Saturday, August 31, 2019

Boundaries

It usually helps to establish the ground rules from the start of a session, according to Gravells (2008, p.7) ‘setting ground rules helps everyone know their limits‘. This can be a mixture of ground rules determined by the tutor or can be negotiated between both the tutor and the students. As a result it can provide expectations for the behaviour of the group. For example typical ground rules may include; †¢ Starting and finishing times †¢ Listening to others †¢ Mobile phone rules †¢ Keeping personal issues out of the session †¢ Maintaining confidentiality within the group The only disadvantage is that it can be time consuming negotiating between the students and the tutor, but setting the rules in this way will result in the group being more likely to be committed to them, (Petty, G. 2004) It is especially important to agree a ground rule if the group are discussing their experiences or difficult situations. This will establish a rule that allows the students to feel safe at being able to express themselves (Gould and Francis 2009) in their contributions to the group. These established, negotiated and agreed ground rules can be displayed on a wall to remind everyone what is expected within the session. This will ensure that a friendly, sociable and relaxed atmosphere is developed and maintained.

Friday, August 30, 2019

ICT AND FILM INDUSTRY

Digital technology in the past decade has totally changed the movie industry. Focusing on the crucial procedures of movie making and the impact that technology had on each of the areas, this research would look at recent reforms in the pre-production part of film making, furthermore we will try to know the new instruments, equipment and storage facilities being used by modern film makers and producers. Film distribution and the adverse impacts that technology has had on the movie industry, majorly on the illegitimate sale and piracy of copyrighted material is scrutinized. Post-theatre film distribution and the revolutionary breakthrough technologies in the industry are explored to look at the continuous changes in education and exercise of professionals in the movie industry. Computer generated graphics and the growing impact ICT has made in the industry is covered and the future of the film industry is predicted. ICT played a lot of positive role in different aspect of the world today. It has touched the medical industries, educational sector, governmental sector and even the movie or film industries. This paper discourse on how ICT have positively impacted the movie/film industry today. If we all remember our young age, we probably think of the 1700s, 1800s, or 1900s when the movie we watch are all cassettes or analog, and probably not durable, with the help of ICT today we can see changes in the video technology in the present world. As revolution continues in the movie industries the impacts of ICT have made the following changes; Technological tools have changed the script writing procedures by making use of the internet, using digital editing tools. The internet is also been used by scriptwriters to forward their scripts to producers, directors and potential cast associates in other to be reviewed by each characters either by peer review in a way of online forums. There has been a crucial increase in the past decade in the use of digital video cameras for film with low budget planning along with high definition video which is set to compete and go beyond the standard 35mm film both in quality and flexibility (culkin & Randle 2003). The post production phase of movie making has possibly been the most important impacted by the new technological inclination. The introduction of non-linear technology has made the use of film edited manually inefficient and time consuming. This procedure involves fixing and putting together film in a virtual screen where the directors, producers, and editors view the output of the film on screen. (culkin & randle 2003. p. 8) The whole course of film making has been completely technology driven, everything from the distribution to the projection of movie to audiences (consumers). However, the absence of commercial agreements between distributors and exhibitors of the films has slowed down the conversion to digital technologies. For instance, only 170 cinemas around the globe have converted to what is recognized as high-end digital (culkin & Randle 2003). Profit margins for the studios are recognizably decreasing, now being out casted or outnumbered by the game industry. So satellite delivery have recently made its first implementation on film industry and reports has shown that upon full execution of film distribution, it can save the film industry of cost of $700 million per year. (markman). A major problem the movie industry has been facing for the past years since the introduction of technology in the industry is the piracy and copyright issue. For this reason copyrighted movies have been easily affordable more than the original film produced for distribution. For movie and music content, these lead to quite a few lawsuits against peer-to-peer networks and individuals as result for stealing and distribution of these movies and music materials. This will always be one of the major industries issues the industry would have to face since the public (consumers) has access to this low cost copyrighted material (peer-2-peer and DVD writers). Nevertheless, the movie industry has endeavored to decrease the risk of piracy of movies by creasing the (CSS) known as content scrambling system in which only authentic DVD or VCD products which contain a certain decryption algorithm can play the particular movie. The same technology also has the capability to rearrange the video and audio on the DVD/CD so that only a DVD with the same decryption algorithm can play the film perfectly. The CSS technology is also designed to prevent users from direct copying of data from DVDs. Though, not long after the CSS technology was introduced, Norwegian teenagers reverse engineered a DVD technology by breaking the code that contain the decryption algorithm and uploaded decryption software for users around the world to use. These means that the movie industry would need to keep updating and also find and option to this difficulties (markman). The post-theatre market accounts roughly for three quarters of movie’s income during its lifetime. The principal of these are ideo rental shops which accounts for nearly half of all profits (). The DVD has completely brought a new dimension to the industry, becoming the fastest growing customer electronics item of all time (culkin & Randle 2003). DVD’s have undeniably increased film studio’s income when it decided to provide movie content to the home consumers with unbelievable picture and sound quality which does not worn out like the old VHS cassettes (markman). A new and rapidly developing area in the dis tribution processes of film industries is â€Å"Movie on demand†. This is a scenario where consumers download their desire movie over the internet instead of going down to their local video store or cinema house. The advantage of this technology is that virtually reduction or no-fees are needed to access the movie and the inconvenience if any when travelling to the video rental store or cinema house (culkin & Randle 2003). Rapid changes in the movie industry in recent years have forced many professionals around the world in audio and graphic industries to acquire new and specialized skills. This is an ongoing development in most industries. An example is that the post-production industries are expected to have continuous upgrades of equipment and software which will lead to continual re-training of employees/crews which in turns increase production costs (culkin & Randle 2003). Future distributions might comprise allowing editors in different countries to editors in various countries to edit film by just gaining access to digitized media on a server without actually leaving the comfort of his or her house. Satellite distributions to cinemas are at the vanguard of future film circulations and distributions. George Lucas, the director of star wars is looking forward to using satellite technology to project the rest of the episode in cinemas. This process of digitally distribution of the film through data projectors is known as E-Cinema (& Randle 2003). It is not expensive and definitely flexible in terms of distribution power; nevertheless Cinemas who wish to implement this new technology would have to acquire substantial expenses when converting to digital projection. This technology is very much still in the development level and the impact is not really seen yet (& Randle 2003). Gregory Huang article titled â€Å"the new face of the movie industry† studies the development in computer animated graphics in past years. Recent blockbuster movies like Spiderman 3 are good examples of how far computer graphics have come in recent years. The movie industry have come to a stage in which every single event in film making process can be computer generated . In past years, the technology illustrations of faces have not looked real when seen a lot closer as it is easier to make non-human objects like dinosaurs real, moreover, improvements in rendering human body or skin, lighting or darkening digital scenes and examining human characters or actors are now allowing animation engineers to manage and take control of every sing movement of pixels in an animated format (skin). Huang (2004) reports that an average budget for a bestseller film cost approximately $150 million where it is exceptional to see more than 50% of funding allocated to just the computer generated effect which in turns raise revenue to about average of $700 million per year. At least we can say that there is no area within the movie industry that has not been impacted by technology over the past years. The major impacts for pre-production phase have been focused on the development of script-writing tools as well as the increase use of internet to distribute script to editors, directors and other important parties within the industry. Generally equipment costs have drastically increased drastically reduced at the same time quality and flexibility of products has increased. The confinement of non-linear technology has all but made hand edited or manually edited movies an extinct and fast-track the whole film editing process (culkin & Randle 2003). The major downside which has increased concerns around film industries around the world is that it has become extremely easy for consumers around the world to copy copyrighted movie material and this keep generating problems in the industries till date. Finally we can say that the advancement in technology would only continue to bring improvement in the movie industries around the world and it is definitely set to revolutionize the industries for years to come.REFERENCECulkin, Nigel & Randle, Keith 2003, Facing the Digital Future: The Implications of Digital Technology for the Film Industry, University of Hertfordshire, Hertfordshire. Huang, Gregory 2004, The New Face of Hollywood, Technology Review, http://www. technologyreview. com/articles/04/09/huang0904. asp? p=0. Markman, David & Vega 2001, Mark, Digital Future: Movie Industry Tries to Keep One Step Ahead of Hackers, Daily Journal, Los Angeles. ICT AND FILM INDUSTRY Digital technology in the past decade has totally changed the movie industry. Focusing on the crucial procedures of movie making and the impact that technology had on each of the areas, this research would look at recent reforms in the pre-production part of film making, furthermore we will try to know the new instruments, equipment and storage facilities being used by modern film makers and producers. Film distribution and the adverse impacts that technology has had on the movie industry, majorly on the illegitimate sale and piracy of copyrighted material is scrutinized. Post-theatre film distribution and the revolutionary breakthrough technologies in the industry are explored to look at the continuous changes in education and exercise of professionals in the movie industry. Computer generated graphics and the growing impact ICT has made in the industry is covered and the future of the film industry is predicted. ICT played a lot of positive role in different aspect of the world today. It has touched the medical industries, educational sector, governmental sector and even the movie or film industries. This paper discourse on how ICT have positively impacted the movie/film industry today. If we all remember our young age, we probably think of the 1700s, 1800s, or 1900s when the movie we watch are all cassettes or analog, and probably not durable, with the help of ICT today we can see changes in the video technology in the present world. As revolution continues in the movie industries the impacts of ICT have made the following changes; Technological tools have changed the script writing procedures by making use of the internet, using digital editing tools. The internet is also been used by scriptwriters to forward their scripts to producers, directors and potential cast associates in other to be reviewed by each characters either by peer review in a way of online forums. There has been a crucial increase in the past decade in the use of digital video cameras for film with low budget planning along with high definition video which is set to compete and go beyond the standard 35mm film both in quality and flexibility (culkin & Randle 2003). The post production phase of movie making has possibly been the most important impacted by the new technological inclination. The introduction of non-linear technology has made the use of film edited manually inefficient and time consuming. This procedure involves fixing and putting together film in a virtual screen where the directors, producers, and editors view the output of the film on screen. (culkin & randle 2003. p. 8) The whole course of film making has been completely technology driven, everything from the distribution to the projection of movie to audiences (consumers). However, the absence of commercial agreements between distributors and exhibitors of the films has slowed down the conversion to digital technologies. For instance, only 170 cinemas around the globe have converted to what is recognized as high-end digital (culkin & Randle 2003). Profit margins for the studios are recognizably decreasing, now being out casted or outnumbered by the game industry. So satellite delivery have recently made its first implementation on film industry and reports has shown that upon full execution of film distribution, it can save the film industry of cost of $700 million per year. (markman). A major problem the movie industry has been facing for the past years since the introduction of technology in the industry is the piracy and copyright issue. For this reason copyrighted movies have been easily affordable more than the original film produced for distribution. For movie and music content, these lead to quite a few lawsuits against peer-to-peer networks and individuals as result for stealing and distribution of these movies and music materials. This will always be one of the major industries issues the industry would have to face since the public (consumers) has access to this low cost copyrighted material (peer-2-peer and DVD writers). Nevertheless, the movie industry has endeavored to decrease the risk of piracy of movies by creasing the (CSS) known as content scrambling system in which only authentic DVD or VCD products which contain a certain decryption algorithm can play the particular movie. The same technology also has the capability to rearrange the video and audio on the DVD/CD so that only a DVD with the same decryption algorithm can play the film perfectly. The CSS technology is also designed to prevent users from direct copying of data from DVDs. Though, not long after the CSS technology was introduced, Norwegian teenagers reverse engineered a DVD technology by breaking the code that contain the decryption algorithm and uploaded decryption software for users around the world to use. These means that the movie industry would need to keep updating and also find and option to this difficulties (markman). The post-theatre market accounts roughly for three quarters of movie’s income during its lifetime. The principal of these are video rental shops which accounts for nearly half of all profits (). The DVD has completely brought a new dimension to the industry, becoming the fastest growing customer electronics item of all time (culkin & Randle 2003). DVD’s have undeniably increased film studio’s income when it decided to provide movie content to the home consumers with unbelievable picture and sound quality which does not worn out like the old VHS cassettes (markman). A new and rapidly developing area in the distribution processes of film industries is â€Å"Movie on demand†. This is a scenario where consumers download their desire movie over the internet instead of going down to their local video store or cinema house. The advantage of this technology is that virtually reduction or no-fees are needed to access the movie and the inconvenience if any when travelling to the video rental store or cinema house (culkin & Randle 2003). Rapid changes in the movie industry in recent years have forced many professionals around the world in audio and graphic industries to acquire new and specialized skills. This is an ongoing development in most industries. An example is that the post-production industries are expected to have continuous upgrades of equipment and software which will lead to continual re-training of employees/crews which in turns increase production costs (culkin & Randle 2003). Future distributions might comprise allowing editors in different countries to editors in various countries to edit film by just gaining access to digitized media on a server without actually leaving the comfort of his or her house. Satellite distributions to cinemas are at the vanguard of future film circulations and distributions. George Lucas, the director of star wars is looking forward to using satellite technology to project the rest of the episode in cinemas. This process of digitally distribution of the film through data projectors is known as E-Cinema (& Randle 2003). It is not expensive and definitely flexible in terms of distribution power; nevertheless Cinemas who wish to implement this new technology would have to acquire substantial expenses when converting to digital projection. This technology is very much still in the development level and the impact is not really seen yet (& Randle 2003). Gregory Huang article titled â€Å"the new face of the movie industry† studies the development in computer animated graphics in past years. Recent blockbuster movies like Spiderman 3 are good examples of how far computer graphics have come in recent years. The movie industry have come to a stage in which every single event in film making process can be computer generated . In past years, the technology illustrations of faces have not looked real when seen a lot closer as it is easier to make non-human objects like dinosaurs real, moreover, improvements in rendering human body or skin, lighting or darkening digital scenes and examining human characters or actors are now allowing animation engineers to manage and take control of every sing movement of pixels in an animated format (skin). Huang (2004) reports that an average budget for a bestseller film cost approximately $150 million where it is exceptional to see more than 50% of funding allocated to just the computer generated effect which in turns raise revenue to about average of $700 million per year. At least we can say that there is no area within the movie industry that has not been impacted by technology over the past years. The major impacts for pre-production phase have been focused on the development of script-writing tools as well as the increase use of internet to distribute script to editors, directors and other important parties within the industry. Generally equipment costs have drastically increased drastically reduced at the same time quality and flexibility of products has increased. The confinement of non-linear technology has all but made hand edited or manually edited movies an extinct and fast-track the whole film editing process (culkin & Randle 2003). The major downside which has increased concerns around film industries around the world is that it has become extremely easy for consumers around the world to copy copyrighted movie material and this keep generating problems in the industries till date. Finally we can say that the advancement in technology would only continue to bring improvement in the movie industries around the world and it is definitely set to revolutionize the industries for years to come. REFERENCE Culkin, Nigel & Randle, Keith 2003, Facing the Digital Future: The Implications of Digital Technology for the Film Industry, University of Hertfordshire, Hertfordshire. Huang, Gregory 2004, The New Face of Hollywood, Technology Review, http://www. technologyreview. com/articles/04/09/huang0904. asp? p=0. Markman, David & Vega 2001, Mark, Digital Future: Movie Industry Tries to Keep One Step Ahead of Hackers, Daily Journal, Los Angeles.

