Wednesday, October 30, 2019
Developing Management skills - 8th edition david a Whetten & Kim s Essay - 2
Developing Management skills - 8th edition david a Whetten & Kim s cameron - Essay Example ensation rewards and organizational goals will make employees take full control of their jobs hence improving their efforts and overall job performance. According to Navistar Internationals incentive plan, the plain aims at enabling the organization and its affiliated company subsidiaries to attract and retain employees with high qualifications and skills. Additionally, the companyââ¬â¢s incentive plan aims at attracting consultants and non-employee directors who have exceptional skills in the operation of the company (Whetten and Cameron 90). The company is focused on providing its key employees occupying major positions an opportunity to earn incentive awards in line with the quality of their individual performance and achievement of performance goals. In line with the above mentioned organizational goals, the company has designed a number of compensations for its different categories employees. The company has different levels of employees defined by their tasks and responsibilities (Whetten and Cameron 95). The awards for performance depend on the performance of employees and their level of employment as stated earlier on. The objective of the company is attracting and retaining exceptional talent through attractive compensation packages. The incentive plan for the company is designed in such a way that employees with greater responsibility receive higher compensation compared to employees with less responsibility. This is because employees with greater responsibility have higher skills and talents and the organization is keen in attracting and such a group of employees in order to improve and maintain good performance. The organizationââ¬â¢s incentive plan is based on pay-for-performance. The organization provides for the establishment of a committee that is responsible for the evaluation of employee performance and recommendation for compensation. Since the organization aims at attracting and retaining exceptional talent and skills, the pay-for-performance
Monday, October 28, 2019
Social Impact of Cybercrime
Social Impact of Cybercrime Cyber criminals take full advantage of the anonymity, secrecy and interconnectedness provided by the Internet, therefore attacking the very foundations of our modern information society. Cyber crime can involve botnets, computer viruses, cyber bullying, cyber stalking, cyber terrorism, cyber pornography, Denial of Service attacks, hacktivism, identity theft, malware and spam. Law enforcement officials have struggled to keep pace with cyber criminals, who cost the global economy billions annually. Police are attempting to use the same tools cyber criminals use to perpetrate crimes in an effort to prevent those crimes and bring the guilty parties to justice. This essay begins by defining cyber crime, and then moves to a discussion of its economic and social impacts. It continues with detailed excursions into cyber bullying and cyber pornography, two especially representative examples of cyber crime today, and concludes with a discussion of ways to curtail the spread of cyber crime. Computer-related misdeed designated days back to the sources of computing itself, though the larger connectivity between computers through the Internet has conveyed the notion of cyber misdeed into the public consciousness of our data humanity, where it continues at the start of the 21st century. In 1995, when the World Wide Web was in its very early phases of development, futurist Gene Stephens composed about the present and future truth of cyber misdeed then made some predictions: Billions of dollars in deficiency have currently been discovered. Billions more have gone undetected. Trillions will be thieved, most without detection, by the appearing expert lawless individual of the twenty-first 100 years the cyberspace offender (Stephens, 1995, p. 24). Reflecting on his propositions in a 2008 item, Stephens documented that he and other ones foresaw much of the cyber misdeed to come: I rightly outlook an blast of mobile telephone time robbery and telephone fraud; expanded cyber attacks and deception contrary to government and business; huge borrowing business card robbery and fraud; interior robbery of clients persona by financially laboring and/or hungry economic service employees; more cyber porn, cyber stalking, cyber harassment, and cyber vengeance; and the use of biometrics and encryption as procedures of defending facts and numbers in cyberspace (Stephens, 2008, p. 33). Media accounts since the 1990s have documented the numerous procedures by which lawless individuals have utilized the Internet to consign crimes. Cyber thieves have become accomplished at utilizing the anonymity and secrecy of the Internet to defraud their victims of their cash, their calm of brain and really even their lives. When victims let their guard down by muting a wholesome skepticism and caution, cyber misdeed takes place. As one FBI representative documented, The scammer endeavors to prey on victims who are kind of in melody with whats going on in the world. The con alterations, but finally theyre preying on the good will of people (quoted in Simmons, 2008). The Extent of Cyber Crime Law enforcement agents have labored to recognize, apprehend, and prosecute these tech-savvy lawbreakers, even as sociologists have searched to get to the origin of cyber crime. The U.S. Federal Bureau of Investigation (FBI) has dedicated cyber squads at each of its 56 area agencies over the US [that] support 70 cyber task forces nationwide, endorsed up by international understanding accumulating by its Internet Crime Complaint Centre (Heath, 2008). The area of cyber misdeed has generated the area of cyber criminology, characterized as the study of causation of misdeeds that happen in the cyberspace and its influence in the personal space (Jaishankar, 2007, p. 1). The scope of cyber misdeed continues really staggering, and it extends to grow. In 2007 solely, the U.S. finances lost $240 million to cyber misdeed (2007 Internet Crime Report, p. 1), up $40 million from 2006, though the genuine dollar allowance might be substantially higher because the report only followed situations described to regulation enforcement. According to one Internet security business, cyber misdeed is $200 billion commerce, rivaling the illegal markets for pharmaceutical trafficking and cash laundering (Swartz, 2008, par. 2). In Europe, almost one quarter of computer users in the European Union described that they had been victims of cyber misdeed (National Economies, 2008). As more and more persons have utilized the Internet to manage their buying, broadcasting, banking and account giving, they have become goals for cyber criminals. There are common-sense steps that can avert or decrease having ones borrowing business card data thieved online, as well as to bypass other scams and risks, but cyber misdeed in these localities perseveres mostly due to a need of buyer education. Some diversity of cyber misdeed, for example hacktivism, is ostensibly inspired by noble aims, for example dispute contrary to seen misuses by authorities and corporations. Often these attacks engage posting remarks on authorized government websites and are not inspired by a yearn for monetary gain. However, other types of cyber misdeed have a much more brutal intent. These encompass cyber stalking, cyber bullying and cyber terrorism. Cyber Crime the Society While the financial influence of cyber misdeed is after argument, rather less vigilance has been granted to the communal significances of cyber crime. Psychologists and psychiatrists can assist victims contend with the fallout from persona robbery, sexy misuse or economic wreck, while sociologists are well-positioned to gaze at the broader communal influences and interpretations of cyber crime. Cyber misdeed attacks the very bases of up to date, technological societies, compelled up as they are with the fast flow of computer facts and numbers helped by the Internet. At the most rudimentary grade, cyber lawless individuals often take benefit of technologically unsophisticated persons who nonetheless find themselves in a world where the Internet performances an progressively centered function in both groups and in personal lives. Cyber misdeed counts, at this grade, on the proficiency of those who are more technologically complicated to use that information to knack other ones into submitting crucial data, for example their bank account data or Social Security number. While it is likely in some positions for the casualty of cyber misdeed to refurbish thieved cash or even their individual online persona, the happening often departs the casualty traumatized and profoundly doubtful of the Internet and other trappings of up to date life. In this way the cyber lawless individual d eprives his or her casualty of numerous of the conveniences of todays data economy. Experts in cyber misdeed have documented that its influence happens on multiple levels. First, on a solely financial grade, cyber misdeed engages the robbery of millions, possibly even billions, of dollars every year. In supplement, cyber misdeed needs persons and organizations to take on the supplemented cost of security programs and other entails by which to block the cyber criminals. Cyber-bullying Cyber-bullying can best be recounted as the elongation of personal bullying in cyberspace. However, the one-by-one often is not bodily assaulted, but rather psychologically harassed. Perhaps not amazingly, cyber bullying most often takes location inside assemblies most probable to be attached to internet, in specific teenagers and other juvenile adults. According to a 2007 review by the Pew Internet American Life Project, 32 per hundred of American teens described being victims of cyber bullying (Lenhart, 2007). Cyber bullying is characterized as the undertaking by which an one-by-one or assembly of persons is aimed at for abusing, attack or intimidating notes dispatched through wireless telephones and other Web-connected devices. According to cyberspace professional Parry Aftab, Cyber-bullying is when one progeny or teen goals another for humiliation, humiliation, worry, blackmail. Something conceived to injure the other utilizing an interactive technology. Thats made a large-scale distinction because children have wise that they can use the internet as a weapon (quoted in Battling the online bullies, 2008). Sometimes cyber bullying extends and expands a battle or contradiction that takes location at school, a party or in some other communal situation. In the attitude of numerous victims and professionals, cyber bullying is poorer than in-person bullying because the perpetrators can conceal behind a cloak of anonymity supplied by the Internet. Two victims of cyber bullying expressed the harshness of the tactic: Its rougher over the internet because they dont have to glimpse your answer when they state those signify phrases to your face. So over the internet youre more probable to state the meanest likely things you can state, and then you dont even lament it, said cyber-bully casualty Abby. I would get notes on IM [Instant Messenger] and they would be youre actually mean or youre ugly, until I just couldnt take it any more, states Ralph who was furthermore a casualty of cyber-bullying (quoted in Battling the online bullies, 2008). A distracting elongation of cyber bullying happens when personal assaults, for example rapes, and are dispatched online. The aim is to display the power and command of the perpetrators over the casualty or victims, as well as to disgrace and humiliate them. A associated perform is announcing photographs, telephone figures and other individual data about the cyber bullying casualty on certain websites. The trauma sensed by victims of cyber bullying is very genuine, and it often exacerbates preexisting insecurities sensed by juvenile persons going through adolescence. There has been not less than one described example of a cyber bullying casualty committing suicide after pain unrelenting attacks (Pokin, 2007). Given the expansion of Web-enabled apparatus, parents, progeny supports, political leaders and regulation enforcement agents are unsure about how to decrease examples of cyber bullying. Some suggested answers encompass more parental engagement in their childs online undertakings, for example texting and instant messaging, while other ones propose that affirmative gaze force is the best long-run procedure for decreasing cyber bullying. Cyber-pornography Cyber-pornography mentions expressly to progeny pornography on the internet, usually engaging those less than 18 years of age. While enclosures in the United States and Europe have discovered mature individual pornography on the internet to drop inside lawful boundaries, there