Wednesday, August 26, 2020

Blacktown essays

Blacktown expositions The number of inhabitants in Blacktown was accounted for as 232, 219 individuals as of the last evaluation recovered in 1996. Of these individuals, supposedly 114,043 were guys furthermore, 117,176 were guys (BBC, 2000). The populace thickness is 941 people per square kilometer, with the territory of Blacktown being 246.9 square kilometers (BBC, 2000). The city has been depicted as youthful and flourishing, speaking to in excess of 30 distinct societies (BBC, 2000). At present a dominant part of the populace is younger than 45, with 70% of the populace falling into this segment. In view of the current populace, the city is required to develop to upwards of 294,000 individuals by The accompanying extra data was recovered from insights introduced by the Blacktown City Council, Blacktown Community Website and There are at present 39 rural areas inside Blacktown with the accompanying assigned as more up to date increasingly wealthy rural areas: Acacia Gardens, Glenwood and Woodcroft. A portion of the more seasoned increasingly settled rural areas incorporate Kings Langley, King Park and Minchinbury. Certain rural areas of the town have a bigger matured populace and higher extent of individuals living in solitary individual family units, including the suburb of Blacktown, Lalor Park, Of those networks displaying a socio-segment inconvenience, which means that a larger part of inhabitants are living in less rich conditions and have manual employments, with a greater part delegated low salary, incorporate the accompanying: Bidwill, Blackett, Emerton, Lethbridge Park, Shalvey, Every one of these rural areas is contrasted and the Sydney measurable division for motivations behind breaking down the Blackton LGA. A general summation of the LGA is as follows: the more current rural areas as portrayed above are bound to be well-to-do and to have more youthful families living in them; a vast larger part of individuals living in networks that are non-locals have tended to float toward specific rural areas and a significant number of suburbia are... <!

Saturday, August 22, 2020

Love in Times of Cholera Free Essays

Love in Times of Cholera Gabriel Garcia Marquez 26/10/2011 Alan Anaya| The plot unfurls in Central America early this century, a period where, as indicated by the storyteller, indications of beginning to look all starry eyed at could be mistaken for side effects of cholera. Like the strong Magdalena, whose banks are created, the story contorts and streaming, musical, purposeful, and composition describes down through over sixty years the life of the primary characters, Fermina Daza, Florentino Ariza and Doctor Juvenal Urbino de la Calle. What's more, gradually, this situation and these characters, as a blend of tropical plants and muds that the author’s hand shapes and likes, are streaming into the place that is known for fantasy and legend, drawing closer to a glad closure. We will compose a custom article test on Love in Times of Cholera or then again any comparative theme just for you Request Now Without a doubt, the subject is profound, rich, sensible and moving. Garcia Marquez stresses earth shattering issues in the life of man, for example, family, companionship, love in various phases of life, devotion, matrimonial life, and passing, for it advances to a to a great extent illustrative asset. Utilizing a language loaded with extravagance and flexibility, the Colombian essayist tells the intricate plan, conceivable and cheerful of a world that looks like, more than we might suspect, the world where we live. Along these lines indeed gives us that life is only interminable work for which individuals were made. The story happens in the Caribbean town of La Manga, which live lowered in nonstop thoughtful wars and the consistent danger of cholera. Fermina Daza with his dad, Lorenzo Daza, and auntie, moved from San Juan de la Cienega to La Manga looking for a more promising time to come. Once there, apparently Florentino Ariza goes gaga for Fermina, at which it starts to frequent with long letters of adoration to which, later, Fermina replays. Yet, at some point, Lorenzo Ariza is informed with respect to graphing and chooses to invest some energy away from La Manga, on the grounds that he needed another sort of spouse for her little girl. In this way, went to San Juan de la Cienaga where Fermina, in cahoots with his cousin Hildebranda Sanchez, where she keeps on comparing to Florentino. After some time, the family comes back to La Manga Daza. One day Fermina goes to the market , where she experiences Florentino, acknowledging in a split second that she isn't infatuated with him, thus she conveys him. Florentino is devastated, however he promises to himself that at some point or another get the affection for Fermina. Time passes, and a decent day when Fermina becomes sick, goes to make a visit to the town specialist, Juvenal Urbino de la Calle. This, to see the self-importance and pride of Fermina, gave up at his feet down and causes everything feasible for her to consent to wed him. After a few endeavors, Fermina respect the request of the specialist and gets hitched, to the incredible distress of Florentino. Florentino, to the lose faith in regards to the abrupt loss of Fermina, â€Å"decides† that Juvenal Urbino bites the dust before Fermina, and in this manner her being separated from everyone else, he seems to live the affection that had been prohibited. A day of Pentecost, where mature age and had chosen the characters, Juvenal, attempting to safeguard her parrot was stuck in a tree, kicks the bucket in the wake of tumbling from a stepping stool. That equivalent day, in the wake of the well known specialist, seems to accept the open door to remind Florentino for Fermina’s guarantee that he would stand by perpetually cast in his childhood, which meets Fermina annoyed, since he accepts it as a challenge. Sooner or later the passing of Juvenal, Florentino comes back to the diagramming with Fermina, which was at first hesitant. Yet, to praise a time of the demise of Juvenal, Florentino goes to Fermina Mass and welcomes you with extraordinary accentuation, Florentino reality that taken as an expectation. So following a couple of days, is introduced in Fermina’s house, a reality that will end up being a propensity and you will express gratitude toward Fermina. The days and months, and Fermina chooses to make an outing up the Magdalena River, which is set up by Florentino. The outing, initially just going to make Fermina, is that it turns into a kind of special first night between the two in which, at last find that adoration can happen at any age, on account of Fermina, or proceed anyâ life, on account of Florentino. Instructions to refer to Love in Times of Cholera, Essays