Thursday, August 29, 2019

Checking the Resistance through Wire

Check the resistance with wire We will use the constantan wire to check the resistance wire; our deformation is wire of different length. I chose this because it seems like an interesting deformation and proves that sometimes it is acceptable and safe to use long lines rather than small rows. For the experiment, use the following equipment.  · As a power pack, Constantine wire, ammeter group, we take the voltmeter and the ammeter into consideration, cut the different lengths of the constantan wire and indirectly connect them to the power pack. Examining the resistance of a wire is the name of the wire's resistance to the tendency of electrons to travel through the wire. The greater the resistance generated by the electron, the greater the voltage required to drive the current through the wire. The resistance value is defined by the following equation. Resistance on resistor R (R) = p  · db Current through wire (I) Tab / Important factors have many factors that can influence. Temp erature, current, line thickness, line length, line resistance. When the temperature rises, atoms in the wire begin to vibrate. That is, since they react electronically, the temperature affects the resistance. The problem with this method is that it is difficult to change the temperature of the wire and keep it at the same constant temperature. A 0.02 ohm resistance wire was used to measure the effect of temperature on the current. Wire thickness is 1 mm. I connected the wire to the battery and measured its resistance. Resistance decreases as the refrigerator temperature decreases. After cooling it to 0 degrees Celsius the resistance reached 0.014. After that, the wire is placed on dry ice and its resistance drops again. The resistance is measured after the star has heated the wire. The resistance of the wire rises as the temperature rises. At 100  ° C, its resistance is about 0.029

Wednesday, August 28, 2019

The Current and Futuristic Position of Etisalat Assignment

The Current and Futuristic Position of Etisalat - Assignment Example Furthermore, the report looks into the factors that limit the company’s efficiency and effectiveness on a global and national front. According to research carried out, it is notable that entering a foreign market can pose unique sets of problems that a company had not previously in the country of origin (Womack and Jones, p. 12). Emirates Telecommunications Corporation, which operates under the brand name Etisalat is a service provider in the telecommunication sector. The company is incorporated in the UAE and is operational in at least eighteen nations especially in the Middle East, Africa, and Asia. Mobile Network Code (MNC), a global regulator of the telecommunication industry asserts that, at present, Etisalat is ranked as the fifth biggest operator in the mobile telecommunication sector, having a massive consumer base of close to one hundred and twenty million people globally. MNC, which offers a list of mobile national codes under ISO 3166-1 country codes, asserts that Etisalat is a key player in the global telecommunication sector, having been founded in the year 1976. As at February 2011, Etisalat gives an account of a net income of AED 31.9 billion ($8.4 billion), with profit margins reaching AED 7.63 billion or $ 2.07 billion. The company is a joint-stock corporation held by local affiliates and int ernationally reputed companies such as International Aeradio Limited and another company based in Britain. The ownership structure of the company shifted significantly in 1983 when the government of the United Arab Emirates acquired up to 60% of the company’s shares, before trading the remaining 40% in the public market.

