Monday, September 30, 2019

Introduction to Communication Skills Essay

Doing this involves effort from both the sender of the message and the receiver. And it’s a process that can be fraught with error, with messages often misinterpreted by the recipient. When this isn’t detected, it can cause tremendous confusion, wasted effort and missed opportunity. In fact, communication is only successful when both the sender and the receiver understand the same information as a result of the communication. By successfully getting your message across, you convey your thoughts and ideas effectively. When not successful, the thoughts and ideas that you convey do not necessarily reflect your own, causing a communications breakdown and creating roadblocks that stand in the way of your goals – both personally and professionally. In a recent survey of recruiters from companies with more than 50,000 employees, communication skills were cited as the single more important decisive factor in choosing managers. The survey, conducted by the University of Pittsburgh’s Katz Business School, points out that communication skills, including written and oral presentations, as well as an ability to work with others, are the main factor contributing to job success. In spite of the increasing importance placed on communication skills, many individuals continue to struggle with this, unable to communicate their thoughts and ideas effectively – whether in verbal or written format. This inability makes it nearly impossible for them to compete effectively in the workplace, and stands in the way of career progression. Getting your message across is paramount to progressing. To do this, you must understand what your message is, what audience you are sending it to, and how it will be perceived. You must also weigh-in the circumstances surrounding your communications, such as situational and cultural context.

Sunday, September 29, 2019

Alon Together

Yuqin Ge Prof. Joshua November Final Draft 4 4. 8. 2013 Imagination and Reality Individuals live with both imagination and reality. Often, imagination is based on reality and rooted reality. They utilize their imagination to image something they have never seen to fulfill their curiosity or something they are eager to realize. In â€Å"The World and Other Places,† Jeanette Winterson depicts a boy, a fictional character, who imaged flying to many places in his childhood. When he grew up, he joined the Air Force and realized the reality was not as fantastic as he had imagined.In â€Å"Bumping into Mr. Ravioli,† Gopnik uses his daughter Olivia and her imaginary playmate Charlie Ravioli, who is always too busy to play with her, to reveal a deeper truth about New York. Gopnik explains how imagination can be beneficial in understanding reality. Gopnik and Winterson both confirm that imagination is beneficial because it can help individuals to develop their identity and to hav e fun. One the contrary Gopnik contradicts Winterson, suggesting that imagination can also let individuals feel disappointed when imagination can not match reality.Individuals can develop their identity with imagination. Gopnik confirms Winterson on people can develop their identity through an imaginary sense. In Winterson’s story, the narrator was disappointed because reality was so different than his fantasies in his childhood. He supposed the real places and the people would be like fantasy as he imaged; however, his reality let him down. He lost himself and tried to find a specific answer to his identity, â€Å"How shall I live? † (287) Until one day, the narrator met an old woman in the park, he realized he could develop his identity through his imagination.Although the old woman was in poverty, she was happy, â€Å"Happy. The kind of happiness that comes from a steadiness inside. This was genuine. This was not someone who had turned away from the bolted door. It was open. She was on the other side. † (288) The narrator imaged there was a bolted door and the old woman was on the other side from him, because the old woman knew her identity and her expectation clearly. Here, the narrator learned he could not find his identity because he was not satisfied with his expectation from the old woman who was on the other side.He realized and developed his identity due to the usage of imagination. Gopnik confirms Winterson that Gopnik develops his identity through his daughter’s imaginary friend Charlie Ravioli who is always too busy to play with her. Olivia creates an imaginary friend based on the real world where she lives. There is a big difference between children like Olivia and children from out of New York. Olivia lives in New York which is busy, tight and huge, and the children who live outside of the cities live in a world where they can be free to play and do as much as they want to.Charlie Ravioli is a typical New Yorker, â₠¬Å"fit, opinionated, and trying to break into show business. † Gopnik notices that almost every single person in New York is as busy, or may pretend as Charlie Ravioli. Gopnik is also a New Yorker, and he realizes, â€Å"Busyness is our art form, our civic ritual, our way of being us. Many friends have said to me that they love New York now in a way they never did before, and their love, I’ve noticed, takes for its object all the things that used exasperate them—the curious combination of freedom, self-made fences, and paralyzing preoccupation that the city provides. (160) He realizes that the busyness in New York is more different than before. Gopnik realizes himself as a New Yorker like Charlie Ravioli, and then he develops his identity. Winterson’s developed his identity, and then he continued to seek the answer â€Å"How shall I live? † much deeper through his imagination. Gopnik also develops his identity and he knows himself and New Yorkers w ell. Both Winterson and Gopnik confirm that individuals can develop their identity with imagination. Gopnik confirms Winterson’s that individuals can have fun with their imagination.In Winterson’s story, when the narrator was a child, he and his family were too poor to travel anywhere, but they spent time on an imaginary trip in their living room. They used their imagination to fly away to better places such as â€Å"Bombay, Cairo, Paris, New York† and escape the reality of poverty that they faced (283). When they reached destination, they enjoyed themselves in their trip. The narrator stated, â€Å"When we reached our destination, we were glad to stand up and stretch our legs. Then my sister gave us each a blindfold.We put it on, and sat quietly, dreaming, imagining, while one of us started talking about the strange place we were visiting. † (284) Although they had never been to these places and didn’t know the appearance of these places, they con sidered these locations as amazing places to travel to. The narrator had so much fun flying an aeroplane with his imagination. Likewise, in Gopnik’s essay, his daughter Olivia has fun with her imaginary friend, Ravioli. A paracosm is an extension of imaginary friend, it is an imaginary world.He mentions about his daughter that â€Å"The existence of an imaginary friend had liberated her into a paracosm, but it was a curiously New York paracosm† (160) Author Gopnik uses the word paracosm in his essay which describes a detailed imaginary world which his daughter creates. His daughter has made herself her own little world with her imagination, kind of a mini New York. In this world she lives the life of a New Yorker with a busy life and with friends who have no free time to sit down and play with her.Although she is unlike the other children who play, have a nap and pay a visit to the Central Park Zoo, â€Å"she is too hurried to share them, that she dose have an indepen dence social life, by virtue of being to busy to have one. † (154) Olivia enjoys herself in her imaginary world, so she is too hurried to share them. Olivia’s childhood is different from other children’s. She creates her own world which based on reality. She enjoys herself with her imaginary friend in her own world. In her site, she regards this imaginary game as fun and she has fun with this creating world.The narrator had fun in his fantastic travel and Olivia enjoys herself and has fun with their imaginary world and friend. Therefore, Gopnik confirms Winterson’s on individuals can have fun with their imagination. Imagination is a double-edged sword. It can benefit individuals but can also make individuals disappointed. This depends on if it is based on reality or not, Gopnik complicates Winterson’s negative stance on reality. In Winterson’s story, when the narrator was a child, he and his family would spend time in their living room on tra veling with their imagination.They used their imagination to fly over better places, such as â€Å"Bombay, Cairo, Paris, New York† and escape the reality of poverty that they faced (283). After years of dreaming of these places, the narrator joined the Air Force and physically traveled to these places he imaged traveling to in his childhood. After all his traveling, he stated, â€Å"Bombay. Cairo. Paris. New York. We have invented them so many times that to tell the truth will be a disappointment† (289). After traveling to all these â€Å"amazing places,† he was disappointed because he was unable to tell his amily the truth that these places were not as amazing as they had imaged them to be. He was disappointed because he had imaged these places in his childhood with his imagination, and they didn’t match his expectations. Unlike the narrator, imagination benefits Gopnik’s daughter, due to the fact that her imaginary world is based on reality. In G opnik’s essay, he illustrates how beneficial the imagination is. Gopnik’s daughter, Olivia, has an imaginary friend Mr. Ravioli, who is too busy to play with her.Gopnik’s sister certifies that children create an imaginary playmate â€Å"not out of trauma but out of a serene sense of the possibilities of fiction-sometimes as figures of pure fantasy, sometimes, as Olivia had done, as observations of grown-up manners, assembled in tranquility and given a name. †(155) This means imagination is not a trauma, is beneficial to help Olivia cognize the reality. Olivia begins to understand how to organize her experience into stories through her imagination.She created an imaginary friend based on her observation of the adults living in New York. This creation of the imagination is rooted in reality because her imagination can match the reality where she lives. Gopnik’s daughter creates an imaginary friend who benefits her to cognize the reality; however, in Winterson’s, the narrator disappointed because the reality didn’t match his expectation. Gopnik contradicts Winterson on imagination can benefits individual when imagination depends on reality. Imagination is a double-edged sword.If individuals are able to connect imagination with reality, they will be able to develop their identity and have fun with their own world. But if individuals cannot match imagination with reality, they would be disappointed, just like the narrator in Winterson’s. In Gopnik’s essay, because Gopnik match reality with his daughter’s imaginary playmate, he develops his identity in New York. Winterson confirms Gopnik, because the narrator developed his identity through his an imaginary bolted door. Both Winterson and Gopnik confirm that individuals can have fun with their imagination.