is a effectively agreed lawful, lesson, psychological and communal agreement that young children are not to be engaged in the international sex industry. Just as the increase of the internet helped a new and expansive kind of bullying, so too it has directed to a expansion of progeny pornography. Various websites have become repositories of related to sex explicit images of young children, where the pictures are acquired and traded (simons, 1998). There are clues that the increase of cyber pornography has directed to expanded examples of progeny misuse in the world (internet porn, 2004). Countries like Great Britain have been especially impacted: Childrens benevolent humanity nch previously nationwide childrens dwellings said there was clues that the 1,500% increase in progeny pornography situations since 1988 would be echoed in more young children being misused to make the pictures. the scale of the difficulty has altered after acknowledgement in just over a decade, said nchs internet advisor john Carr. The expanded demand has made progeny pornography into large-scale enterprise and the penalties for young children in all components of the world are horrifying (internet porn, 2004, par. 1-3). A newer pattern of cyber pornography on the internet engages online groups for example second life, where avatars, or three-dimensional representations of computer users, combine with one another in very shrewd online environments. Prosecutors have conveyed allegations contrary to persons in second life who acquired virtual sex with other second life users comprised as children. In some nations, for example Germany, virtual progeny pornography is illicit, while the regulation is much less clear in another location (johnston, 2007). Putting an End to Cyber Crime In his 1995 term paper, Gene Stephens suggested what one might call a conventionally libertarian way to battle cyber misdeed that aligns well with the open ethos of cyberspace: the only genuine assist isà ¢Ã ¢Ã¢â¬Å¡Ã ¬Ãâà ¦ conscience and individual standards, the conviction that robbery, fraud, and attack of privacy are easily unacceptable (quoted in Stephens, 2008, p. 2). Given the huge expansion of cyber misdeed even in the years since 1995, Stephens now sees things differently. Today he contends that halting cyber misdeed will count mostly on two factors: a more protected Internet infrastructure, redesigned with security foremost in mind; and coordinated, international policing of cyberspace to back up other security procedures for example biometrics. One proposition Stephens makes is for a more protected, second lifetime Internet: The Defense Advanced Research Projects Agency (DARPA) set up the Internet and fostered its early development, but DARPA will probable overhaul its creation in the 2010s. Not only will the conclusion be much quicker and bigger capability usage, but furthermore, by effectively beginning over with the security facets in brain, the future Internet will be safer and tougher to strike and disable (Stephens, 2008, p. 3). Stephens furthermore contends that battling cyber misdeed engages undertaking a bigger and more basic issue: How can one policeman an locality, for example cyberspace, that very conspicuously no one individual owns and has jurisdiction over? The response, he contends, is voluntary, multinational policing, with the cost of malfunction being too large to ignore: The exponentially advancing capabilities of appearing Web technologies spotlights the long-ignored matters of who owns the World Wide Web, who organizes it, and who has jurisdiction over it. The response now is: Nobody! Can the worlds most mighty socio-politico-economic mesh extend to function nearly at random, open to all, and therefore be excessively susceptible to cyber criminals and terrorists alike? Yet any try to constraint or policeman internet can be anticipated to be contacted by farthest opposition from a plethora of users for a kind of causes, numerous contradictory. à ¢Ã ¢Ã¢â¬Å¡Ã ¬Ãâà ¦ Biometrics and more-advanced schemes of ID will require to be finalized to defend users and the network. In supplement, multinational cyber crime flats will be needed to apprehend those preying on users worldwide, as Web board riders in Arlington, Virginia, and Victoria, British Columbia, may be victims of cyber scams perpetrated in Cairo or Budapest. Coordination and collaboration will be keys to producing the Internet a safer location to journey and perform enterprise (Stephens, 2008, p. 3). There still appears to be work left to do. For demonstration, Interpol, which battles misdeed over nationwide boundaries, only has $102 million allowed for each year to battle cyber crime (Swartz, 2008). Can one be hopeful about the containment of cyber crime? If annals are any referee, the identical Internet expertise that empowers lawless individuals to flout the regulation can endow regulation enforcement to fight back the law. In the case of the telegraph, instanced previous, it was utilized to good result shortly after it was invented: After killing his mistress [in 1845] and escaping to London by train, [John] Tawells recount was telegraphed ahead by the policeman and he was apprehended upon his appearance (Standage, 1998: 51) (Wall, 2007, p. 2).
Friday, October 25, 2019
Internet Plagiarism Essay -- Plagiarizing Cheating Copyright Essays
Internet Plagiarism Plagiarism used to be easy to catch. It always took real work for a student to try to pass off someone elseââ¬â¢s work as his or her own. Different sources of plagiarizing included copying texts from the library and buying old papers off of other students. There were not many resources to choose from where a studentââ¬â¢s topic was contained. That has now changed. There is a little thing called the Internet. It has revolutionized the plagiarism world and made it a little more difficult for educators to catch plagiarism culprits. There are some tools out now, however, that are aiding this new battle. Since the Internet came along plagiarism has become a lot easier to accomplish; at least for the time being. What exactly is considered plagiarizing and how is it punished? ââ¬Å"To plagiarize is to steal and use the ideas or writings of another as oneââ¬â¢s own. Legally, plagiarism has been defined as the act of appropriating the literary composition of another, or parts or passages of his/her writings, or languages of the same, and passing them off as the products of oneââ¬â¢s own mind.â⬠[1] Basically what this is saying is that plagiarism is when someone takes anotherââ¬â¢s idea and calls it his or her own by either not citing properly or merely just trying to take full credit. There are three different ways a paper or a section of a paper can be plagiarized. The first way is quotations. Quotations must always be worded exactly and then cited exactly. The citation needs to be precisely from where it was found and do not forget to put quotations marks around the quoted section. The second form of plagiarizing is through paraphrasing. Paraphrasing involves taking other sources ideas and putting them into your own words. When... ...html). These programs also cost varying sums. [10] Until the Internet came along, plagiarism was difficult. There were not enough sources on a specific topic at a studentââ¬â¢s fingertips to effectively pull it off. Plagiarism is a major offense and needs to be taken seriously. Students just cannot seem to resist cheating and trying to make their life a little easier by letting someone else do the work that they are getting credit for. Now that there is the Internet, new doors have opened for plagiarists and it is keeping educators on their toes. Teachers now need to make little modifications on their assignments and they need to keep a careful watch on students as they work on papers. New technology such as search engines, detection services and detection software are helping aid teachers keep plagiarism to a minimum. Soon it will be hard to plagiarize once again.
Thursday, October 24, 2019
Geert Hofstede Cultural Dimensions Analysis Essay
Geert Hofstede is a social psycologist, originally from the Netherlands. Hofstede is well known globally for his revolutionary research of multicultural organisations and groups. Perhaps his most important work was developing the theory of cultural dimensions. There are 5 dimensions that Hofstede explains in his framework- these are; Power distance index (PDI), Individualism versus Collectivism (IDV), Masculinity versus Femininity (MAS), Uncertainty Avoidance Index (UAI), and Long term Orientation versus Short term normative orientation (LTO). Power distance index is the dimension in which a society can understand and accept inequalities that occur in their culture. It is all about the less dominant members of that culture understanding that imbalances politically, financially and racially for example, occur in their world- and the key issue Hofstede focuses on is how these disparities are handles. For a country to yield a large degree of PDI, then the people must recognise that thes e inequalities will occur and accept a hierarchical order. Therefore societies with a low PDI, make every effort to rid of the differences in status or importance and strive to level the distribution of, for example, wealth or power. The example that Hofstede recently gave to illustrate the impact of PDI is the reaction of Chinese authorities to the fact that a Chinese author won the Nobel Prize for peace, explaining that he is a man that the western part of the world would only perceive as a good, virtuous winner of the prize. Due to the authorities reaction he describes them as feeling threatened by the possible share of power, therefore being a place of high PDI. The second dimension that Hofstede describes is Individualism. This can be explained as a preference of a society that only believes they need to look after themselves and their immediate family. The flipside of this, which Hofstede refers to as Collectivism, represents a preference for a tightly-knit framework in society in which individuals can expect their relatives or members of a particular in-group to look after them in exchange for unquestioning loyalty. A societyââ¬â¢s position on this dimension is reflected in whether peopleââ¬â¢s self-image is defined in terms of ââ¬Å"Iâ⬠or ââ¬Å"we.â⬠The next aspect of his framework is the Masculinity versus Femininity factor. The masculinity feature is where society in whole is very competitive. It is about achievement, success, and prevailing more than others and gaining material rewards for success. The opposite of this that is illustrated is femininity,à which is a society which is more focused on cooperating, caring for the weak and the general concern for quality of life. In the business context Masculinity versus Femininity is sometimes also related to as ââ¬Å"tough versus genderâ⬠cultures. The fourth point that Hofstede portrays in his work is Uncertainty avoidance index. This is explained as being the degree to which the members of a society feel uncomfortable with doubt and ambiguity. Hofstede explains the key issue here is how a society can deal with or accept the uncertainty of the future and how it cannot be known- it is a question of whether society attempts to control what will happen in the future or just simply let it happen. A country with a low uncertainty avoidance index is the latter; the part of society with more of a laid back and relaxed approach to how the future develops, whereas a country with strong UAI has firm beliefs on codes of conduct and behaviour, in order to be able to influence the future as much as possible. The final dimension that Hofstede uses is the Long term orientation versus short term normative orientation. Societies who score low on this dimension, for example, prefer to maintain time-honoured traditions and norms while viewing societal change with suspicion. Those with a culture which scores high, on the other hand, take a more pragmatic approach: they encourage thrift and efforts in modern education as a way to prepare for the future. To conclude this exploration of Geert Hofstedeââ¬â¢s framework, I believe that all of the points he makes and focuses on are relevant in societies internationally, regardless of specific cultures. For example, the Power Distance index dimension is an issue that occurs all over the globe. There are individuals in every society that have superior power to others, be it financially, politically or just have a greater status in the social order. However the acceptance of these issues can vary from country to country. For example, I would say that North Korea have a very high PDI, as they are governed by a dictatorship where certain individuals have enormous power over the rest of society, and they just get along with it and accept that fact. However in more democratic states; i.e. the UK and the USA the PDI is much lower as society believes much more in equality.