Tuesday, August 27, 2019

What are the problems faced by small convenience stores of UK in terms Literature review

What are the problems faced by small convenience stores of UK in terms of surviving against the larger competitors and obtaining financing - Literature review Example The paper tells that it was in the year 1971 when the Bolton Committee presented its report concerning small businesses, made the first attempt to define small, medium and large sized firms and highlighted the indispensable importance of SMEs for the British economy. Not only that SMEs generate bulk of the employment, contribute significantly to the overall GDP but they create value for their customers and the entire society. However, SMEs also face significant challenges, which are unique in their own. Many business start-ups who fail to address those challenges become history. Amongst these challenges, problems related to financing and facing competitive pressures from the larger players in the industry rank at the top of the list. In fact, these challenges and problems have ensured the decline of many SMEs as well. This investigative report is an attempt to explore these problems faced by small businesses within UK related to financing and surviving against larger competitors. The same has been presented in under the heading of critical literature review. The study then narrow downs the focus to small convenience store within UK and conducts a questionnaire-based research to explore the dynamics of problems and challenges faced by small convenience stores in the above-mentioned areas. The common perception about entrepreneurial ventures and small businesses is that their growth slows down during recession like large corporations and big businesses but the evidence coming from Berger and Udell reveals that the same might not be true. ... 1 Respondents identifying competitive advantage enjoyed by larger firms 22 Table 2 Respondents on their perceived competitive advantages 24 Introduction It was in the year 1971 when the Bolton Committee presented its report concerning small businesses, made the first attempt to define small, medium and large sized firms and highlighted the indispensable importance of SMEs for the British economy. Not only that SMEs generate bulk of the employment, contribute significantly to the overall GDP but they create value for their customers and the entire society. However, SMEs also face significant challenges, which are unique in their own. Many business start-ups who fail to address those challenges become history. Amongst these challenges, problems related to financing and facing competitive pressures from the larger players in the industry rank at the top of the list. In fact, these challenges and problems have ensured the decline of many SMEs as well. This investigative report is an atte mpt to explore these problems faced by small businesses within UK related to financing and surviving against larger competitors. The same has been presented in under the heading of critical literature review. The study then narrow downs the focus to small convenience store within UK and conducts a questionnaire-based research to explore the dynamics of problems and challenges faced by small convenience stores in the above-mentioned areas. Critical Literature Review The common perception about entrepreneurial ventures and small businesses is that their growth slows down during recession like large corporations and big businesses but the evidence coming from Berger and Udell (2011) reveals that the same might not be true. The study focuses on 112 different small business in London alone and

Monday, August 26, 2019

The Article by Atul Gawande (2009) New Yorker Term Paper

The Article by Atul Gawande (2009) New Yorker - Term Paper Example Some scholars suggest that the system has drifted out of control: â€Å"Through no planned design or evil intent, our health care system has evolved in ways that better serve a myriad of economic, professional, and political interests than those of patients and families, and the larger public† (Mechanic, 2006, p. ix). Gawande, however, sees a much bleaker picture, and suggests that there are areas in America where doctors and administrators are financially tied into provision, and that this encourages massive amounts of over-treatment, with no benefit to patients. Gawande’s article describes a huge discrepancy in the per capita costs of medical care in two comparable districts, McAllen and El Paso, Texas, while there is no evidence that the higher cost location (McAllen) offers better care or achieves better results. This gives rise to a serious ethical problem: in El Paso patients have much lower rates of access to all kinds of tests and treatments, while in McAllen, t hey have much higher rates. The variation is due to doctor behavior, and not down to the demographics of the citizens, since the two regions are very similar. This is the kind of situation that led to the passing of the 2010 Health Care Reform bill which aims to extend health coverage to from 83% to 95% of the legally resident population. (Tumulty, 2010, p. 1) Unfortunately, however, huge variation in the way that this money is spent will mean that a fair and equal service is not likely to happen. From the point of view of justice, or fairness, such unequal practices cannot be defended, since all American citizens should have equal access to the benefits of our modern technologies. From a utilitarian point of view, there is a deviation from best practice, since in the McAllen hospitals there is little effort to gain the greatest benefit to patients for the lowest cost. Increasing the amount of testing in order to maximise revenue is the very opposite of ethical behaviour on the part of institutions where doctors earn more for ordering more procedures and tests. Gawande suggests that the problem lies with the structures of delivery, and describes the McAllen healthcare model as â€Å"as system that has no brakes† (Gawanda, p. 14). He cites the example of the Mayo clinic, where doctors receive a fixed salary, as a potential solution. Fewer scans are done, and more discussion between doctors takes place to minimize unnecessary treatments, all of which come with risks as well as benefits, and to try to ensure that patients have what they need, rather than what can be sold to them for profit. There is little incentive to cherry pick patients in this kind of system, and hospitals which follow this style find that overall costs are lower, and quality of care goes up. This analysis takes a refreshing look at the way the whole system is set up, and this gives the reader an overview of things rather than just the view of an economist, or a health professional, or an administrator. It highlights the error that patients, and some doctors, often make, in thinking that more testing is always good. The point is to do what is the best for the patient, and not what sustains the system. If there was more of this kind of benchmarking across hospitals with comparable patient characteristics, then perhaps more could be done to eliminate wasteful

Personal philosophy reflection Coursework Example | Topics and Well Written Essays - 500 words

Personal philosophy reflection - Coursework Example Any behavior that may go against the lines of conduct may be deemed as inappropriate and unprofessional, and in the end, might diminish the benefits of nursing to patients, and society at large (Hannigan, Pattison & Pill, 2010). Today, nurses are shown on how to make these boundaries visible to the people in their care, thus; ensuring that patients receive the utmost help in their quest to attain health. Nurses have been given the responsibility of ensuring that patients get the necessary attention and provide an environment where the provision of healthcare is done in an ethical and effective manner (Hannigan, Pattison & Pill, 2010). From this, patients can comprehend the extent of their caregiver’s duties to them, and learn to appreciate them during the entire process. Times are changing, and it is fundamental for nurses to change with them. This may work toward ensuring that any and all relationships formed in the healthcare field reflect the nursing code of conduct and profession, and also indicate their commitment and affection for the people in their care. It is my belief that nursing is one of the most reliant and dependable vocations globally (DeLaune & Ladner, 2010). This is because there are lives that depend on the code of conduct of all nurses, and it is these responsibilities that help them uphold upright morals and values in this profession. There are lots of lives at hand, not just the patients’ that might be affected; it is my duty to ensure that being effective every time is at the top of the to-do-list. It is vital to be a team player in a bid to ensure that patients receive the care they need. This requires proper communication skills, with both my colleagues and the patients in my care. Proper decision making is one of the most vital aspects of this course that might ensure I execute my duties

Sunday, August 25, 2019

Elements of US Culture Essay Example | Topics and Well Written Essays - 750 words

Elements of US Culture - Essay Example Elements of US Culture In other words, for free expression of ideas, there is need of a proper social order. In addition, it can be said that allowing free expression of ideas helps reduce violence to a great extent. When people are allowed to opine publicly, they are less likely to resort to violence or armed agitation which, often, are the ways of the suppressed. Thus, the American society, from the very beginning, believes in liberalism including freedom of speech, freedom of press, equality under law, equality in all governmental provisions including education and health care. Though this freedom of thinking and expression resulted in better individual performance, and thus better overall growth, there are certain areas that witnessed a trend that is in sharp contrast to expectations and thus, having a negative impact on society. The first one among them is the family structure. Looking into the way American families have changed over these years, one can see a rather grim picture of situations. The tr aditional concept of family included a breadwinning father as the head of the family, a caretaking mother and a few children. mother and a few children. The family, in the traditional context, involved a number of basic relationships including biological, emotional, social, and economic relations. People used to turn to their families whenever they wanted physical, economic or emotional support. Thus, families acted as the basic institutions that passed culture and traditions to the future generations. However, the social changes in the twentieth century resulted in a lot of changes in the way families operate. Some such changes are active participation of females in the paid labor, medical advances resulted in effective birth control, and increasing divorce rates due to the general fall in morale. Though almost three quarters of American citizens still live in family setup, the nature of the family is totally different from that of a traditional one. Recent studies reveal that only less than one-tenth of families fit the traditional definition of family In addition, more than half of the families have no minor children; and yet another serious concern is that only twenty percent of total births are out of wedlock (Fraser 1989). Traditionally, women were raised to become dependent housewives and they did not work outside home. They were caretaking wives and the economic safety of the family was the total responsibility of the breadwinning husband. In sharp contrast, in the present generation, most females in the child-bearing age are employed. Yet another surprising trend visible is the decline visible in the employment rate of men. In addition, there are more grandparents than grandchildren for the first time in the history of America. The trend is pointing towards a social situation that is totally contradictory to the traditional concepts. Despite these shortcomings, America is looking forward to a bright future through technology and education. The present situation of education in America is rather grim. It is a tough task for the American youth to join a school or college as they have to go through the tiring task of proving why they are joining the school through essays, tests and recommendations. Furthermore, it is possible for Americans to judge the ethnicity and economic status of a student

Saturday, August 24, 2019

Summarize each article Research Paper Example | Topics and Well Written Essays - 1000 words

Summarize each article - Research Paper Example Moral distress affects all the healthcare providers across the board in different healthcare settings making it a serious issue in the healthcare sector. Although moral distress is defined differently depending on different fields it primarily acquaints itself with ethical perspective of health practice. Upholding professional values, responsibilities and duties remains vital and are strongly affected by moral distress. Some of the negative impacts of moral distress in healthcare include emotional distress, withdrawal of self from patients, inadequate patient care, and job dissatisfaction or may be attrition in nursing (Pauly, Varcoe & Storch, 2012). Moral distress is argued by some researchers that it can change the position of nurses regarding the particular situation or ethical requirements. At times the nurses’ demands of providing care may affect the healthcare providers by prompting them to cease their profession which is actually a serious concern. Research on moral dis tress in nursing faces various challenges such as lack of conceptual clarity and perpetuation or meta-narration regarding the identity of nursing as a profession. Generally there is insufficient conceptual and theoretical clarity of moral distress in the healthcare sector. ... These kinds of constraints are believed to be beyond nurses’ perspectives thus leading to reactive moral distress as Jameton explains. Nurses may be faced with challenges of doing as per the institutional requirement or following their conscious. Moral distress may therefore be caused by individuals’ failure to do things compromising their personal integrity. Resolution to moral distress may really boost performance of nurses (Pauly, Varcoe & Storch, 2012). Consequently, it is undeniable that empirical research tensions hindering moral distress are found to be the fact that most research involves nurses in acute care in North America and also repeated use of a specific tool developed in a particular context. Additionally, there is insufficient connection among moral distress, moral agency and ethical climate as well as minimal attention to interventions or actions addressing issues related to moral distress. Since moral distress cuts across all professions and disciplin es especially disciplines related to healthcare provision, research should be conducted based on interdisciplinary perspective (Pauly, Varcoe & Storch, 2012). Recommendations to cope with moral distress only concentrate individual perspective thus living behind structural concerns. Although there has been limited involvement of policy and politics in trying to solve or control the issue of moral distress, they still remain important factors in moral distress management. Reference Pauly, Varcoe & Storch. (2012), Nurses perceptions and responses to morally distressing situations.  Nursing