Saturday, September 28, 2019

Economics Sba Essay

Title: An analysis into the involvement of adults in the financial sector. Purpose of Investigation The purposes of this research are: 1. To identify the association of adults with the formal sector of Tobago. 2. To determine the involvement of adults in the informal sector of Tobago. 3. To determine the factors affecting the involvement of adults in the financial sector. Methods of Investigations The primary source of information used in this project is: 1. Questionnaire. Thirty-one questionnaires were distributed to residents of Canaan. All the persons responding were eighteen and over. Limitations Faced Some limitations faced are: * Villagers misunderstanding some of the questions. * Villagers not taking the questionnaire seriously. * Locating responders to retrieve questionnaires was difficult since they were not known personally. Presentation of Data Factors Affecting Choice in Stock Market Frequency of Use of Stock Market Service Analysis and Interpretation of Data Description of Financial System in Trinidad and Tobago The financial system is a network of savers, investors and financial institutions that work together to ensure that savings are transferred to investors. The financial system consists of two sectors: formal and informal. The formal sector includes all the financial institutions that are regulated officially, such as, commercial banks, credit unions, central bank, stock exchange and insurance companies. The informal sector includes all financial activities that are not under official control, such as, sou sou, money lending. The functions of the Central Bank are: * maintaining the exchange rate of the local currency * solely authorizing the issuing of money * acting as treasurer to government; making payments and receiving taxes * acting as a banker to commercial banks by managing their banking systems * assisting commercial banks that are facing financial problems * assisting development of money markets A commercial bank is a financial institution that is engaged in money transmission services and is jointly owned by shareholders. In Tobago there are four commercial bank; First Citizens Bank, Scotiabank, Republic Bank and Royal Bank of Trinidad and Tobago. A credit union is a cooperative association whose members can obtain low-interest loans from their combined savings. There are nine credit unions in Tobago, these are; Lambeau Credit Union, Bethel Credit Union, Mt. Pleasant Credit Union, Thawe Credit Union, Whim Credit Union, Tunico Credit Union, Total Holdings Credit Union, Runnemede Credit Union and People’s Credit Union. The Trinidad and Tobago Unit Trust Corporation is a mutual company that dominates the mutual fund market in Trinidad and Tobago. There is a branch in Scarborough, Tobago. The Western Union Company is a financial services and communications company. There are several locations in Tobago, including in Crown Point, Scarborough and Canaan. An insurance company provides financial protection for property, life, health, etc., against contingencies, such as death, loss or damage. There are insurance companies in Tobago; ScotiaLife, Colonial Life Insurance Company, The Beacon and Guardian Life. A stock exchange is an organized market facilitating the purchase and sale of securities, operated by professional stockbrokers. The Trinidad and Tobago Stock Exchange is located in Port-of-Spain. Market Structure Market Structure refers to the type of competition faced by firms in an industry. The four main market structures are perfect competition, monopolistic competition, oligopoly and monopoly. | No. of Buyers and Sellers| Knowledge| Type of Product| Control of Price| Barriers to Entry| Perfect Competition| Many buyers and sellers| Perfect| Homogeneous| Price Taker| No barriers| Monopolistic competition| Many buyers and sellers| Imperfect| Differentiated| Price Setter| Low barriers| Oligopoly| Many buyers, few sellers| Imperfect| Homogeneous or differentiated| Price Setter| High barriers| Monopoly| Many buyers, one seller| Imperfect| Unique| Price Setter| Very high barriers| Banks in Trinidad and Tobago fall under an oligopolistic market because there are few sellers and many buyers. Credit unions are under a perfect competition market. Unit trust is a monopoly. Western union is an oligopoly. Insurance companies are oligopolies. The stock exchange is a monopoly. Participation of Adults in Canaan Village in the Formal Sector Banks Location was the largest factor in Canaan’s choice in banks at 24%, and customer service followed with 22%. Advertisements affected 16% of respondents, whereas 13% were influenced by friends. Both the respondents who chose at random and those who knew employees of banks earned 9% each. Unspecified reasons determined 5% of choices and age–group appeal impacted only 2%. Twenty-three adults in Canaan use banks; 13% use them rarely, 26% visit fortnightly, 30% monthly, and another 30% weekly. Stock Market Only three residents of Canaan are involved in the stock market, one influenced by friends, another chose at random and the third whose reason was unstated. Of the three residents who use the stock market, each used the service at different frequencies: rarely, monthly and another unspecified time span. Credit Unions Influence of friends determined 21% of residents of Canaan choice in credit union, indefinite reasons following with 17%. Respondents who decided at random earned 13%, those who chose based on knowing an employee earning the same. Customer service and location earned 12% each, advertisements affect 8% and age group only appealed to 4%. The majority of respondents, namely 35%, rarely use the services of a credit union. The second most common time span, monthly, made up 24%. 18% use credit unions annually, and 12% chose based on unspecified reasons. 6% use services weekly and another 6% fortnightly. Unit Trust Advertisements influence a quarter of Unit Trust members in the village of Canaan. Customer service, friends and unmentioned reasons affected 19% each and 18% of respondents were impacted by location, age group and knowing an employee equally. Of the Unit Trust members that reside in Canaan, 45% rarely use its services. Another 45% use it monthly, and approximately 10%, fortnightly. Insurance Companies Customer service influenced 24% of Canaan’s residents in terms of insurance companies, 19% were impacted by advertisements and age-appeal affected 14%. Respondents who knew employees made up 10%, and those whose reason was unspecified also formed 10%. Location and friends each earned 9%. 5% of choices were made at random. 40% of villagers who have insurance use it monthly and those that use it fortnightly, annually, and at unstipulated time intervals made up 20% of respondents each. Western Union Of the people who use Western Union/Money Gram in Canaan, an estimated 25%, were influenced by the customer service, 25% were affected by location and another 25% by arbitrary selection. Unstipulated reasons determined 17% of villager choices and 8% personally knew an employee. The most common frequency at which the services of Western Union/Money Gram were used was ‘monthly’, earning 44%. One quarter of the remaining 56% of respondents used services rarely, another quarter, annually, another weekly, and the final uses the services in an unstated time period. Findings 1. It has been found that 100% of the adults in Canaan that use services of the formal sector. 2. There was participation in the in informal sector. Â  3. The main factors affecting the involvement of residents of Canaan in the financial sector are location, influence of friends, customer service and location. 4. To identify the association of adults with the formal sector of Tobago. 5. To determine the involvement of adults in the informal sector of Tobago. 6. To determine the factors affecting the involvement of adults in the financial sector. Recommendations 1. One of the factors Institutions can appeal more to certain age groups.

Friday, September 27, 2019

Social enterprises Essay Example | Topics and Well Written Essays - 1000 words

Social enterprises - Essay Example The main mission and objectives of a social enterprise are to carry out some form of social benefit to the local or international community by developing socially-minded programs, workplace ethics, and then expanding these principles into broader society. Common examples of social enterprises are those organizations that have a specific focus such as conserving wildlife or improving the skills and talents of workers so that they can become better contributors in society. A social enterprise takes all of its profit (if earned through commercial practices) and then builds momentum with these resources in redefining or assisting social policy. Any organization that is non-profit and has a specific agenda (though they can have profit opportunities), with a focus on contributing to society through corporate social responsibility, would be labeled a social enterprise. An example of the social enterprise can be viewed in The Ashoka Organization, a non-profit organization that specializes in social program development and social enterprise entrepreneur support. Ashoka is a global association of many different social enterprise leaders that provides temporary salaries to start-up social enterprises, offers professional support in their social-minded efforts, and also provides networking opportunities for social enterprise leaders for the purpose of education and support (ashoka.org, 1). One of the main missions of this organization is to assist in building infrastructures and financial stipends to assist in developing a common social agenda and spreading social innovation at the global level. This social enterprise uses its resources solely for this agenda, taking part in many different social programs such as working toward the de-programming of bullies that assault youths (ashoka.org). The common goal is improving society and building more network support in efforts such as these. What makes the social enterprise

Thursday, September 26, 2019

Learning and development Essay Example | Topics and Well Written Essays - 3000 words

Learning and development - Essay Example Hence, it is of utmost significance for organizations in present times, to plan strategies for predicting such unforeseen situations and devise appropriate policies and frameworks to keep them at bay. One of the greatest challenges in this highly competitive global village is the management of knowledge. In order to implement effective policies for dealing with organizational pressures in this rapidly changing corporate world, it is essential for the management to educate their employees and equip them with adequate information so as to make them capable enough to take informed decisions which are in favor of the organization. "Learning Organizations" is an emerging concept in the field of knowledge management whereby organizations strive to enhance the employee skills by adopting a systematic approach to training and development which involves integration of theories, innovative practices and systematic assessments with a goal of knowledge enhancement for the benefit of the organization as a whole. This paper seeks to analyze, understand and discuss the importance and relevance of a systematic approach to learning and development in organizations and establish a link between theories and practice. It also strives to review the theoretical frameworks gathered from academic literature and observations made through empirical findings with a view to study organizational performance against the backdrop of implementation of systematic learning practices. Knowledge and learning are rapidly emerging as critical elements of organizational development. Several studies have focused on this aspect as a tool of improving organizational performance whereby the efficiency and ability of such an approach in enhancing organizational growth have been widely debated from different contexts. Adopting a systematic approach to learning and development in organizations implies challenging the predominantly bureaucratic epitome which has over ruled the

Experience in English 102 Class Essay Example | Topics and Well Written Essays - 250 words - 52

Experience in English 102 Class - Essay Example I am conversant with MLA, APA, Harvard, and Chicago writing styles and my fellow students could always ask me for assistance in these areas, a factor that helped me become even better. Through the various creative reading, writing and research assignments I have greatly sharpened my critical analysis skills, which involves a set of critical interrelated questions (Browne & Keeley, 2). I have learned to ask myself questions other than just follow what is written, this is translated to my researches where I write more analytically than I did before. This is a skill that I did not have at the beginning of this class; however, achieving it will be of great use not only in my academic work but also in work-related goals. One assignment that I did not enjoy was the group assignment, this is because some of the members in my group were not co-operative and we ended up wasting a lot of time and eventually doing the assignment in a rush. I believe this is what contributed to the low grade in the assignment. However, the individual assignment on creative literature was most meaningful to me because I was able to practice most of the skills that I had learned. The stories that I read for this assignment and many others helped me change my whole perception of humanity. I learned that people live in different conditions and may be going through other circumstances that affect their way of life. Therefore, we should never be quick to judge people’s actions. Generally, my experience in the English 102 class has been interesting as well as very educative. My teachers and fellow students have been very supportive in ensuring that all concepts being taught are well grasped. I have also made many friends hence improving my social life in addition to my academic