Wednesday, August 12, 2020

Slashed EMA Hits College Enrolment

Slashed EMA Hits College Enrolment The OE Blog A “super survey” carried out by the Association of Colleges to assess the impact of the withdrawal of the Education Maintenance Allowance has revealed low enrolment figures indicating that the most disadvantaged students have been priced out of education. Government spokespeople have been quick to try to interpret the data to their advantage but the facts are damning. The survey shows that an enormous 49% of colleges have seen lower numbers of students signing up for courses this year compared to previous years, with enrolment periods forced to stay open longer than usual in an attempt to attract more pupils. College heads unequivocally cited the scrapped EMA as the biggest single cause of decreased student numbers, with many going on to point out that without the financial support it provided, their poorest students were simply physically unable to make it to college. Fiona McMillan, principal of Bridgwater College, explained: “We know of students who cannot afford to get to college…For people with very little, any extra cost is too much.” This evidence starkly contrasts with government claims that the £560 million per year EMA scheme was being abused by youngsters who would have been able to attend college with or without the extra financial support. Whilst this may have been true of a minority, it simply falls far short of justifying the replacement of the scheme with a vastly reduced £180 million bursary scheme â€" tantamount to suggesting that a ridiculous 68% of those receiving the EMA were ‘unworthy’ of financial support â€" clearly an unrealistic claim. The new figures clearly prove that many students written off by the government as not really needing the grant have now been forced out of college education for good. The government has claimed that the figures are misleading, pointing to the fact that 42% of colleges actually reported an increased course uptake. However a more detailed analysis of the figures makes it clear that these higher enrolment levels refer to “the upper end of the skill level” â€" A level courses and their equivalents. These are not the courses most attended by those students in need of financial support. In addition, college heads, those best placed to give an accurate analysis of the dropping enrolment figures, have confirmed that it is the students from disadvantaged and poorer backgrounds who are failing to come back to college. Ms McMillan warned that the problem could have a serious impact on youth crime and gangs, pointing out that those belonging to the demographic now forced out of sixth form ed ucation are likely to be “hanging around and not doing very much”. The inadequacy of the government’s £180 million bursary replacement scheme and blundering and confusion surrounding its implementation have been highlighted by the extraordinary lengths to which individual colleges are being forced to go to support their students as a result. The survey revealed that many colleges are turning to their own already overstretched budgets to top up financial support for the poorest students in a desperate bid to keep them in education the irony being that their lower budgets then have a negative impact on the quality of that education. The government claimed that the changing of the EMA to the new bursary scheme would mean that the same financial support would be available, but only to carefully vetted students who were truly in need of it. Yet McMillan laid the facts bare, explaining that under the new scheme a pupil who had qualified for the £1000 per year EMA support was now only entitled to funding of £152 annually under the new scheme. Poorer students are simply being forced out of education altogether as a result, with ministers and campaigners fearing that “class is being brought back into the classroom” and that “children born into poverty are going to stay in poverty”. The recent devastating figures on youth unemployment only serve as a further warning of the terrifying drop out underclass the government is creating by pricing poorer students at all levels out of education.

Saturday, May 23, 2020

The Socialization And Dilution Of Marxist Theory Essay

The Socialization and Dilution of Marxist Theory in the Post-WWII Era In Antonio Gramsci’s â€Å"Hegemonic Theory† in The Prison Notebooks, the Neo-Marxist ideology of cultural and social monopolies is the underlying source of bourgeoisie corruption and economic dysfunction. Gramsci‘s view of capitalist fascist ideology had failed to understand the complexity of capitalism as a system that dominated academia, the mass media, and other forms of institutionalization that co-opted Marxist leftists movements in the economic booms of the 1970s and 1980s: An analysis, for instance, of how the conservative regimes of Margaret Thatcher in England and Ronald Reagan in the United States in the late 1970s and early 1980s won power would dissect how conservative groups gained dominance through control of the state, and the use of media, new technologies, and cultural institutions such as think tanks and fund-raising and political action groups (Kellner, 2005, p.6). In this theory, Gramsci defined the social and cultural aspects of education, mass media, and other cultural forms of â€Å"think-tank† operations led by elites in the capitalist classes, which negates the underlying power of capital that simply purchased these ideologies and moderated them for the benefit of the bourgeoisie. Gramsci’s Neo-Marxist ideology shows the variability of social and cultural forces, which denies the economic materialism of Marx’s underlying lying theory of ownership, production, and propaganda generated byShow MoreRelatedThe Bankruptcy Of Marxist Ideology : The Dilution And Variability Essay1720 Words   |  7 PagesTopic 4: The Bankruptcy of Marxist Ideology: The Dilution and Variability of Marxist and Neo-Marxist Theory in the Post-WWI Era Introduction: This economic study will define the dilution and variability of Marxist and Neo-Marxist Theory in the post-WWII era. The slow dissolution of Marxist theory as as a 19th century economic concept defines the rise of capitalism and the neoliberal ideology that has permeated the latter half of the 20th century. The fall of communism in the late 1980s revealsRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesmacrostructural conditions shape migratory flows and shift destinations, see Moya, Cousins and Strangers, 80–88. 56. For critiques of national perspectives, see Hasia Diner, â€Å"History and the Study of Immigration: Narratives of the Particular,† in Migration Theory: Talking across Disciplines, ed. Caroline Brettell and James Hollifield (New York: Routledge, 2000), 27–42; Donna Gabaccia, â€Å"Is Everywhere Nowhere? Nomads, Nations, and the Immigrant Paradigm of United States History,† Journal of American History