Friday, August 23, 2019

ENGLISH LEGAL SYSTEM-2, CASE STUDY Coursework Example | Topics and Well Written Essays - 1250 words

ENGLISH LEGAL SYSTEM-2, CASE STUDY - Coursework Example This in turn resulted in the job loss and financial erosion. Moreover, his friend John was killed in the accident. Peter faced more problem from his insurer as it denied the payment of insurance money for his car damage, hospital / medical expenses/ medical expenses of his wife Maria and compensation for John as claimed by Andrea, wife of John. John’s wife and Solicitors acting on behalf of other driver sent formal notices for contemplating legal action against him for his act of negligence. In addition, the Police have filed a charge sheet making him liable for manslaughter, reckless driving and driving with out negligence. However, according to Peter’s version, he was not responsible for the accident as the other driver was involved in faulty driving. Hence, according to him, his driving shouldn’t be treated as reckless. In several of the road accidents, the accidents happen suddenly due to mistake from other people during which one has little scope to escape. Moreover, there was no proof that Peter was driving recklessly and hence he shouldn’t be held responsible for this. The main objective at this moment is to protect Peter in cases of any possible legal proceedings against him. The insurance money should also be paid to him for which he should prove that he has not violated the contract law2. At the same, time, he should also be protected against any Police action under the law of insurance and traffic laws. According to English law and insurance regulations of United Kingdom, if a person is responsible for any road accident and if rash and negligence driving is proven with reasonable facts, there may be a possibility of filing a criminal case against the driver and compensation can also be claimed legally. In case, it is proven that the driver is not responsible for accident, then the insurance company will have to pay the necessary compensation. In the present case, Peter should be protected against the criminal case and clai m for compensation as he is not responsible for the accident and rash driving was not proven in any court or tribunal. Peter must try for obtaining an anticipatory bail under this context. This is required because of the fact that two formal court notices were issued against him by John’s wife and Solicitors on behalf of other driver. The Police may try to arrest him at any time mentioning the cause of accident as negligence driving. He should have a proper representation for explaining the court about the nature of the accident and his reasoning about his non commitment of any mistake. For obtaining justice against the claims of Andrea and other driver, he should submit enough evidence that he was not solely responsible for the accident. Hence, he should claim for anticipatory bail in any local civil court under the context of intentional allegation against him with out any solid proof. In case if Peter is convicted of the matters alleged by the Police, there is a possibilit y that he may be arrested under criminal case3 as his friend died in accident, with the ground of obtaining more material facts required for getting clarity in the case and he would be submitted by the Police in the Court with relevant documents and charge sheet. Hence, anticipatory bail is very much required to be obtained by the Peter before Police initiate any action on their behalf. In case he is convicted in court of law by