Wednesday, September 25, 2019

Research and Analysis of a Current Issue in Education Essay

Research and Analysis of a Current Issue in Education - Essay Example This essay describes the nature Ð ¾f the prÃ'â€"mary schÐ ¾Ã ¾l currÃ'â€"culum and the clÃ'â€"mate Ã'â€"n whÃ'â€"ch schÐ ¾Ã ¾ls functÃ'â€"Ð ¾n in the UK that changed quÃ'â€"te dramatÃ'â€"cally fÐ ¾llÐ ¾wÃ'â€"ng the passÃ'â€"ng Ð ¾f the EducatÃ'â€"Ð ¾n RefÐ ¾rm Act Ã'â€"n 1988. NÐ ¾t Ð ¾nly was the NatÃ'â€"Ð ¾nal CurrÃ'â€"culum Ã'â€"ntrÐ ¾duced by thÃ'â€"s Act, but schÐ ¾Ã ¾ls became much mÐ ¾re publÃ'â€"cly accÐ ¾untable fÐ ¾r theÃ'â€"r actÃ'â€"Ð ¾ns and fÐ ¾r the ways Ã'â€"n whÃ'â€"ch they have deplÐ ¾yed the resÐ ¾urces made avaÃ'â€"lable tÐ ¾ them. The researcher refers to an example, in which the gÐ ¾vernÃ'â€"ng bÐ ¾dy Ð ¾f a schÐ ¾Ã ¾l and the parents Ð ¾f the pupÃ'â€"ls attendÃ'â€"ng that schÐ ¾Ã ¾l were gÃ'â€"ven Ã'â€"ncreased rÃ'â€"ghts and respÐ ¾nsÃ'â€"bÃ'â€"lÃ'â€"tÃ'â€"es regardÃ'â€"ng the currÃ'â€"culum. This essay ivestigates the dynamÃ'â€"c nature Ð ¾f sÐ ¾cÃ'â€"ety that has prÐ ¾vÃ'â€"ded new challenges fÐ ¾r EnglÃ'â€"sh educatÐ ¾ rs Ð ¾f yÐ ¾ung chÃ'â€"ldren. DÃ'â€"vergent vÃ'â€"ews Ð ¾f the wÐ ¾rk Ð ¾f teachÃ'â€"ng as a prÐ ¾fessÃ'â€"Ð ¾n Ð ¾r a technÃ'â€"cal skÃ'â€"ll, suppÐ ¾rt fÐ ¾r teachers topic were analyzed. The mÐ ¾bÃ'â€"lÃ'â€"ty and ethnÃ'â€"c dÃ'â€"versÃ'â€"ty Ð ¾f pÐ ¾pulatÃ'â€"Ð ¾n alsÐ ¾ creates tensÃ'â€"Ð ¾ns and relatÃ'â€"Ð ¾nshÃ'â€"ps between sÐ ¾cÃ'â€"ety’s demands and chÃ'â€"ldren’s needs. DÃ'â€"fferent levels Ð ¾f gÐ ¾vernment, schÐ ¾Ã ¾l Ð ¾ffÃ'â€"cÃ'â€"als and prÐ ¾fessÃ'â€"Ð ¾nal Ð ¾rganÃ'â€"zatÃ'â€"Ð ¾ns have unlÐ ¾aded gÐ ¾als and purpÐ ¾ses Ð ¾f schÐ ¾Ã ¾lÃ'â€"ng tÐ ¾ teachers, whÃ'â€"ch are tÐ ¾Ã ¾ many Ã'â€"n number and tÐ ¾Ã ¾ cÐ ¾nflÃ'â€"ctÃ'â€"ng Ã'â€"n nature. To sum up, all Ð ¾f these challenges described in the essay requÃ'â€"re our Ã'â€"nbred pÃ'â€"Ð ¾neer values Ð ¾f hard wÐ ¾rk, Ã'â€"nnÐ ¾vatÃ'â€"Ð ¾n and self-suffÃ'â€"cÃ'â€"ency tÐ ¾ resÐ ¾lve. And thÐ ¾ugh Ã'â€"ndÃ'â€"vÃ'â€"dual sÐ ¾lutÃ'â€"Ð ¾ns wÃ'â€"ll p rÐ ¾vÃ'â€"de hÃ'â€"gh qualÃ'â€"ty care fÐ ¾r many, prÐ ¾vÃ'â€"dÃ'â€"ng qualÃ'â€"ty care fÐ ¾r all chÃ'â€"ldren wÃ'â€"ll take the effÐ ¾rt Ð ¾f all EnglÃ'â€"sh.

Tuesday, September 24, 2019

Social networking Essay Example | Topics and Well Written Essays - 750 words - 1

Social networking - Essay Example The particular study would be evaluated by referring to a variety of its characteristics, such as structure and content/ evidence. Also, the contribution of the study, for understanding the potential implications of social networking sites could be explored. Hak has divided the study into thematic sections, so that all aspects of the issues under discussion are covered. In this context, Introduction is used for explaining to the reader the paper’s key points and objectives. Then, two sections have been used for presenting the findings of the literature in regard to the study’s subject: the first section, entitled as ‘Social Media Networking’ (Hak 2012, p.12) shows the structure and role of social networking sites, as these issues have been analyzed in the literature. The second section, entitled as ‘Security Risks and Trust Zones’(Hak 2012, p.14) explains the security issues involved in the use of social networking sites and describes the struc ture of Security Trust Zones, as tools for protecting the privacy of these sites’ users. At the next level, Hak refers to the ‘Analytic Hierarchy Process’ (Hak 2012, p.15), a tool developed by ‘Saaty in 1970s’ (Hak 2012, p.15). The potential use of this tool for assessing the security risks of social networking sites is analytically explained (Hak 2012, p.15-16). ... Literature is used for showing the various aspects of study’s subject. It should be noted that the literature chosen is recent; mostly studies of 2010 and 2011 have been used, reflecting the actual status of social networking sites as tools for communication. Moreover, academic journals have been preferred, instead of books, aiming to use, as possible, empirical evidence for supporting the assumptions made. Also, a methodology is suggested for facing a key problem in regard to social networking sites: the assessment of security risks related to these sites. In addition, graphs and tables are used, where appropriate, for making the explanations given clearer. In other words, Hak has covered successfully both the theoretical and practical aspects of the issues under discussion. At this point the following issue should be discussed: which is the value of the study of Hak in regard to the understanding of risks related to social networking sites? At a first level, the study of Hak shows that social networking sites can be related to risks, especially security risks. These risks are analytically explained using appropriate literature, so that no doubts can exist in regard to the security implications of social networking sites. Then, the structure of social media networking is explained, so that the users of social networking sites are aware of the potential security gaps involved. The use of graphs, as possible, increases the value of the study of Hak in presenting the security risks of social media networking. Also, the study of Hak provides a methodology for assessing the security risks related to social networking sites. This methodology is based on a model that was first introduced in 1970s but which was never used, up today, for assessing the

Monday, September 23, 2019

Nike's Case Study Example | Topics and Well Written Essays - 250 words

Nike's - Case Study Example The company lacked the diversification on its products and produced products for only some specific consumers. It shunned sports like soccer, rollerblading and golf and focused more efforts on making shoes for basketball and track market. This lead to falling of the sales in the market and the company realized that it had to increase its sales. As a result, the company took its designs and marketing competencies and crafted new lines of shoes for its consumers. It lined a new line of soccer shoes and started winning a big market share from the soccer market. The company lacked competences in marketing and design. To improve on it design it purchased other foot wear companies that were complimenting its products. The company lacked a marketing design of convincing its customers that its products were the best. Nike is now searching for new market acquisitions to improve its market share (Henderson et al, 2). The focus of developing new products for new market segments has proved to be a

Sunday, September 22, 2019

Workplace Motivation Essay Example for Free

Workplace Motivation Essay In this paper, I will examine many motivational strategies that affect productivity in a workplace. Another will include an explanation of organizational efforts to improve performance, employees’ resistance to increasing productivity and satisfaction, and management’s philosophy of motivation and its practices in the workplace. Motivation is one of the single driving factors in one’s work performance. Organizations take this very seriously and to waste time, and energy and the expense into training someone who is not motivated. Needs Theories, Goal-Setting Theory, Equity Theory and Expectancy Theory are the four specific theories that are used in motivational practice. In addition, I will identify and analyze the implications of applying any two motivational theories not currently used in my selected workplace and how they will influence both management and employees. Organizations are always looking for ways to increase productivity, especially in the growing competitive environment. It is a known fact that when employees are unsatisfied with their current job, productivity decreases, tension builds up in the work environment, and morale is low. Most organizations have motivational programs that provide useful tools to increase motivation, and reduce employee turnover. There are many strategies that are used to influence employee loyalty and these are intrinsic motivation and extrinsic motivation. Intrinsic motivation is one’s personal development, self-control over their work without reward. Whereas, extrinsic motivation is having external incentives, pay bonuses, time off, these are some common strategies used to motivate and individual to complete or do a task. I work for a organization mostly based on customer service and to provide nursing care for long-term residents and rehabilitation following a hospital stay; and assisted living communities. As an employee, I am a member of the nursing staff department. Some of the motivational strategies used at Trisun are competitive salaries, health benefits, sign on bonuses, and employee perks. Recently, their census has been very low, so now employees have to take longer lunches or downsized. Thus, they want employees to work shorthanded but at the same time still have the same responsibilities. This tactic only makes employees frustrated and unmotivated to be productive. Only when you reward employees, they become happier, stay longer, and become more productive at the workplace. Many organizations fail to recognize that money is not the biggest factor in motivating employees. An engaged employee comes in early, reaches out to other employees, smiles, and has great customer service. On the other had you have an disengaged employee and they come in late or absent, and doesn’t want to be bothered with and most always leaves right at five. Successful business should have only one kind of employee, engaged. The process is to reward, recognize, and keep those behaviors among employees. If you don’t recognize those behaviors, you won’t get them back. People think that more money is better than a closer parking space. That is not always true. Depending on what you do, even the smallest perk can be bigger than a bonus and would be more valued. There are whole ranges of factors that motivate people. Many organizations have surveys to find out what really motivates employees and learning their values. Are they motivated in intrinsic or extrinsic theories, do they like more money, status, rewards, or do they value what people think of their work instead. Management can sometimes be pulled in different directions, so it is good that other employees see you working hard and are recognized by your supervisors. The two motivational theories that are not used in practice in this workplace were the Goal-setting Theory and the Cognitive Evaluation Theory. Cognitive evaluation theory is the event in which affects individuals’ feelings and self-determination will affect their intrinsic motivation. By using this theory, it will help employees feel self-determined, competent, and intrinsically motivated. Secondly, Goal-setting Theory was not used in the workplace. This theory explains that individuals are able to reach a defined objective. Sometimes this is a reward in itself and primarily a goal’s ffectiveness is implemented by three factors; specificity, proximity, and difficulty. Another theory self-efficacy will enhance an individual’s to achieve the goal. By using the self-efficacy, it will give positive feedback and have impact on applying the goal-setting theory in management and increase productivity. The most noted theory would be Abraham Maslow’s Hierarchy of Needs. The Needs model is where each need is set on a basis of the strength of need. The human needs are physiological, Safety, Social, Esteem, and Actualization. Physiological need is the highest strength and is essential for survival. These form every human motivation and fulfilled more than any other human need. Motivation Strategies The highest levels of motivation for employees are individuals who empower workers, have an effective rewards system, redesign jobs, and create a more flexible work environment. Empowerment is to design the worker to become more responsible and encourage accomplishing a given task. Providing an effective rewards system is to reinforce employee behavior and the reward is when outcome is positive for the individual. There are two ways to receive rewards: Extrinsic rewards are common in the workplace, which are pay bonuses, promotions, time off, and verbal praises. Intrinsic rewards gives people a â€Å"natural high† when completing a job. It gives them a certain personal development and self-control over their work. Managers need to realize that all people are different; managers must provide a range of rewards, time off, recognition, and promotion. Redesigning jobs is a concept that will help employees not get bored with their everyday routine. One attempt would be job enlargement, which increases the job tasks decreases boredom. Job rotation is a practice which people can do different tasks and at the same time be exposed to new interest in the workplace. Job enrichment also includes tasks with more responsibility and authority. In today’s busy world employees value their personal time. Therefore, having a flexible schedule always helps employee’s needs. A full-time job is 40-hour workweek, so most employees get three days off which benefits the individuals lifestyle and give more leisure time and lowers commuting cost. Lastly, job sharing and twinning is when one full-time job is split between two or more people. Job sharing involves working only half a day, thus organizations benefit by employing people who wouldn’t otherwise be a unable to work full-time. In this paper, I explained different motivational strategies that affect productivity in the workplace, and analyzed two theories that are not in affect at my job. I explained organizational efforts to improve performance. By applying these theories and strategies will influence both management and employees to be motivated and be more productive at the workplace.

