaps their boss won’t let them apply new knowledge. Or, maybe they’ve learned everything you taught, but they have no desire to apply the knowledge themselves. Level 4: Results At this level, you analyze the final results of your training. This includes outcomes that you or your organization have determined to be good for business, good for the employees, or good for the bottom line. How to Apply the Model Level 1: Reaction Start by identifying how you’ll measure reaction. Consider addressing these questions: Did the trainees feel that the training was worth their time? Did they think that it was successful? What were the biggest strengths of the training, and the biggest weaknesses? Did they like the venue and presentation style? Did the training session accommodate their personal learning styles? Next, identify how you want to measure these reactions. To do this you’ll typically useemployee satisfaction surveys or questionnaires; however you can also watch trainees’ body language during the training, and get verbal feedback by asking trainees directly about their experience. Once you’ve gathered this information, look at it carefully. Then, think about what changes you could make, based on your trainees’ feedback and suggestions. Level 2: Learning To measure learning, start by identifying what you want to evaluate. (These things could be changes in knowledge, skills, or attitudes.) It’s often helpful to measure these areas both before and after training. So, before training commences, test your trainees to determine their knowledge, skill levels, and attitudes. Once training is finished, test your trainees a second time to measure what they have learned, or measure learning with interviews or verbal assessments. Level 3: Behavior It can be challenging to measure behavior effectively. This is a longer-term activity that should take place weeks or months after the initial training. Consider these questions: Did the trainees put any of their learning to use? Are trainees able to teach their new knowledge, skills, or attitudes to other people? Are trainees aware that they’ve changed their behavior? One of the best ways to measure behavior is to conduct observations and interviews over time. Also, keep in mind that behavior will only change if conditions are favorable. For instance, effective learning could have taken place in the training session. But, if the overall organizational culture isn’t set up for any behavior changes, the trainees might not be able to apply what they’ve learned. Alternatively, trainees might not receive support, recognition, or reward for their behavior change from their boss. So, over time, they disregard the skills or knowledge that they have learned, and go back to their old behaviors. Level 4: Results Of all the levels, measuring the final results of the training is likely to be the most costly and time consuming. The biggest challenges are identifying which outcomes, benefits, or final results are most closely linked to the training, and coming up with an effective way to measure these outcomes over the long term. Here are some outcomes to consider, depending on the objectives of your training: Increased employee retention. Increased production. Higher morale. Reduced waste. Increased sales. Higher quality ratings. Increased customer satisfaction. Fewer staff complaints. Considerations Although Kirkpatrick’s Four-Level Training Evaluation Model is popular and widely used, there are a number of considerations that need to be taken into account when using the model. One issue is that it can be time-consuming and expensive to use levels 3 or 4 of the model, so it’s not practical for all organizations and situations. This is especially the case for organizations that don’t have a dedicated training or human resource department, or for one-off training sessions or programs. In a similar way, it can be expensive and resource intensive to â€Å"wire up an organization† to collect data with the sole purpose of evaluating training at levels 3 and 4. (Whether or not this is practical depends on the systems already in place within the organization.) The model also assumes that each level’s importance is greater than the last level, and that all levels are linked. For instance, it implies that Reaction is less important, ultimately, than Results, and that reactions must be positive for learning to take place. In practice, this may not be the case. Most importantly, organizations change in many ways, and behaviors and results change depending on these, as well as on training. For example, measurable improvements in areas like retention and productivity could result from the arrival of a new boss or from a new computer system, rather than from training. Kirkpatrick’s model is great for trying to evaluate training in a â€Å"scientific† way, however, so many variables can be changing in fast-changing organizations that analysis at level 4 can be limited in usefulness. Key Points The Kirkpatrick Four-Level Training Evaluation Model helps trainers to measure the effectiveness of their training in an objective way. The model was originally created by Donald Kirkpatrick in 1959, and has since gone through several updates and revisions. The Four-Levels are as follows: Reaction. Learning. Behavior. Results. By going through and analyzing each of these four levels, you can gain a thorough understanding of how effective your training was, and how you can improve in the future. Bear in mind that the model isn’t practical in all situations, and that measuring the effectiveness of training with the model can be time-consuming and use a lot of resources.

Saturday, September 28, 2019

Naturalistic Observation

Naturalistic observation is considered as one of the basic methods in psychological research and study. This fundamental research methodology is known to divulge and aid the psychologist in his or her critical analysis of the human behavior and characteristics while in socially acceptable public domain in his or her course of interacting with other individuals in their aspect of addressing their sociological needs. In this aspect of human interaction, psychologist try to significantly analyze the human nature as shown by their actions both involving the verbal and non-verbal communication style and how individuals manifest their motives while adhering to the social values and cultures pertaining to public communication. Naturalistic observation is commonly an actual observation of subjects mainly while they are in their course of social interaction specifically while they are in the public place. In the course of implementing this method, the researcher must also observe social values and cultural manners thus preventing any offensive act during the observation. In addition, the concept of personal privacy and inappropriate intrusion should also be constantly observed while the researcher is observing the subjects. All of these limitations must be implemented while the researcher observed the subjects in an isolated nature keeping his or her presence unnoticed and ideally absent to the personal space of the subject during their interaction. The only aspect to be focused on in this project is the psychological behavior of the subject as manifested by their very intricate details such as gestures, voice, reaction, facial expression and impression and others. Project: Naturalistic Observation In this aspect of applying the method of naturalistic observation during an actual psychological study, this author conducted a personal project using the said methodology. In this study, the researcher particularly this author will try to support the psychological hypothesis postulated by Aronson (et al, 2004) and Lesko (2000) regarding the psychological behavior and actions of individuals during an actual social interaction. This hypothesis will significantly govern the psychological observation project and will guide the researcher in establishing an interactional pattern as observed through the subjects. In this observation, the researcher presumptively hypothesized that the dominant speaker in the first part of the conversation will likely speak more frequently in the later part of the conversation. The chosen subjects are a man and a woman both Caucasians who are dining in a restaurant and are observably conversing with each other regarding a specific matter which both of them can relate. It is very apparent from the observable verbal and non-verbal aspect of their communication that the topic they are conversing is very critical as they both stresses their own involvement and awareness to it. Verbal recording is not very likely in this situation as an attempt to push this is prevented by the environment and the situation at hand however, few notes of recorded key words denotes that they are talking about a legal and ethical issue in their work environment. Words mentioned such as â€Å"management†, â€Å"chief-of-executives†, â€Å"a settlement bargain† and â€Å"what the labor union ought to do† will denote that they are both involve in the same job and in the same issue they are both probably working with. This will suggests that the situation is likely an informal meeting between the two, possible from different party, to discuss some important details regarding their business issue or a settlement for the resolution of their topic. This is established to be informal by the researcher as suggested by their attire as they are into casual wear. In non-verbal observation, the actions and gestures of the subjects will denote that they are with a professional background as their etiquettes and manners are significantly refined for the matter (Aronson et al, 2004; Lesko, 2000). In addition, their gesture mainly the speaker, at their specific chances, will suggests a clear and direct emphasis on his or her point thus suggesting that their topic is indeed of high importance (Lesko, 2000). This concept is further followed with the high intention of the other to listen carefully and then reply with his or her personal opinion on the matter with a language that is concise and direct to the point. The observed intonations and voice volume is noticeably well modulated suggesting that both of the subjects as well versed in the field of the topic and that they are cautious of offending the other. With critical and empirical observation of the subjects, this researcher has noted that the man seems to be speaking more frequently while the woman speaks primarily in response to the man’s idea. This factor suggests that the man has the part of proposal or he is the one with the main intention for the meeting, which is likely established by him. The verbal aspect of the woman can thus be regarded to be as a commentary or a supplementary mean in this conversation making her the character that the proposal is focused with. In the aspect of considering the hypothesis that is previously stated, the man is postulated to speak more frequently in the following period. And in the observed subjects, the man is indeed noted to have spoken more frequently than the woman, which establishes the hypothesized interactional pattern in the social behavior of the observed individuals. Conclusion As observed in the conducted naturalistic observation, it has been determined by this author that social interaction of individuals are indeed influenced by their natural nature and motives manifesting through the creation of the dominant speaker and the other being the receiver. The person who has the greater aim and intention in each social interaction who is more likely than one who established the said meeting has the greater possibility of becoming the main speaker in the conversation. On the other hand, the other party becomes the main receiver as his or her speech becomes supplementary or commentary with that of the other. Thus, in social interaction, it is very likely that one party manifest as the dominant side to guide and focus the conversation as he or she has the greater intention in the said interaction. Bibliography Aronson, E. & Wilson T. D. & Akert R. M. (2004). Social Psychology. Prentice Hall, NY, USA. 5th Edition. Lesko, W. A. (2000). Readings in Social Psychology: General, Classic and Contemporary Selections. Allyn and Bacon, Boston, USA. 5th Edition.