Thursday, August 22, 2019

Anonymous Research Essay Example for Free

Anonymous Research Essay Anonymous (used as a mass noun) is a loosely associated hacktivist group. It (is estimated to have) originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.[2] It is also generally considered to be a blanket term for members of certain Internet subcultures, a way to refer to the actions of people in an environment where their actual identities are not known.[3] It strongly opposes Internet censorship and surveillance, and has hacked various government websites. It has also targeted major security corporations.[4][5][6] It also opposes Scientology, government corruption and homophobia. Its members can be distinguished in public by the wearing of stylised Guy Fawkes masks.[7] In its early form, the concept was adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment. Beginning with 2008, the Anonymous collective became increasingly associated with collaborative, international hacktivism. They undertook protests and other actions in retaliation against anti-digital piracy campaigns by motion picture and recording industry trade associations.[8][9] Actions credited to Anonymous were undertaken by unidentified individuals who applied the Anonymous label to themselves as attribution.[10] They have been called the freedom fighters of the Internet,[11] a digital Robin Hood,[12] and anarchic cyber-guerrillas.[13] Although not necessarily tied to a single online entity, many websites are strongly associated with Anonymous. This includes notable imageboardssuch as 4chan, their associated wikis, Encyclopà ¦dia Dramatica, and a number of forums.[14] After a series of controversial, widely publicized protests, distributed denial of service (DDoS) and website defacement attacks by Anonymous in 2008, incidents linked to its cadre members have increased.[15] In consideration of its capabilities, Anonymous has been posited by CNN to be one of the three major successors to WikiLeaks.[16] In 2012, Time named Anonymous as one of the most influential groups in the world.[17] Origins The name Anonymous itself is inspired by the perceived anonymity under which users post images and comments on the Internet. Usage of the term Anonymous in the sense of a shared identity began on imageboards.[14] A tag of Anonymous is assigned to visitors who leave comments without identifying the originator of the posted content. Users of imageboards sometimes jokingly acted as if Anonymous were a real person. The concept of the Anonymous entity advanced in 2004 when an administrator on the 4chan image board activated a Forced_Anon protocol that signed all posts as Anonymous.[14] As the popularity of imageboards increased, the idea of Anonymous as a collective of unnamed individuals became an Internet meme.[18] Anonymous broadly represents the concept of any and all people as an unnamed collective. As a multiple-use name, individuals who share in the Anonymous moniker also adopt a shared online identity, characterized as hedonistic and uninhibited. This is intended as a satirical, conscious adoption of the online disinhibition effect.[19] â€Å"| We [Anonymous] just happen to be a group of people on the internet who need—just kind of an outlet to do as we wish, that we wouldnt be able to do in regular society. Thats more or less the point of it. Do as you wish. Theres a common phrase: we are doing it for the lulz.| †| —Trent Peacock. Search Engine: The face of Anonymous, February 7, 2008.[19]| Definitions tend to emphasize that the concept, and by extension the collective of users, cannot be readily encompassed by a simple definition. Instead Anonymous is often defined by aphorismsdescribing perceived qualities.[2] One self-description, originating from a protest video targeted at the Church of Scientology, is: We are Anonymous. We are Legion. We do not fo rgive. We do not forget. Expect us.[20] Overview â€Å"| [Anonymous is] the first Internet-basedsuperconsciousness. Anonymous is a group, in the sense that a flock of birds is a group. How do you know theyre a group? Because theyre traveling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely.| †| —Chris Landers. Baltimore City Paper, April 2, 2008.[2]| Anonymous consists largely of users from multiple imageboards and Internet forums. In addition, several wikis and Internet Relay Chat networks are maintained to overcome the limitations of traditional imageboards. These modes of communication are the means by which Anonymous protesters participating in Project Chanology communicate and organize upcoming protests.[21][22] A loose coalition of Internet denizens,[23] the group bands together through the Internet, using IRC channels[21] and sites such as 4chan,[21][23] 711chan,[21] Encyclopà ¦dia Dramatica,[24] and YouTube.[3] Social networking services, such as Facebook, are used for to mobilize groups for real-world protests.[25] Anonymous has no leader or controlling party and relies on the collective power of its individual participants acting in such a way that the net effect benefits the group.[23] Anyone who wants to can be Anonymous and work toward a set of goals a member of Anonymous explained to the Baltimore City Paper. We have this agenda that we all agree on and we all coordinate and act, but all act independently toward it, without any want for recognition. We just want to get something that we feel is important done[2] Anonymous members have previously collaborated with hacker group LulzSec.[citation needed] Membership It is impossible to join Anonymous, as there is no leadership, no ranking, and no single means of communication. Anonymous is spread over many mediums and languages, with membership being achieved simply by wishing to join.[26] Commander X and the Peoples Liberation Front A person known as Commander X provided interviews and videos about Anonymous.[27] In 2011, he was at the center of an investigation into Anonymous by HBGary CEO Aaron Barr, who claimed to have identified him as a San Francisco gardener. Interviewed following the attack on HBGary Federal, Commander X revealed that while Barr suspected that he was a leader of the group, he was in his own words a peon. However, Commander X did claim to be a skilled hacker and founding member of an allied organization, the Peoples Liberation Front (PLF).[28] According to Commander X, Peoples Liberation Front, a collective of hactivists founded in 1985, acted with AnonOps, another sub-group of Anonymous, to carry out denial-of-service (DDOS) attacks against government websites in Tunisia, Iran, Egypt, and Bahrain. Explaining the relationship between Anonymous and the PLF, he suggested an analogy to NATO, with the PLF being a smaller sub-group that could choose to opt in or out of a specific project. AnonOps and the PLF are both capable of creating huge Internet armies. The main difference is AnonOps moves with huge force, but very slowly because of their decision making process. The PLF moves with great speed, like a scalpel.[29] On September 23, 2011, a homeless man in California named Christopher Doyon was arrested and stated by officials to have used the Commander X screen name.[30] He pleaded not guilty.[31] Low Orbit Ion Cannon Main article: LOIC The Low Orbit Ion Cannon is a network stress testing application that has been used by Anonymous to accomplish its DDOS attacks. Individual users download the LOIC and voluntarily contribute their computer to a bot net. This bot net is then directed against the target by AnonOps.[32] Joining the bot net and volunteering ones resources for the use of the group is thus one way of being a member, a concept that is otherwise hard to define. The Pirate Bay In April 2009, after The Pirate Bay co-defendants were found guilty of facilitating extensive copyright infringement in a commercial and organized form, Anonymous launched a coordinated DDoS attack against the International Federation of the Phonographic Industry (IFPI), an organisation responsible for safeguarding recording artists rights.[33] When co-founders lost their appeal against convictions for encouraging piracy, Anonymous again targeted the IFPI, labelling them parasites. A statement read: We will continue to attack those who embrace censorship. You will not be able to hide your ludicrous ways to control us. Megaupload On January 19, 2012, Megaupload, a website providing file-sharing services, was shut down by the US Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI).[36] In the hours following the shutdown, hackers took down the sites of the DOJ and FBI, as well as the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and Broadcast Music, Inc. (BMI) using distributed denial-of-service (DDoS) attacks.[37]Barrett Brown, described as a spokesperson for Anonymous, called the attack the single largest Internet attack in [Anonymous] history.[38] With the protests against the Stop Online Piracy Act (SOPA) protests only a day old, Brown stated that internet users were by-and-far ready to defend an open Internet.[38] Although the actions of Anonymous received support,[citation needed] some commentators argued that the denial of service attack risked damaging the anti-SOPA case. Molly Wood of CNET wrote that [i]f the SOPA/PIPA protests were the Webs moment of inspiring, non-violent, hand-holding civil disobedience, #OpMegaUpload feels like the unsettling wave of car-burning hooligans that sweep in and incite the riot portion of the play.[39] Dwight Silverman of the Houston Chronicle concurred, stating that Anonymous actions hurt the movement to kill SOPA/PIPA by highlighting online lawlessness.[40] The Oxford Internet Institutes Joss Wright wrote that In one sense the actions of Anonymous are themselves, anonymously and unaccountably, censoring websites in response to positions with which they disagree.[37] Government websites Anonymous claimed responsibility for taking down government websites in the UK in April 2012 in protest against government extradition and surveillance policies. A message was left on Twitter saying it was for your draconian surveillance proposals.[41] Occupy movement Anonymous activists merged with Occupy Wall Street protesters. Anonymous members descended on New Yorks Zucotti Park and organized it partly. After it became known that some Occupy protesters would get violent, Anonymous used social networking to urge Occupy protesters to avoid disorder. Anonymous used Twitter trends to keep protests peaceful.[42] A similar protest occurred outside the London Stock Exchange in early May 2012 during a May Day Occupy protest.[43] Internet pedophilia Alleged Internet predator Chris Forcand, 53, was charged with child sexual and firearm offenses.[44] A newspaper report stated that Forcand was already being tracked by cyber-vigilantes before police investigations commenced.[45] A television report identified a self-described Internet vigilante group called Anonymous who contacted the police after some members were propositioned by Forcand. The report stated this was the first time a suspected Internet predator was arrested by the police as a result of Internet vigilantism.[46] In October 2011, Operation Darknet was launched as an attempt to cease the activities of child porn sites accessed through hidden services in the deep web.