Saturday, September 21, 2019

Flow Phenomena Within a Compressor Cascade

Flow Phenomena Within a Compressor Cascade Paolo Mastellone section{Aim of the investigation} The scope of the assignment is to study and assess the flow phenomena within a compressor cascade employing controlled diffusion blades through a computational fluid dynamic simulation. The results of the simulation are subsequently compared to the experimental data obtained from the simulated cascade. The quality and the discrepancies are discussed in order to demonstrate the understanding of the theory and the application computational tools. section{Experimental data} The simulation is based on the experimental work done by Hobson et al.cite{rif1} that studied the effect of the Reynolds number on the performances of a second generation controlled-diffusion stator-blades in cascade. The three Reynolds numbers evaluated were 6.4E5, 3.8E5 and 2.1E5. This work was carried out in order to analyse a more representative Reynolds number of flight conditions and to create a test case for computational fluid dynamic models of turbulence and transition. The experimental cascade is made of 10 67B stator blades with an aspect ratio of 1.996 and the solidity of 0.835. The tecnique used for the experimental measurement is the laser Doler velocimetry (LDV) with a seed material of 1$mu $m oil mist particles. The experimental data and e cascade geometric parameters are shown in the figures below. The Reynolds number used for the simulation is 6.4E5, which gives an inlet velocity of: $$ where is the kinematic viscosity and $L$ is the blade chord. section{Mesh} The software used for the mesh generation is ANSYS ICEM. The mesh has a critical importance and consequences on simulation and results, a well-constructed mesh eliminates problem of instabilities, absence of convergence and increase the opportunity to achieve the right solution cite{rif4}. There are key aspects to take into account, the mesh must capture the geometric details and the physics of the problem.\ The discretization is made for one representative flow passage introducing periodic boundary conditions. The fluid domain thickness is half of the blade spacing in order to use properly the periodic boundary conditions: the fluid quantities at the top and the bottom of the domain will be the same, in order to represents the periodicity of the cascade. The inlet and the outlet distances from the blade are respectively 2.5 and 3 times the blade chord so that their position doesnt have an influence on the results and the flow is fully developed at this stations. In order to get low numerical diffusion the mesh must be aligned with the flow directioncite{rif2}, consequently to have the same geomety of the simulation the blade is staggered of $ang{16.3}$ and the inlet grid inclination is $ang{38}$ while the outlet one is $ang{5.5}$. The mesh is a structured type made of quadrilateral elements, because they can be fitted to flow direction and are quite tolerant of skew and stretchingcite{r if2}. To adapt the mesh at the profile an O-grid type made of 9 blocks is used. subsection{First node position} One major parameters for the mesh sizing is the non dimensional distance $y^+=frac{u^+y}{nu}$. This parameter must be chosen as a function of the type of boundary layer treatment. The use of a wall function consents to bridge the explicit resolution of the near wall region, which is described by the dimensionless parameters $u^+$ and $y^+$. The turbulent boundary layer is subdivided into the viscous sub-layer for $y^+RNG. For the k-$omega$ SST a near wall treatment has been chosen and hence a $y^+=1$, which resulted in first node distance of 0.004 mm. With the K-$epsilon$ RNG model a standard wall function has been adopted and choosing $y^+=25$ the first node distance is 0.1 mm. subsection{Grid independence study} The number of nodes required for a 2D simulation with resolved boundary layers is around 20000 while is around 10000 nodes if a wall function is used cite{rif2}. The grid adopted for the K-$omega$ SST has 20128 nodes. The mesh for the K-$varepsilon$ RNG model, which uses a wall function, has 14488 nodes. The two meshes have been chosen between three types with increasing resolution: a coarse, an intermediate and a finer one. The Cd and Cl values obtained from the three meshes are displayed in the table below for the two different turbulent models used for the simulation: k-$omega$ SST and k-$varepsilon$ RNG. A grid independence study and mesh quality analysis have been effectuated for both the meshes of the two different models, and satisfactory results were achieved. In the assignment just the mesh analysis of the K-$omega$ SST model with $y^+=1$ has been reported.\ The difference between the values of Cl and Cd of the intermediate and the fine mesh are negligible, hence the results dont rely upon the mesh resolution anymore and a further increase of the nodes is ineffective. Consequently the intermediate mesh has been adopted in both cases since the results are mesh-independent. The quality of the mesh can be analysed through specific tools available in the software. The overall quality level is acceptable, above 0.85 over 1, even if there are some parts that can be improved. Indeed the skewness at the top due to the curved flow profile and near the trailing edges should be reduced. The region not interested by the wake and the upper and lower parts have been left intentionally coarse since there is not presence of steep gradient in these regions (see figure 10). The quite high aspect ratio in the zones in front and behind the blade can be tolerated because it hasnt a great influence since the mesh is parallel to the flow. The outcomes are displayed below. section{Simulation} The software used for the simulation is ANSYS FLUENT with double precision and four processors enabled for the calculations. The problem has to be properly set up through subsequent steps. subsection{Solution setup} In this section the inputs for the simulation must be implemented. The mesh has to be scaled to the proper geometric dimensions (mm) and afterwards has to be checked to find eventual errors. The solver is a pressure-based type and the simulation is 2D planar. The turbulent model used and compared are the K-$varepsilon$ RNG with a standard wall function and the K-$omega$ Shear Stress Transport both with default model constants. The methods use two separate transport equations for the turbulent velocity and length scale which are independently determined cite{rif5}. The first model is characterised by robustness,economy and reasonable accuracy. The RNG formulation contains some refinements which make the model more accurate and reliable for a wider class of flows than the standard K-$varepsilon$ model cite{rif5}. It is semi-empirical and based on the transport equations for the turbulence kinetic energy ($K$) and its dissipation rate ($varepsilon$) cite{rif5}. The limit of this model is the assumption of complete turbulent flow, which is not the case in consideration.\ The second model is also empirical but is based on the specific dissipation rate ($omega$). The K-$omega$ SST is an improvement of the standard K-$omega$ and it is more reliable and accurate for adverse pressure gradient flows because it includes the transport effects for the eddy viscosity cite{rif5}. This model should capture more accurately the flow behaviour because of the adverse pressure gradient on the suction side of the blade. The fluid used is air, the specific heat and the thermal conductivity are kept constant as well as the density and the viscosity. Indeed the Reynolds and hence the velocity field are low and the problem can be considered incompressible, as a consequence the energy equation is not necessary.\ The boundary conditions for the blade profile, the outlet and the lateral edges have been set to wall, pressure outlet and periodic respectively.\ For the inlet boundary condition the velocity-inlet has been selected, through the magnitude and direction method, the main velocity from the Reynold number is 73.56 m/s and the components are $x=cos(38degree)=0.78801$ and $y=sin(38degree)=0.61566$. For the turbulence definition the intensity and length scale method is used since there are no informations about the value of $K$, $omega$ and $varepsilon$ but just about the inlet turbulence. The value of the turbulence intensity is determined by the formula: $$ The turbulent length scale, from the Fluent manual, is: $$ which is an approximate relationship based on the fact that in fully-developed duct flows, $ell$ is restricted by the size of the duct since the turbulent eddies cannot be larger than the duct cite{rif5}. subsection{Calculation parameters} In this step the parameters to achieve the solution are decided. The calculation has been split into two parts: in the first one the solution method has a simple scheme with a first order Upwind spatial discretization; the second one has a coupled scheme and is second order Upwind. In the first part a first-order accuracy result is achieved and is used as the input for second part of the calculation.