Friday, September 27, 2019

MIH514 - Cross-Cultural Perspectives - Mod 2 Case Assignment Essay

MIH514 - Cross-Cultural Perspectives - Mod 2 Case Assignment - Essay Example In March 2003 the manager of Dunken Donuts in Yonkers, New York posted a sign inviting customers to complain if they heard employees seeking other than English behind the counter. 1 day later he removed his sign because the complaints were that he was being discriminative. The interesting thing about the case is that the manager spoke Spanish as his first language but always spoke English at work. He felt that there were good reasons to speak English only at work and those reasons related to bonding of employees in a team atmosphere. He feels that when a language other than English is spoken, it causes poor attitudes and people do not get along as well (Rodriquez, 2005). On the other hand, in another case, the manager of an insurance company was consistently angry about Tony who liked to speak Cantonese to his Chinese co-workers. The manager believes that employees should only speak English while on the job. Eventually the company did put together an English speaking only rule and Tony left the company. Tony felt that the English only rule violated antidiscrimination laws. Certainly by leaving the company, the company has lost the diversity of information that Tony may have had (Thornton, 2004). However, the Supreme Court declared that employers could, in fact, enforce English only rules in the workplace. Many people find this a boon for working conditions but it is difficult to see it one way. While many think it is positive for the work place, there are just as many that believe that having language diversity is as important as cultural diversity, knowledge diversity and more. For example when Tony lost his job, he got a job recruiting Cantonese speaking Engineers and Scientist (Thornton, 2004). Interestingly enough, though the Supreme Court supported the use of English only rules, Title VII of the Civil Rights Act states that it is discriminatory unless there is a business necessity. As there is confusion in the law, so there is also confusion

Thursday, September 26, 2019

Being a Leader Case Study Example | Topics and Well Written Essays - 1500 words

Being a Leader - Case Study Example This enhanced its brand image and brand value to a significant extent as compared to others. This is mainly because of its huge strength of students and the total revenue earned each financial year. So, due to such reputation, I always decided to become a manager or leader of an elementary school in my future days in order to know its operations and goals. If I would attain an opportunity to become a leader or HR manager of an elementary school in near future, then I would surely try to develop innovative facilities for the students to enhance the portfolio and demand of such institutions in the market among others. Along with this, it might be also worth trying to introduce varied types of extra-curricular activities such as lab and library facilities, an Accelerated Reader Program to develop the joy of reading among students and character education classroom programs to enhance the inner skills and talents of the students. Only then, the dominance of the school might be maintained in the upcoming competitive market scenarios as compared to others. Along with this, the profit margin and sales might also be enhanced resulting in amplification of the brand equity in the market. Side by side, the market value and reputation of the organization might also be enhanced among other rivals in the market. ... According to me, the most essential leadership theories required at the time of the development of global goals for the elementary school in the next 5 years are stated below. Trait theory: It is an approach describing the personalities of human beings. It is essential, because on the basis of an individual personality trait, I would approach the person for further discussion regarding the prospects of the goals in the up-coming competitive scenario. For example, this theory would also prove effective in understanding the personality traits of the senior managers and the administrators if enrolled below me for the fulfillment of this task. Thus, it may be stated that trait theory of leadership is extremely essential for any leader or members of any organization or group. So, it is extremely essential for the leaders to attain a definite type of skills and traits to accomplish the objectives or goals of a specific organization, as he, might act as a motivator in these case. Transforma tional leadership theory: This theory states that in order to attain organizational upliftment, personal interest need to be rejected and the peers and employees need to be motivated to work for the success of the common goal or an objective of the organization. Along with this, it also helps in enhancing the morale, and performance of followers resulting in attainment of the tactics and strategies of the organization. So, according to my perspective it is extremely essential while developing the global goals of an elementary school. Transactional leadership theory: This theory means transaction of information and ideas among the leaders and followers. This helps in the attainment as well as transformation of varied types of information among each other that would prove

Genetic testing for overall population health Assignment

Genetic testing for overall population health - Assignment Example On the downside, genetic testing could further complicate people’s lives in regards to their health status. It is likely that genetic tests will lead to the realization of genetic conditions that leave patients worried over their health. Such an observation negates the prospects of genetic testing. On the same note, genetic conditions and/or disorders that previously received no serious attention, or those that are not necessarily threatening, could now become the new focus of healthcare practitioners. This could translate to increased costs of healthcare, medical research, and development. Moreover, an ethical concern in this matter relates to possible interference with an individual’s natural and biological genome. For a nurse, it is important to create awareness and promote legal and ethical practices as far as genetic testing is concerned. In essence, nursing plays an important role in promoting overall population health (DeNisco & Barker, 2013). In this respect, a nurse with advanced knowledge is a key driver of the prospects of genetic testing. The idea is to ensure that nurses work under mutual grounds with their patients to ensure proper genetic testing and improved population

Wednesday, September 25, 2019

Claiming feminism Essay Example | Topics and Well Written Essays - 1500 words

Claiming feminism - Essay Example A feminist woman is, thus, someone who does not appear to be agreeable in any way and who indulges in fighting over every little issue, making it, it seems her worldview to argue with everyone. This stereotype has done quite a lot to damage the cause of feminism, and thus women liberation. Moreover, it is because of this stereotypical feminist that not only men, but women also, find themselves considering feminism and everything related to it in a very negative light. The myth is ever present and there seems to be a need to end it, however, just how it is to be done successfully, and just how one can convince the general population about the pivotal role of feminists when it comes to changing the worldview regarding women in general are questions that need to be answered with a lot of thought and consideration. During the 1970s and 1980s, the feminist movement found much success; women joined a struggle to create a world where they were the equal counterparts of men, and where they were not discriminated against based on their sex. These women, the pioneer feminists one can call them maybe, paved the road for those that came after them; they fought for equal rights when it came to employment, for wages that were equal to their male counterparts, for protection against sexual harassment against women. In short, all matters that were considered to be an issue for any women were considered to be part of the feminist agenda as well. The feminists were at a war-path, so to speak, to eradicate all forms of sexism found in their society. This was, indeed, a noble cause, however, it has been much maligned and misunderstood, and perhaps that is the reason of it being suspect to a lot of people. In her article â€Å"Fear of Feminism,† Lisa Maria Hogeland discusses just how hard it is for the woman of today to join the feminist movement. Many women of today do not

Tuesday, September 24, 2019

Implementation of the Final Solution Research Paper

Implementation of the Final Solution - Research Paper Example The uniqueness of the Holocaust lies in its motivation - in the fact that for Nazi regime the removal of the Jews was a sine qua non of the survival of mankind, a matter of global, if not cosmic, importance, and not an ordinary political matter.2 The Final Solution and the Holocaust were unique genocides of the Jewish people, unique for its magnitude and the "rationality" of their processes. To achieve its goals of Jews' elimination, the Final Solution "rationally" targeted nation's most vulnerable and vital members - women and children. On 20 January 1942, Chaired by Reinhard Heydrich, the Wannsee Conference played host to nine high-ranking officials, five senior SS chiefs, and local party bureaucrats from across the Third Reich. Serving as the chief dignitary and ranking member of the SS, Heydrich explained that "in view of the extreme importance of the subject, a consensus of opinion is reached regarding the "'Final Solution.'"3 From the historical perspective, there is an ongoing historical debate as to when the decision was made for the "Final Solution." Many historians argue that when Hitler made his "prophecy" speech of January 30th, 1939, he had already decided on the "Final Solution." Christian Gerlach has argued for a different timeframe, however, suggesting the decision was made by Hitler on December 12, 1941, when he addressed a meeting of the Nazi Party and of regional party leaders.4 In addition, Gerlach argued that Hitler had not decided on what the true "Final Solution" was until the euphoria of vict ory swept over the German leadership in the summer of 1942 in the wake of the anticipated victory over Russia. Historians on the Holocaust largely agree that the policies and strategies of the Final Solution has been prepared and practically tested some time before the year 1942. They took the form of deportations, ghettos, and euthanasia programs. Although the deportations and the ghettos can be called murderous solutions in their own right, they were not the Final Solution. The ghettos themselves were just temporary holding pens until a more "permanent solution" was developed. The development of the "permanent solution" started with the Einsatzgruppen. The Einsatzgruppen were squads composed primarily of German SS and police personnel. Under the command of the German Security Police (Sicherheitspolizei or Sipo) and Security Service (Sicherheitsdienst or SD) officers, the Einsatzgruppen had among their primary objectives the elimination of those considered to be racial or political enemies found the occupied zones, Soviet Union territories particularly. These victims included Jews, Roma (Gyp sies), and officials of the Soviet state and the Soviet Communist party. The Einsatzgruppen also murdered thousands of residents of institutions for the mentally and physically disabled. Many scholars believe that the systematic killing of Jews in the occupied Soviet Union by Einsatzgruppen and Order Police (Ordnungspolizei) battalions was the first step of the "Final Solution," the Nazi program to murder all European Jews. However, some scholars such as Dina Port contend that the Final