[47] Anonymous published in apastebin link what it claimed were the user names of 1,589 members of Lolita City, a child porn site accessed via the Tor network. Anonymous said that it had found the site via The Hidden Wiki, and that it contained over 100 gigabytes of child pornography. Anonymous launched a d enial-of-service attack to take Lolita City offline. Cyber-attacks and other activities The group is responsible for cyber-attacks on the Pentagon, News Corp and has also threatened to destroy Facebook.[54] In October 2011, Anonymous hackers threatened the Mexican drug cartel known as Los Zetas in an online video after one of their members was kidnapped.[55] In late May 2012 alleged Anonymous members claimed responsibility for taking down a GM crops website.[56] In early September 2012 alleged Anonymous members claimed responsibility for taking down GoDaddys Domain Name Servers, affecting small businesses around the globe.[57] In mid-September 2012, Anonymous hackers threatened the Hong Kong government organization, known as National Education Centre. In their online video, Anonymous members claimed responsibility for leaking classified government documents and taking down the National Education Centre website, after the Hong Kong government repeatedly ignored months of wide-scale protests against the establishment of a new core Moral and National Education curriculum for children from 6–18 years of age. The new syllabus came under heavy criticism and international media attention, as it does not award students based on how much factual information is learned, but instead grades and evaluates students based on their level of emotional attachment and approval of the Communist Party of China, almost in blind brain-washing fashion.[58] Israel In response to Operation Pillar of Cloud in November 2012, Anonymous launched a series of attacks on Israeli government websites. Anonymous protested what they called the barbaric, brutal and despicable treatment of the Palestinian people.[59] Syria On November 30, 2012, the group declared an operation to shut down websites of the Syrian government, in response to a internet blackout the previous day believed to be imposed by Syrian authorities in an attempt to silence opposition groups of the Syrian civil war Reaction from law enforcement agencies Arrests â€Å"| First, who is this group called Anonymous? Put simply, it is an international cabal of criminal hackers dating back to 2003, who have shut down the websites of the U.S. Department of Justice and the F.B.I. They have hacked into the phone lines of Scotland Yard. They are responsible for attacks against MasterCard, Visa, Sony and the Governments of the U.S., U.K., Turkey, Australia, Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand.| †| —Canadian MP Marc Garneau, 2012[67]| In December 2010, the Dutch police arrested a 16-year old for cyberattacks against Visa, MasterCard and PayPal in conjunction with Anonymous DDoS attacks against companies opposing Wikileaks.[68] In January 2011, the FBI issued more than 40 search warrants in a probe against the Anonymous attacks on companies that opposed Wikileaks. The FBI did not issue any arrest warrants, but issued a statement that participating in DDoS attacks is a criminal offense with a sentence of up to 10 years in prison.[69][70] In January 2011, the British police arrested five male suspects between the ages of 15 and 26 with suspicion of participating in Anonymous DDoS attacks.[71] Matthew George, a Newcastle, New South Wales resident, concerned with forthcoming Australian internet filtration legislation, was arrested for his participation in Anonymous DDoS activities. George participated in Anonymous IRC discussions, and allowed his computer to be used in a denial of service attack associated with Operati on Titstorm. Tracked down by authorities, he was fined $550, though he was not fully aware that his actions were illegal, and believed his participation in Operation Titstorm had been a legal form of civil protest. His experience left him disillusioned with the potential of online anonymity, warning others: There is no way to hide on the internet, no matter how hard you cover your tracks you can get caught. Youre not invincible.[72] On June 10, 2011, the Spanish police captured three purported members of Anonymous in the cities of Gijon, Barcelona and Valencia. The operation deactivated the main server from which the three men coordinated DDoS attacks. This particular group had made attacks on the web servers of the PlayStation Store, BBVA, Bankia, and the websites of the governments of Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand. The operation revealed that their structure consisted of cells which at any given time could coordinate attacks through the downloading of software; the decision-making process to attack occurred in chat rooms. The Spanish national police stated that this operation corresponds to the fact that the Spanish government and NATO considers this group of hackers a threat to national security.[73] On June 13, 2011, officials in Turkey arrested 32 individuals that were allegedly involved in DDoS attacks on Turkish government websites. These members of Anonymous were captured in different cities of Turkey including Istanbul and Ankara. According to PC Magazine these individuals were arrested after they attacked these websites as a response to the Turkish government demand to ISPs to implement a system of filters that many have perceived as censorship.[74][75] During July 19–20, 2011, as many as 20 or more arrests were made of suspected Anonymous hackers in the US, UK, and Netherlands following the 2010 Operation Avenge Assange in which the group attacked PayPal, as well as attacking MasterCard and Visa after they froze Wikileaks accounts. According to US officials statements suspects homes were raided and suspects were arrested in Alabama, Arizona, California, Colorado, Washington DC, Florida, Massachusetts, Nevada, New Mexico, and Ohio, as well as a 16 year old boy being held by the police in south London on suspicion of breaching the Computer Misuse Act 1990, and four being held in the Netherlands.[76][77][78][79] On February 28, 2012, Interpol issued warrants for the arrests of 25 people with suspected links to Anonymous, according to a statement from the international police agency. The suspects, between the ages of 17 and 40, were all arrested.[80] On September 12, 2012; Anonymous spokesman Barrett Brown was arrested at his home in Dallas on charges of threatening an FBI agent. Agents arrested Brown while he was in the middle of aTinychat session.[81]

Wednesday, August 21, 2019

Religious Experience is Nothing but Fantasy Essay Example for Free

Religious Experience is Nothing but Fantasy Essay The above criticism to religious belief was proposed by Sigmund Freud; who thought that the origin of relig exp (religious experience) is rooted in the unconscious and that they are a product of eschewed psychosexual development. Freud rejected any appeal to the supernatural to explain these occurrences as our mind regularly deludes itself, pointing to dreams as an obvious example. The materialistic approach to explaining relig exp has led scientists to pinpoint specific physical causes of this phenomena; St Paul of Tarsus is thought to have possessed a form of epilepsy. In this case, Pauls relig exp would be a fantasy but perceived as real experience. A theistic challenge to materialism is that God and organic explanations of religious phenomena. In this way our brains may be wired up to experience God; materialism does not necessarily deem all relig exp fantasy. But how does one explain those who do not experience religious phenomena? Are some people born with Gods calling card? This in my mind is where atheists and theists will never agree; theists will say God only chooses some to be his messengers and atheists will say that our genetics and upbringing predispose some of us to superstition. In this way we cannot know whether each and every religious experience is fantasy; a conclusion reached by Bertrand Russell who reasoned that the fundamental truth that we cannot get inside someone elses head and verify the experience deems this argument irresolvable. William James set out specific criteria for a religious experience. For example, the experience must be transient i.e it is temporary and therefore cannot be sustained. This conveniently prevents science from examining the psychological causes of the experience; further evidence that this argument is irresolvable. James based in conclusions in part on Pragmatism; the doctrine that truth is the acceptable conclusion for whomever concerned; in this sense, religious experiences are very much true to the believer. This would be seconded by Ludwig Wittgenstein who indentified religion as a closed language game; proposing that the experiences are fantasy is not an accepted move and is only know to the outside observer. Ergo, to say religious experiences are fantasy excludes the one accepted explanation upon which religion is based; God did it. The term fantasy is vague; does this indicate a belief that we want to be true and know is false or rather a true deception ourselves. The former seems plausible in the case of Mass Hysteria e.g The Toronto Blessing, where our desire to fit in overtakes our desire to be right; what psychologists call Normative Social Influence. As James pointed out, these psychological explanations do not necessarily reject God. However, they do give us no reason to believe in him via Occams razor (believe in the most simple of the explanations) and thus reckon religious experiences as fantasy. This brings to mind Anthony Flews Death by 1000 qualifications; constantly changing the goalposts for the definition of God so that the eventual result is an idea that possesses no verifiable or falsifiable claim. Thus God cannot be counted in or out of existence, or even on the fence. Kant objected to the term religious experience; calling it a contradiction. How can we experience that which is fundamentally beyond our sensory capacity? We experience people and trees and the world around us because it is finite; as are we. We can level the challenge that we experience the universe, which is infinite, but that we experience finite sections of the infinite set. Similarly we can count numbers but not count to the be it and end all of real of the numbers. God we can experience in short, transient bursts but cannot experience the sum of him; this is not logically impossible. Kants reasoning is not the reason to reject religious experience as fantasy; as with religion there can only be one wholly true explanation of religious phenomena. Only one religion can be wholly true as they make incompatible claims; and so we must dismiss most religious experiences as fantasy. And if we reject most religious experiences, then those remaining must be of the same psychological nature so they too can be dismissed as fantasy. Jamess pluralism is merely another get out clause; another death by 1000 qual which offers no explanation to how faiths are linked, and is infinitely less simple than materialism. In conclusion, not every criticism levelled against religious experience is sound. However, only one is sufficient; that because we can track the experience of God to psycho/physiological phenomena, there is no reason left to believe in God even though the two are not mutually exclusive. Since the debate cannot be resolved ala Russell, we must assume the answer is not the theistic one.