\ The monitors are enabled to assess the convergence of the calculation. For the residuals the convergence criterion has been set to 1E-6 for continuity, x-velocity, y-velocity, energy, k and $omega$. Other two monitors for Cl and Cd have been added to appraise the convergence. For Cd the vector components are x = 0.78801 and y = 0.61566 although for Cl are x = -0.61566 and y = 0.78801. Their their value must be asymptotic when the solution converges. The last parameter used to check the convergence is the net value of mass flow flux inside the domain, which must be zero. To initialize the solution an hybrid method is used, afterwards the calculation can be run. section{Results} subsection{Convergence} The convergence has been reached after 479 iterations for the k-$omega$ SST and after 410 for the k-$varepsilon$ RNG. From the reports the mass flow flux can be evaluated, the difference between the inlet and the outlet is in the order of 1E-7 in both cases. According to this outcomes the convergence has been verified and the validation of the simulation results with the experimental study can be performed. subsection{Post processing} The post processing of the results is useful to understand the validity of the simulation.\ From the velocity contours the acceleration of the fluid on the suction side and the deceleration on the pressure side is captured. The pressure contours show the depression on the suction side and an overpressure on the pressure side. The stagnation point on the leading edge is highlighted by pressure and the velocity contours: the velocity is zero and the pressure reach the stagnation value. The separation of the fluid can be seen from the reverse velocity region on the rear part of the airfoil. The two methods made different predictions for the separation phenomenon. Indeed the velocity and the turbulence contours as well as the velocity pathlines show a less intense separation region and a smaller recirculation zone for the k-$varepsilon$ RNG model. subsubsection{K-$omega$ SST} subsubsection{Cp distribution} The Cp distribution is compared to the experimental one. The values from the paper have been extrapolated and inserted in a Matlab graph to give a better comparison. The Cp coefficient is defined by: $$ Cp = frac{p-p_{infty}}{1/2rho_{infty} V_{infty}^2}$$ where the value of $rho_{infty}$ and $p_{infty}$ are extracted from the Fluent reports in terms of mass-weighted average: The abscissa values from Fluent data has been normalised with the chord length in order to obtain the same type of graph. In the experiment for the low and the intermediate Reynold numbers there was a separation bubble between approximately 50 and 65% of the chord for Re=3.8E5 and between 45 and 70% for Re=2.1E5, while it was absent for the highest Reynolds number. The absence of the separation bubble is captures from both the models since the Cp coefficient rises continuously after the point of minimum pressure. The separation at about 80% of the chord is highlighted by flat trend of the Cp cite{rif6} by both models . On the pressure side the trends are very similar to the experiment. On the suction side a difference is observed after the 40% of the chord. Both the simulation results are shifted, a possible explanation could be the presence of 3D effects and secondary flows which are not captured by the 2D simulations. In the subsequent sections only one passage has been taken into account for the comparison with the results of Hobson et al.cite{rif1}. The stations 7,8,9 and 13 have been used for the observations (see figure 4). Station 7,8 and 9 have been taken perpendicular to the profile as showed in the paper. subsubsection{Wake profile} The wake profile presents the velocity distribution behind the blade leading edge, the measurement has been made at station 13 that is 20% of the chord downstream the leading edge. The data from the simulation were exported from Fluent and plotted on Matlab, the abscissa is normalised with the blade spacing S. Both the models highlight a profile similar to the experiment even if the wake wideness is underestimated. Anyway the obtained trends appear to be quite accurate. subsubsection{Turbulence intensity} The turbulence intensity profiles exhibit a trend similar to the paper. The figures has been divided by $sqrt{2}$ because of the different definition of turbulence intensity and the values on the abscissa have been normalised with the blade space S. The simulations captured the double-peaked distribution due to the boundary layer separation. The peaks are in correspondence of the maximum velocity gradient in the wake profile (see figure 27), likewise the experimental data. The outcomes ofÂÂ   K-$omega$ SST are more similar to the paper trend. The underestimation of the wake amplitude is consistent with the previous graph. subsubsection{Outlet flow angle} The velocity flow angle distribution has considerable differences compared to the paper data. A likely explanation could be the limitation of the simulation that can capture only the 2D flow characteristics, while the significant flow angle is primarily caused by the secondary flows in the cascade which are typical 3D effects. This is supported by the fact that the trends predicted by the two models are very similar hence both miss some flow characteristic that cannot be predicted by the 2D simulation. The mass-averaged exit flow angle in the experiment was $ang{9.25}$, the results from the fluent reports are showed below. subsubsection{Velocity profiles} The velocity profiles, normalised with the inlet velocity and the blade chord, at station 7,8 and 9 have are presented.\ At station 7 the curves are almost identical, the velocity evolves from zero in contact with the wall and then increases over the reference speed of 73.56 m/s. At station 8 and 9 both the experimental and the K-$omega$ SST present a reverse flow close to the wall, evidence of the separation. At station 8 and 9 the experimental reverse flow reaches 0.06 (7.6mm) and 0.1 (12.7 mm) of the blade chord that is in agreement with the results of the K-$omega$ SST model. The K-$varepsilon$ RNG fails to capture the reverse flow (only a negligible portion on at station 9). This is in accordance with the theory: the K-$omega$ SST model has better performance in-handling non equilibrium boundary layer regions, like those close to separation cite{rif4}. subsubsection{Loss coefficient} According to cite{rif3} the loss coefficient is defined by: $$ The table below presents the values calculated for the two different models. The figures have been taken from the Fluent reports in term of mass-weight average. The loss coefficient found in the experiments is 0.029. k-$omega$ SSTÂÂ   k-$varepsilon$ RNG Total pressure inlet $bar{p}_{01}$ [Pa] 2290 2209 Total pressure outlet $bar{p}_{02}$ [Pa] 2176 2103 Static pressure inlet $p_1$ [Pa] -1048 -1107 Loss coefficient $omega$ 0.034 0.031 The two coefficients are of the same order of magnitude to the one determined experimentally. The slightly difference could be explained by the different reference sections used for the mass-weight average in the experiment (upper and lower transverse slot for the experiment, see figure 1) since the inlet and the outlet have a different position. Moreover the lightly larger value obtained from the K-$omega$ SST compared to the K-$varepsilon$ RNG is consistent with the greater separation, hence more dissipation of energy, predicted by the model. section{Conclusions} In this assignment a CFD simulation using Icem and Fuent software has been carried out and the results have been analysed with engineering judgement, in order to demonstrate the understanding of the theory and the tools.\ The achievement of satisfying results is strictly related to successful implementation of every single steps of the simulation. The knowledge of the aerodynamics and the physics of the problem is paramount to set the mesh, the boundary conditions and the calculation.\ Great attention has been taken on the mesh generation and it resulted to be the most challenging part since a lot of experience is needed to have good results. The key aspects taken into account are the they grid domain extension, the grid type, the alignment with the flow, aspect ratio and skewness. The choice of the wall treatment influences the first node position. To make a comparison between two turbulence models, for the K-$omega$ SST has been used $y^+=1$ while for the K-$varepsilon$ RNG that uses a standard wall function $y^+=25$. When the mesh has an adequate quality is ready for the simulation. The choice of the turbulence model and the boundary conditions depend on the problem studied and should represent the physic of the problem as precise as possible. Once the simulation has been run the control of the convergence is the necessary but not the sufficient condition to obtain exact outcomes. Indeed the calculation can converge to wrong results if the problem is not well posed. Some modifications have been made to the mesh in order to attain more precision and the calculation has been repeated several times, lots of experience is requested to reduce the number of attempts.\ A qualitative and quantitative comparison with experimental results showed both accuracy and limitations of the simulation. Certainly the mesh can be improved, for example using more then nine blocks, to promote the skewness and the aspect ratio, particularly near the leading and the trailing edge. From the comparison between the K-$omega$ SST and the K-$varepsilon$ RNG the limitations of the latter in the unstable boundary layer treatment have been highlighted.\ The discrepancies observed can be addressed to the 3D effect not captured by the simulation and the limitations of the models adopted. The adoption on more sophisticated models such as the Transition SST (4 equations) and the Reynolds stress (5 equations) can improve the accuracy.