Monday, September 23, 2019

Pharmacology (Drug Profile Midazolam) Essay Example | Topics and Well Written Essays - 2750 words

Pharmacology (Drug Profile Midazolam) - Essay Example b) Oral administration is also done for short term treatment. This is done mainly for the insomnia patients. c) Midazolam is also indicted for the management of schizopernia. 3. Midazolam is found to interact with many drugs. The drug interaction is found to either increase the activity or decrease the activity of Midazoalm. The drug interaction occurs mainly with the antipsychotic medications, barbiturates, antibiotics and antifungal, cimetidine, Diltiazem, Narcotics, Seizure and Sleep medications, alcohol and antidepressant medicines such as Antipsychotic drugs include: Aripipraxole , asenapine, chlorpromazine, clozapine, fluphenazine, haloperidol, Iloperidone, loxapine, lurasidone, molindone, olanzapine, paliperidone and perphenazine and pimozide. Barbutarates include: Amobarbital, Butalbital, Pentobarbital and Secobarbital. Antibiotics such as Clarithomycin, Erythromycin, Isoniazid, Itraconazole , ketoconazole and Telithromycin. Narcotics such as morphine and oxycodone are used i n combination with Midazolam. (drugs.emedtv.com) The pharmacokinetic drug interactions are found to occur based on the enzymes involved in the metabolism. The drug interaction with the CNS depressants such as alcohols, opioids and barbiturates are found to have lethal, clinical and forensic consequences with midazolam. Many studies have found that this interaction results in death. (Mozayani and Raymon 2004). Similarly when analgesics are used along with the midazolam, they are found to have greater sedative effects. The gastrointestinal agents when combined with midazolam are found to increase the rate of absorption of the drug. Cimetidine when used along with Midazolam is found to increase the retention time of Midazolam in the body. Similarly the antifungal agents are also found to inhibit the movement of Midazolam from the body. 4. a) The mechanism of interaction of Midozolam is understood well. The main target of Midazolam is the GABAa receptor. This is an ionotropic receptor w ith gamma amino butyric acid as the endogenous ligand. When GABAa receptor is activated then it transmits Chloride ions through their pores and polarizes the neurons. This polarization results in the inhibition of the neurotransmission. The benzodiazepines binds to the receptor found between the alpha and gamma receptor subunits. The five subunits of GABA receptor are sensitive to benzodiazepine. When benzodiazepine binds to the alpha and the gamma subunits of the GABA receptor, and brings the receptor into its control. The binding brings out a change in the conformation of the GABA – alpha and makes them to open the chloride ion channel and this polarizes the membrane. This process inhibits the signal transduction pathway by arresting the GABA molecules and creating sedatory and anxiolytic effects to the human. (Sigel 2002). b. Midozolam is the substrate for the receptor GABA only. This is very specific in nature. It binds to the GABA receptors that are having only alpha and gamma subunits. The binding of benzodiazepine modifies the GABAs response by the receptor. As these receptors are found in the cerebral cortex region, limbic system, cerebellar cortex and spinal cord, its effect can be felt in many parts of the body. The two compartmental model enables the specificity of the molecule and increases the sensitivity. (Stoelting and Miller 2007) c.

Sunday, September 22, 2019

A Reflection of the Cyborg’s Manifesto Essay Example for Free

A Reflection of the Cyborg’s Manifesto Essay The Cyborg Manifesto’s general idea is that under different definitions, all of us could be considered cyborgs. A universal theory is not going to work because in reality, â€Å"cyborg is our ontology; it gives us our politics. † The manifesto was made for a â€Å"powerful infidel heteroglossia. † The manifesto is intended for people in the academe – students, instructors and professionals. The way that it is written is definitely not the style the common people would identify with. The writer’s playful use of words makes it very difficult to comprehend. Figurative languages were used many times in the essay; even its main subject – the cyborg – is a metaphor. I see myself as being one of the target audience but knowing it did not add to my interest on the essay. The essay anticipated and responded to possible objections. For example, Haraway stated that â€Å"the main trouble with cyborgs†¦is that they are the illegitimate offspring of militarism and patriarchal capitalism, not to mention state socialism†. However, she suggested that it might not be something to worry about. Haraway identified two main arguments in her manifesto. First, â€Å"the production of universal, totalizing theory is a major mistake that misses most of reality. † Second, â€Å"taking responsibility for the social relations of science and technology means refusing an anti-science metaphysics, a demonology of technology, and so means embracing the skilful task of reconstructing the boundaries of daily life, in partial connection with others, in communication with all of our parts. † These two arguments exhibit post-modernity and critic Marxism at the same time. She refused to accept a grand narrative, or what she calls a â€Å"totalizing theory†, which is a main concept of Marxism. She further contested the materialist dialectics theory by refusing the relation between society and science and technology. Clearly speaking, the arguments were made to suggest acceptable compromises between contending positions. Haraway stated that irony, the main argumentative style she used, â€Å"is about contradictions that do not resolve into larger wholes, even dialectically, about the tension of holding incompatible things together because both or all are necessary and true†. She adapted concepts from materialism, socialism, and feminism and post-modernized them to form an alternative that she deems not â€Å"totalizing† and does not miss â€Å"most of reality†. Nevertheless, to arrive at this alternative, she had to debunk certain theories or to call â€Å"assumptions† like Marxism into question. I can see in the essay that it does not have an explicit thesis. I think the essay is all about post-modernity, of adapting varying concepts and meanings. Moreover, it attempted to discuss a wide range of issues from religion to sexuality. Being a post-modern, the struggle for change is fragmented which means it can be done through a variety of perspectives and means. The thesis statement could be cyborg politics will make way for a â€Å"powerful infidel heteroglossia. † Cyborgs do not come to existence through human reproduction, it is post-modern and is â€Å"outside the salvation history†. It is a suitable term to use to when creating a post-gender world; this is why it was used as a metaphor to support the author’s proposal. As mentioned above, irony was used as an argumentative style because since it is a product of contradictions that were not resolved, it supports Haraway’s manifesto in compromising contradicting ideas. The term â€Å"cyborg† has been mentioned many times in the piece and it has been used in 4 different ways, it â€Å"is a cybernetic organism, a hybrid of machine and organism, a creature of social reality as well as a creature of fiction (p. 149). † There are many suggested meanings of the word cyborg in the essay. It was used differently on various parts of the manifesto. Haraway had implied different meaning of cyborgs in the essay aside from the ones she specified. She implied vagueness to word. She referred to it as something we could only see in the distant future but she also considered all of us as cyborgs. Reference: Haraway, Donna. A Cyborg Manifesto: Science, Technology, and Socialist-Feminism in the Late Twentieth Century, in Simians, Cyborgs and Women: The Reinvention of Nature (New York; Routledge, 1991), pp. 149-181.