Tuesday, May 12, 2020

Argument Of An Open Source Visualisation Tool - 8116 Words

Argument Visualisation tools 1. Abstract 2. Introduction Argumentation is the area that studies the relation between a claim and any statement that supports or opposes this claim. Argument visualisation is the way to present the arguments, which make it easy way to analysis and evaluate. There are many tools help to visualise arguments used different type of visualisation, such as, network, tree, and table. Argument graph is import to summarize the complex argument on documents, which make all the argument’s elements and relation clear and explicit. Also it can play role in making decision. The decision can be taken after analysis the graph and find solution for problems. 3. Background 3.1. Network Visualisation: It is type of visualisation which support directed and undirected graph. The graph consists of nodes and lines. 3.1.1. CompendiumLD: is an open source visualisation tool that is usually used for learning purposes [1]. It helps education’s staff to organise their ideas, design learning tutorials, and share relevant materials with students. CompendiumLD has a clear layout as Fig. 1 shows. This tool consists of sets of icons. Users can simply drag and drop the icons and use arrows to link between the icons and describe task’s direction between them. The icons are divide to groups according to their objectives [2]. Some icons are used for learning design while other are used to express conditional issues in the task. For example, if a student passes theShow MoreRelatedThe Decision Of Childhood Vaccination2130 Words   |  9 Pagesslightly hyperbolic comparison between the two groups forcing puts the readers in an uncomfortable position where they are perhaps ‘forced’ to reevaluate what unintended consequences the â€Å"no jab, no pay† policy may induce. Adding c larity to this line of argument, Aly is then logically reminding the audience that the main objective of the policy is to â€Å"get more people immunised†; and so to further dismiss the merit and perceived gains that come with â€Å"exiling]† anti-vaxxers, and establish the idea that â€Å"noRead Moremotivational techniques used by infosys6547 Words   |  27 Pagesquestions with multiple-choice answers, rather than general open-ended questions. Specific questions improve clarity and consistency of understanding among respondents, and a multiple-choice format enables the answers to be converted into scores which can be loaded into a spreadsheet and very easily analysed. General or vague questions on the other hand tend to lead to varying interpretation (or confusion) among respondents; also, by inviting an open-ended answer you will generate lots of narrative-basedRead MoreStrategic Management Accounting and Balanced Score Card11170 Words   |  45 Pageswill be ab le to: ï  ± Appreciate the organisational necessity, and difficulty, in being strategic – i.e., (re-)planning and continually monitoring for alignment between organisational aims and actions. ï  ± Describe some of the key components (tools and techniques) comprising SMA, and understand why they are regarded as such. ï  ± Describe the balanced scorecard, including its four main perspectives and main assumptions; and understand its aims for holistic and integrated performance measurementRead MoreDissertation-Viral Marketing27075 Words   |  109 Pages................................................................................... 23 3.3 Interview subjects ...................................................................................................................... 24 3.4 Secondary sources ..................................................................................................................... 25 3.5 Data analysis............................................................................................................Read MoreA Study on Enhanced Employee Performance Through Soft Skills20707 Words   |  83 Pagessoft skills 62 3. Research Methodology 65-69 3.1 Meaning of Research Methodology 65 3.2 Objectives of Research Methodology 66 3.3 Types of Research 66 3.4 Sample Design 66 3.5 Tools of data collection 67 3.6 Sources of data 67 3.7 Universe of the study 68 3.8 Pre Test 68 3.9 Statistical Tool 68 4. Data Analysis and Interpretations 70-94 4.1 Soft Skills Component 70 4.2 Essentiality of Soft Skills 71 4.3 Best Place To Impart Soft Skills Training 72 4.4 Sufficient ImportanceRead MoreChange Management13001 Words   |  53 Pages7-S Model is a framework for analyzing organizations and their effectiveness. It looks at the seven key elements that make the organizations successful, or not: strategy; structure; systems; style; skills; staff; and shared values. The 7-S model is a tool for managerial analysis and action that provides a structure with which to consider a company as a whole, so that the organization s problems may be diagnosed and a strategy may be developed and implemented. The 7-S diagram illustrates the multiplicityRead MoreMarriage Guidance: Summary Notes19959 Words   |  80 Pagesdemonstrate sympathy to the person whenever he/ she is upset → A partner should always be willing to express innermost thoughts and feelings at all times → A partner should be loyal by automatically siding with the person when they’ve been in an argument with others. → A partner should always want do to things with the person, devoting time and attention to the relationship → A partner should choose the person above all others at all times. → A partner should allow the person to continue to takeRead MoreEmotional Intelligence15079 Words   |  61 Pagesis having is to have a leader who is compelling and inspired to do their work (Burns, 1978). Until the twentieth century that is when leadership was studied scientifically. What determines leadership was the main focus of the study (Yukul, 1998). Sources of power of the leaders, behaviour that is exhibited by the leaders, traits that make up good leaders and also the abilities they have as leaders were the areas that were focused on in social sciences. A new base of the influence of leadership wasRead MoreMarketing Management130471 Words   |  522 Pagesrelations Understanding individual consumer behaviour Understanding industrial consumer behaviour Customer satisfaction Customer relationship management Marketing of services Rural marketing Types of marketing research Process of marketing research Tools and Techniques of marketing research Applications of marke ting research Preparation of marketing research report Online marketing E-commerce Trends in marketing Page No. Marketing management – an introduction Unit structure: 1. Introduction