Friday, September 20, 2019

Basic Firewall Operation Computer Science Essay

Basic Firewall Operation Computer Science Essay A firewall is a piece of software or hardware that filters all network  traffic between the computer, local network or commercial network and  Internet.  Firewall is a component of a computer system or network  designed to block unauthorized access while  allowed   communication.  It is a device or group of devices  configured  deny, encrypt, decrypt, or proxy all (inside and outside) traffic  team  between different security domains based on a set   Firewalls can be implemented in hardware or  software,  or  a combination of both.  A firewall can be few rules  determine what traffic is  being permitted inside or outside your home network.  Depending on the  type  firewall in place, access to certain  IP addresses or domain  names, or you can block certain types of traffic by blocking  of  TCP / IP  the ports they use.  There are basically four mechanisms used by servers  security limit  traffic.  A device or program can use more than one of these in  relationship  together for more depth protection.  The four mechanisms  of  packet filtering, circuit-level gateway, the  proxy-server and application  Gateway. However, Firewall has some drawbacks.  Initial equipment cost is the main factor that determines the  Better communication technology network security  required.  The firewall cannot protect against attacks that bypass  firewall.  To  For example, dial-in and dial-out access.  The firewall does not protect against internal threats.  The firewall cannot protect against transmission of the virus  infection  programs or files.  It would be impractical and perhaps  impossible to scan  all incoming files, emails and messages for  virus   Time to time, the use of cheaper Internet and  links  much faster.  This leaves many people always want to  use long time. It is  increasing the exposure of computers to various  threats   Internet.  When using an anti-virus software protects  computers  viruses, not other forms of Internet intruders.  A server  Safety  bodyguard keep between your computer and the Internet,  decide what doors to open, and that can come Overview of Firewall -II A firewall examines all traffic sent between two networks to see if it meets certain criteria. If so, is routed between the networks, otherwise it stops. A firewall filters incoming and outgoing traffic. You can also manage public access to private networked resources such as host applications. It can be used to record all attempts to enter the private network and trigger alarms when hostile or unauthorized entry attempt. Firewalls can filter packets based on their source and destination addresses and port numbers. This is known as address filtering. Firewalls can also filter specific types of network traffic. This is also known as protocol filtering because the decision to forward or reject traffic depends on the protocol used, such as HTTP, FTP or Telnet. Firewalls can also filter traffic by packet attribute or state. A firewall cannot prevent individual users with modems to dial in or outside the network without going through the firewall at all. Employee misconduct or negligence cannot be controlled by firewalls. Policies regarding use and misuse of passwords and user accounts must be strictly enforced. These are management issues that must be asked in the planning of any security policy, but cannot be solved with firewalls alone. [5] 2.1Advantages of Firewalls Firewalls have a number of advantages. They can stop incoming requests for services, fundamentally insecure, as may be prohibited or rlogin RPC services such as NFS. They can control access to other services such as bars appellants from certain IP addresses, use the filtering service (incoming and outgoing), for example, to stop hiding information about FTP, in writing, for example, allowing access only to certain directories or systems Are more profitable than ensuring every guest on the corporate network, as it is often only one or a few systems firewall concentrate. They are safer for every guest, because of the complexity of the software on the machine which makes it easier for security holes appear. 2.2 Disadvantages of Firewalls Firewalls are not the alpha and omega of network security. They have some disadvantages, such as: It is a focal point for attack, and if a hacker penetrates the firewall that can have unlimited access to the corporate network. You can prevent legitimate users access to services of value, for example, business users will not be released to the web or when working outside the home to a business user can not access the organization track network. No protection against attacks from the back door, in May and encourage users enter and exit through the door, especially if the restrictions are too severe service. Examples of entry points to the back door of the network business are: modems, and import and export unit. The security policy should cover such aspects as well. They can be a bottleneck for the flow, since all connections must pass through the firewall system. Firewall systems themselves can not protect the network against smuggling of import or export of material to prohibit such game programs firewalls as attachments to email messages. Smuggling could also be an important source of infection if users download software from external newsletters recent Melissa virus and the Love Bug have been smuggled into the e-mails to unknown recipients. This is an area that security policy must be addressed. There are software programs that can help in this instance MIMEsweeper runs on the firewall and monitoring of e-mail attachments before you let them pass. It will remove potentially dangerous attachments or prevent the mail from all over. The main disadvantage of a firewall is that it protects against the aggressor inside. Like most computer crimes are perpetrated by corporate internal users, a firewall offers little protection against this threat. For example, an employee may not be able to email sensitive data on the site, but may be able to copy on a floppy and after it. Therefore, organizations need to balance the amount of time and money they spend on the firewall with one on other aspects of information security. [3] Firewall function III There are two methods of denial of access used by firewalls. A firewall may allow all traffic through unless it meets certain criteria, or you can deny all traffic unless it meets certain criteria (see Figure 3.1). The type of criteria used to determine whether to allow traffic through varies from one type of firewall to another. Firewalls may be concerned about the type of traffic, or source or destination addresses and ports. They can also use complex rule bases that analyze the application data to determine whether traffic should be allowed to pass. How a firewall determines what traffic to pass depends on the network layer it operates.[5] Figure 3.1: Basic Firewall Operation Firewall Types IV A real firewall is hardware and software that intercepts data between the Internet and your computer. All data traffic must pass through it, and the firewall allows the data is allowed through the corporate network. Firewalls are typically implemented using one of four major architectures: â‚ ¬Ã‚  Packet Filters â‚ ¬Ã‚  Application Gateways â‚ ¬Ã‚  Circuit -level Gateways â‚ ¬Ã‚  State -full inspection 3.1 Packet Filters The first line of defence in protecting firewalls and most fundamental is the packet filtering firewall. Packet filters operate at the network layer to examine incoming and outgoing packets and applying a fixed set of rules for determining whether packets are allowed to pass. The firewall packet filtering is generally very fast because it does not take into account some of these data in the packet. Just analyze the header of IP packet, IP addresses, source and destination, and combinations of ports and then applies filtering rules. For example, it is easy to filter all packets destined to port 80, which could be wearing a Web server. The administrator can decide which port 80 is off limits except to certain IP subnets, and a packet filter would suffice. Packet filtering is fast, flexible, transparent (no changes required on the client) and inexpensive. Most routers offer capacities of packet filtering and pure firewall packet filter does not require powerful hardware. This type of filter is commonly used in businesses small and medium enterprises that need to control users can or can not go. IP addresses can be distorted by this type of filter media itself is not sufficient to stop an intruder from accessing your network. However, a packet filter is an important component of a server solution for complete security. [4 vara] Fig 4.1 packet filtering[4] 3.2 Circuit-level Gateways A step above the standard packet filtering firewall, but still considered part of the same architecture, are the gates of the circuit, also known as Stateful Packet Inspection. In the circuit level firewall, all connections are monitored and connections that are deemed valid are allowed to cross the firewall. This usually means that the client behind the firewall can initiate any type of session, but customers outside the firewall can not see or connect to a machine protected by the firewall. State inspections usually occur in the network layer, which makes it fast and preventing suspect packets travel up the protocol stack. Unlike static packet filtering, however, an inspection of State takes decisions on the basis of all data in the packet (which corresponds to all levels of the OSI model). Using this information, the firewall builds dynamic state tables. Use these tables to keep track of connections through the firewall instead of allowing all packets meeting the requirements of all rules to adopt, allows only the packets that are part of a valid connection, prepared social. The firewall packet filtering is popular because they tend to be cheaper, faster and relatively easy to configure and maintain. [4vara] Fig. 7.2: Circuit Proxy 3.3 Application Proxies Working in the implementation of the OSI model, proxy firewall forces all client applications on workstations protected by the firewall to use the firewall as a gateway. The firewall allows each package for each different protocol. There are some drawbacks to using this type of firewall. Each client program must be configured to use a proxy, and not everyone can. In addition, the firewall must have a representative in the same for each type of protocol that can be used. This May, a delay in the implementation of new protocols, if the firewall does not. The penalty paid for this extra level of security is the performance and flexibility. Firewall proxy server processor and large memory to support many simultaneous users, and the introduction of new Internet applications and protocols can often involve long delays, while developing new powers to support them. True proxies are probably the safest, but to impose a surcharge on the network load. Dynamic packet filtering is definitely faster, but the highest end firewall these days are hybrids, incorporating elements of all architectures. [4vara] Fig. 7.3: Application Proxy 3.4 Stateful Inspection The optimal firewall is one that provides the best security with the fastest performance. A technique called Stateful Multi-Layer Inspection (SMLI) was invented to make security tighter while making it easier and less expensive to use, without slowing down performance. SMLI is the foundation of a new generation of firewall products that can be applied across different kinds of protocol boundaries, with an abundance of easy-to-use features and advanced functions. SMLI is similar to an application proxy in the sense that all levels of the OSI model are examined.Instead of using a proxy, which reads and processes each packet through some data manipulation logic, SMLI use traffic-screening algorithms optimized for high-throughput data parsing. With SMLI, each packet is examined and compared against known state (i.e., bit patterns) of friendly packets one of the advantages to SMLI is that the firewall closes all TCP ports and then dynamically opens ports when connections require them. This feature allows management of services that use port numbers greater than 1,023, such as PPTP, which can require added configuration changes in other types of firewalls. Statefu inspection firewalls also provide features such as TCP sequence-number randomization and UDP filtering. [5vara] Fig. 7.4 : Stateful Inspection firewalls inspect in each type Packet Filtering Data link header Internet header Transport header Application header Data Circuit Filtering Data link header Internet header Transport header Application header Data + Connection state Application Gateway Data link header Internet header Transport header Application header Data + Connection state application state Hardware Firewalls and Software Firewalls V 5.1 Hardware Firewalls Hardware firewall can be purchased as a standalone product, but more recently hardware firewalls are typically found in broadband routers, and should be regarded as an important part of your system and network settings, especially for those who have broadband. Hardware firewalls can be effective with little or no configuration, and can protect every machine on a LAN. Most hardware firewalls will have a minimum of four network ports to connect other computers, but for large networks, firewall solutions for enterprise networks are available. A hardware firewall uses packet filtering to examine the packet header to determine their origin and destination. This information is compared to a set of predefined rules or created by the user determine if the packet is sent or deleted.[2] As with any electronic equipment, a user with general computer skills can connect a firewall, adjust a few settings that work. To ensure that the firewall is configured for optimal security and protection, however, consumers certainly have to learn the features of your hardware firewall, to enable them, and how to test your firewall to secure your done a good job of protecting your network. Firewalls are not all equal, and it is important to read the manual and the documentation that came with the product. In addition the manufacturers site will generally have a database or FAQ to get you started. If the terminology is a bit too tech-oriented, you can use my library technical terms to help you get a better understanding of certain terms of technology and equipment is where you configure your hardware firewall. To test the security of your hardware firewall, you can buy third party software or a review of research on the Internet for a free online service that is based on testing of firewalls. Test firewall is an important element of maintenance to ensure that your system is configured for optimal protection provided.[2vara] Figure-1 Hardware Firewall Hardware firewall providing protection to a Local Network [3vara] 2.2 Software Firewalls For users of the detached house, choosing the most popular firewall is firewall software. Firewall software installed on your computer (like any software) and can be customized, allowing some control over its function and protection features. A firewall software to protect your computer from outside attempts to control or access your computer, and your choice of firewall software, you can provide protection against Trojans, the most common or e-mail to. Many software firewalls that the user defined controls for setting up files and share printers and block harmful applications from running on your system. In addition, the firewall software may also include access control, Web filtering and more. The disadvantage of software firewall is that it protects only the computer that are installed, no network, so that each team must have a software firewall is installed. [2] As hardware firewalls are a large number of firewalls to choose from. To begin, we recommend you read the comments of firewall software and search the product website to get some initial information. Because your firewall is always running on your computer, you must take note of system resources will be required to execute and possible incompatibilities with your operating system. A good software firewall will run in the background on your system and use only a small amount of system resources. It is important to monitor firewall software, once installed and to download updates provided by the developer. The differences between software and hardware firewall are enormous and the best protection for your computer and the network is to use both because each offers different, but very necessary for safety and performance. Update your firewall and your operating system is essential to maintain optimal protection because it is proof of your firewall to ensure it is connected and working properly. [2 vara] Figure-2 Computer with Firewall Software Computer running firewall software to provide protection [3 vara] Table 5.1: firewall comparison Advantages Disadvantages Hardware Firewall Operating system independent Not vulnerable to malicious attacks Better performance Focuses on only firewall-related duties Can be single point of failure Higher administrative overhead Higher cost to implement and maintain Software Firewall Less expensive to implement and maintain Lower administrative overhead Dependent upon host operating system Requires additional host hardware, Vulnerable to malicious attacks, Lower performance [6]