Saturday, September 21, 2019

Importance of Database Security

Importance of Database Security To be able to manage a huge amount of data effectively and fast, a well organized system is needed to build. It will also need to store and retrieve data easily. Generally, a database system is designed to be used by many users simultaneously for the specific collections of data. Databases are classified based on their types of collections, such as images, numeric, bibliographic or full-text. Digitized databases are created by using management system to make, store, maintain or search the data. Oracle, MS SQL and Sybase servers are mostly used in companies, agencies and institutions for their different purposes of the assets. On the one hand, internetworking technology provides the assets efficiently and effectively among cooperation but it also gives opportunities to hackers or lawbreakers to make profits. So, database security becomes the most important issue and all related agencies have to focus on the availability of their data to the authorized users only. The protection of data from unauthorized disclosure, alteration or destruction is the main purpose of the database security process. Database security is the system, processes, and procedures that protect database from unintended activity that can be categorized as authenticated misuse, malicious attacks made by authorized individuals or processes. Databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment. Database security can begin with the process of creation and publishing of appropriate security standards for the database environment. Particularly database systems in E-commerce, can access the database for exchange and retrieval of information from web applications. As many layers consisted for web application access, it is needed to make sure the security of each layer. In this paper, we are making an attempt to present how to make secure database in each layer of database system of ecommerce in details. Importance of Database Security In this information technology age, it is compulsory for all types of institutions or companies to make avail their information assets online always through databases. However, they must have a policy to divide the levels of users with to which extent they can asset the information. It is vital not to give opportunities to mischievous intruders. Databases are used to provide personnel information, customer information, credit card numbers, financial data and business transactions, etc. The information is very sensitive and highly confidential and must be prevented from disclosure by other competitors and unauthorized persons. The security of data is crucial not only in business but also in even home computers as personal files, details of bank accounts are difficult to replace and potentially unsafe if they will be in wrong hands. Data destroyed by hazards like floods or fire is just lost but handing it in unethical person will have severe consequences. Other threats will be included human errors and espionage. Therefore, the data security starts with strategies of identifying the area of exposure which will be affected. It is important to define who can access what data, who is allowed and who is restricted, whether passwords are used and how to maintain it, what sort of firewalls and anti-malware solutions to use, how to train the staff and to enforce data security. Furthermore, the backup continuity plan should be laid out so that even though the systems fail, the business can be carried out without delay. While constructing the infrastructure security of a company, database security should be well considered. Database is very crucial to most enterprises at present days; the damage of database will have tragic impact on it. Unsecured systems will make hurt both the company itself and its clients. Based on the research done by American National Infrastructure Protection Center (NIPC) in 2000, the continuous attacks on U.S. e-commerce system are increasing. The most interrupted system is Microsoft Windows NT systems, but UNIX based operating systems have also been maltreated. The hackers are utilizing at least three identified system weaknesses to be able to achieve illegal access and download information. Even though these vulnerabilities are not freshly innovated and the mischievous activities of hackers had been in progress for quite long before the sufferer became noticed of the intrusion. The insecurity of the database can affect not only the database itself, but also the other running systems which have the relationship with that database. The process of an intruder can be first to get access to the poorly safe database, then use strong built-in database characters to get admission to the local operating system. In this way, other trusted systems connecting with that database will be easily attacked by the intruder. Database Security in E-commerce database Database system cannot stand alone and it needs to depend on many other systems. Hence, database security is a combination of many other associated and correlated systems are included as well. The following figure is a normal schema of E-commerce Company. In figure 1, the four basic layers are existed in order to defend a database system. These systems are the functioning system on which the database system runs. Firewall is a commonly applied mechanism to obstruct the interruption from the external network. Web server and web application offer numerous services to the end user by accessing the database. Network layer is the medium in which the data is transmitted. Operating system layer Operating system security is a very important characteristic in database administration. Some dominant features of database systems will possibly be a crack for the underlying operating system. Thus, the responsible person should very thoroughly scan the relations between a feature of database and it is operating system. According to Gollmann, there are five layers in Information Technology system. These layers are application, services, operating system, os kernel and hardware. Each layer is constructed on top of other fundamental ones. As the database system is at the service and application layer, it is existed in above the operating system layer. If the weaknesses of the operating system platforms are identified, then those weaknesses may lead to illegal database access or manipulation. Database configuration files and scripts are at server level resources and they should be sheltered severely to ensure the reliability of the database environment. In many database environments, membership in Operating system group is authorized full power of controlling over the database. To keep away from mistreatment and exploitation of the membership, those users membership and access to the database should be warranted frequently. One of the responsibilities of Administrator is to organize the settings of the operating system or to adjust the size of the buffer and the timeout period, so as to avoid the rejection of service attack stated previously. Most operating system vendors supply system patches generously and fast if any vulnerability has been detected on the system. Another weakness which is often ignored by the administrator is to bring up to date the operating system with the latest patches to abolish the newest revealed holes of the system. Network layer Data has to be transmitted through the network including local LAN and Internet when web applications communicate with database or other distributed components. The two major network transmissions are from user to web server, and from the web application to web database server. All these communications must be completely protected. Although the administrator can secured the network in local domain, the global internet is unmanageable. Encryption is another influential technology. It is set aside not only the invader cannot interrupt but also the encrypted data is unreadable and tremendously hard to presume or decrypt. The matching key can only be to decrypt the cipher text. The two means to apply encryption in database system are of the one way to use the encryption options provided by database products and another way to obtain encryption products form trusted vendors. In addition, one more approach for a safety connection is practicing the secured protocols above TCP/IP, for example, the technology of Ipsec and VPN (Virtual Private Network). The personal traffic in the course of the public internet by means of encryption technology can be provided by VPN. In generally, SSL (secure sockets layer) can be used as another way for cryptography on top of TCP/IP. Safe and sound web sessions can be obtained by Netscape. SSL has newly developed into Transport Layer Security (TLS) that make certain no other invasion may snoop or interfere with any communication. Utilization of SSL can help to validate and protect web sessions, but the computer itself cannot be safe. Web servers There are dissimilarities in functions of Web programs and common programs in area of safety. The major reason is safety for Web application program as the flaw is not easy to perceive. Web server that keeps the external disturbances is located in the middle of the application server and firewall. It can be applied as intermediary to get the data that we approved to be available. For the time being, the software commonly used in web applications is CGI (Common Gateway Interface). The web server can do a different function in easier way as it is uncomplicated. It is user-friendly as a web page counter. Moreover, for example as reading the input from the remote user, it can be used as multifarious to access the input as uncertainty to a local database. CGI proceeds the outcome to the user after retrieving the database. On the other hand, it is also risky since CGI scripts permit software applications to be carried out inside the web server. The well-known language for CGI scripts is Perl since it is simple to build applications and parse the input from the user. Nevertheless, Perl can be exploited by wicked users as it grants some forceful system commands. The invader can simply demolish the system if CGI was weakly executed by web server. This may be a huge hazard to the system as someone can easily eliminate the classified files from Web server as effortless to contact. To get rid of the intimidations, there are several ways to prevent these. The CGI scripts should be prohibited by abuser to write, and the arrangement should be done to CGI program that can be performed as a single way of directory. It should also be cautious in writing the CGI script. No more longer usage of CGI applications such as sample applications should be disposed as these are approachable to Web server and major intentions for invaders since older CGI samples have safety gaps. Without comprehensive handlings, default settings of Web application server can be a huge imperfection of the system if the database system networks with CGI. There need to make sure the system for which extent of operation is unapproved to the clients when a use logs into the database. Web serve with verification methods built in CGI is the most valuable way which means to prepare a CGI script with login name and password to prevent the files. By doing this, the files are protected to the web server apart from readable only. The safety gaps should be checked firmly and regularly to all the scripts even though these are obtained by self-developed, downloaded or bought from vendors. Firewalls The major significant layer to slab the external interruption of the system is Firewalls. Packet filter and proxy server are the two types of firewall mechanism. The connected data between the application and database are divided into packets which consist of much information in its headers, for examples, sources, destination address and protocol being used. A number of them are cleaned as with which source addresses are unbelievable to access to the databases. The arrangement of firewall should be done to access only one or few protocols which is helpful for application queries such as TCP whereas the other packets are choked-up firmly. Accordingly, the smallest amount of risks is maintained for the vulnerable system. Moreover, the ping of fatal loss will be kept systematically if the firewall is constructed to abandon the approached ICMP demand. The potential invaders should be marked out by reserving log files at the firewall. There are two connections in Proxy server. The first one is the connection between cooperations database and proxy server. Another one is the connection between proxy servers also provided the log and audit files. On the other hand, there are very hard to build up strong firewalls, and also too huge and tough to investigate the audit tracks. Database server Database servers are the fundamentals and essentials of greatest values in each and every sector of Education, Health, Military, Manpower, Economics, Modern Arts and Sciences, Information Technology, Electronic Businesses, Financial Institutions, Enterprise Resource Planning (ERP) System, and even universally comprised of sensitive information for business firms, customers, marketers and all stakeholders. The functions and purposes of Database servers are highly depended on the users of their particular intentions for applying the services provided by the operating systems. Some good safety practices for Database servers are to: use multiple passwords to access multi-functions of a server such as using one password to access the single system for administration; apply a different password for another operation; be audited for each and every transaction of the database; utilize application specific user name and password and should never use a default user name or password; back up the system thoroughly for late recovery in case of accidentally break down Allowing to know the end-user for the name and location of database is very worthless. In addition, exposing physical location and name of every database can also be a huge danger to the system. To cover up these issues, we should better practice the service names and pseudonyms. The several copies should be done for the important files which control the accessibility to the database services. Each and every copy should be also connected to a meticulous user group. Moreover, the members of each group should be allowed to access only the relevant documents concerning them. Conclusion The institutions, organizations and business firms mainly stored their important information and valuable assets as digital formats in online related excellent databases. The safety and security issues of Databases become strongly an essential role in the modern world for enterprises. To save from harm of database is to prevent the companiesà ¢Ã¢â€š ¬Ã¢â€ž ¢ untouchable information resources and digital belongings. Database is the multifarious system and very complicated to handle and difficult to prevent from invaders. Last, but not the least, database protection is also to be taken significantly to the confidentiality, availability and integrity of the organizations like other measures of the safety systems. It can be guarded as diverse natures to cover up. Although auditing is critical, but analysis is also very tough while potential analytical tools will be an enormous contribution to protect the online rationality of database system. There should be reinforced to the corporate safety and security issues. Means of verification and encryption will play the essential role in modern database precaution and safety system.