Wednesday, May 6, 2020

Girl in the Window Analysis Paper Free Essays

Brittaney Doss ENG 303 November 15, 2012 Girl in the window Response Questions 1. What is your initial reaction to this piece? Use descriptive language to describe how you felt while reading this. * I endured several emotions while reading this piece. We will write a custom essay sample on Girl in the Window Analysis Paper or any similar topic only for you Order Now It was an emotional roller coaster for me. Emotions of sadness, hopefulness, and happiness came over me while reading this piece. I was floored when reading the conditions of the home in the beginning of the piece; I couldn’t believe that people could live in such conditions, yet alone with a baby. I also was taken for a loop when I read the consequences that the mother received. I was extremely upset with the protocol of Child Protective Services. The testimonial from the mother made me angry. I too grew up in a toxic situation for most of my childhood. Although my conditions were not comparable to the environment that Danielle was in, I could feel that look that the writer described as pain and hopelessness. I could not have sympathy for this woman and I couldn’t accept how she could justify her actions. 2. What is investigative journalism? * The journalist investigates and researches a specific topic for a long period of time. They use the newly found information and older facts to create the story. Their job is to uncover facts that have not been revealed. 3. Lane DeGregory (woman) wrote this piece. What can you find out about her online? * When I searched Lane I found links to her social network accounts, videos and personal website. I also found several articles about â€Å"Girl in the Window. † There was additional information on the journey that he endured while investigating Danielle’s story. Her copartner Melissa, who was a photojournalist, revealed information about Lane. I found information on how to contact and book her for group talks and information about other pieces in which she has written. 4. Discuss Lane DeGregory’s style in your own words. What’s working in this piece to make it a Pulitzer Prize winner? * She was able to incorporate imagery using descriptive words and placed quotes within the piece that added emotion and sensory. The chronological arrangement of the piece was done differently she started from beginning to end and kept it in order but also added known facts and interview questions that flowed and the transitions where very easy to follow. I thought the sub headings with in the story also created a change of scene almost. She incorporated all sides of the story from the social worker to the law enforcement to the doctors to the teachers to the adopting family and to the mother. It was like reading a documentary. After reading this peace I had no questions about what was next I felt that Dani was in great care and I had no doubt that she would get better. She didn’t leave a hanger for the reader. I was complete at the end of the article. That to me made it Pulitzer Prize worthy. 5. How does â€Å"Girl in the Window† differ from other articles we’ve read? * The Girl in the Window reads like a story rather that an article. It has a rising action and a resolution. Normally articles don’t end with the happy ending; you have to research or follow up to find out more information. Lane included a start middle and ending to the piece. At the end of the article I felt like I was closing a book or there would be credits following the last word. 6. What qualities does it share with other articles we’ve read? * The very first article we read about James Cameron shares similar qualities. Both writers had to endure a long journey to collect information for these pieces. You can compare the on-site time spent by both authors. The two articles couldn’t have been written with dedicating the proper time. 7. What techniques were utilized and how did this article come together? * Lane used details and ravishing quotations throughout the piece. It was a timeline piece use great transitions and subheading to help the reader keep up. She used descriptive words and did a amazing job setting the scenes as she wrote about them. 8. How did Lane DeGregory build her characters in the story? Lane gives us background information about the Lierows and then at the end she lets us into the background of Dani’s birth mother. She lets the readers know about the characterictics of the Lierows by sharing their daily activities and there at home lifestyles. 9. What did Oprah do after she learned/read this article? * Oprah did a segment on Dani’s story and the exposure lea d to strangers donating over $10,000 to fund her long term care cost. Later her parent released a book this year called Dani’s Story: A Journey from Neglect to Love. How to cite Girl in the Window Analysis Paper, Essay examples