Wednesday, October 23, 2019
Haircuts Case Study Essay
Strategic Business Area to Improve through IT. The most important aspect of the haircutting business model that can be improved in UMUC Haircut situation has to be customers (customer demand). The entire profit model revolves around two truth. The first is that people want to come get haircuts here at UMUC. Second, these customers will be repeat customers at a rate that facilitates profit. In order to meet both ofà these goals for profit the use of a comprehensive scheduling tool is needed to both benefit customers and manage employees. A cloud-based open schedule application allows for simple transparency and has a secondary feature of using old scheduling data to form a more profitable business model. Being able to have a constantly evolving schedule provides the perfect amount of flexibility for Myra Morningstar. Specific Solution To best apply information technology to the scheduling problem a robust program will be developed. This programs first major feature is that it will be cloud based. So for a 7 day work week there will be open hourly blocks that can be filled with customer appointments. These blocks are of course able to be filled at the main counter on the central computer in the system but can also be filled via the web. Customers will be able to submit request for blocks which will be approved by management. At the same time, in the same program these blocks will correspond to individual chairs, in the sense that the chair represents an available stylist being able to perform the styling or cut. This program will be real time so that everyone is one the same page. Ultimate control will fall on Myra Morningstar. The program will run through the UMUC Haircut website. IT Infrastructure Requirements Services- Myra and staff will be required to learn and manage this program. Although not overly complicated it will require dedication of use to be successful. It will be tempting to use the paper scheduling method but this will need to be cut out. The initial construction of the program and subsequent upgrades to the program will be the work of a clever programer for hire and should not require constant technical support. Hardware- Any internet connected device will be able to access to the program. It would be a sound investment to have a small command terminal or server inside the store able to handle backing up this data constantly and allows a level of redundancy. (To both handling the data and backing it up) Software- A application will have to be purchased or designed to facilitate this online scheduling. An example of a pre-existing software package would be Appointment-plus, this service already includes customer self-booking. Telecommunications- A high-speed internet connection will be required at all times so that the program can communicate changes back and forth at all times. This need can be handled by fiber-optic or a dsl network from a local provider. Most of the information here will be data. Facilities- The main desk computer station will be the facility for housing the center server. This software, if uniquely designed for UMUC Haircuts will be entirely in-house but if a generic version it is applied it will be managed from that companies facility. How Online Scheduling will Improve the Process. As UMUC Haircut conducts business now there is no single method for managing both employee staffing times and customer appointments. Customers have to come in or use the phone to schedule an appointment or come for a walk in unsure of availability. This new program will allow for the front desk, all the stylist, and customers to access the scheduling tool at all times. This will stream line the process of getting into a chair and cut down on the almost guess method of scheduling employees. Online Scheduling Impact on Generic Strategy. The generic strategy goal that is strived for at every step in this process is Broad Market/High Value-to-Cost Ratio. With an affective online scheduling tool more customers will be able to access appointment opportunities that fit their schedule. This gives them the ability to plan ahead. at the same time the scheduling application also cuts down on the hours that stylist are getting paid even though there are no appointments. Being able to cut down on these wasted hours will make the cost drop which will indirectly rase the Value Ratio. Reaching more people online, at aà cheaper price will be the driving force to adopt an online solution for scheduling. References: Schmidt, M. (n.d.). Retrieved from http://www.businesscaseanalysis.com/business.html http://www.appointment-plus.com/product/how_it_works.php
Tuesday, October 22, 2019
Labor Unions During the Great Depression
Labor Unions During the Great Depression The Great Depression of the 1930s changed Americans view of unions. Although AFL membership fell to fewer than 3 million amidst large-scale unemployment, widespread economic hardship created sympathy for working people. At the depths of the Depression, about one-third of the American workforce was unemployed, a staggering figure for a country that, in the decade before, had enjoyed full employment. Roosevelt and the Labor Unions With the election of President Franklin D. Roosevelt in 1932, government - and eventually the courts - began to look more favorably on the pleas of labor. In 1932, Congress passed one of the first pro-labor laws, the Norris-La Guardia Act, which made yellow-dog contractsà unenforceable. The law also limited the power of federal courts to stop strikes and other job actions. When Roosevelt took office, he sought a number of important laws that advanced labors cause. One of these, the National Labor Relations Act of 1935 (also known as the Wagner Act) gave workers the right to join unions and to bargain collectively through union representatives. The act established the National Labor Relations Board (NLRB) to punish unfair labor practices and to organize elections when employees wanted to form unions. The NLRB could force employers to provide back pay if they unjustly discharged employees for engaging in union activities. Growth in Union Membership With such support, trade union membership jumped to almost 9 million by 1940. Larger membership rolls did not come without growing pains, however. In 1935, eight unions within the AFL created the Committee for Industrial Organization (CIO) to organize workers in such mass-production industries as automobiles and steel. Its supporters wanted to organize all workers at a company - skilled and unskilled alike - at the same time. The craft unions that controlled the AFL opposed efforts to unionize unskilled and semiskilled workers, preferring that workers remain organized by craft across industries. The CIOs aggressive drives succeeded in unionizing many plants, however. In 1938, the AFL expelled the unions that had formed the CIO. The CIO quickly established its own federation using a new name, the Congress of Industrial Organizations, which became a full competitor with the AFL. After the United States entered World War II, key labor leaders promised not to interrupt the nations defense production with strikes. The government also put controls on wages, stalling wage gains. But workers won significant improvements in fringe benefits - notably in the area of health insuranceà and union membership soared.