Thursday, September 19, 2019

Declining Trust In Our Government :: essays research papers

Declining Trust in Our Government Is the American people's trust in our government declining? According to most people, it definitely is. Recent polls make this argument very valid. In 1995, the Princeton Survey Research Associates conducted a telephone interview of 1514 random sample adults. In this interview, people were asked how much of the time they trusted in the federal government to do the right thing. Twenty- one percent said most of the time and seventy-one percent said only some of the time. When asked the same question of their state governments, the results were only slightly better. Thirty percent said most of the time and sixty-two percent said only some of the time ("Why Don't"). This indicates that a majority of the American people believe that the American government is not doing the right thing in a lot of the actions it takes. Of course, nobody expects the government to operate perfectly with no mistakes, because this is not a perfect world. These numbers are too high though. What caused this problem in the United States, what is the extend of this problem in our country, and is this distrust of our government even a serious problem at all? These are three questions that need to be addressed in out society today. What really has caused the American people to distrust our government and when did this trend actually begin? I do not believe there is any clear answer to these questions and I do not believe it would ever be possible to pinpoint any exact reason for the feelings of the American people. One reason cited by some is that it is the fault of poor leaders. Two commonly blamed leaders are President Johnson and President Nixon. Two of the biggest drops in the public's confidence in our government occurred in 1964, during the bombing of Vietnam, and in 1972, during Watergate (Nye). Although these two events may have contributed to the distrust of the American government, I do not believe that two events and two leaders can be held totally responsible. For one thing, these things occurred over twenty years ago, why is there still distrust today. Not only does this distrust still exist, but many would say that it has increased greatly since then. I do not thing that two leaders can be pinpointed and blamed for destroying the trust in our government. Perhaps though the blame could be laid on American political leaders in general. In a 1995 poll, thirty- five percent said the main reason that they do not trust the federal government

Wednesday, September 18, 2019

English Story :: essays papers

English Story Hello my name is rage, you are probably thinking just about now that who named this girl. Well I have always had that question on my mind as well. From what I remember about my childhood (which I might add is not much) is mostly living in this house with about thirty other kids that did not have parents either and we lived off our worldwide drug Elate, bread and water. I was told from the older kids that my mother dropped me off there one day she told the kids that she had been diagnosed with AIDS, and she was going to murder herself. So my best friend her name was Sky, she was one of the older kids and she took care of me for my early years. I lived there until I was about 16, then I moved in with Jeremy, my boyfriend and started a family. Anyway back to our drug Elate, you may have an idea what this drug is I have no idea if it will sill exist when you receive this letter or you may have never heard of the drug before. So let me explain. It is what I have heard that people used to call "cocaine" or something in that form. And I have also heard that people used to actually pay for this stuff, and used to go in "jail" if they were caught with it or on it. Well now a day it is completely different, we have to be on it twenty-four hours a day, seven times a week, etc. The drug Elate, it brings all the others and me such a high, and has got me through some pretty bad times in my life. You already know my mother died from it, using the needle method, and I presume my father did also; that is why we start our lives so early in this society. The older kids have prepared us that our lives only last about forty years, if we are lucky. But forty years of being high; that is the way I want to live my life. Who really like's reality in the first place. The only down sides of this drug are my nose hurts all the time and I do not really sleep, nor eat much, the drug make me feel full. It is our choice weather we want to sniff the stuff or inject it or do both. I personally switch with both methods every few months. The one thing that I do not do is share needles, that is the huge down side

Tuesday, September 17, 2019

Transaction, Operating Accounting Exposures

Transaction, Operating, & Accounting (Translation) Exposures Foreign Exchange Exposure – measures the potential for a firm’s profitability, net cash flow, and market value to alter because of a change in exchange rates. Q: What are the three main foreign exchange exposures? A: 1) Transaction Exposure 2) Operating Exposure 3) Accounting Exposure Transaction Exposure – measures changes in the value of outstanding financial obligations incurred prior to a change in exchange rates.Operating Exposure (Economic Exposure, Competitive Exposure, Strategic Exposure) – measures a change in the present value of a firm resulting from any change in future expected operating cash flows caused by unexpected changes in exchange rates. Accounting Exposure (Translation Exposure) – measures accounting-derived changes in owner’s equity as a result of translating foreign currency financial statements into a single reporting currency. Exhibit 8. 1 [pic] Note: In th e fourth quarter of 2001 Amazon. om reported a net income of $5 million, due in part to a one-time foreign currency gain of $16 million. Hedging – To take a position that will rise (or fall) in value to offset a change in value of an existing position. |Benefits of Hedging |Costs of Hedging | |Improved the planning capability of the firm. |Risk-averse strategy that benefits management more than | |Reduced the likelihood of financial distress. i. e. the risk that cash|shareholders. (i. e. shareholders can diversify currency risk on an| |flows will fall below what is required for debt payments and continued|â€Å"as needed† basis) | |operations) |Consumes the firm’s resources and expected cash flows to the firm | |Management has a comparative advantage over shareholders. (i. e. |are not increased. (i. e. gency theory, NPV of hedging is zero, | |understanding the currency risk of the firm and take advantage of a |and FX losses appear on the I/S while hedging are b uried in | |disequilibrium through selective hedging) |operating and interest expenses) | Transaction Exposure Transaction Exposure – measures changes in the value of outstanding financial obligations incurred prior to a change in exchange rates. Transaction exposure can arise from the following activities: ? Purchasing or selling foreign goods and services on credit. Borrowing or lending in another currency. ? Foreign exchange contracts. Exhibit 8. 3 The Life Span of Transaction Exposure [pic] Example Expect to collect ? 1,000,000 in three months on a sale, minimum acceptable value $1,700,000. Q: What type of transaction exposure has occurred? A: Billing Exposure S0 = $1. 7640/? ES90= $1. 76/? F90= $1. 7540/? iU. K. = 10% per year (2. 5% per quarter) kU. K. = 8% per year (2% per quarter) iU. S. = 8% per year (2% per quarter) kU. S. = 6% per year (1. 5% per quarter) P90ATM = $1. 75 (1. 5% premium) P90OTM = $1. 71 (1% premium)Note: ES90 is the estimated spot rate in three mont hs, â€Å"i† is the borrowing interest rate, and â€Å"k† is the investment interest rate, P90ATM is an at-the-money three-month put option, and P90OTM is an out-of-the-money three month put option. Q: Is the pound expected to appreciate or depreciate? A: Depreciate Q: What is the forward premium/discount on the pound? A: [pic] Q: What are the four alternatives to hedge a transaction exposure? A:1) Remain unhedged 2) Hedge in the forward market 3) Hedge in the money market 4) Hedge in the options market 1) Remain unhedged, collect ? 1,000,000 in three months at the new spot rate. pic] 2) Hedge in the forward market, collect ? 1,000,000 in three months at $1. 7540/?. [pic] 3) Hedge in the money market, borrow ? 975,610 today, and exchange for dollars at the current spot rate ($1. 7640/? ). Invest the $1,720,976 for 90 days, and in 90 days pay back the loan + interest with the ? 1,000,000. Q: To construct a money market hedge, how much should the investor borrow today if the annual interest rate is 10% and the company expects to receive ? 1,000,000 in 90 days? A: [pic] Q: At what investment rate is the money market hedge superior to the forward contract? A: [pic] pic] Note: Either the forward contract or the money market hedge is better than an uncovered position if the spot rate at time 2 is less than the forward rate. But, if the funds can be invested at anything above 7. 68% (or 1. 92% for 90 days) then the money market hedge is a better option than the forward contract. If the spot rate at time 2 is greater than what can be earned by investing the funds in the company (in this case the funds are invested in the company yielding the company’s WACC of 12% or $1,772,605) then the uncovered hedge would be superior. 4) Hedge in the options market.An at-the-money[1] (ATM) put option is selling for a 1. 5% premium. The cost of the option is (size of the option) x (premium) x (spot rate) = cost, in this case ? 1,000,000 x 0. 015 x $1. 7640 = $26 ,460. This is the maximum loss, while the maximum gain is the spot price – the cost of the option. [pic] To compare the alternatives, first estimate what you expect spot rates to be, then estimate a range of possible prices, and consider your ability to accept the downside. Then select the best strategy. Some Examples: [pic] Q: Transaction exposure arises from what? A: Sales and expenses that are already contracted for.Operating Exposure Operating Exposure (Economic Exposure, Competitive Exposure, Strategic Exposure) – measures a change in the present value of a firm resulting from any change in future expected operating cash flows caused by unexpected changes in exchange rates. Q: Operating Exposure depends on whether an unexpected change in exchange rates causes unanticipated changes in what? A: Sales volume, sales prices, or operating costs Figure 9. 1 Financial and Operating Cash Flows Between Parent and Subsidiary [pic] Q: What are four proactive ways to manage op erating exposure?A: 1) Matching currency cash flows 2) Risk-sharing agreements 3) Back-to-back or parallel loans 4) Currency swaps Note: Planning for operating exposure depends on the interaction of strategies in finance, marketing, purchasing, and production. Accounting (Translation) Exposure Accounting Exposure (Translation Exposure) – measures accounting-derived changes in owner’s equity as a result of translating foreign currency financial statements into a single reporting currency. Q: What are the financial goals of the multinational enterprise? A:1) To maximize consolidated after-tax income ) To minimize the firm’s effective global tax burden 3) To correct the positioning of the firm’s income, cash flows, and available funds. Note: These goals are frequently seen as inconsistent. Functional currency – the dominate currency used by the foreign subsidiary in its day-to-day operations. Q: What are the two basic methods for the translation of fo reign subsidiary financial statements? A: 1) The current rate method 2) The temporal method Current rate method – a method of translating the financial statements of foreign affiliates into the parent’s reporting currency.All assets and liabilities are translated at the current exchange rate. Temporal method – assumes that a number of individual line item assets such as inventory and net plant and equipment are restated regularly to reflect market value. Q: Which method is the most common worldwide? A: The current rate method Q: What are the advantages of the current rate method? A: 1) The variability of reported earnings due to translation gains or losses is eliminated, because the gain or loss on translation goes directly to a reserve account (rather than passing through the income statement). ) Does not distort balance sheet ratios such as the current ratio or debt-to-equity ratio (because the relative proportions of the individual balance sheet accounts rema in the same. Q: What is the disadvantage of the current rate method? A: 1) It violates the accounting principle of carrying balance sheet accounts at historical costs. Q: What is the advantage of the temporal method? A: 1) Foreign nonmonetary assets are carried at their original cost in the parent’s consolidated statement. Homework Problems Chapter 8 1.Imagine one of the companies from your final project is expecting an $80million payment in one year. The company also expects $20million in expenses in one year. Use real figures or the following: Current spot rate 3. 4x/$ (trend shows 3. 8x/$ two months ago) Interest rates are 14% in your country and 4% in the U. S. Forward contracts are too expensive Based on the current spot rate and relative interest rates, please advise your company on its currency exposure. Chapter 9 2. Imagine one of your companies will soon be exporting to China.Use the following (replace the $ equivalent with your currency at the current spot price): C urrent sales of 1,000,000 units per year at a price equivalent to $24 each. Current spot price Rmb8. 2/$, but the H. K. advisory will drop the value next week to Rmb10/$. Direct costs are 75% of the U. S. dollar sales price. Accepting this forecast, advise the company on two options: 1) Maintain the same renminbi price (i. e. no change in price) 2) Raise the price to offset the devaluation and experience a 10% drop in unit volume. A) What would be the short-run (one year) impact of each strategy?B) Which do you recommend? Optional Assignment: (0. 5 participation points) Prepare a write-up on the country you are doing for your final project. (Include GDP, inflation, major exports/imports, major stock exchange, currency, exchange rate, and anything else you find interesting and relevant)†¦ use sources like countryreports. org, cia. gov, etc. And remember to compare your country to something (i. e. the U. S. or another country in the region)†¦ Try to make everything you turn in look â€Å"professional,† imagine you're getting paid for your work.Please cite your sources throughout the report, and if you could e-mail it to me before next Monday, that's even better. Final Project These are two great sites to look at for your final project: globaledge. msu. edu www. world-exchanges. org ———————– [1] An at-the-money put, means that the strike price is equal to the current spot price†¦ Meaning an investor is indifferent between exercising the option or going to the market. In this case the forward rate is $1. 7540/? , and the option is $1. 75/? plus 1. 5% premium.