Sunday, May 3, 2020

Australian Regional Retailer Of Foodstuffs - Myassignmenthelp.Com

Question: Discuss About The Australian Regional Retailer Of Foodstuffs? Answer: Introducation Webbs Stores is an Australian regional retailer of foodstuffs. The main data centers of this retailer are in Melbourne and Sydney. The other regional data centers are in Brisbane, Wagga, Auckland, Port Macquarie and Bathurst. They have decided to take cloud computing in their business. The main problem that Webbs Stores are facing is the operational complexity, application complexity and management of data (Almorsy, Grundy Mller, 2016). They have thought of closing their data center in Auckland rather than replacing or updating the existing infrastructure. The services and the data are moved to the cloud. They are also planning to run a Risk and Security Workshop to assess the security threats, risks and the probable methods of control required for hybrid cloud. The report outlines the brief description of the case study of Webbs Stores. It covers the advantages of migration of data from MS SQL Server 2012 R2 database to IaaS instance in cloud. It also covers the risks that are associated for the migration of data and services with proper details (Garg, Versteeg Buyya, 2013). The report further describes the utilization of cloud in backup and for the removal of records. The final part of the report gives a description about the procedure of protecting access to the services for moving to the cloud. Proper recommendations are also provided in the report. Discussion Webbs Stores are migrating their data and services from MS SQL Server 2012 R2 databases to an IaaS instance in the cloud. The type of cloud security policy that can be deployed for protecting the critical database after moving to an IaaS instance in a public cloud is the authorization and authentication (Hashizume et al., 2013). Cloud computing is the way of utilizing the network of several remote servers that is hosted to control, store and process data on the Internet. Authentication is the procedure to enable confidence in the identities of the users. The Security Assertion Markup Language or SAML is an open standard data format that are utilized for authentication in cloud computing. Authorization is the permission given to a sanctioned individual or organizational body to access any confidential data or service. Webbs Stores is dealing with high security data and services. It is evident that the authority will not give permission to access their data and services. The security p olicy of authentication and authorization will provide them excess security and there will be extremely low chances of the data being hacked (Malawski et al., 2013). Moreover, cloud computing modules are extremely safe and secured and thus it can be claimed that if Webbs Stores will migrate their MS SQL Server 2012 R2 database to an IaaS instance, they should undertake authentication and authorization security policy. Benefits and Issues of Deployment Webbs Stores is taking authentication and authorization policy for the security of their data in the cloud. They will get several benefits if they will deploy this particular policy in their organization. The main advantages of this policy are as follows: i) Scalability: This security policy provides excellent scalability to the database (Li et al., 2013). This will be extremely helpful to the company. ii) Flexibility: Another main advantage of this security policy is that the entire system becomes flexible. iii) Cost Effective: The third advantage of this security policy is that the maintenance cost becomes lower and thus can be claimed as cost effective. iv) High Security: This is the most important benefit if this policy. The security level is extremely high, which makes it popular for all organization (Arora, Parashar Transforming, 2013). The authentication and authorization policy allows only authorized users to access the data in authenticated servers. However, in spite of the above-mentioned benefits, authentication and authorization policy undergoes several issues (Tao et al., 2014). The issues that Webbs Stores can have after deploying this security policy are as follows:i) Complexity: The main issue that is faced after deploying this type of security is the complexity. The authentication and authorization sometimes become extremely complex after it is deployed.i) Brute Force Attacks: This is another dangerous issue that is faced when this type of security is deployed (Wei et al., 2014). Brute force attacks are extremely dangerous for any organizational databases. It opens the way for intruders and hackers and the data can be leaked. iii) Storage: When password authentication is used, the usernames and passwords should be stored in a database for authentication purposes. Storing of these passwords are done in a particular database. The storage can be easily hacked and the passwords and the usernames can be easily stolen. iv) Encryption: Encryption is mandatory for this type of security (Garg, Versteeg Buyya, 2013). However, there is a high chance that symmetric or the asymmetric key would be lost and the user can be in problem. Risks for Migration Risks and threats are evident and common in case of data migration. Webbs Stores is migrating their database to an IaaS instance in public cloud. Several risks can occur in case of database. The risks that applies to the database are as follows: i) Data Loss: This is the principal risk that comes into account when data migration is done. There is a high chance that the data would be loss when the data is being migrated (Hashem et al., 2015). The database might lose the data completely. ii) Corruption of Database: There is always a chance that the database would be corrupted. This type of risk is very common in migration of data. The database even cannot be recovered any more. Webbs Stores should be careful before they migrate their data. The IaaS Infrastructure The risks applied to the Infrastructure as a Service database are as follows: i) Insider Threats: The main risk that is applied to the IaaS instance while migration of data is the insider threats (Hashizume et al., 2013). An IaaS database in a public cloud allows and enables internal administrator to access the entire database and data. Webbs Stores should be careful enough before migrating their data. ii) Denial of Service: This is another important risk that can take place in case of migrating the data in IaaS infrastructure. When a client utilizes the cloud resources, the service quality of the other clients are degraded. The hackers use this opportunity and utilize all the shared resources to slow down the system and even deny the cloud services (Malawski et al., 2013). This type of attack is known as denial of service or DoS attack that prevents the clients from accessing the resources. The Communications There are several risks in communications between the Webbs Stores and the IaaS database. They are as follows: i) Data Breach: This is the main risk that can occur while communication between IaaS and Webbs Stores (Fernando, Loke Rahayu, 2013). Data can be easily breached while migration. ii) Incompatible Database: This is the second type of risk that can occur while communications between IaaS and Webbs Stores. Database should be compatible so that there exists no issues. Cloud for Backup and Removal of Records Webbs Stores should back up their data periodically. However, there are few risks that can take place while this backup. They are as follows: Security: This is the most common risk while backing up of data is done. Data gets lost and can never be recovered once lost. Control over Data: When data is backed up, the client of the cloud gets complete control over that data (Hashem et al., 2015). This sometimes turns out to be risky as the cloud provider gets complete access and control over that data. He might not be trusted person and data can be theft. Webbs Stores may face several risks while storing their data in the cloud storage. The risks related to this are as follows: Security: This is again the most common risk in case of cloud storage. There is a high chance that the data would be lost and cannot be recovered (Wei et al., 2014). Moreover, there is a chance that the data can be theft or hacked. Lack of standardization: Vendors do not follow a standard set of rules and protocols for business support. Therefore, Webbs Stores should select their vendor carefully to avoid any type of storage risks. Webbs Stores might undergo several risks while retrieving their data from the cloud (Dinh et al., 2013). The risks applied to retrieval of data are as follows: Data Leakage: There is a high chance that the data can be leaked while retrieval. This type of leakage is extremely common in case of public cloud. Snooping: This is another most common risk in case of data snooping in cloud. The hacker or the intruder can snoop in or look into the data while retrieval of data is done. Cloud disaster recovery or DR is the strategy for backup and recovery of data, which is used for maintaining and storing of the electronic records for a security measure (Li et al., 2013). Cloud backup plays a very significant role in cloud disaster recovery plan. When Webbs Stores is migrating their data to the cloud database, the DR plan helps them to simplify the