Friday, September 20, 2019

Prescriptive Privileges for Clinical Psychologists

Prescriptive Privileges for Clinical Psychologists Erin E. Wood In the last thirty years, many parties within the American Psychological Association have made motions to promote the motion for clinical psychologists to have prescriptive privileges. With the motions made to promote prescriptive privileges, there have also been motions to counter the arguments made supporting prescription privileges. To research the claims made by both sides of the issue, the American Psychological Association has created a task force to assess the effects that prescriptive privileges will have on education as well as psychology as a whole. This paper will discuss the arguments revolving around professional integrity, financial implications, the amount of professionals interested in prescriptive privileges, safety, and educational consequences of prescription privileges as well as my own opinions as to whether I support or oppose the motion for clinical psychologists to obtain these privileges. Since the birth of psychology, American society has evolved to the point that individuals demand instant gratification. The desire for instant gratification has caused individuals â€Å"‘one-stop shop’ for mental health services† and medical professionals who can directly prescribe medications—causing physicians to become increasingly popular in comparison to psychologists (McGrath, 2010: Levine Schmelkin, 2006). By being able to prescribe medication while proving effective treatments to patients, prescriptive privileges will not only assist patients by cutting out the middle-man, it will also, according to Barnett and Neel (2000), â€Å"result in higher quality care.† Although physicians are currently able to provide medication, they are often uneducated on the effects drugs have on mental health (Barnett Neel, 2000). Psychologists in favor of prescriptive privileges argue that, through training and practice, they are more apt to deal with prescri bing medications and treatments that will treat mental health disorders than physicians who have very little training on mental health disorders (Barnett Neel, 2000). While some psychologists believe that prescription privileges is essential to keep psychotherapy from becoming superfluous in comparison to pharmacology and will assist in increasing the care for patients, others believe that these privileges will change the change the â€Å"professional identity† of those practicing psychology (Wiggins Wedding, 2004). Those who believe that psychologists should be allowed prescription privileges believe that not only will prescription privileges keep psychologists from becoming overshadowed by physicians, they also believe that clinical psychologists would be â€Å"in a unique position to assess and to monitor† when it comes to prescribing medication because, through doctoral training, they are more apt to study the effects of medications on patients (Barnett Neel, 2000). This would allow clinical psychologists to retain and extend their psychotherapeutic roots by giving them the opportunity to research the effect medications have on mental disorders while giving behavioral and cognitive therapies to patients. While psychologists in support of prescriptive privileges argue that prescriptive privileges will give way to many new opportunities in psychology, those in opposition to these privileges claim that the authority to prescribe medication will not create such a large window of opportun ity and will cause psychologists to fall prey to advertising from pharmaceutical companies. Many of the psychologists in opposition to prescriptive privileges believe that the addition of prescription privileges will change the direction of psychology towards an undesired direction—ultimately jeopardizing their professional integrity. They believe that, by placing more of an emphasis on medical treatments rather than behavioral treatments, â€Å"psychology as we know it will come to an end† because psychologists will be more interested in providing medications than therapy (Caccavale, 2002). Psychologists may not prescribe medications to patients based on their effectiveness, but more because will be encouraged by pharmaceutical companies. Currently, pharmaceutical companies create advertisements that strategically influence the opinions that physicians have on medications and bribe psychologists – through means of money and continuing education – to encourage them to prescribe these medications (Antonuccio, Danton McClanahan, 2003). Bribing and advertising does not only affect practicing physicians, according to Antonuccio, Danton and McClanhan (2003), pharmaceutical companies assert their influence as early as medical school—meeting with students to promote medication. This influence asserted by pharmaceutical companies over physicians and medical students can taint the objectivity of psychologists and, in extreme cases, place the patient in harms way. Although psychologists who are against prescriptive privileges believe that the integrity of the profession will be negatively impacted by the bribes and advertising of pharmaceutical companies, those who support prescriptive privileges believe th at these privileges will increase the financial status and interest in the profession. The pharmaceutical industry is one of the fastest growing industries in the United States being dubbed â€Å"the most profitable industry in the United States† (Antonuccio, Danton McClanahan, 2003). By being one of the most profitable industries in the nation, if psychologists were given the right to prescribe, it would not only give clinical psychologists an ‘edge’, it would also encourage individuals to join the profession. With prescriptive privileges, psychologists will also be able to partake in the benefits of pharmacology by receiving insurance reimbursements and increased status within health institutions (McGrath, 2010). McGrath (2010) claims that this increased status will not only benefit psychologists in private practice, hospitals, and other intuitions, it will also benefit the academic community by funding research projects. Although there are many financial benefits to both the counselling and academic communities of clinical psychology, there are also drawbacks that could potentially outweigh the benefits. First, while pharmaceutical companies have been known to provide bribes and false information to professionals with prescription privileges to increase drug sales, they have also been responsible for increasing levels of â€Å"commercialism and malpractice allegations† within health professions (Antonuccio, Danton McClanahan, 2003: Stuart Heiby, 2007, p. 6). Commercialization of medications has further tainted the objectivity of health professionals because, according to Stuart and Heiby (2007), although prescribers are able to deny medication to patients, they are more likely to give medications that have been â€Å"requested† by the client—even if they are ill-informed of the drug. Physicians may be becoming more willing to prescribe requested medications because the negative side effects of drugs have drastically decreased making it less of a risk for them to prescribe them (Levine Schmelkin, 2006). While medications have become safer to prescribe, when com plications arise, the professionals who prescribe the medications will be the ones at risk for malpractice lawsuits—not the pharmaceutical companies. In the article To Prescribe of Not to Prescribe: Eleven Exploratory Questions, Stuart and Heiby (2007) discuss the lack of support insurance companies have for professionals in malpractice lawsuits. Many insurance companies have created new policies when dealing with malpractice because â€Å"the rate and cost of settlements [that have] risen so sharply during the past decade† (Stuart Heiby, 2007, p. 22). Because of this, it can be very expensive for a psychologist to pay for the insurance to cover malpractice, or pay for the legal counsel because their insurance does not cover malpractice. According to Wiggins and Wedding (2004) only a small majority of psychiatric nurses – clinical psychologists who have gone through training to prescribe medication – have insurance policies that cover malpractice—even when it is in many ways cheaper than other forms of insurance (p.150). This could be because, although psychiatric nurses are able to prescribe medicatio ns, very few of them actually utilize prescription privileges (Wiggins Wedding 2004, p. 149). Due to the amount of psychiatric nurses who refrain from prescriptive privileges, before the APA -financial -military -RNP -coursework References Antonuccio, D. O., Danton, W., McClanahan, T. M. (2003). Psychology in the prescription era: Building a firewall between marketing and science.American Psychologist,58(12), 1028-1043. Barnett, J. E., Neel, M. L. (2000). Must all psychologists study psychopharmacology?Professional Psychology: Research and Practice,31(6), 619-627. Caccavale, J. (2002). Opposition to prescriptive authority: Is this a case of the tail wagging the dog.Journal of Clinical Psychology,58(6), 623-633. DeLeon, P. H., Dunivin, D. L., Newman, R. (2002). The tide rises.Clinical Psychology: Science and Practice,9(3), 249-255. Levine, E. S., Schmelkin, L. P. (2006). A move to prescribe: A change in paradigm.Professional Psychology: Research and Practice,37(2), 205-209. McGrath, R. (2010). Prescriptive authority for psychologists.Annual Review of Clinical Psychology, (6), 21-47. Retrieved from clinpsy.anualreviews.org Muse, M., Neel, R. E. (2010). Training comparison among three professions prescribing psychoactive medications: psychiatric nurse practitioners, physicians, and pharmacologically trained psychologists.Journal of Clinical Psychology, 66(1), 96-103. Robiner, W. N., Bearman, D. L., Bearman, M., Grove, W. M., Colon, E., Armstrong, J., Marack, S. (2002). Prescriptive authority for psychologists: A looming health hazard?Clinical Psychology: Science and Practice,9(3), 231-240. Stuart, R.B., Heiby E.E. (2007). To prescribe of not to prescribe: eleven exploratory questions. The Scientific Review of Mental Health Practices, 5(1),4-32. Wiggins, J. G., Wedding, D. (2004). Prescribing, professional identity, and costs.Professional Psychology: Research and Practice,35(2), 148-150. (McGrath, 2010) (Antonuccio, Danton McClanahan, 2003) (Wiggins Wedding 2004) (DeLeon, Dunivin Newman, 2002) (Caccavale, 2002) (Levine Schmelkin, 2006) (Robiner et al., 2002) (Muse Neel, 2010) (Stuart Heiby, 2007)