Monday, October 21, 2019
8 Ways to Help Students with Dyslexia Succeed
8 Ways to Help Students with Dyslexia Succeed Homework is an important part of the school learning experience. Guidelines for homework are 20 minutes for elementary age children, 60 minutes for middle school and 90 minutes for high school. It is not unusual for students with dyslexia to take 2 to 3 times that amount of time to get their homework completed each night. When this happens, any benefit a child might derive from the extra practice and review is negated by the frustration and exhaustion they feel. While accommodations are often used in school to help students with dyslexia complete their work, this is rarely done with homework. Teachers need to be aware that it is easy to overburden and overwhelm a child with dyslexia by expecting the same amount of homework to be completed in the same amount of time as the students without dyslexia.The following are suggestions to share with general education teachers when giving homework: Outline assignments Write the homework assignment on the board early in the day. Set aside a portion of the board that is free of other writing and use the same spot each day. This gives students plenty of time to copy the assignment into their notebook. Some teachers provide alternate ways for students to get homework assignments: A bulk email is sent to all students, or their parents, listing the homework assignmentAn online calendar lists homework assignmentsThe classroom telephone message is changed each morning to reflect the homework assignments. Students can call the classroom to get the assignmentStudents with dyslexia, ADHD or other learning differences are paired with another student who checks the students notebook to make sure the homework assignment was written correctlyForm a homework chain. Each student writes the name of two other students in the front of their notebook who they can call to ask questions about the assignment. If you must change a homework assignment because a lesson was not covered, give students plenty of time to amend their notebooks to reflect the change. Be sure each student understands the new assignment and knows what to do. Explain the reasons for the homework There are a few different purposes for homework: practice, review, previewing upcoming lessons and to expand knowledge of a subject. The most common reason for homework is to practice what has been taught in class but sometimes a teacher asks the class to read a chapter in a book so it can be discussed the following day or a student is expected to study and review for an upcoming test. When teachers explain not only what the homework assignment is but why it is being assigned, the student can more easily focus on the task. Use less homework more frequently Rather than assigning a large amount of homework once per week, assign a few problems each night. Students will retain more information and be better prepared to continue the lesson each day. Let students know how homework will be graded Will they receive a checkmark simply for completing the homework, will wrong answers be counted against them, will they receive corrections and feedback on written assignments? Students with dyslexia and other learning disabilities work better when they know what to expect. Allow students with dyslexia to use a computer This helps to compensate for spelling errors and illegible handwriting. Some teachers allow students to complete an assignment on the computer and then email it directly to the teacher, eliminating lost or forgotten homework assignments. Reduce the number of practice questions Is it imperative to complete every question to receive the benefits of practicing skills or can the homework be reduced to every other question or the first 10 questions? Individualize homework assignments to make sure a student gets enough practice but isnt overwhelmed and will not be spending hours each night working on homework. Remember: Dyslexic Students Work Hard Keep in mind that students with dyslexia work hard each day just to keep up with the class, sometimes working much harder than other students just to complete the same amount of work, leaving them mentally exhausted. Reducing homework gives them time to rest and rejuvenate and be ready for the next day at school. Set time limits for homework Let the students and their parents know that after a certain amount of time working on homework the student may stop. For example, for a young child, you may set 30 minutes for assignments. If a student works hard and only completes half of the assignment in that time, the parent may indicate the time spent on homework and initial the paper and allow the student to stop at that point. Specially-designed Instruction When all else fails, contact your students parents, schedule an IEP meeting and write new SDIs to support your students struggling with homework. Remind your general education partners to protect the confidentiality of students who need accommodations to homework. Learning disabled children may already have low self-esteem and feel as if they dont fit in with other students. Drawing attention to accommodations or modifications to homework assignments can further damage their self-esteem. Sources:Ã A Dyslexic Child in the Classroom, 2000, Patricia Hodge, Dyslexia.comEffects of Instruction in an Assignment Completion Strategy on the Homework Performance of Students with Learning Disabilities in General Education Classes, 2002, Charles A.Hughes, Kathly L.Ruhl, Teaching LD Newsletter,Volume 17, Issue 1
Sunday, October 20, 2019
What Is an Alternative High School Is It Right for You
What Is an Alternative High School Is It Right for You SAT / ACT Prep Online Guides and Tips Will you be attending an alternative high school or are you wondering if itââ¬â¢s the right choice for you or your child?For some students, alternative high schools fit their personality and learning style much better than traditional high schools, and they can be a way for these students to achieve success. What are alternative high schools? How are they different from traditional high schools? Is attending one the right choice for you? How can you find the right alternative high school? Read on for answers to each of these questions and more. What Are Alternative High Schools? An alternative high school is simply a school that doesnââ¬â¢t provide a completely traditional learning experience.This is a very broad definition, and, because of that, alternative high schools can vary widely. They can be public or private and can include magnet, charter, and online schools (although not every school in these categories would be considered an alternative high school). Some alternative schools are offered throughthe studentââ¬â¢s regular school district, while others, such as magnet, charter, or private schools, operate independently of the public school system. Classes at online schools are conducted primarily or completely over the internet.There is no official ââ¬Å"alternative schoolâ⬠designation or requirements a school must meet in order to be considered alternative. An alternative high school will usually include the word ââ¬Å"alternativeâ⬠in its name or mention it in its mission statement or website homepage. Alternative schools were first created to help ââ¬Å"troubledâ⬠students who had behavioral problems that traditional publicschools were ill-equipped to handle. However, today students attend alternative schools for a variety of reasons which are discussed in more detail below.In general, alternative high schools exist to give students who do not do well in a traditional academic environment an opportunity to succeed in high school and earn a high school diploma. How Are Alternative Schools Different From Regular High Schools? As mentioned above, there can be large variations between alternative high schools.Some alternative high schools donââ¬â¢t give out grades, some allow students to develop their own graduation requirements, some include a significant work component, some take place during non-traditional hours, and more. Common features of manyalternative high schools include: Smaller Class Sizes:Smaller classes allow teachers to give students more individual attention and make it easier to tailor lessons to specific student needs. More Flexible Schedules and Graduation Requirements:Some alternative high schools offer classes at night, which can be helpful for students with jobs or children. Others have flexible graduation requirements and give students more choice in the classes they must take (as opposed to one math class, one science class, one English class, etc. each semester). This can give students the opportunity to study a subject of particular interest to them. Wider Variety of Teaching Methods:Alternative high schools often use numerous teaching methods that emphasize creativity and interaction. This can help students who struggle with sitting in a classroom and taking notes all day. Non-Traditional Evaluation Methods:Some alternative schools donââ¬â¢t give out grades, instead they provide written evaluations. Others offer academic credit for work experiences or internships. Address Social, Mental, and Emotional Needs of the Student: In addition to addressing academic needs, alternative schools often have additional resources, such as counseling and support groups, available for students. You can also research specific alternative schools to get a better idea of what they can offer. For example, City-As-Schoolin New York City, has no grades, exams, or class years. Students complete projects and papers which are added to their portfolio, and they spend about half of each week at an internship instead of in the classroom. It's also easy to find student testimonials of alternative schools online. One former student of an alternative high school credits the school with saving her life.You can read these to get a better idea of the typesof students alternative schools have helped and how they overcame their difficulties. Even if you never wanted to show up to class at your old school, an alternative high school may have teaching methods that work for you. Why Do Students Attend Alternative High Schools? There are multiple reasons why someone may begin attending an alternative high school, but they usually relate to the student not thriving in a traditional school. Specific reasons include: Trouble Learning in a Traditional Classroom One of the main reasons students attend alternative schools is because they donââ¬â¢t learn well in a traditional school. They may have learning disabilities that make it challenging for them to sit in a classroom all day, they may struggle to retain information learned this way, or their classes may interest them so little that they have no desire to attend school or complete homework. Alternative schools specialize in using varied and creative ways to teach the material, and their teaching methods are often much more tailored to each studentââ¬â¢s learning preferences. Need More Support/Guidance Some students also need more guidance than traditional schools can provide. This can be academic support or emotional support/counseling. They can benefit from the smaller classes of alternative schools as well as the increased access to counselors and support groups. Many alternative schools also often have regular meetings with a studentââ¬â¢s teachers, parents, and counselors to make sure the student is on track, which can also be beneficial for many students. Bored or Not Challenged at Their Current School Alternative high school may also be an option if you donââ¬â¢t feel challenged or interested at a traditional school. This may be the case if you donââ¬â¢t find yourself caring about your classes, struggle with sitting at a desk all day, find the coursework too easy, or want to focus your studies on a subject your school doesnââ¬â¢t offer. Alternative schools often use a wider variety of teaching methods, including hands-on, interactive, and self-directed work, which can benefit you. Social or Behavioral Difficulties A student might also have issues with classmates or teachers. This can include being bullied, struggling to make friends, befriending the wrong crowd, or coming into conflict with teachers and students. A studentââ¬â¢s social network is a huge part of their high school experience, and if they donââ¬â¢t feel included or welcomed at their school, or donââ¬â¢t contribute to an inclusive and welcoming environment, it can be very difficult for them to do well. Attending a new school with new classmates as well asteachers and counselors who can better meet their needs can have a significant improvement on their high school performance. Difficult Life Circumstances Additionally, some students have experiences that make attending traditional high school challenging. These can include pregnancy, serious illness, family problems, and more. Circumstances like these can make it difficult for a student to concentrate on classes, and they may need more individual support and flexible scheduling. Is an Alternative High School the Right Choice for You? So, should you attend an alternative high school? The answer varies depending on the person, but, in general, if you are very unhappy or performing poorly at your current high school, some major changes need to happen for you to get on track to graduate high school and set yourself up for success in the future. Transferring to an alternative school that useslearning styles that suit you better than your current school can help youdo well and even begin to enjoy high school if you didn't before. The new school, teachers, and classmates can help give you a fresh start with high school. However, some students prefer to stay in their current high school and arenââ¬â¢t receptive to the idea of attending a new, ââ¬Å"differentâ⬠high school.Making a student transfer to a new school when they are against it can make them even less likely to succeed in school, so, if they are extremely opposed to the idea of transferring schools, and it is possible for them to stay at their current school, you could try letting them