process. They do not have to migrate everything rather if they will only migrate their storage. The main advantage that Webbs Stores will get is that after deploying cloud back up is that a copy of their data will be sent in a public network to an offsite server (Rahimi et al., 2014). A provider of third party, who charges, normally hosts this server to the customers. The main advantage of backup and restore strategy is that the data can be easily backed up. It will be helpful to Webbs Stores as there will be a scope for backing up of data. This will change the entire system of database of this organization. Another advantage of data backup and restore strategy is that the data can be easily recovered by this strategy (Sanaei et al., 2014). If there is a chance that the data can be lost during migration, this strategy will help Webbs Stores to recover their data quickly and easily. Protecting Access and Recommendations Webbs Stores should be careful before providing access to the data and services. Only the authorized and sanctioned individuals would get the permission to access the services and data. There should be an authority only to look into the matter of authorization of access to the services. IaaS Infrastructure The infrastructure of IaaS is an extremely delicate infrastructure that should be utilized by only authorized users. Two methods are recommended to Webbs Stores for protecting access to IaaS infrastructure. They are as follows: i) Physical Access to Infrastructure: The physical access to the IaaS infrastructure should be secured and protected so that unauthorized users are not able to access it (Dinh et al., 2013). Cloud vendor controls these. Precisely, it is recommended that the access to the physical server must be monitored and managed regularly. ii) Access via API: Cloud infrastructure works best and with great speed with management. It is automatic via API (Xiao, Song Chen, 2013). It is recommended for Webbs Stores that they should take care of the fact that unauthorized utilization of API should not exist at all. MS SQL Server 2012 R2 Cloud Instance The access to the MS SQL Server 2012 R2 can be easily protected by adopting certain security measures. The recommended security measures of access for MS SQL Server 2012 R2 are as follows: i) Physical Access: There should be a strict limit for accessing the physical server and the hardware components. The server should utilized by authorized users so that the access can be controlled. ii) Operating system Access: Webbs Stores should be careful about their access to the operating system of cloud network infrastructure. The main protection that Webbs Stores can take is the firewalls (Fernando, Loke Rahayu, 2013). They provide excess security and thus protect and control the access to the operating system. Moreover, it separates and restricts the network traffic. Cloud Network Infrastructure Webbs Stores should be careful about the protection and control of access to the infrastructure of cloud network. The recommendations that would be helpful for the cloud network infrastructure are as follows: i) Protection against External and Internal Threats: Security infrastructure should be secured so that no external and internal threats can attack (Rittinghouse Ransome, 2016). The information security team can assess the performance of the system on regular basis for relevant improvements. Webbs Stores should protect and control the access of their cloud network infrastructure so that the threats do not take place. ii) Server Monitoring: The server should be monitored and controlled time to time so that the access can be protected easily (Whaiduzzaman et al., 2014). The cloud network infrastructure is the most important hardware and software components that complete the entire cloud infrastructure. Cloud Backup and Restore Infrastructure Webbs Stores should be careful about the control and protection of access to the cloud backup and restoration infrastructure (Rahimi et al., 2014). There are certain recommendations for this organization for backing up and restoring their data in the infrastructure. This particular infrastructure can be protected by few recommendations. They are as follows: i) Encryption: This is the best solution for any confidential data. The data should be encrypted so that all the users are unable to retrieve those data (Avram, 2014). This encrypted data form will be helpful for protecting access to the cloud backup and restore infrastructure. ii) Passwords: The cloud backup and restore infrastructure should be password protected so that it is not accessible to everyone (Botta et al., 2016). Moreover, this password should be biometric protected so that only authorized individuals will be able to access it. These recommendations would be helpful and useful to the Board of Webbs Stores for their successful migration of data to the IaaS cloud and their backup and restore strategies. Conclusion Therefore, from the above discussion it can be concluded that Webbs Stores is an Australian regional retailer of foodstuffs. The main data centers of this retailer are in Melbourne and Sydney. The other regional data centers are in Brisbane, Wagga, Auckland, Port Macquarie and Bathurst. They have decided to take cloud computing in their business. The main problem that Webbs Stores are facing is the operational complexity, application complexity and management of data. They have thought of closing their data center in Auckland rather than replacing or updating the existing infrastructure. The services and the data are moved to the cloud. They are also planning to run a Risk and Security Workshop to assess the security threats, risks and the probable methods of control required for hybrid cloud. The above report gives a detailed discussion about the benefits and problems in migration of data to the IaaS instance in cloud. The report also provides the detailed research about the risks a nd challenges about the database, the infrastructure of IaaS and the communications between Webbs and the IaaS database in the cloud. Webbs Stores is also considering to utilize cloud for their backup and archival of records. The report also helps to understand the probable risks and issues associated with the backup, storage and retrieval of data from the cloud. This cloud backup will also affect in their disaster and recovery plans. This strategy would be helpful for Webbs Stores. Moreover, relevant recommendations are provided for protecting the access to the MS SQL Server 2012 R2, infrastructures of IaaS, cloud network and cloud back and restore. References Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Arora, R., Parashar, A., Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms.International journal of engineering research and applications,3(4), 1922-1926. Avram, M. G. (2014). Advantages and challenges of adopting cloud computing from an enterprise perspective.Procedia Technology,12, 529-534. Botta, A., De Donato, W., Persico, V., Pescap, A. (2016). Integration of cloud computing and internet of things: a survey.Future Generation Computer Systems,56, 684-700. Dinh, H. T., Lee, C., Niyato, D., Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches.Wireless communications and mobile computing,13(18), 1587-1611. Fernando, N., Loke, S. W., Rahayu, W. (2013). Mobile cloud computing: A survey.Future generation computer systems,29(1), 84-106. Garg, S. K., Versteeg, S., Buyya, R. (2013). A framework for ranking of cloud computing services.Future Generation Computer Systems,29(4), 1012-1023. Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., Khan, S. U. (2015). The rise of big data on cloud computing: Review and open research issues.Information Systems,47, 98-115. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. Li, M., Yu, S., Zheng, Y., Ren, K., Lou, W. (2013). Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption.IEEE transactions on parallel and distributed systems,24(1), 131-143. Malawski, M., Juve, G., Deelman, E., Nabrzyski, J. (2015). Algorithms for cost-and deadline-constrained provisioning for scientific workflow ensembles in IaaS clouds.Future Generation Computer Systems,48, 1-18. Rahimi, M. R., Ren, J., Liu, C. H., Vasilakos, A. V., Venkatasubramanian, N. (2014). Mobile cloud computing: A survey, state of art and future directions.Mobile Networks and Applications,19(2), 133-143. Rittinghouse, J. W., Ransome, J. F. (2016).Cloud computing: implementation, management, and security. CRC press. Sanaei, Z., Abolfazli, S., Gani, A., Buyya, R. (2014). Heterogeneity in mobile cloud computing: taxonomy and open challenges.IEEE Communications Surveys Tutorials,16(1), 369-392. Tao, F., Cheng, Y., Da Xu, L., Zhang, L., Li, B. H. (2014). CCIoT-CMfg: cloud computing and internet of things-based cloud manufacturing service system.IEEE Transactions on Industrial Informatics,10(2), 1435-1442. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A. V. (2014). Security and privacy for storage and computation in cloud computing.Information Sciences,258, 371-386. Whaiduzzaman, M., Sookhak, M., Gani, A., Buyya, R. (2014). A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, 325-344. Xiao, Z., Song, W., Chen, Q. (2013). Dynamic resource allocation using virtual machines for cloud computing environment.IEEE transactions on parallel and distributed systems,24(6), 1107-1117.