Thursday, September 19, 2019

The Washington Monument Essay -- Architecture History Historical Essay

The Washington Monument The most stunning monument in our capital is the Washington Monument. At 555 feet high, it is the tallest such monument in the world. It is an obelisk by shape, yet not a true obelisk because it is not carved out of a single stone. The monument was built at intervals between 1848 and 1885. It memorializes George Washington's achievements and his devotion to principles and to his country. The Washington Monument has an interesting history. The idea of a monument celebrating George Washington was first considered by the Continental Congress in 1783. However, the next three decades brought neglect by Congress to take action. Finally, in 1833 the Washington National Monument Society was organized to forward the progress of the monument. Progress was slow for the society and by 1847 they had raised $87,000. Robert Mills, a well-known architect, was soon selected to design the monument. His design called for a decorated obelisk that was 600 feet high, rising out of a circular colonnaded building. This building was to be a 'temple' , an American pantheon, which would house statues of presidents and national heroes, including a large statue of George Washington. The design changed over the years and finally settled on a the obelisk without decoration as we know today. The building progressed well until the civil war. At this time construction was halted for almost 25 years. This left the unfinished obelisk standing 150 feet. Finally, on August 2, 1876, President Grant ordered the completion of the monument. The capstone was placed on the monument on December 6, 1884 and it was finally dedicated on February 21, 1885. Elevators were first powered by a steam hoist. The current elevator was installed in 195... ...ke the ancient Egyptians, we still raise monuments to commemorate our present day heroes. Although today these monuments are ordered and directed by the general public and not by the king or hero themselves. (This probably accounted for the difficulty in final completion of the Washington Monument) The long history or the obelisk being built, toppled, and stolen, further illustrates the ideas it contains. It stood for power and divinity. Today, the Washington Monument stands as a symbol of George Washington's contribution to our nation and our citizens still pay tribute to the great leader. Works Cited: Badawy, Alexander. A History of Egyptian Architecture. University of California Press. 1968. Tompkins, Peter. The Magic of Obelisks. Harper & Row Publishers, New York, 1981. Engelbach, L. The Problem of the Obelisks. T. Fisher Unwin Limited, London, 1923.

Wednesday, September 18, 2019

Life in the Sixties :: essays research papers

Life in the Sixties   Ã‚  Ã‚  Ã‚  Ã‚  Sometimes in life people do strange things, and while others may perceive it as a harmless act, human morals can make it seem otherwise. In the story â€Å"A & P† John Updike reveals what it is like to have been a young man who worked in a grocery store in the nineteen-sixties and what it was like to see three young girls walk in with only two pieces on. The semi- sexist thoughts of how Sammy describes the young girls when they walk in, the three girls walking in to the grocery store in only two pieces was obviously against the moral standards of that day, and sometimes small, seemingly insignificant actions and events can push a person to make a life-changing decisions, are the themes of John Updike’s story.   Ã‚  Ã‚  Ã‚  Ã‚  How men perceive women is a funny thing, Sammy, the one who is telling the story, gives, what we call sexual, and almost kind of a perverted way of describing the girls. Updike used his descriptions of the girls to bring out that men, even then had impure thoughts of women and the way that we perceive them sometimes, really though, it’s the nineteen-sixties and in walks three beautiful girls in not just bathing suits, but two pieces! Of course a male mind is going to start racing a million miles per second. So begins the sexual descriptions of the girls. So as Sammy is ringing up the lady’s food at the cash register, he can’t help but be distracted, Updike shows us this when Sammy says â€Å"I stood there with a box of HiHo crackers trying to remember if I rang it up or not. I ring it up and the customer starts giving me hell†(p.344). Updike clearly showed that the girls were a distraction to Sammy, and how easy it was for his thoughts to go astray.   Ã‚  Ã‚  Ã‚  Ã‚  The three girls walking into the A & P was not what was wrong, it was the fact that they came in wearing bathing suits. Not just the normal bathing suit, but a bikini! By law, one had to be over eighteen just to get in to a movie if there were going to be women in bikinis in it. Two piece bathing suits were practically unheard of and if someone was caught wearing one, they might have been considered wild and irresponsible. Walking into the grocery store would be were the wild part comes in.

Tuesday, September 17, 2019

Christology Case Essay

Have you ever wondered if peoples’ names have any real value or significance? If it has any connection to our inner selves, and most specially our souls? A person’s name matters a lot more than we might think; names are given to us which we wear like a label through most of our lives. This is something that allows us to distinguish one from another in speech and writing, but it is truly nothing more than a label and seldom has any true energetic connection to who or what we are. A name can be generally termed as something by which a certain thing possesses the quality of being known so that it establishes its distinctive identity and existence in the scheme of things. Therefore, a name is the very base of the being of something. A name is more than a label. It’s a description of who you are and what your path and purpose in this experience is, was and will be. It is the perfect energetic compliment to your understanding of this experience for yourself; your role , your relationships to others, basically everything about you. â€Å"A name powerfully symbolizes character and importance. â€Å" There are first name, middle name, last name, surname, nick name, family name, given name and etc. when the reference is to people. A surname is usually inherited and, while it may be changed, some form of it is usually retained. Given names are more important in a way because they represent a voluntary choice by the parents or, sometimes, by an individual. By all means, a name is usually not given lightly. My Name Is JAZZY REJEL AGUILLON GOLOSO MEANING â€Å"Jazzy† This name is believed to have an American origin which means â€Å"Fragrant Flower†. Its meaning and origin came from a variantof the Persian Yasmin (Jasmine). â€Å"Jazzy† usually means â€Å"unconventional† or â€Å"unusual†, to stand out and are different from the people around you in a good way. Jazzy personality -means you are outgoing, talkative, funny, and fun to be around. Jazzy sense of humor – means you are clever and think of jokes that other people wouldn’t think of. It could possibly mean that your sense of humor is a little bit crass and you joke about things that others wouldn’t joke about. But not necessarily – it could be completely complimentary. Jazzy clothes or a jazzy dresser -means you probably wear bright, unusual colors or patterns, or your clothes show a unique and modern sense of style. What does it mean to other language? In Spanish -Sassy In French -Sophisticated In Danish -Over smart â€Å"REJEL† Rejel or Rigel (i)-gelIt is Arabic origin,and the meaning of Rigel is â€Å"foot†. In the Orion constellation, Rigelis the blue star of the first magnitude that marks the hunter’s left foot. Nickname (jazz) Jazz, coming from the word Jasm is thought to derive from or be a variant of slang jism or gism, which is defined as â€Å"spirit; energy; spunk.† . Deepening the nexus among these words is the fact that â€Å"spunk† is also a slang term for semen, and that â€Å"spunk†, like jism/jasm, also means spirit, energy, or courage. Other proposed origins include French jaser, meaning to chatter or chat, and French chasser, meaning to chase or hunt and from Irish teas, which is pronounced â€Å"jass† and means â€Å"heat† or â€Å"passion†. ACRONYMN J is for jolly, the fun side! A is for abundant, cheer knows no bounds. Z is for zeal, zest for life. Z is for zany, the funny side of me! Y is for yearn, my innermost desires. R is for reasonable, understanding way. E is for enchant, for enchant will. J is for jolly, the fun side! E is for eternal, spirit will live. L is for loyalty that I show. FAMOUS PEOPLE HAVING THE SAME NAME DJ Jazzy Jeff- Jeffrey Allen Townes, also known as DJ Jazzy Jeff or simply Jazz, is an American hip hop, R&B disc jockey, record producer, turntablist and actor. He is best known for his early career with Will Smith as DJ Jazzy Jeff & The Fresh Prince. Jazz Raycole-an American actress and dancer. Jazzy Rhia-female rapper. Research from my parents My mother told me why she named me Jazzy Rejel it’s because of her name Jenny while my father’s name is Romeo the first letter of my first name is from the first letter of my mother’s name, while the first letter of my second name is from the first letter of my father’s name . She said that she named me Jazzy Rejel since when I was born I was cute and adorable. How I could stand up to my name? As what I have researched, my two names mean a fragrant flower and a star- which is at the foot of a constellation. With such unique name, it was hard looking for meanings but as I discover what my name means; it was astonishing to know that my name really fit my personality. If I would be asked to give my own meaning to my name basing on this, I would say that Jazzy Rejelmeans a bubbly, perky person who will do everything to reach her goals and become that star, become a part of something important. I would carry on with my good works, remain as humble and lively and improve on my mishaps. END.