remain ââ¬Å"on probationâ⬠at their current school. If they make required changes that are laid out beforehand (improving grades, meeting attendance requirements, disassociating with a badcrowd, etc.) they can be allowed to remain at that school, but, if they do not, they will have to transfer to an alternative school. If you do decide that attending an alternative high school is the right choice, or even if you just want more information on what your options are, read the next section on how to select the best alternative high school for you. Choosing whether to attend an alternative high school can take a lot of thought in order to make the right decision. How to Choose the Right Alternative High School Selecting the right alternative school is an important undertaking; you have to make sure you choose a school that fits with your personality and learning style. Attending an alternative school that isnââ¬â¢t a good fit wonââ¬â¢t help you do any better in high school than you were doing before. Choosing which school to attend requires more work than simply finding the alternative school thatââ¬â¢s closest to you. Follow these three steps to make an informed choice and give yourself the best chance of success in high school. Step 1: Identify the Issues With Your Current School Before you do anything else, you should figure out exactly why your current school is not working for you.Make a list of all the reasons you are switching schools. Was it due to problems with classmates? Boredom with traditional education? A need for more guidance and support? Really think about all the reasons you arenââ¬â¢t happy with your current school. The more complete and specific your list the better your chances of finding the best alternative school for you are. If you're unsure of whether or not you want to change schools, this is also a good time to see if you can solve these problems while remaining at your current school. You may be able to make changes to your class schedule, join a program that includes more non-traditional learning, or a different option. If you'd like the option of staying at your current school, set up a meeting with your guidance counselor and possibly some of your teachers. They'll be able to go over all your options with you so you can make the best decision. Step 2: Make a List of the Qualities Your New School ShouldHave Next, use the list you made in the previous step to come up with a new list of things your new alternative high school should have for you to do well there.Research different alternative schools online to get a better understanding of what alternative schools can offer. Perhaps you want an alternative school with smaller class sizes, non-traditional teaching methods, the opportunity to earn academic credit through a job/internship, or other qualities.You should use your list from step one to develop this second list. For example, if one of the reasons you were unhappy with your current school is because you get bored sitting at a desk all day, your second list should mention that youââ¬â¢d like an alternative school that offers more hands-on work. Step 3: Research Nearby Schools Now that you know what youââ¬â¢re looking for, start looking at potential alternative schools you can attend.Most students will be limited to schools that are close to them because they will still be living at home, but if that isnââ¬â¢t a requirement for you, you can look at alternative schools in a wider area that offer boarding options. You should also take cost into consideration. Some alternative high schools are free or low-cost while others can have large price tags attached. There are often ways to reduce costs through grants or scholarships. If you find an alternative school youââ¬â¢re interested in but is out of your price range, talk to someone at the schoolââ¬â¢s office. They should be able to give you advice on financial aid options. Once you find a school youââ¬â¢re interested in, research it thoroughly before applying for enrollment. Talk to teachers and staff, research the school and its goals, and see if you can speak with past or current students to get their opinion.Many alternative schools offer potential students the chance to attend classes for a day or a few days to get a feel for the school and see if it will be a good fit for them. Definitely take advantage of this if itââ¬â¢s an option because itââ¬â¢s a great way to decide if the school is really the right one for you. Once youââ¬â¢ve decided on a school, contact the office to learnhow you can enroll or apply for enrollment. Not all alternative schools can accept everyone who wants to attend, especially smaller schools, so be aware that itââ¬â¢s not guaranteed that youââ¬â¢ll get in. Talk to staff and teachers to get a better idea of what you need to do to get enrolled at the school. Once you've foundyour ideal alternative high school, you can begin the enrollment process! How Do Colleges View Alternative High Schools? Will attending an alternative high school hurt your chances of getting into college? Will it make colleges think youââ¬â¢re a ââ¬Å"badâ⬠kid who will have a negative impact on their school? In short, no. Colleges understand that there are many reasons why a student may attend an alternative school, and there are multiple areas on your application for you to put your alternative school experience in a positive light. If you donââ¬â¢t have any behavioral issues (like suspensions or expulsions) on your transcript and your attendance record is good, that is a huge benefit for you when you apply to college. You can use your personal statement to discuss why you attended an alternative school, how it helped you, and how it has prepared you for the future.Even if your grades from your first few years of high school arenââ¬â¢t great, showing significant improvement and being able to clearly discuss how youââ¬â¢ve overcome difficulties will put your alternative education in a positive light and show colleges that youââ¬â¢re able to overcome challenges and still be successful. If you do have a record of behavioral issues and/or truancy, convincing colleges that you should attend their school will be a bit more difficult, but you should still follow the above steps. In your personal statement (some schools also have an area on their application where you can provide them with additional information on yourself), mention that you had problems before, then clearly and specifically discuss how youââ¬â¢ve worked to overcome them and the progress youââ¬â¢ve made since then. Obviously, this is much easier to do when you've made a lot of progress, so keep staying on track in order to make the best impression. If youââ¬â¢re worried that colleges will think that your non-traditional learning environment hasnââ¬â¢t prepared you enough for college, taking the SAT or ACT and receiving strong scores will help show them that you have the knowledge necessaryto do well in college. Summary Alternative high schools can be a great, and even life-changing, option for students who havenââ¬â¢t thrived in traditional high schools.A wide variety of alternative high schools exist, but, in general, they use more non-traditional methods of teaching and are able to be more flexible in accommodating student needs than traditional high schools. Some alternative high schools use grades, some allow students to work part-time for class credit, some allow students to develop their own class schedule, and more.Students attend alternative high schools for a variety of reasons, but, in general, itââ¬â¢s because they are unhappy at, not challenged by, or uninterested in a traditional high school environment.If you decide to attend an alternative high school, be sure to research potential schools thoroughly to find one that fits you well. What's Next? Have you decided to attend an alternative school and will now be transferring schools? Our complete guide to transferring high schools will walk you through each step of the process and help you make sure you've completed each requirementyou need to! Considering online high school? They're becoming increasingly popular, but it's important to be well-informed before you make the decision to attend school online. Check out our guide to online high schools to learn if they're the right option for you. Studying for the SAT or ACT?We have great guides to help you study for the SAT and ACT and get your best score! Want to improve your SAT score by 160 points or your ACT score by 4 points?We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download it for free now:
Saturday, October 19, 2019
Autism Essay Example | Topics and Well Written Essays - 3750 words
Autism - Essay Example It is because of these reasons that autism has been deemed as one of the most complex and difficult developmental disorders with which families might have to deal with and family members of such children are often perceived to experience negative psychological effects (Gupta & Singhal, 2005). Dealing with traumatic events that are outside oneââ¬â¢s control is one of the biggest challenges of life. With no possibility of lessening or eradicating the causes of stress, such circumstances require tactics where one transforms the self to fit the situation. It is important to understand the ways in which families deal with such circumstances as these are essential to cognitive paradigms of stress and coping frequently applied to families of children with disorders. Interventions concentrating on parentsââ¬â¢ coping mechanisms have revealed encouraging results. These treatments utilize concepts from stress and coping paradigms to enhance parent education in problem solving and decisio n-making, communicative abilities, ability to contact and make use of social networks, and coping mechanisms such as encouraging self-statements, self-praise and relaxation (Gupta & Singhal 2005). A number of factors effect familiesââ¬â¢ experience of having a young individual with certain mental, emotional or physical disability and it is significant to keep in mind the distinctive requirements of each family, when deciding on the type of support being provided. Various factors such as cultural values of the family, socio-economic status, level of the disability, and amount of social support, type of family structure, and geographic location are significant when formulating and applying effective treatment programmes. All or any of these factors can improve or restrict the success of a treatment and emphasize the need for individualization. Thus the amount and kind of programs should be according to the needs of the individual family unit (Gupta & Singhal 2005). Research suggest s that the number of children being red-flagged with autism is increasing. This increase might be to some extent due to enhanced assessment techniques or better knowledge of autism and other developmental disorders and of behaviours of autistic children. This disturbing increase in the number of children evidently requires for added facilities to fulfil the needs of these children and their families (Barnard, et al. 2002). From the developmental systems perspective, children are members of numerous social networks. These networks are created and are implemented by socio-cultural beliefs. Vygotsky, in relation to people with developmental disorders, suggested that the various aspects of development are quite similar in people with mental retardation and other disorders. He deemed working together as vital for the growth of improved psychological processes, and highlighted the significance of children working together in different groups (Vygotsky, 1993). Active participation of paren ts in the treatment programmes is increasing in the contemporary world. This involvement of parents has proven to be successful in educating parents to teach a number of skills to their children, especially play and communication skills. Increasing participation of parents during this stage, by giving extra information and incorporating them in
Friday, October 18, 2019
A critical review of the literature. has E-prescribing reduced Essay
A critical review of the literature. has E-prescribing reduced medication errors in inpatient settings in England - Essay Example The central role à ¿f the physician is the provision à ¿f care to individual patients. This process centres around the consultation between the physician and the patient. This process requires and generates information, historically recorded on a paper based medium. The limitations à ¿f paper records as a standard repository à ¿f information, is universally recognized as lacking the dynamic which electronic data medium promise: in effect, paper strangles the process à ¿f delivering timely high quality health-care delivery. So whatââ¬â¢s wrong with a medical system based on paper? Paper gets lost, degrades, and no matter how voluminous, paper files are limited in the quality and quantity à ¿f data they contain@ (Scalet, 2003). From the viewpoint mainstream medicine, IT has long offered the promise à ¿f significant improvements supporting the business à ¿f provider operations. An inventory à ¿f situational experiences, passive inquiry à ¿f physicians, collateral health-care providers, and review à ¿f literature, identified the following business support opportunities recognized secondary to the effective use à ¿f IT: Promises à ¿f transformation through IT have reverberated through my decade long career in health care. Yet, progress to date has been slow. The Institutes à ¿f Medicineââ¬â¢s 2001 report bemoaned the fact that AIT has barely touched patient care,@ as evidenced by the storage à ¿f the vast majority à ¿f clinical information in paper form@ (as cited in Fromberg, 2003). Analysis à ¿f passive inquiry and observation à ¿f physicians, collateral health-care providers, and review à ¿f literature, buttresses a frequently voiced sentiment: Electronic medical records, and increased IT applications, should top hospital CIO=s agendas because they can prevent errors, enforce standards, make staff more efficient, simplify record keeping and improve patient care. However, the current reality experienced by the author à ¿f this essay,