Tuesday, August 20, 2019

Applying change theories on the implementation of an ambulance despatch system

Applying change theories on the implementation of an ambulance despatch system 1. INTRODUCTION Change is inevitable and to enhance the efficiency of the services that a company offers, change is very necessary. The world is changing everyday. This is attributed to the advancement in technology, globalisation in addition to many other factors. There is an incentive for all business and economic institution to change in order to benefit from the advancement in information technology. This is one of the factors that motivated the Metropolitan Ambulance Service (MAS) in Melbourne to implement a state of the art emergency despatch and communication system in 1994. In the late 1980s, the MAS received criticism based on poor ambulance response times(Darren,2004).In an average day, MAS ambulances attends to more than 600 medical emergencies and are also involved in transporting around 400 patients(Darren, 2004). Therefore, the decision to improve previous system as a result of delays is acceptable and necessary to provide a timely, appropriate, and professional response to all calls f or emergency assistance (Darren, 2004). However, the underlying decision to implement this system and the strategies utilised to implement this information system affected the efficiency to deliver desired services. The new CEO, John Farmer, intended to change the way the MAS operated through the utilisation of computer technology in two areas: management of emergency calls and management of finances (Darren, 2004). This decision in conjunction with politics and other strategies were the catalyst for the failure to implement change in the MAS. This paper is set to analyse the case study written by Prof Darren Dalcher in 2004 (Emergency: Implementing an Ambulance Despatch System).The case study highlights the story of the problematic implementation of a computerised despatch system for the Metropolitan Ambulance Service (MAS) in Melbourne, Australia(Darren, 2004). The aim of this paper to analyse how information system implementation approaches, resistance theories and change theories such as Lewins Three Step Change Theor y, Lippits phases of change Theory and the Social Cognitive Theory can be applied to the case study to bring about necessary changes. 2.LITERATURE REVIEW The literature review is divided into 3 sections. The first section explains the four approaches designed for implementing I.T systems. The second section explains resistance theories. The third section explains change theories. 2.1 There are four approaches available for implementing an I.T information system. These approaches include 2.1.1 Plunge approach: The plunge approach means implementing a system in an urgent fashion, by ending the previous system at a particular day and starting the new system the next day. This approach minimises transition cost and operation cost. However, the plunge approach is risky and could easily lead to system failure. (Efraim Linda, 2010, p 533) 2.1.2 Parallel approach: The parallel approach means operating the old and the new system at the same time. Although the parallel approach is costly to operate, it is beneficial in the long run because major problems about the new system would have been identified and solved. If the new system fails, the old system acts as a backup for achieving the corporate goal. (Efraim Linda, 2010, p 533) 2.1.3 Pilot approach: The pilot system means operating the new system in another geographical area or a specific branch of the organisation in study. Conducting the pilot study to examine the impact of change will avoid unseen complications (Anderson,1985). 2.1.4 The phased approach: The phased approach is applicable to both parallel and plunge approach. It focuses on implementing every module or version of the system as it is developed and tested. Efraim Linda, 2010, p 533).The cost of application varies with the methodology. (Efraim Linda, 2010, p 533) 2.2 Resistance theories: 2.2.1 The people oriented theory: The people-oriented theory suggests that resistance to systems is created by factors internal to users as individuals or groups.( James, Waleed, and Gary (1999)). Gardner, Dukes and Discenza (1993) supports the notion that certain characteristics (e.g., age, gender) as well as varying background, value and belief systems contribute to an individuals attitude towards technology. 2.2.2 The system oriented theory The system-oriented theory posits that resistance is induced externally by factors inherent in the design of the system or the technology being used (James, Waleed, and Gary (1999).Such factors include user interface and other systems characteristics (e.g., realization of requirements, performance, reliability, and the degree of centralization, distribution, or decentralization)( James, Waleed, and Gary (1999). 2.2.3 The Interaction oriented theory: The interaction theory explains that systems acquire different political and social meaning in different settings and that different users perceive the effects of the same system differently ( James, Waleed, and Gary ,1999). Resistance may, for example, manifest itself as a result of shifting power relationships (James, Waleed, and Gary ,1999). 2.3The change theories 2.3.1 Kurt Lewins planned change: The Lewins planned change theory argues that planned change occurs by design where each and every process is planned. This is as opposed to spontaneous change or change by accident. The status quo is disrupted and results into some imbalance of forces. The two forces that are mostly present are the driving force and the restraining force. The driving force acts as a motivator in motion towards a positive direction or a goal that has been set. The restraining force opposes the movement towards a destined goal. When the opposing forces are overcome, another equilibrium position is reached (Bessie, 2003: p.167). The three phases that are identified include: unfreezing the status quo, attaining a new state (moving) and refreezing to make the change permanent. The first steps are informing stakeholders of the required change and agree on the importance of the change. According to Miller (1982) one of the most difficult tasks is getting people to accept a change. Change is challenging and the stakeholders or users may feel as if they have lost control of everything but it is important to encourage them. The individuals will then take time to implement the real change. This might take quite sometime but the process should be gradual. Freezing makes the process to stabilize and the process can now be implemented into the system. 2.3.2 Lippits Phases of Change Theory In Lippits Phases of Change Theory, an extension of the Lewins Change Theory is done. Seven steps are developed that focus more on the change agent than on the change itself. This involves exchange of information throughout the process. The change begins by a diagnosis of the problem and then checking the motivation that the change will bring and the capacity of the change to make a difference from the current situation. The change agent should also be examined so as to decide if the necessary capacity that is required is available (Alicia, 2004: p.1). The strategies that will be used to accomplish the change are chosen and each agent of change is assigned and alerted of the changes that are expected from his part. Experts and facilitators may be required at this stage and may be part of the change agents. The institution implementing the change should ensure that the change is maintained. This can be achieved by efficient communication, coordination and feedback on every activity th at takes place. When the change has been implemented and the employees have adopted the new culture, the change agent can now withdraw from the process. 2.3.3 Social cognitive theory: According to the social cognitive theory, individuals can change their behaviours depending on the environmental factors that surround them, the personal factors of the individuals and the attributes of the behaviour itself. The individuals must believe that they have the capacity to perform the new behaviour and they must also see the importance of adopting the new behaviour. If the individuals see the consequences of the behaviour to be positive, they will be willing to adopt the new behaviour and vice versa. This means that social learning will take place where the individuals can perceive the positive expectations to outdo the negative expectations (Alicia, 2004: p.1). If the individuals can visualize the positive benefits and see the importance of the change, they are likely to be motivated and to have more morale to carry out the changes in the behaviour. Self-efficacy is the most important aspect in this process and can be increased by: giving clear instructions that will allo w the change to be achieved, providing proper training that will enable the individuals to develop the skills required for the change to be achieved and trying to model the desired behaviour. 3. Analysis of the Case Study The MAS was established at the end of the nineteenth century. The aim was to offer emergency medical transport especially in transporting patients in critical conditions to hospitals as fast as possible. They offer first aid services to individuals that require the first aid services as they move them to places where they can be attended to. They provide first aid education to the public for free and in addition, they provide special facilities that can be used by individuals who require these special transport services in order to get to the hospital. In the late 1980s, MAS experienced intense criticism with the press analysing major events where the companys response to calls was very poor. The private sector had also tried to become very active and had started actively competing with the MAS. The financial status of the MAS had also been very poor. The service was recording losses every year. The relationship that existed between MAS management and the ambulance unions was not good. Many strikes, mistrust and tensions had always prevailed in the region and the media produced some articles on how the ambulance had been inadequate in dealing with some cases. In 1992, it was found that MAS was using some systems that were not integrated in terms of technology. As a result, the new government which was elected was concerned with the way the service was using the finances that the government had allocated to it. A review that was formed in 1992 to address the issue concluded that the MAS should restructure its management and structu re so that it could focus on improved technological systems so that the dispatch of ambulances could be strengthened. A John farmer was elected as the CEO and he wanted to use computer technology in managing emergency calls and in the management of finances. X-consultants were given the contract for providing the emergency system and were offered about $A32 million by the Victoria State Government. In 1994, the media produced records of delays by the company and the deaths that occurred as a result of those delays (Darren, 2004: p.1). The implementation strategy was flawed from the start because stakeholder had different objectives. The means the government was more focussed on reducing cost than employing the right agent for the project. The X-consultants agreed to an unrealistic timeframe in which to introduce the system (Darren, 2004). Implementation was scheduled to proceed in a Big Bang manner, with a switch over to the full system scheduled for 24 August 1995(Darren, 2004). The timeframe was obviously too short for the information system to be developed, tested and reviewed for further corrections. The fixed deadline imposed by the clients, without negotiation, became a major constraint on the project and proved to be a difficult hurdle for X-consultants (Darren, 2004). The CEO decided to use the plunge approach in implementing the new system in order to reduce cost. The methodology backfired and resulted into the failure of the new system. Other approaches such as parallel, pilot and phased approach should have been considered. Although these other approaches will not necessary minimise cost, the pace of the system implementation would have allowed for adjustment period to the new system (Zuboff, 1988). By May 1995, it became clear that X-consultants were unable to meet contract deadlines, while the media uncovered evidence of frequent system shut downs. (Darren, 2004). MAS officers began complaining to X-consultants and a heated row developed between the two organisations. (Darren, 2004).The obvious truth was that the ambulance union would have liked their members to do the despatching, rather than non-paramedic X-consultants civilians. (Darren 2004).This means the importance of the change has not been properly communicated. Resistance had developed within the organisation because MAS was not consulted about the need for change. The change was enacted by force instead by consultation from the stakeholders and users. The trade unions were ignored instead of been consulted to process change. The government and the CEO did not recognise the inability of sophisticated technology to overcome human and organisational issues(Darren, 2004). The government in conjunction with the CEO should have appropriate strategies to promote acceptance of the information system. They should have Involve employees in development of new systems to encourage a feeling of ownership (Mumford, 1979). Open lines of communication between employees and management should have been established (Land, 1992).The employees should be provided with information regarding system changes to preserve ownership (Jager, 1994). Morale-boosting activities should have been initiated, for example, company parties and newsletters, to promote community (Nord and Tucker, 1987). Standards could have been documented so new procedures are easy to learn and reference (Nord and Tucker, 1987). The CEO should have established in advance the demarcations of authority that will exist following changeover to clarify role definitions (Martinsons and Chong,1999). The CEO could have upgrade work environment following change e.g. more space and design for comfort, to improve atmosphere (Swanson, 1988). Job titles could have been altered to reflect increased responsibility to clarify job roles (Rivard, 1984). Show sympathy and be receptive to complaints following conversion to maintain user contact and trust ( Nord and Tucker,1987). Conduct orientation sessions to prepare for change (Rivard, 1984).Give job counselling to help users adjust (Holmes and Holmes, 1970). Organize group therapy to help users adjust (Hussain and Hussain, 1984). Retrain employees to be effective users of the new system (Aggarwal, 1998) According to Lewins planned theory, the first process that ought to have been discussed was if the change to privatise and outsource the emergency despatch system was necessary. If it was found to be necessary, the process of convincing the MAS of the importance of the change would begin. This would have taken sometime but at the end of the day, the individuals would have been convinced and would have embraced the need for change. The next process would have been identifying the driving forces and the restraining forces. When all these are identified, the goals that are destined are identified (Bessie, 2003: p.168). This will help in identifying the methods that will be used in achieving the corporate goals. The government together with the MAS could have sat down and negotiated on the requirements that would result in efficient distribution of the emergency services. Different companies that would have supplied the requirements would have been identified and the best one chosen. Th e barriers towards achieving these goals would also have been evaluated and ways of overcoming them designed. In unfreezing the status quo, the management together with some government officials will think of the specific areas that need change and these areas will eventually be destabilized. This will call for some processes that will involve the planned changes. The time that will be taken to establish the change may also be noted so that people may work and dedicate their efforts towards achieving the greater goal (Bessie, 2003: p.313). Much resistance should be expected as usual since some individuals will view the change as being stressful and may seem to lose focus. Reaching the equilibrium is not that easy and every member should be determined to make a change. This way, it will take less time to reach the destined goal. In dispatching the system, resistance is one of the expectations as individuals are not trained in working with computers and especially in the new software. The best training should be given to employees to ensure that they are confident in working with the new system. Appropriate software also ought to be developed so that there is no confusion in the software. The Lippits Phases of Change Theory could also have been used to address the issues that existed in the case study. Before taking any action, the government ought to have taken sometime to sit down with the MAS and see if there was a way that the problem could have been solved by making some changes. The first necessary process could have been diagnosing the problem and knowing why there were delays in releasing the ambulances that led to the death of many people. If a change was deemed fit for the process such as the proposed use of computers in call taking, the motivation and capacity for change could have been necessary before implementing it. Some agents like facilitators and experts could have been identified to help in the process of change. Determination of the capacity of the change agent to attain the required change is also necessary when using the Lippits Phases of Change Theory (Alicia, 2004: p.1). The power, stamina and commitment to change are important and therefore, the company should be very keen in selecting the change agents. The strategies that were to be used to help accomplish the change could have been identified and the change agents assigned the roles that they should play in the process. Proper communication between the change agents and the members of the company is necessary as it will allow the members to get the details about the change. 4. Conclusion The Victoria government in conjunction should have applied better I.T information system implementation approaches and better strategies to implement acceptance. Before proposing change, an analysis ought to have been done to determine if the change was necessary and if the capacity for change was available. Most of the processes failed because the companies together with the government never attempted to analyze the problem in hand before proposing the change. Again, after proposing the change, no analysis was done to see if the implementation of the change was possible and if so, whether the change would have any impact on the current process. References Alicia, K. (2004). Comparison of Change Theories. Retrieved on 19-Nov-09 from http://www.nationalforum.com/Electronic%20Journal%20Volumes/Kritsonis,%20Alicia%20Comparison%20of%20Change%20Theories.pdf Anderson E.F (1985). Managerial considerations in participative design of MIS/DSS, Information Management 9(4) pp. 201-207 . Aggarwal A.K (1998). End user training revisited, Journal of End User Computing 10(3) pp. 32-33. Bandura, A. (1986), Social Foundations of Thought and Action: A Social Cognitive Theory, Prentice-Hall, Englewood Cliffs, NJ Bessie, L. M. (2003). Leadership Roles and Management Functions in Nursing: Theory and Application. London: McMillan Publishers, 166-172. Becker, L. K. (2003): Related Risk of injury and death in ambulances and other emergency vehicles. Cambridge: Cambridge University press, 231-233. Darren, D. (2004). Emergency: Implementing an Ambulance Despatch System. UK: IDEA Group Publishing. Retrieved on 18-Nov-09 from http://www.infoscijournals.com/downloadPDF/pdf/IT5715_ZFAV6bdOJK.pdf Efraim, T. Linda, V. (2010): Information technology for management: Transforming organizations in the digital economy: 7th edn. Asia: John Wiley and sons. Geoff, C. (2009): The medical Priority and Dispatch System. Retrieved on 18-Nov-09 from http://www.emergencydispatch.org/articles/ArticleMPDS%28Cady%29.html Gardner D.G. Dukes R.L., Discenza R. (1993).Self-confidence and attitudes: a causal analysis, Computers in Human Behavior 9(3) pp. 427-440. Holmes T.S Holmes T.H (1970): Short-term intrusions into lifestyle routines, Journal of Psychosomatic Research 14 pp. 121-132. Hussain D. Hussain K.M (1984): Information Resource Management, Irwin, Homewood, IL. Henry, S. (1994). The origin of medical terms: Baltimore: Williams and Wilkins Jager P.de (1994): Communicating in times of change, Journal of Systems Management pp. 28-30. James, J.J., Waleed, A.M Gary, K. (1999): â€Å"User resistance and strategies for promoting acceptance across system types† Information management, 37(2000), pp 25-36. Lex, D. (2000): American Anti-Management Theories of Organization: A Critique of Paradigm Proliferation, 312-314. Land F.F (1992) .The management of change: guidelines for the successful implementation of information systems, in A. Brown (Ed.), Creating a Business-based IT Strategy, Chapman Hall, London, UK, pp. 145-157. Lippitt, R., Watson, J. and Westley, B.: The Dynamics of Planned Change. New York: Harcourt, Brace and World, 1958 Mumford E. (1979): Human values and the introduction of technological change, Manchester Business School Review 3(2), pp. 13-17. Mumford E. (1981): Participation -what does it mean and how can it be achieved, Manchester Business School Review 5(3) pp. 7-11. Mumford E. (1993): The ETHICS Approach, Communications of the ACM 36(6) pp. 82. Melanie, N. (2002): Theoretical Basis for Nursing. New Jersey: Princeton University Press, 369-373. Miller, D. Friesen, P. (1982): ‘Innovation in conservative and entrepreneurial firms: two models of strategic momentum: Strategic management journal, vol3, pp. 1-25. Martinsons M.G Chong P.K.C (1982): The influence of human factors and specialist involvement on information systems success, Human Relations 52(1) (1999), pp. 123-152. Nord W.R. Tucker S.(1987). Implementing Routine and Radical Innovation, Lexington, Lexington Books, MA. Phillip, J. (2004). Ford to gasoline ambulance in 2010 Rivard S. (1984): Successful implementation on end-user computing, Interfaces 17(3) pp. 25-33. Swanson E.B (1988). Information systems implementation: bridging the gap between design and utilization, Irwin, Homewood, IL. Tony, B. (2004): The Principles and Practice of Educational Management. New York: Sage Publishers, 123-124. Zuboff S. (1988). In the Age of the Smart Machine: The Future of Work and Power, Basic Books, New York.