Wednesday, March 25, 2020

Information systems in Best Buy

Introduction This essay discusses information systems usage in Best Buy. It starts by introducing Best Buy, and then it proceeds to discussing its business process in general. Having identified key areas, it underlines the involvement of information systems in the business process as well as the improvements they bring.Advertising We will write a custom assessment sample on Information systems in Best Buy specifically for you for only $16.05 $11/page Learn More The essay also identifies an issue Best Buy is currently facing, and describes the role that information systems can play in improving the situation. Best Buy in brief Best Buy is an American retailing company, operating in the North America, South America, Europe, and Asia. Richard M. Schulze and Gary Smoliak founded it in 1966. The company specializes in consumer electronic products and services. It is now â€Å"the world’s largest multi-channel consumer electronics retailer with stores in the United States, Canada, China, Europe, and Mexico† (Best Buy, par. 1). With 1 billion visits to its websites annually, Best Buy is ranked the 11th biggest online retailer in the North America (Best Buy, par. 1). The revenue of the company in 2012 was $50.70 billion (Yahoo! Inc., par. 3). Its net income for the same year was $1.231 billion (Yahoo! Inc., par. 26). The company is currently listed on the New York Stock Exchange (NYSE) under the SP 500 stock market index. The total assets and equity of the company in 2012 were valued at $16.005 billion and $3.745 billion respectively. Best Buy’s business process in general Best Buy as mentioned above is a retailing company, as such its business process is centred on eight key areas. The first area, which is supply chain management, ensures that customers receive merchandise at the right time and in the proper condition. The second area is warehouse management, which ensures that the company’s inventory is proper ly controlled and managed. The third area, order processing, ensures that orders made by customers are properly serviced. The fourth area is business intelligence, which ensures that the company uses existing raw data to improve its operations and service delivery. The fifth area, performance management, ensures that the company is achieving its short-, mid- and long-term goals in a cost and time efficient manner.Advertising Looking for assessment on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The sixth area is customer relationship management, which ensures that the company’s interaction with its current and future customers is modelled in such a way that it is in synchrony with sales, marketing, technical support as well as customer service. The seventh area, business process automation, ensures that the company’s expenditure and operational costs are reduced through automation of certain manual tasks. The eighth key area is brand management, which ensures that there is brand awareness and recognition for its brand. Map of business process The map of Best Buy’s general business process is shown in figure 1 in Appendix A. The map is prepared using radial circles. Involvement of information system in the business process An information system (IS) is â€Å"a set of interrelated components that collect (or retrieve), process, store, and distribute information to support decision making and control in an organization† (â€Å"Andragogy: Information Systems: Definitions and Components † 24). The involvement of information systems in Best Buy’s business process is for two main reasons. The first is to integrate information technology into the process as a means towards reducing operational costs, maximizing sales, and gaining a competitive advantage (Windnagle). The second reason is to encourage innovation, which facilitates the invention of better ways of do ing the tasks, incorporated in the business process (Windnagle). How could information system improve the business process One way in which information systems can improve Best Buy’s business process is by means of decentralization. Decentralization frees up resources and creates time for departmental managers. As such, it facilitates them to take on more strategic level activities. Consequently, the strategic goals of the company have a better chance of being achieved in a time and cost efficient manner. For a given information need, information systems provide in high speed the best available information. In this way, Best Buy’s business process benefits from better and faster decision-making.Advertising We will write a custom assessment sample on Information systems in Best Buy specifically for you for only $16.05 $11/page Learn More For instance, a member of staff can provide the best response to a customer’s query without an un necessary delay. As such, many queries can be handled satisfactorily. Better decision making, therefore, leads to the customer satisfaction, increased sales, and reduced operational costs. Information systems can improve Best Buy’s business process by providing better security of the information that customers entrust with Best Buy. Poor information security and age can ultimately lead to heavy lawsuits, which have the potential to bankrupt the company even, such a big enterprise as Best Buy. Therefore, better information security is a vital component in improving Best Buy’s business process. Identify a suggestion for improvement One of the major problems Best Buy is facing is an unfriendly customer service in some of its stores (Loeb, par. 8). Though this problem can be solved through better employee ethics, information systems can also play a significant role. Managing customer relationships through information systems can help Best Buy model its interaction with its existing and future customers in such a way that, the interaction is in line with the customer service as well as technical support. This means that there is a working relation between staff, resources, and customers, allowing Best Buy to attend to customers’ queries on time, fully and satisfactorily. Therefore, information systems dedicated to customer relationship management is only one way in which the company can improve its business process. Summary Since information systems have the ability to provide quick access to information and to present it in a user-friendly way, they are a vital component for improving Best Buy’s business process, which involves eight key management areas. Quick access to information and its presentation in a way which is easy to understand as is done by information systems, facilitates better decision-making, time and cost efficiency, being essential ingredients of any business success. If Best Buy is to maintain or improve its rankings , then its strategic management has to consider exploiting the full potential of information systems.Advertising Looking for assessment on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Works Cited Andragogy: Information Systems: Definitions and Components 2012. PDF file. 2013. Web. Best Buy. 2013. About Best Buy. Web. Loeb, Walter. Best Buy in turmoil: Will it survive?  2012. Web. Windnagle C. Re: How information systems impact processes.  2012. Web. Yahoo! Inc. 2013. Income statement.  Web. Appendix Fig 1: The map of the business process of Best Buy This assessment on Information systems in Best Buy was written and submitted by user Sadie Glover to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Friday, March 6, 2020

How suspense is created in the ghost story The Signalman by Charles Dickens Essay Example