A case study of social movement or collective action event by ethnic Essay
A case study of social movement or collective action event by ethnic group(s) - Essay Example Discussions of discrimination can raise the blood pressure of even the most neutral person. On the one hand, there are those who steadfastly claim there is no such thing as discrimination in the mortgage industry: everyone is an ââ¬Å"equal opportunity housing lender,â⬠after all; it says so right on the application. On the other hand, there are those who have examined the issue with as much neutrality as possible and have arrived universally at one conclusion: all things being equal (such as similar credit reports, income, and down payments) African Americans are the victims of predatory, abusive, and discriminatory mortgages at a sickening rate. Just a quick glance at a few numbers: In 1993, approximately 100,000 subprime loans were originated. In 2001, more than a million subprime loans were originated. In 2008, more than 65 percent of subprime loans were refinances, not direct purchase (ACORN.org). Racial discrimination is often hidden and it certainly can be inadvertent. This does not excuse banks and mortgage brokers accused of discrimination. Three major organizations address this as a part of their foundation missions, and steps have been taken to remedy the problem, such as neutral research, education, and collective action. Before we can understand what organizations and the collective actions of individuals do to expose the problem of discriminatory lending, we must define what we mean by predatory and abusive mortgage loans. Once we have created a broad definition of discriminatory lending, we must seek to understand how the African American community can fall victim to such practices on a broad level through a culture of overt and inadvertent discrimination. The major leaders and organizations involved in exposing the problem have a multi-pronged approach to the problem, and institutional recognition of the problem lends strength to individual collective action. Final ly, there are several effective
Project Proposal. What strategies have proven most successful in Essay
Project Proposal. What strategies have proven most successful in getting the writer an interview - Essay Example A resume is a vital marketing tool. It enlightens a prospective employer everything concerning a person and what one is capable of bringing to the profession. It is also an opening for them to evaluate ones language, writing, and proficiency in presentation. While the standards of a resume alone will not make certain that one is selected, a resume that is well developed and that markets one as a viable candidate can in the long run establish whether one will be shortlisted for an interview. Introduction The aim of this project is to analyze concerning why it is fundamental to comprehend what companies look for in cover letters and resumes. It is also of significance to make out what to write when making a resume in order to be considered for a job opening. The majority of resumes are only reviewed for a maximum of 10 seconds prior to being disqualified (Block & Betrus, 1997). On this paper, I will illustrate systematically the way in which companies review and choose prospective cand idates for a job interview based on the quality of the resume. Discussion The project will be based on perception approach, which it will offer arguments in its favor, beginning with the most important to the least important. The points to be delivered will be: The significance of writing a resume that is successful Comparison and contrasting of the disparity between a hardcopy resume and an online resume The major points to consider when writing a resume I will investigate concerning why it is essential to understand what companies are seeking in cover letters and resumes. I will also explore the disparities involving a hard copy resume and a resume from the Internet. In addition, I will investigate the strategies which have proven most successful in getting the writer an interview. The reason why I chose this topic is because I am interested in learning how organizations make decisions when evaluating a resume. I will also compared and contrast the disparities involving a resume i nà hard copy form and a resume in electronic form. I am planning to use books from the public library, DeVry online library, magazines, journals and the Internet. At the conclusion of this project, I will have a better comprehension of the significance of creating a resume that is admirable in order to be successful when applying for a job position. What strategies have proven most successful in getting the writer an interview? It is obvious that everyone has heard of the expression first impressions are lasting ones. Well ones resume is the initial meeting involving an individual and a potential employer more frequently now than ever (Bennett, 2005). Therefore, in what manner does one want to be remembered: Craggy and unorganized; orderly and structured; lengthy and lackluster; or precise and remarkable? Organizations do not have the time to interview all candidates that are concerned with the job. If they did, there would be no organization to work for. Hiring managers employ an elimination process, which is resumes. Resumes inform an employer a great deal regarding an individual. Where one has been, where one is and where one is headed. Nevertheless, the details ought to be given in brief and clearly. One only has limited moments to persuade the hiring manager that his/her resume is worthy of additional
Thursday, October 17, 2019
Advanced IT Research Paper Example | Topics and Well Written Essays - 750 words
Advanced IT - Research Paper Example In addition, biometric enrolment in most cases is carried out in-person under environments that are controlled making the process reliable in case of any succeeding application. The system however faces a number of challenges mostly non-trivial when it comes to security cases following its inherent biometric data features. Such features make biometric matching probabilistic thus samples from a given individual can never be exactly the same. This is a violation of security measures as two encrypted samples have to undergo decryption before any matching takes place. Biometric systems are unable to rely on one-ways systems performing user input harsh functions. The management is also challenged to ensure that there exists decryption and vulnerability representation in biometric processes (Abhilasha, 2007). Biometrics are almost impossible to change or revoke in cases where data has been compromised. This is because its template is in a digital data form and is mostly kept in a token or a database. Such templates come in specific vendors thus their interoperable use in a system that is disturbed becomes difficult. Biometric authentication systems represent a location that is unsupervised presenting the high risks of attacks from sensor spoofing. This makes the output credibility of the process of biometric matching to depend completely on the integrity of the given sample and whether the sample provided is a true one from the biometric characteristic owner. Security problems also come up during the execution of biometric templates either at the client or at the server. Other privacy and security risks are witnessed in the process of keeping biometric information together with identifiable information that are personal (Abhilasha, 2007). Biometric authentication systems play a crucial role in the identification process. It is more preferable compared to other non-biometric methods. Despite this age over the other methods, biometric systems face a number of
Project Management Essay Example | Topics and Well Written Essays - 5000 words - 2
Project Management - Essay Example Projects also enable the development of new products and services and help the organization to respond to changes in the external environment like development of information technology. In todayââ¬â¢s scenario, project management indulges in the use of information technology to communicate and develop projects effectively. Projects are designed to enhance the organizational performance and continuously update the systems as they are continuously developing. But in reality, many projects are scrapped or dumped as they are not able to function properly or have incurred heavy expenses during the production space. The aim of this report is to make the readers understand the different reasons behind the failure of a project. The report is divided as follows: section 2 will present an overview of project management; section 3 will discuss risk management and its importance in project management. Section 4 will discuss why a project fails and in section 5, deeper understanding would be gained by the analysis of a case of UK passport processing agency. This report will present why the project to implement new information system failed in the Agency. A project is defined as ââ¬Å"a collaborative enterprise, frequently involving research or design that is carefully planned to achieve a particular aimâ⬠(Oxford Dictionary). It is defined as ââ¬Å"a unique venture with a beginning and an end, conducted by people to meet established goals within parameters of cost, schedule and qualityâ⬠(Buchanan and Boddy, 1992). Few examples of some well published project is the Apollo program which landed the man on moon (Nasa, 2010), the Genome project which mapped the human genome (Genome, 2010). The characteristics of the project is that it is temporary i.e. it has a definite beginning and end, it creates unique deliverables, creates capability to perform a service and is developed in steps. It is different from operations as the processes in operations are ongoing and
Wednesday, October 16, 2019
Advanced IT Research Paper Example | Topics and Well Written Essays - 750 words
Advanced IT - Research Paper Example In addition, biometric enrolment in most cases is carried out in-person under environments that are controlled making the process reliable in case of any succeeding application. The system however faces a number of challenges mostly non-trivial when it comes to security cases following its inherent biometric data features. Such features make biometric matching probabilistic thus samples from a given individual can never be exactly the same. This is a violation of security measures as two encrypted samples have to undergo decryption before any matching takes place. Biometric systems are unable to rely on one-ways systems performing user input harsh functions. The management is also challenged to ensure that there exists decryption and vulnerability representation in biometric processes (Abhilasha, 2007). Biometrics are almost impossible to change or revoke in cases where data has been compromised. This is because its template is in a digital data form and is mostly kept in a token or a database. Such templates come in specific vendors thus their interoperable use in a system that is disturbed becomes difficult. Biometric authentication systems represent a location that is unsupervised presenting the high risks of attacks from sensor spoofing. This makes the output credibility of the process of biometric matching to depend completely on the integrity of the given sample and whether the sample provided is a true one from the biometric characteristic owner. Security problems also come up during the execution of biometric templates either at the client or at the server. Other privacy and security risks are witnessed in the process of keeping biometric information together with identifiable information that are personal (Abhilasha, 2007). Biometric authentication systems play a crucial role in the identification process. It is more preferable compared to other non-biometric methods. Despite this age over the other methods, biometric systems face a number of
Tuesday, October 15, 2019
Lindt Truffles Essay Example | Topics and Well Written Essays - 500 words
Lindt Truffles - Essay Example The product has lived up to his expectation and satisfied him. This makes him fall in love with the brand and not just become a consumer for life, but in effect a brand ambassador for the company. Good things in life are never free. If you have to consume the worldââ¬â¢s finest brand of chocolates, you have to pay a price that is very fine too. Lindor Lindt Trufles are one of the most expensive chocolates in the world. The price itself brings out the target market for the Truffles; they are targeted towards the rich and well off people who can afford and who want to pay a very high price to consume. Price is a major factor, but not the only one. Another factor which identifies the target market for Lindt Trufles is people having aristocratic taste and love for fine items. They need not be very wealthy, but they need to have understanding of the value of things. Demand for Lindor Lindt Truffles is likely to be very stable and not affected by other factors. Although a seasonal variation is likely to occur, but in most cases the demand is fairly inelastic. This is because the consumers are unaffected by other events occurring such as changes in economic or political conditions. Also the chocolates happen to be a very insignificant portion of oneââ¬â¢s income; it is not likely to be affected by changes in income. Chris Alleny. Best Chocolates in the world. Articles Base. November 28th 2008. Online. Available at: http://www.articlesbase.com/food-and-beverage-articles/best-chocolates-in-the-world-662334.html. [accessed: 16 April
Monday, October 14, 2019
Successfully Raise A Defence Of Necessity