Monday, September 16, 2019

Culture of New Zealand

British and European Custom interwoven with Maori and Polynesian tradition. Maori tradition dominated the beginning of human existence in New Zealand and has stayed around even as the culture modernized. Maori established separate tribes, hunted and fished, traded commodities, developed agriculture, arts and weaponry, and kept a detailed oral history. Regular European contact began approximately 200 years ago, and British immigration proceeded rapidly during the nineteenth century. Colonists affected the Maori tradition by introducing religion, technology, and the English language. European New Zealander’s, despite being far from Europe, kept strong ties to the â€Å"mother land. † These ties were weakened by the demise of the British empire and their loss of special access to British meat and dairy markets. More recently, New Zealand culture has been broadened by globalization and immigration from the Pacific Islands, East Asia, and South Asia. European and Maori remain the two largest ethnicities Maori and Kiwi: Language has evolved to two major languages, Maori and English. The two have influenced each other Maori demeanor: Maori are friendly and place great value on hospitality They are easy to get to know and will say hello to strangers. They often break into speech or song and even if they don’t know each other they may close conversations with a song. Maori will know the same songs so they are able to sing together even if they just met. New Zealand’s indigenous people (Maori) have tattoos covering their face. This art stands for warriors. Some New Zealanders are still representing these tattoos today. Kiwi demeanor: . New Zealanders are friendly, outgoing, somewhat reserved initially yet polite, and enjoy extending hospitality. . They are quite easy to get to know as they say hello to strangers and will offer assistance without being asked. . Because they do not stand on ceremony and are egalitarian, they move to a first name basis quickly and shun the use of titles. Kiwis dress casual. There are no dress codes in restaurants. Even business men may take off suit jackets and roll up shirt sleeves. Modern New Zealanders live very casually and laid-back. Environmentalism: Kiwis are extremely concerned with the environment and keeping their counties beauty. One of the major local issues is importing of predators. Boarder controls are very tight and there are huge fines for importing food or other natural products such as wood, cane, etc. The local attitude about the environment comes from the indigenous people, the Maori. . They believe that all things have a ‘mauri' – a life force. Damage to this life force, or human attempts to dominate it, result in the mauri losing its energy and vitality, which affects the lives of people as well as the resilience of ecosystems. . Maintaining the mauri of the environment and ecosystem resilience are equally important for sustainable development Egalitarianism: New Zealand has no formal class system. They take pride in individual achievement and wealth and pow er are not extremely important. As a ‘welfare state’ unemployment and health benefits are available to those who cannot afford it. New Zealanders believe that everyone is equal regardless of race or social status. Etiquette: Traditional Maori greetings consist of a handshake and they often touch their faces to each other. Kiwi meetings are casual and move quickly to first names. Greetings consist of a handshake and a smile New Zealanders can be somewhat reserved with people they do not know. Rugby is the largest sport in New Zealand. The Kiwi (New Zealanders) are very competitive when it comes to rugby. The All Blacks are a favorite Rugby team. The all blacks have won 75% of games since 1903.

Sunday, September 15, 2019

Case Study Carmex Essay

Question #1 a) Some advantages of an online survey of a cross section of Internet households are having a larger audience with a wider variety of responses, lower cost, and instant results. Some disadvantages are people may disregard the survey, answers may be careless just get the promo or offer, surveys may be sent directly to junk mail. b) Some advantages of an online survey of Carmex Facebook likers are The people that fill out the Facebook surveys actually know the products, they aren’t just completing for the free stuff, responses will come directly from product users, surveys will not get lost in spam or junk mail. Some disadvantages would be that it does not cover a wide customer base and the survey will only increase engagement and not likes Question #2 a) On a Facebook brand page, â€Å"engagement† measures how much activity is being made by its Facebook audience with a certain brand which is measured through posting a comment, liking a status or by replying to one of the posts on brand page. On the other hand â€Å"likes† measures the number of new likers or the size of the audience on Facebook b) For Carmex engagement is more important because it means its current likers are interested in learning about the company by interacting with posts Carmex makes by replying and liking their posts. Carmex would appreciate this because it shows customer interest and brand loyalty. c) Question #3 a) Consumers having the ability to engage with a brand they like and having the chance to create their own opinion about the products they sell will create activity between the user and the brand page. Engagements on a brand page like Facebook are evoked by making sure those opinions count and are heard, as well as by posting content to attract consumers and give them a chance to engage further b) To attract like to a brand page on Facebook you could give out prizes, have a contest that requires user to like the page, and offer coupons that offer a better deal than what’s already in the market. Question #4 a) The advantages of a fixed alternative poll question on Facebook are the questions tend to be short and can be answered quickly, you can keep anonymous, more people may answer as it only takes a click. b) I think it would be best to use an open ended question when you are trying to get opinions on the company or products that could range from a variety of answers from a range of different users. This will allow the consumers to speak freely and give them the flexibility to write whatever they want Question #5 a) If I had a limited budget a time I would choose a poll only strategy because it has low cost and set-up associated with it. All you have to do is post the poll to the Facebook brand page and wait for users to respond, which will happen quickly. The last step would be to collect your data. b) On the other hand, If I had a higher budget and more time I would choose the contest only strategy because the results would be more rewarding. Promoting the contest will drive customers to participate, involving prizes will make the users take it more seriously, and they will result in more accurate and realistic answers.

Saturday, September 14, 2019

Case Study: National Bank of Kuwait

Opting for exempt CHI will reduce the legal requirements to the minimum. Central Bank of Bahrain) According to the CAB, the initial capital required should comprise of: At least two real estate properties constituting 80% of the initial investment At most 20% of the initial Investment should be Invested in development and other activities. Additionally, the CAB requires that the amount of equity capital be at least 40% of the total value. All of the legal requirements as stated above require N.B. to provide substantial funding at the onset of the Joint venture.There are many options available: N.B. may elect to form a separate SSP to raise levered capital required as equity in he CHI. N.B. may invest in the CHI formation from unrestricted investments. N.B. can raise equity of unrestricted investment account holders using Muskrat instruments under the banks name. I opt for the second option, given that the fund type is an open-type fund and N.B. can subsequently raise capital as neede d without limitations as to the number of shares.Further, in order to comply with Shari, N.B. must ensure that: The fund does not disburse or receive fixed payments based on principal (interest). All payments and receipts should be be either in the form of profit shares – or striations thereof; or fee based flows. Profit sharing ratios and fee structures should be according to contractual agreements made before the formation of the fund to avoid gharry. The agreement should include no clause limiting the exposure of the bank to losses in contradiction to the stipulations of Shari without adequate Justification (e. . Limiting the exposure to loss for Arab al mall in a Muhammad contract without a valid justification which may be, for instance, gross misconduct by the midrib in breach of the contract resulting in the loss). To sum up, I suggest that N.B. raises funds through equity of unrestricted investment account holders using Muskrat instrument under the name of the Bank to purchase the assets needed to set up a collective investment undertaking according to the stipulations of the CAB. 2) How N.B. can raise Shari-compliant funds in excess of initial capital for financing of specific real estate projects. After formation of the fund, N.B. will have to enter into joint venture agreements with real estate developers. This will require further financing as the portfolio will require investments for developing real estate assets in arioso countries in excess of the initial investment amount. Islamic finance provides many options for raising capital for such purposes, but two option are the most used: Muskrat and Muhammad.Muskrat, basically, is a partnership where all parties provide finance and share profits according to predetermined arrangements. Management arrangements may differ according to the stipulation of contracts so does the management fees. Muhammad is a special type of partnership that involves a financier (Arab al mall) and an entrepreneur (m idrib) whereby the undertaking is financed by the Arab al mall in turn for a profit or loss share and the midrib provides the actual work and technical expertise and receives a share of the profit.It is worth mentioning that the Midrib does not share losses. The solution to Nab's case is a two-tier financing agreement. There will be a Muhammad contract with the developer whereby the bank is Arab al mall and the developer is the midrib. There will also be a Muhammad contract between the bank and the bank and investors whereby the bank is the midrib and the investors are ABA al mall. The reason why Muskrat was not used is that, in common with investment funds, the manager does not share losses with investors.The common practice is to charge fixed management and other fees and charge commission on profits which is compatible with the Islamic instrument of Muhammad. This strategy better matches the inflows and outflows for N.B. as they will only act as intermediaries between investors a nd developers and will minimize exposure to loss. The income for the fund will be in the form of: Fee income from investors Share of profit from the sale or rent of properties less developers shareThis kind of arrangement is common with Islamic banks when finance is not readily available internally Malden) However, the bank can also limit its risk exposure by taking a deposit from the developer in the form of Muskrat contract whereby the bank will be able to share some of the risk with the developers. This sharing of risk will solve the agency Muskrat partnerships that for their own interest, thus increasing efficiencies in their part of the Job as their net compensation will not contain a fixed minimum but can also extend to loss to a certain extent depending on the amount of the Muskrat contract.