Monday, August 19, 2019

Deer Hunting Essay -- Process Essays

  Ã‚  Ã‚  Ã‚  Ã‚  Many people have misconceptions about hunting. One such misconception is that hunting is easy and any person can go sit in the woods and wait for an animal to cross the hunter’s path. However, people who believe this are sorely mistaken. Hunting is not just sitting in the woods with a rifle; there are many other aspects that must be considered. An individual must have all preparations complete, purchase or gather the equipment needed, and know what to listen for while in the woods.   Ã‚  Ã‚  Ã‚  Ã‚  First, an individual must get prepared for the beginning of the deer-hunting season. Contact your local parks and wildlife organization to find out the rules and regulations for that particular season, the dates for the season, and bag limits. Once you have gathered this information, go to any sporting goods or hardware store to purchase a hunting license. A combination hunting and fishing license usually costs around $55. In preparing for the season, you also need to find a hunting club or lease. When looking for a hunting club or lease, it is important to find an area that has plenty of hardwoods and a water source; otherwise you will be wasting your time. Now that you have found the club or lease that is right for your hunting needs, there are dues that are owed to your club or lease and the clubs or leases own rules and regulations that need to be gone over. Since, the rules and regulations, club or lease, and license are taken care of, you need to figure out what type of equi...

Amendments to the Constitution Essay -- First Amendment, Second Amend

The framers of our Constitution knew that time has a way of changing countries and their citizens. Our country was in a whirlwind of change in 1789 as people were experiencing freedom from the tyranny of England for the first time in their lives. Our country was being molded and formed into a great nation by the founding fathers. Expectations and rules had to be set to protect the rights of the minorities and majorities. Amendments to the Constitution were written to ensure equality for all in changing times. The First Amendment is one of the most recognized rights in the Bill of Rights. It is a basic right that seems to help define each person as an individual yet as part of an association. The amendment states that â€Å"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances† (Constitution, Amendment 1) This amendment gave the right to secure and practice any religion. Religion was the reason that the Puritans left England. They wanted to be free to start their own churches and be free from religious persecution. The first amendment allows individuals the right to be part if any religion, if any, of their choosing. The vast majority of religious associations attest to this amendment: Catholics, Protestants, Scientologists, Jews, Hindus, and many, many more. United States citizens also enjoy the right to express themselves and their opinions in printed form or verbally. This is known as the freedom of the press. There are restrictions within reason, such as restrictions on libel and slander, and obscene act... ...ad a ban on handguns for 32 years. The ruling states that the Second Amendment guarantees the individual right to posses a firearm, even if they have no connection to a military organization, as long as the firearm is for law abiding reasons, such as self-defense in the home. (Fields, 2010). The First and Second Amendments will forever be ‘contemporary issues’. The rights that are guaranteed to us are the same ones that allow us to question our government and allow for change. It will be a challenge for our courts to keep up with the changing times yet keep our rights intact. These rights are part of the foundation of our society. The framers had insightful intent to include the basic rights of all people for generations. Our great nation has flourished because of these rights- they allow each all of us to be unique individuals while being completely whole.

Sunday, August 18, 2019

One Tear That Meant the World :: essays research papers

I have always enjoyed having a best friend that was male. Whether we were swimming, jogging, fishing, or just talking for hours, I never got bored. We balance one another. I will never forget the day I lost that all. The day my best friend left ended up touching me the most.   Ã‚  Ã‚  Ã‚  Ã‚  When I stepped outside, the pavement felt like ice, yet the air had a warm breeze to it. It was a gorgeous August day. Not a single worry mingled in the air. The birds were chirping long, beautiful melodies. Melodies I had heard many mornings that summer. They sang when it was going to be a wondrous day. Nothing seemed wrong to anyone except to me. Today, my birthday, August first, my best friend was leaving for the Navy. He was going to serve our country. For six dreadful years, I’d have to live without him. The only communication would be a few cards and letters and one long distance call. This day reminded me of those long rainy days, the days where the clouds blocked out the suns bright rays of sunlight.   Ã‚  Ã‚  Ã‚  Ã‚   The clock finally struck four and it frightened me because the sweet sound of the clock seemed loud and harsh. It sounded kind of like I was in a horror movie. I dreaded walking across the street to say good bye to my dear friend, but I knew I had to go. As I walked across the street it seemed like a mile. My legs ached and my throat was dry. I could hear the pattering of my feet on the pavement and the thud of my heart racing about ninety miles a minute. I just wanted to run up to him and beg him to stay, but I knew I couldn’t do that. I finally walked up to him and started to cry. I cried as though I had lost someone close to me, but I hadn’t. There was a part of me that was dying. My heart was aching and I couldn’t stop it. I hugged him for five minutes, but it only seemed like seconds. My tears started to disappear. He let me know how much he’d miss me and how he couldn’t believe he was leaving. I could feel the tears starti ng to come again, but I kept them in. I knew there was something I wanted to say, but I couldn’t.

Saturday, August 17, 2019

Elements of a State and Philippine Constitution Essay

State A community of persons more or less numerous, permanently occupying a definite portion of territory, independent of external control, and possessing an organized government to which the great body of its inhabitants render habitual obedience (De Leon, 2000). The Philippines is a state. Elements of a State The first element of a state is the people, which is known to be the most essential and indispensable element of a state. This is the mass of the population, or the number of people living within the state. There is no specific number of people required living within a state so that it could be called a state. The second element is the territory, which is the established area that rightly belongs to the people of the state. This is the aerial (air), terrestrial (land), fluvial (stream/river), and maritime (water) domains of the state. The third element is the government, which is the agency to which the will of the state is expressed, created and administered. This is a group of people or institutions which run and rule the society. The fourth element is the sovereignty, which is known as the supreme power of the state to command and enforce obedience its will from the people. Territory According to Article One, National Territory, of The 1987 Constitution of the Republic of the Philippines: â€Å"The national territory comprises the Philippine archipelago, with all the islands and waters embraced therein, and all other territories over which the Philippines has sovereignty or jurisdiction, consisting of its terrestrial, fluvial and aerial domains, including its territorial sea, the seabed, the subsoil, the insular shelves, and other submarine areas. The waters around, between, and connecting the islands of the archipelago, regardless of their breadth and dimensions, form part of the internal waters of the Philippines.† This means that all the area that is encompassed by 185 kilometers (100 nautical miles) from the Philippine shore, under the seabed even, is a territory of the Philippines. This is sometimes also known as the â€Å"Philippine Area of Responsibility†, a term used by PAG-ASA and other weather agencies to determine for example, if a typhoon or a Low Pressure Area has entered our territory. Constitution of the Philippines The constitution of the Philippines is the most important part of a state. The national territory and all the fundamental laws- the set of rules and principles- can be found here.  The Constitution also enunciates state principles and policies. Among the principles and policies embodied in the Constitution are: (1) Sovereignty of the people; (2) Renunciation of war as an instrument of national policy; (3) Supremacy of civilian authority over the military; (4) Service and protection of the people as the prime duty of the Government; (5) Separation of Church and State; (6) Guarantee of human rights; (7) Separation of power among the various branches of governments; and (8) Autonomy for local government units. One of the central components of the Constitution is the Bill of Rights, which declares and enumerates the basic rights and liberties of the people which the government (or any person) is forbidden to violate or encroach upon. Among the rights granted by the Constitution are: (1) Due process of law and equal protection; (2) Right against unreasonable search and seizure; (3) Right of privacy; (4) Freedom of speech, of expression, and of the press; (5) Freedom of religion; (6) Liberty of abode and travel; (7) Right to information on matters of public concern; (8) Right to form associations for purposes not contrary to law; (9) Right to a just compensation when private property is taken for public use; (10)  Right against impairment of contract; (11) Freedom of access to the courts; (12) Rights pertaining to persons under investigation; (13) Right against excessive bail; (14) Rights of the accused in criminal cases; and (15) Right to speedy disposition of cases. It has been revised seven times, starting from The 1899 Malolos Constitution, which was approved by then President Emilio Aguinaldo on December 23, 1898 and promulgated on January 21, 1899, and then the Philippine Organic Act of 1912 enacted into law by the United States Congress on July 1, 1902. Next was The Jones Law of 1916, enacted into law by the United States Congress on August29, 1916, followed by The 1935 Constitution, which was approved by the 1934 Constitutional Convention on February 8, 1935, certified by the President of the United States on March 25, 1935, and ratified by plebiscite on May 14, 1935. This was amended two times, on June 18 1940 and March 11, 1947. The 1943 Constitution, was approved by the Preparatory Committee on Philippine Independence on September 4, 1943 and ratified by the KALIBAPI convention on September 7, 1943. Following this is The 1973 Constitution, which was proclaimed in force by Proclamation by then President Ferdinand Marcos on January 17, 1973. This was amended three times, on October 16-17, 1976, January 30, 1980 and April 7, 1981. The present constitution, which is The 1987 Constitution, was first presented to then President Cory C. Aquino as The 1986 Freedom Constitution on October 15, 1986. This was approved by the Constitutional Commission on October 12, 1986. It was ratified by a plebiscite on February 2, 1987 and proclaimed in force by February 11, 1987. References: Pacaway, J. (2014, July 4). Philippine government with 1987 constitution. Retrieved from http://www.slideshare.net/anjanet2/philippine-government-with-1987-constitution Philippine Constitutions | Official Gazette of the Republic of the Philippines. (n.d.). Retrieved from http://www.gov.ph/constitutions/ Salinas, S. (2013, December 16). Concepts of state and government. Retrieved from http://www.slideshare.net/sarahsalinascatwoman/concepts-of-state-and-government-29249128 THE 1987 CONSTITUTION OF THE REPUBLIC OF THE PHILIPPINES – ARTICLE I | Official Gazette of the Republic of the Philippines. (n.d.). Retrieved from http://www.gov.ph/constitutions/the-1987-constitution-of-the-republic-of-the-philippines/the-1987-constitution-of-the-republic-of-the-philippines-article-i/ The History and Evolution of the Philippine Constitution | Law | Jcmiras_03. (2014, August). Retrieved from http://www.pinoysites.org/jcm/item/12/ The Constitution of the Philippines: An Overview | Herald Digital Law Philippines. (2011, February 1). Retrieved from http://philippineslaw.wordpress.com/2011/02/01/the-constitution-of-the-philippines-an-overview/