Successfully Raise A Defence Of Necessity Necessity and Private Defence are closely linked therefore; many of the requirements of private defence are also requirements for necessity. The difference between these two grounds of justification is that private defence stems from and is directed at, an unlawful human attack while in necessity a person finds him/herself in a situation in which he/she must between two evils: either suffer personal harm or break the law. The act of defence in private defence is always directed at an unlawful human attack whereas; in cases of necessity it is directed at either the interests of another innocent party or a mere legal provision. (Snyman, 2008, p. 115) Necessity There must be an urgent and immediate threat to life which creates a situation in which the defendant reasonably believes that a fair response to that threat is to break the law. This reflects the distinction between the defenses of necessity and duress in that the former is pressure of circumstances arising naturally, whereas the latter is a threat from an entirely human agency that overpowers the will of the defendant. The subjective frame of mind of the person who is relying on necessity the courts will not consider this but rather whether the act of necessity was in accordance with the legal conviction of society. The courts will also weight the option of whether a reasonable would have acted in the same way as a person that claims to have acted in necessity. They are using the concept of the reasonable person to practically embody the legal convictions of society and not to determining negligence. (Joubert, 2001, p. 61) REQUIREMENTS TO SUCCESSFULLY RAISE A DEFENCE OF NECESSITY The author will no discuss five (5) requirements that must be met in order for a person to successfully raise a defence of necessity: A legal interest must be endangered The danger must have begun or be imminent The defensive act must be necessary to avert the danger The defensive act must be reasonable The endangered person must know he/she is acting in necessity A legal interest must be endangered The purpose of the specific conduct must be clearly to protect a legal interest. Although the law recognizes many interests the most obvious are a persons life, limb, personal safety and integrity. A person may act in a situation of necessity to protect property but cannot relay on necessity to protect his/her job. If a person is not able to perform his job without breaking the law he must find another way to earn a living. For example a person cannot operate an illegal shebeen and claim it is to sustain his family when apprehended. The person must rather apply legally for a shebeens license. A person may also act in necessity in defence of some else. (S v Pretorius, 1975) The danger must have begun or be imminent When danger has already passed or will possibly occur in the distant feature a person cannot rely on necessity. Therefore, the danger must already have begun or the situation must be immediately threatening. In the trail Regina v. Dudley Stephens four stranded sailors were adrift in a small boat without supplies. The three strongest decided to eat the fourth, a seventeen (17) year old cabin boy to save themselves. There was some degree of necessity arising from the threat of starvation, even though the cabin boy would almost certainly have died of natural causes the sailors killed the boy intentionally and the court ruled that cannibalizing the boy was not urgently necessary and found them guilty of murder. (Regina v. Dudley Stephens, 1884) The defensive act must be necessary to avert the danger When a person relies on necessity the action taken should have to avert the danger. When there is less drastic measure to avert the danger a person a person should take this option. If it was not taken a person cannot rely on necessity. For instance when a man are awake by a noise in the middle of the night and found a person at his fridge busy eating food and killed the person by shooting him he thus cannot relay on necessity. If there is a possibility that a person can flee from the immediate or imminent danger he should do so. (S v Pretorius, 1975). The danger does not take the form of an unlawful attack and removing oneself from the danger in most cases of necessity. The defensive act must be reasonable A person must act reasonable if he wants to rely on necessity as ground of justification. The interest that is being protected must not be disproportionate of the defence act. Not more harm than is necessary to avert the attack must be inflicted by the person who wants to rely on necessity. According to Snyman this proportionality requirement is sometimes explained by requiring that the protected interest should be of greater value than the interest that is infringed upon. (Snyman, 2008, p. 119). The protected and infringed interests are a totally different nature, but if the infringed interest is a legal provision only, the defence of necessity would most probably succeed. For example a correctional exceeding the speed limit because he is rushing to the Prison where inmates are in the process of escaping, he will most probably be allowed to justify his actions by relying on necessity as a defence, since he infringed a legal provision only. The endangered person must know he/she is acting in necessity If a person is conscious of the fact that an emergency exists and knowingly acted in necessity than he can rely on necessity as a defence. A person cannot thus rely on necessity as a ground of justification if he throws a brick through a window in an attempt to break into a house but his action saves the occupants lives who are sleeping in a room filled with poisonous gas. PRIVATE DEFENCE The onus is on the state to prove beyond reasonable doubt that the accused action cannot be justified, if private defence is raised as a ground of justification. Private defence involves a person who takes the law into his own hands. Therefore, it is a drastic measure that should not be used for corrective purposes. Snyman alleged that this ground of justification has no history, but exist from the beginning of time. (Snyman, 2008, p. 103). Every person has a right to defend himself against an unlawful attack a right that is recognised in section 51 of the Charter of the United Nations. The two theories for the existence of private defence are protection theory, which emphasises each persons right to defend oneself or another against an unlawful attack whereas in upholding-of justice theory is where people acting in private defence perform acts assist in upholding the legal order. (Snyman, Criminal Law, 2004, p. 178). It is the primary duty of the state to protect the life and property of individuals but no state no matter how big its recourses can afford it. Therefore, this right has been given by the state to every citizen to take the law into his own hands for their safety. REQUIREMENTS TO SUCCESSFULLY RELIANCE ON PRIVATE DEFENCE The requirements of private defence can be divided into two groups for the purpose of classification namely: the requirements with which the attack must comply and the requirements with which the defence must comply. Requirements of the attack It must be unlawful A legal interest deserves protection. It must be imminent, but not yet completed The attack must be unlawful When the attack on a person is unlawful only than can a defender rely on private defence. A suspect who was lawfully arrested by a police official cannot rely on private defence in resisting the arrest. On the other hand, when a police official exceeds his powers by arresting a person he is not allowed to arrest the person may resist and can rely on private defence to justify his resistance. A legal interest deserves protection. Normally a person acts in private defence to protect his life, limb, bodily integrity and property. These are not the only interest worth of protection as the courts also recognized a persons right to defend personal freedom, sexual integrity, self-respect and chastity. To protect the interest of other persons is also an act of private defence but than the third party should want the defender to act on his behalf. However, the defender will not be able to rely on private defence if the victim does not want the help of the defender. (Joubert, 2001, p. 52) The attack must be imminent, but not yet completed If it is clear that an attack is about to happen than a person can rely on private defence. The defender doesnt have to wait for the attacker to attack first if the attack is imminent he can avert the attack by defending himself before the attack actually arise. But if the attack have been already completed the defender no longer defend him but get even. In the case of S v Moghlwane it was find that if the attack formed part of one and the same immediate and continued act of resistance, the defender can rely on private defence even if he left the scene temporarily. (S v Mogohlwane, 1982) The defence requirements Before private defence can succeed the defensive action have to comply with certain standards. The defence must be directed at the attacker It must be necessary It must be reasonable The defence must be directed at the attacker When the defence is directed at anyone else than private defence as a ground of justification will not succeed therefore, it may only be directed at the attacker. (Snyman, Criminal Law, 2004) The defence must be necessary If there is another way that the attack can be averted in a less serious way than that option should be used. The law must not be taken into their own hands if the defender can rely on another remedy. Therefore, the defence should be absolutely necessary in order to protect the interest threatened. The question arises than should a person rather flee an attack than resort to private defence? But than once there is a duty to flee it will imply that justice will have to give up to injustice. Therefore, it is not expected of a police official on duty to flee if he is being attacked while lawfully performing his duties. The defence must be reasonable There should be a balance between the attack and the defence. The defence act may not be more harmful than necessary to ward of the attack. Therefore, it would be unreasonable to kill a person who attempts to steal bread. Proportionality also plays a very important role in determining whether the defence was reasonable or not. The proportionality requirement will be met if the defence act is reasonably proportionate to the attack. The right of private defence is a good weapon in the hand of citizens to defend themselves but it is not revenge rather towards the threat and imminent danger of an attack. The courts find it difficult whether this right had been exercised in good faith or not. Conclusion It can be said that the confusion arise between Necessity and private defence are that they are closely related to each other. The difference are than is that private defence is an act of defence directed at an unlawful human attack while necessity is directed at either the interests of another innocent party or a simple legal provision.
Sunday, October 13, 2019
Graduation Speech -- Graduation Speech, Commencement Address
The old poet Kahlil Gibran, a long time ago, once said, "You work that you may keep pace with the soul of the earth. For to be idle is to become a stranger unto the seasons, and to step out of life's procession, that marches in majesty and proud submission toward the infinite." An interesting thought, that we work in order to keep pace with the earth. Now, I'm sure you're asking yourself, how can my near minimum wage job, where the customers treat me like a doormat and I still have to be pleasant and chipper, keep me in sync with the soul of the earth. Well I imagine there are higher rewards to part-time high school jobs, but other than the always too small pay checks, I am hard pressed to fathom them. Yet, that is not the kind of work I am speaking of. And then there is school work. Yes of course there are obvious rewards, such as these diplomas we are about to receive, to putting in a lot of time, energy and hard work into our studies. However, today I am here to talk about another aspect of work. It is work that many of us have been involved in one way or another either in sch...
Saturday, October 12, 2019
life :: essays research papers
Through out history man has always tried to find ways to explain the ways of life. Were do we come from, why are we here, are we alone, so may different questions but yet we still have no answers. Is there there a reason why we do not know?, can we truly comprehend the real answers of life? No one really knows. Some people try to find there answers buy relaying on mans creations. They look to science for answers and believe that there is a reason hidden behind everything and that all things come about by chance. Many other look towards religion to find there answers in hoping that they can gain accurate knowledge of the universe and believe that all things DONââ¬â¢T come about by chance but happen because there were pre-determined and could not be any other way. In order to understand life we must be willing to give up life in order to obtain it because the only real way to understand it would take thousands of years. What is life? Is it something that just happens to be or something that should be? Many people view life as something that is easy to obtain and take it away, to others life is as precious to them as there 1st born. How is it that we can question life itself? Man has tried for so long to figure out how to control it. Scientist spends years and years calculating formulas and equations trying to harness what they can never achieve.Many come to believe that they are higher then god himself. ââ¬Å"The universe must have had a beginningâ⬠, Dr.Gish from the institute for creations says. According to the bible god created the earth in seven days but according to scientist the earth and all other things in our universe were created with a huge explosion (Big Bang Theory). To some people the bibles taking of this makes more sense to them but many modern day people are beginning to accept the more scientific approach when it comes to the creation of the universe. Why is this? One reason is because man has become very self-absorbed and believes that they can find a solution for anything. Another reason is because people just donââ¬â¢t believe that god created the universe and that the universe has always been and always will be. So how then do you know?