Friday, September 13, 2019

Marketing principles Essay Example | Topics and Well Written Essays - 3000 words

Marketing principles - Essay Example Marks & Spencer offers stylish high quality and Fashionable outfits. The company has the core competency within the industry to represents high quality fashionable clothes. The company gets supply of clothes from more than 2000 global suppliers and the company has 78,000 employees worldwide. Marks & Spencer is the leading provider of lady wear in UK clothing market. Moreover the company is receiving high market share in kids-wear and menswear. Apart from these business areas Marks & Spencer has also dedicated to do social welfare activities. The company has become zero solid waste and carbon neutral by implementing its effective five years eco plan for organization’s green credential. Marks & Spencer enjoys the advantages of more than 21 million footfalls every week in all the retail outlets. By providing effective fashion retail marketing strategy and product of high quality with effective customer services, Marks & Spencer has able to produce enormous number of footfall ever y week. It is the major achievement for the company as leading fashion retail chains globally. The study will reveal the internal and external analysis, competitive strategies, and purpose of marketing strategy in order to develop a marketing strategy for Marks & Spencer. This will help the company to attract customers. Finally the study ends with a conclusion. There are different elements of marketing process such as marketing environment analysis, targeting strategy, market segmentation and product positioning. Marketing environment analysis deals with the impact of macro and micro environmental forces on the performance of company. Targeting strategy is used to identify the target audience for the products. Market segmentation is used to determine the various segments of customers with respect to different product line. Product positioning is used to identify the area in which the product will compete in a market place. These

Thursday, September 12, 2019

Auditing Research Essay Example | Topics and Well Written Essays - 500 words

Auditing Research - Essay Example This shows that once the company initiates its international expansion, it will become an even greater threat. In cases when Under Armour, albeit a smaller company, becomes more prominent among the customer population, Nike will no longer remain the most desired company for sports garments and this hinders the main objective of Nike that is to improve as well as protect the position of Nike as the number one brand in US. Furthermore, Nike not only faces huge threat and competition from major sports brands but also faces threats from fake Nike goods. According to an article by BBC, almost 135,000 fake Nike running shoes have been seized by the U.S, making it clear that this is a huge problem. Nike has been selling goods in countries other than the US. Certain labor related accidents, in countries like Bangladesh where the Nike goods are sold, have led to protests regarding the safety rights and health of the employees. If Nike is forced to invest in the uplifting of health for these employees, it would act as a risk since it would enhance the costs of the company and a contraction in margins. This risk will continue to increase with time as Nike is raising their prices of sports goods. Another risk factor for Nike is the fact that since it generates sales outside US, it is inevitable for the company to face currency fluctuations. Since the dollar has been strengthening and will continue to strengthen, it will pose as a risk for Nike. The company is exposed to the international nature of trade. Since it sells and buys in different currencies, it faces instability in terms of margins and costs over time duration. This means that Nike Inc. might be selling at a loss. With these fluctuations, the income of the company will become varied and the cost for its manufactured goods in other countries will also be altered. This tends to obstruct the objective of Nike to manage and direct the international business of the company as it is developing. Also,

Wednesday, September 11, 2019

International business economics Essay Example | Topics and Well Written Essays - 2750 words

International business economics - Essay Example In this pursuit, an M&A team also had been setup to seek out prospective targets (Dutta and Chaturvedi, 2005). The main target of globalizing the company was in terms of boosting up exports substantially. Entering the Chinese market through joint ventures or transfers of technology was also on the cards. But these aspirations failed to materialize and instead when the opportunity to acquire Daewoo, a concern that had a market share of 22 percent even with large idle capacities, arrived, Tata Motors grabbed it (Dutta and Chaturvedi, 2005). The objective of the present endeavor is to look at the acquisition in detail to the extent allowed by the scope. In what follows we look at the strategic and economic rationale of Tata Motors that motivated acquisition, seek to explore aspects like the strengths of Daewoo Motors that made it potentially valuable for Tata Motors, the major challenges faced by Tata Motors in the process of acquiring Daewoo and the major potential synergies and their materialization. To perceive the rationale of the acquisition, it is first necessary to understand where Tata Motors stood just before this breakthrough phenomenon in the history of the Indian Automobile industry. Although Tata entered the sphere of manufacturing automotive vehicles way back in 1954 when it collaborated with Daimler-Benz, it spent the following two decades or so in enhancing its R&D base of operations through a multitude of collaborations and manufacturing mainly construction equipment (Dutta and Chaturvedi, 2005). The first commercial vehicle was manufactured in 1977 and by 1983, Telco, as Tata Motors was known until 2003, initiated its production of heavy commercial vehicles. ‘TATA 407’, the company’s first light commercial vehicle that was completely indigenous in design was launched in 1986. In 1991, the first passenger cars that were designed indigenously, the Tata sierra and the Tata estate,

Discuss how Recent Globalization Trends Have Affected the Aerospace Research Paper

Discuss how Recent Globalization Trends Have Affected the Aerospace Industry - Research Paper Example The aspect of globalization has affected every segment of the industry including the aviation and aerospace industry. The present study would analyze the effect of globalization on the business prospects of the aerospace industry. Effect of Globalization on Aerospace Industry The global aerospace industry consists of both airline companies that are engaged in the transportation of individuals from one point to another as well as the suppliers of aircrafts and parts such as Boeing and Airbus. The global defense and aerospace industry has been valued at 910 billion US dollars as of 2008 and the value is expected to grow by 6.17 percent on a year on year basis, The industry is a very globalised outlook with consumers including organizations as well as governments who are essentially looking towards best deals for their money (Wipro, â€Å"Aerospace Industry†). ... This has arguably increased the efficiency and profitability of the companies and has also generated greater transparencies in the functioning of these business organizations giving its win-win situation for all the stakeholders. On the other hand it has also augured the need for business organizations to generate greater organizational and operational aspects in order to remain afloat in the industry and maintain profitability and sustainability (AT Kearney, â€Å"Globalization†). Aerospace industry is highly capital intensive with huge amounts of capital required for establishment of the industry. The industry has largely been influenced by globalization as about 80 percent of the manufacture of an aircraft is done through outsourcing. Globalization has immensely benefited the aspect of outsourcing with free trade and lifting of trade barriers helping the organizations in a major way. The designing and manufacture of the aircrafts is essentially a highly collaborative and gl obal activity with suppliers and assemblers for any aircraft located across the globe. Companies like Boeing and Airbus can be rightly termed as assembling units in which they only assemble the original equipments and create the final design and product. Globalization has also led to large scale integration of the supply chain management activities of the players of the aerospace market. Globalization has also enabled high end parts and processes being outsourced to destinations like India and China (Wipro, â€Å"Trends in Outsourcing†). Globalization has also led to greater cross border deals that include both the civilian aircraft as well as the military aircrafts. In addition to

Tuesday, September 10, 2019

Apple Company Essay Example | Topics and Well Written Essays - 1250 words

Apple Company - Essay Example These include emails, banners, the company site, and social sites such as face book. The online advertisement is an effective way because it enables the Apple Company to reach may people. Additionally, online advertisements have no geographical restrictions that businesses may encounter when using other mediums (Durkin & McGowan, 2001). The company also prefers this mode of advertisements because it is target oriented. In the internet, one can find may websites that serve particular groups of people. The websites serve individuals in particular age groups and occupations. Apple advertises its products on its website, technology sites and social sites. This has given it the chance to reach the consumers who are particularly interested in procuring its goods (Durkin & McGowan, 2001). Furthermore, the use of the internet as an advertisement media has reduced the firm’s expenses. This because compared to other mediums, this mode is cost effective. When advertising through the inte rnet, Apple only pays when its potential consumers visit its websites. Additionally, the media is very informative since consumers can get all the important information about the products. The other forms of advertisements only give brief information about the products because they are expensive. ... Researches show that people spend approximately five to six hours watching TV. Since many households have televisions, the Apple adverts can reach many individuals. In addition, the media uses sound, pictures and words, which capture the consumers emotionally especially through the soundtracks. In additional, the company can reach its target population through TVs like online adverts. It can reach certain audiences when watching their favorite programs (Business Editors/High, 2001). Newspapers Apple markets its products through newspapers and magazines. In America, almost all homes can access newspapers daily. In the new papers, there are sections targeted for all people. For instance, there, are sports, news, and classifieds sections. In order to reach certain groups of people, the apple company markets its products in specific newspaper sections. Therefore, the company has also increased its sales through the newspaper ads (Durkin & McGowan, 2001). Magazine The publishers produce m agazines for young and the older persons in the society. Apple also uses magazines to market their goods. Magazines are also effective advertisement modes because the company reaches people of all ages. Additionally, magazines give the company more power when creating layouts to market its goods. Moreover, they have longer shelf life because people always keep their favorite magazines and they can read them many times. Therefore, they can read the adverts many times and influence their friends (Yuan, 2006). How essential marketing is in our life Enhancing product awareness Marketing is a vital aspect in businesses since it contributes to the high performance of organizations. The business products and distributions largely depend on marketing. Marketing enhances the public