Monday, September 16, 2019

Bereavement Support for Older Adults

Running Head: Bereavement Support for Older Adults Six Session Group: Bereavement Support for Older Adults Bereavement Support for Older Adults Purpose: To create a safe environment for people to express his or her feelings of grief which will hopefully enable them to reconcile his or her loss and begin to reinvest in life by learning through educational support, coping tools in the absence of a loved one Group Goals/Objectives: To foster self-awareness, healing, new friends, sense of community, support of others, education about grief and learning coping skills through psycho-educational approach.Our goal is to not stop the pain or forget about the loved one but to help members live with the loved memory in a way that doesn’t cause pain. Bereavement Support for Older Adults Outline I. Group Rationale A. Grief is the emotional reaction to a significant loss II. Target Population A. Older Adults a. Bereavement III. Summary A. Mrs. Moore IV. Group Structure & Screening V. Length of Group A. VI. Theories & Techniques A. reminiscence model framework B. Writing/ Journaling C. Art VII. Leadership Style/Skills A. Democratic a. Caring, . Empathetic B. Excellent Communication VIII. Evaluation/Conclusion Bereavement Support for Older Adults Agency: Golden Grief Counseling agency is a bereavement agency that offers services on general grief and loss support group several times throughout the year at various locations in Central Florida. The group typically meets one day a week for about six consecutive weeks. This is a free group, but registration and prescreening evaluation is required to determine the appropriateness of participants to try and obtain group cohesion.All groups will be based on Homogeneity To be eligible to participate potential members must be at least 69 years of age; 3 or 4 months or more after the loss of a loved one(however, some participants may want to join sooner and Golden Grief Counseling agency will respect a bereaved participant interes ts in joining the group based on his or her personal grief journey. Golden Grief Counseling agency certainly realizes what works for one person may not be suitable for the next. 1. Group Rationale:Grief is the emotional reaction to a significant loss, such as the death of a loved one (bereavement) or no longer being independent with activities of daily living. People may use the words â€Å"sorrow† and â€Å"heartache† to describe feelings of grief(Bonifas,2010) Whether an individual loses a beloved person, an animal, place or object, or a valued way of life, such as a job, marriage or good health, some level of grief will naturally follow (Bonifas,2010) For this support group, the focus was on bereavement.Bereavement support groups are increasingly being recognized as an effective way to promote healing through education and support after the loss of a loved one or close friend (Steinberg, 2012). Although support groups Bereavement Support for Older Adults do not full y resolve grief, particularly when they are time limited, but they can promote acceptance that life will be different and that life will be okay and hopeful (Steinberg, 2012) 2. Target Population/Intake:The target population for this proposal is adults 69 years or older due to the transition of becoming a senior adult, the experience can be a greater struggle simply by a person stage of life (Senior Citizen’s Guide, 2013). 3 Selections of Members All potential participants were prescreened by an approved facilitator as to their appropriateness for the group. It is important for each participant to understand the purpose and goals of the group in order to support a positive group experience for all parties involved. 4. Group Structure:The group is intended to be primarily psycho-educational and change oriented group. The main activities of the sessions will center on education about the grieving process, information regarding learning coping skills/tools, healing, sense of com munity, and support of others with an emphasis of self-awareness. The group will be a closed ended group with no new members added once group has started. The size of the group shall be 8- 12 participants within a circle. Duration of the group shall last six weeks. The group will meet weekly with an anticipated length of about 1. to 2 hours. Bereavement Support for Older Adults 5. Theories and Techniques Individuals will learn the process of identifying skills to regulate depression using reminiscence model framework, role-play, contemporary grief work model for a more integrative method, cognitive behavioral model as well as learning how to counter negative thinking and build skills and coping abilities (Greif, Ephross, 2011). The goals and objective of the group will be met by: * Group Processing * Video * Speaker * Reminiscence * Peer Support * Group Work Activities/Games * Fun Homework Assignments . Leadership Skills: The facilitator is a Social Worker with grief group experienc e in bereavement support groups. The facilitator has the responsibility of facilitating, listening, observing and processing. As a facilitator he or she should walk alongside rather than leading the grieving individual along the unpredictable road toward a new adaptation ( Greif, Ephross, 2011). The Facilitator is to Bereavement Support for Older Adults help the group understand the group purpose, establish the groups structure of when, where, how long group will meet.The facilitator should be empathetic, warm, compassionate and caring with a nurturing and warm atmosphere. Client Summary Mrs. Moore a 76 year widow was referred by her daughter for a pre-evaluation at the Golden Grief Counseling agency. Her daughter was concerned that her mother, Mrs. Moore was depressed /grieving since the loss of her son and then the loss of her husband two years after. Mrs. Moore’s daughter stated her mother once was active and full of life, but now her mother is not showing up for appointme nts with doctors, family and friends. Mrs.Moore was evaluated neurologically and neuropsychologically by a medical doctor and both tests were negative. However, it was reported that she had symptoms of depression which started after the death of her son and husband. Mrs. Moore wondered if her lack of energy was due to a physical ailment or if it was a normal part of grief. Mrs. Moore voluntarily decided to seek a bereavement support group session at the Golden Grief Counseling Agency. Mrs. Moore registered and was pre-screened as a potential client at the Golden Grief Counseling Agency to take part of the free bereavement group session.Mrs. Moore received a welcome letter and a courtesy call specifying days, times, location and duration of group and what to expect on her first day. It was pre-arranged that Mrs. Moore’s daughter bring her to the first session. Bereavement Support for Older Adults 7. Introduction/Breaking the Ice: The facilitator introduces himself or herself t o the group in a warm, compassionate and caring way. The facilitator defines group rules and instructs members in a warm, appropriate way about roles and skills needed for effective group participation and group cohesion.The facilitator asks every group member to introduce themselves. Objective of Group Development: 1. Reduces the initial anxiety and misconceptions about joining a group 2. Preaffiliation, members may be guarded at first 3. Provides information and instruction about group to facilitate the member’s ability to provide informed consent. 4. Achieve consensus between group leader and group members on the objectives of the group session 8. Pre-group Activities/Intervention: 1.The preparation session occurs after the group members have had a pre-group written handout that describes what the grief process is and how group works, roles of group leaders and group members, or goals for the group, specific skills to be used in the group, topics and typical activities tha t the group will be experiencing. 2. The group will view a 5 -10 minute video tape of bereavement groups/educational groups. 3. During the pre-group activities, each group member were asked the question â€Å"What they hoped they get from the group. 4. We want all group members to feel comfortable sharing, crying and talking.During the course of the group, group members have the right to leave if they feel the group is not beneficial and are encouraged to look for another group if they desire. First Week Session included information about bereavement, education about grief and the skills to cope. Next several sessions over the six week session can include * Education about Grief * Handling the Holidays * What to do with loved one’s possessions * Reinvesting in Life * Establishing memorials * Meaningful rituals 9. Evaluation/ Conclusion: Over the course of the group session, Mrs.Moore and others was able to talk about and tolerate her feelings more openly. She also began to r e-engage in social activities after the 6 week group session after using several techniques. Mrs. Moore expressed her grief by writing her deceased husband a letter and reading it out loud at his grave. Each member of the group received a questionnaire evaluation in the mail as well as a courtesy call asking the group member three questions 1. What did they get from the group? 2. What are they doing differently before coming to group? 3. What would they like to group to do differently to help others?One example of NASW code of ethics would be the importance of human relationship. Reference Greif, G. L & Ephross, P. H (2011) Group Work with Populations at Risk York, NY: Oxford University Press Grief, Loss and Bereavement in Older Adults [Slide set]. 2013 Arizona State University School of Social Work Complied by Bonifas, R. P (2013)Grief Support for Older Adults Senior Citizen’s Guide. Retrieved from http://www. seniorcitizensguide. com/articles/pittsburgh/grief-support-html S teinberg, M. W (2013) Social Worker Help Start Here â€Å"Grief and Loss- Your Options: Bereavement Support Groups