Friday, October 11, 2019
Antiaging
Initiating tipsââ¬âput ice on face before putting moisturizer on as it helps skin absorb the ingredients sleep on silk pillow Unionized alkaline watt I stand on my head every day for five minutes to engorge my face and head with blood and keep a youthful look ââ¬Å"Use sunscreen even on days you don't think the sun Is out: Skin cancer Is a silent killer. Know the difference between VA and PUB. And remember, It takes 30 minutes for the sunscreen to activate.Fewer wrinkles and sun spots, and less of a risk of cancer ââ¬Å"l take 10 breaths, three times per day (in through nose, out through mouth), at a 2 to-3 ratio. For example, breath in four seconds, then breath out six seconds. Focusing on your exhale releases more toxins, and allows more oxygen in cells. And when you're working out, do two to three all-out bursts for 12 seconds each during cardiacâ⬠¦ His can strengthen the inner membrane of mitochondria, which slows or reverts deterioration of cellsâ⬠¦ ââ¬Å"Wet (but don't drain) caffeinated tea bags and freeze. Use the frozen tea bags on closed eyes for 20 minutes three times a week to reduce dark circles, puffiness, and disconsolation. Tea bags can be any brand but MUST have caffeine, which does the work. â⬠prevents deterioration of cells. ââ¬Å"Wet (but don't drain) caffeinated tea bags and freeze. Use the frozen tea bags on work. ââ¬
Thursday, October 10, 2019
Opinions of Discussion Essay
The critical decision makers necessary for the development of an effective sales curriculum for a multinational company include the sales and marketing director, the financial director, the human resources director and the various country managers. The CEO will need to be kept abreast of all developments to ensure that it meets his approval. Similarly, the board of directors will also have to be briefed about the project so that it is line with the companyââ¬â¢s vision and mission statement. The sales and marketing directorââ¬â¢s input into the project will be to develop sales and marketing strategies that will be adopted for use by sales personnel. From the various methods of marketing are available, the director will have to enumerate the most effective ones and explain which strategy is best suited for a particular situation. This may include direct sales, sales promotions, mail orders or e- business. Market segmentation will be applied to target particular groups while profiling techniques will enable the sales team to correctly identify their customers. Proper planning of finances and budgeting will be the financial directorââ¬â¢s docket. By developing budget plans and drawing up financial estimates, the sales curriculum will effectively guide the sales team in assessing their efforts in terms of money spent and results achieved. It will also reduce wasteful expenditure by explaining how to save money and still be effective in oneââ¬â¢s duties. The human resources director will draw up a training program for sales staff to develop their skills and enable them to be more effective in their duties. As part of their training, the curriculum will incorporate successful techniques of interacting with the customers by focusing on the needs of the end user rather than on the companyââ¬â¢s immediate goals. A remuneration schedule based on performance will form part of the curriculum. A summary of the code of conduct in force will form part of the annex. Different people have different norms and practices. The input of the various country managers will be important in identifying the peculiarities of certain nations. This will assist the sales staff in relating to their customers on local terms. This reduces misunderstandings arising from cultural conflicts. For any program to be successful it must have the support of the final decision maker. In this case the CEO has got to be involved in the overall design and development of the curriculum so that he can give his input. This factor is important when it comes to issues like training that involve the company spending a lot of money. By being involved in the process, the CEO will appreciate the curriculum and ensure that its implementation does not lack finances or materials. In a school setting and a business environment the stakeholders and decision makers are more or less similar. The head teacher and the CEO are the final decision makers. Both entities have a board of governors/director. The company has shareholders who have a stake in the company while the schools have parents who are actively involved in its welfare. Local authorities regulate the functions of both institutions while both of them have customers and suppliers that they attend to. Teachers are unique stakeholders in a school setting because not only do they mould the children under their care but also teach them. They are like surrogate parents and thus have a greater interest in their charges. Unlike employees in a firm, teachersââ¬â¢ concern over the ââ¬Ëproduce of their laborââ¬â¢ extends well beyond the school gates.
Wednesday, October 9, 2019
Were the American Colonists Justified in Waging War?
Tymyr Wilson 11/20/12 Mr. Jones U. S HIST. Were the American colonists justified in waging war and breaking away from Britain ? The colonists were in every right, aspect and mind not only justified but also it was about time that they stood of and actually take action against the British. The choice of going to war with them, was the only choice that they had.All diplimatical options that they had ceased to stand a chance against the tyrant Britain. From the very beginning when the colonists felt upset against their mother country and the way that they went about the law making, up until the beginning of the war, they tried all diplimatical options that they had by sending letters. When they didnââ¬â¢t work then they had no other means but to declare war. It was said and is very true, that the British gave a lot to the colonists and we see such helpings as in the French and Indian war.The British gave up a lot of troops and money and numerous others in fighting that war that the l east that the colonist could do is to pay the taxes. Well they do have a good right to say that since they were the contributing factor in the colonists being safe from the French and Indians. The people in the end should go about daily lives and pay the normal taxes but you do have to draw the line somewhere. The American colonists were justified in waging war and breaking away from Britain because of unjust laws, a King of tyranny, and both violating searches and officials.These things outraged the colonists in different ways. Forcing them to unite together and rebel against Britain, hence leading to Revolutionary War. First off, Parliament imposed many unjust laws they believed that Britain had the right to impose laws to regulate trade. However contrast the introduction of The Stamp Act was purely to gain revenue. The Stamp Act particularly affected lawyers merchants, and editors, as well as the general public parliament can make laws to bind us in all cases. The colonists wishe d to have a leader of respect who could look out for prosperity.The colonists argued that they were unfairly taxed without representation. In contrary there are many different views, concerning the causes of the Revolutionary War. The colonists felt that their privacy was offended and they were being treated inhumane fashion. Intolerable King oppressed the colonists. over the duration of time, there were many occurrences of injuries unlawful seizures. For example once the Sons Of Liberty used mob violence. Stamp agents resigned The Stamp Act was repealed. Parliament asserted with The Delatory Act. They felt it could pass numerous laws to keep control.
Domestic Terrorism Essay Example | Topics and Well Written Essays - 1250 words
Domestic Terrorism - Essay Example In the movie, the Klans acts were terrorism. Terrorism means to cause terror. Burning crosses, throwing fire bombs into houses, and murdering civilians without a legal reason amounts to terrorism. The sole purpose of these acts were to drive fear into the Civil Rights activists and the African Americans in Mississippi. The reason for this terrorism was to force a frightened public, white or black, to accept Jim Crow laws in Mississippi. Compared to terrorism today, similarities can be seen. 9/11 was orchestrated by Osama bin Laden to cause fear in Americans by murdering civilians. Middle Eastern suicide bombers in Iraq, Israel, and Palestine kill civilians in an effort to scare the civilian population. These terrorists act to pressure civilians to pressure politicians to withdraw from territory, or other issues on their agenda. There is no difference from a terrorist today and a Ku Klux Klan member that acted in a terroristic way in the Civil Rights era. Terrorism is a crime, but there are differences in defining crime. For example, murder, extortion, kidnapping, and terrorism are crimes. Crime is an illegal activity. Terrorism is definitely a criminal activity. The reason the Civil Rights activist murders, fire burning, and the cross burning was terrorism is the Ku Klux Klans intention. Terrorisms goal is to create fear and panic. Sometimes it succeeds, or other times it has the opposite effect. The Ku Klux Klans terrorism in the Civil Rights era inspired resistance. I do not believe every Ku Klux Klan member was a terrorist. Only the ones who acted in a terroristic manner or committed a terroristic crime were terrorist. For example, Ku Klux Klan members who got together to speak on White Pride, burning crosses on their own property, or how much they hated African Americans are not committing crimes. As disgusting as it is, the First Amendment gives the right to free speech, even hate speech. Burning a cross on your
Monday, October 7, 2019
The Propaganda of Commodities Assignment Example | Topics and Well Written Essays - 250 words
The Propaganda of Commodities - Assignment Example The modern manufacturing processes for mass production of commodities and the necessity to create ever-increasing demands need to function tandem. The article throws light on the necessity to create a solid demand for the avalanche of new products that engulf the market and prepare the mind of the consumer to accept them, whether his requirement for such goods is genuine or not. As a consumer, I take this article as a warning to keep check on my expenditure. I have seen many advertisements that appeal to my emotions and a want is created, which is not there before the contents of the advertisements begin to cast influence. Lasch provides the specific warning to the gullible consumer and he writes, ââ¬Å"The American economy having reached the point where its technology was capable of satisfying basic material needs, now relied on the creation of new consumer demandsââ¬âon convincing people to buy goods for which they are unaware of any need until the ââ¬Å"needâ⬠is forcibly brought to their attention by the mass media.â⬠(431) So I make it a point to ask a question to myself whenever I visit the super markets, whether I need this product? Whether it will contribute to the happiness and welfare of my family? The famous author Bernard Shaw is asked once, why he visits the market regularly but never buys anything. He replies that his purpose is to verify how many new products have arrived that he doesnââ¬â¢t
Subscribe to:
Comments (Atom)