How suspense is created in the ghost story The Signalman by Charles Dickens Essay Example How suspense is created in the ghost story The Signalman by Charles Dickens Paper How suspense is created in the ghost story The Signalman by Charles Dickens Paper Essay Topic: Literature In this essay I am going to examine how Charles Dickens creates suspense. Written during Victorian times, Dickens wrote the piece after being personally involved in a train crash. The Signalman is themed over the gothic supernatural and The Industrial Revolution. The Signalman is about a signalman who foretells different accidents and events on his line. Later he foretells something far more sinister. The piece was at the time when Frankenstein was written by Mary Shelley. The Signalman opens in the first person. This immediately creates suspense not just through the person its wrote by the words used these being: Halloa Below there The person who shouts this is the narrator. With the reader not knowing whats going on it causes natural apprehension. At this early stage we do not know which of the men, if any are ghosts, as they have not verbally interacted with each other. When the narrator does call to the Signalman he only reacts physically not verbally: He looked up without replying This creates a mood of great tension for the reader, as they dont know what is about to happen. The story is set at the mouth of a tunnel along a railroad. The tunnel is dark inside and unwelcoming. This helps to create mystery. As readers we are intrigued by this opening, as we dont know what is going on in this tunnel. This suspense is made even tenser through the way the story is written. Dickens uses many devices such as first person narrative, the detailed description and the swapping between first and third person views. Suddenly a steam train, often an emblem of the Industrial Revolution, exits the mouth of the tunnel. Dickens describes it as: Vague vibration in the earth and the air, quickly changing into a violent pulsation and a oncoming rush. Vapour as to rose to my height this rapid train had passed me This phrase reflects the fear of the steam trains during the Industrial Revolution era. As the narrator approaches the signalman he describes the setting and journey through detailed description. I particularly like this: A clammy stone that became oozier and wetter as I went down These descriptive adjectives bring interest and even more immediate suspense to the story and sentence. This technique is used to great affect to create huge amounts of suspense to describe the location of the signalmans box on the line: On either side, a dripping wet wall of jagged stone excluding all view but a strip of sky. the gloomier entrance to a black tunnel, in whose massive architecture there was a barbarous, depressing a forbidding air This again demonstrates the technique Dickens uses to create the suspense required for this story which was set in the Gothic supernatural period. Dickens also uses detailed description of the senses: Earthy, deadly, damp smell This description of his sense of smell creates a vivid picture of rottenness for the reader. Dickens also describes how dark it is in the setting: So little sunlight ever found its way to this spot This detailed description like the one before uses very interesting adjectives to create a picture of horror, rottenness and really a sinister setting for the reader which is typical of the storys genre. These descriptions make the narrator feel uncomfortable with the way the situation is going for him. The time period for which The Signalman is set is over a 3-day period of time the story never really leaves this setting; the characters always meet at the mouth of the tunnel the only safe way to get there being: . rough zigzag descending path notched out, This creates suspense though the word zigzag in particular as it gives the impression of a Z-shape path which I think adds to the impression of being sinister. The story of The Signalman this title is also the name of the main character. He has a very important but boring job. He has to maintain safety on the line the signalman and takes his job very seriously: In the discharge of his duties I observed him to be remarkably exact and vigilant, breaking off his discourse at a syllable and remaining silent until what he had to do was done So the signalman took pride in his job and cared about his job and the safety of the passengers on the line. At the first meeting of the characters the signalman does not respond verbally to the narrator. Perhaps the signalman is slightly sacred and this adds anxiety to the story as many people might think a visitor would be a rarity. The narrator first describes the signalman as: Dark sallow man, with a beard Which gives a very sinister impression, which causes great suspense for the reader. Dickens doesnt stop there with his description of the signalman: . Saturnine Face. This gives us the impression of evil and of gloom these descriptive adjectives add great suspense to the story. The narrator, as the story progress realises that the signalman is very intelligent. So intelligent that he attended university but had gone wild and had got kicked out probably. . Had attended lectures. But he had run wild. Gone wild gone down and never risen again. This shows the signalman wasted his life and opportunities. So he was stuck in his job as a signalman. The Signalman takes his job very seriously he has to. The travellers lives are in his hands so he would do all his jobs then carry on talking with the narrator: Remaining silent until what he had to do was done This shows the signalman really does care when he is doing his job. The signalmans manner is one of caring, fear and intelligence. This fear is his evident fear of the bell: Turned his head to the bell when it did not ring This shows the first bit of sinister activity from the signalman. This creates tension for the reader. This bit of madness is also picked up by the narrator. The fear of the bell plays a significant role within the story. The signalman has numerous conversations with the narrator. The first being the one where the signalman tells the narrator he use to be contented but is now a man of trouble: . But I am troubled sir, I am troubled. This immediately shows hes distressed and creates suspense for the reader, as they want to know what is troubling the signalman. The Signalman tells the narrator he will tell of his troubles if he ever returns so they agree to meet the next day at 11:00 PM. The signalman tells the narrator not to yell down when he arrives at the top path the next day. We as readers wonder why? This natural wonder creates great uncertainty. When the narrator does return the signalman tells of his troubles with the spectres and of his past experiences with them on the line. He also tells of the memorable accident on the line. As he talks he is adamant he saw a figure on the spot where the dead and wounded where carried. . Within ten hours the dead and wounded were brought along the tunnel over the spot where the figure had stood. These few lines create immediate suspense for the reader as this will have been a remarkable coincidence and the reader will be keen to know more. The signalman also tells us about his second spectre appearance months after the first. Only this time the signalmans spectre appeared at the mouth of the tunnel in an impression of mourning. Later that day as a train passes his box the signalman sees panic in one of the carriages and stops the train and a: A beautiful young lady had died instantly in one of the compartments. This would cause much more tension and suspense for the reader, as this will be yet another coincidence. In this second visit by the narrator we learn why the signalman is so scared. As only a week ago he started to see the spectre and he keeps seeing it at the mouth of the tunnel: The spectre came back a week ago. Ever since then it has been there by fits and starts This causes even more apprehension for the reader, as they, like the signalman want to know what the spectre is doing here. What both the Signalman and the reader dont know is that the Signalman is seeing his own tragic and sinister death. The Signalman also believes he is the only one who can see the spectre. As after the recent appearances the narrator can not see it. Which suggests the signalman has gone mad. The Signalmans state of mind by this time is one of aggressive madness, which the narrator describes as most pitiable: His pain of mind is most pitiable to see After reading this the reader I think will be saddened and feel pity for the signalman in his madness. I think Dickens uses the character of the signalman to put across suspense in the story. We now move on to analyse the character of the man who tells the story the narrator. In my opinion at the time he would have been a Victorian man interested in the stream trains who wanted to take his interest further. He goes to a signal box to find out more. The narrators account of The Signalman changes from first to third person and back again frequently. This creates increasing suspense and tension for the reader. The narrator holds many different feelings and thoughts as his friendship with the signalman blossoms. For example when he hears of the signalmans evident fear: His pain of mind was most pitiable This shows that the narrator feels sorry for the signalman as he may be going mad. He also feels an urge to help the signalman. After hearing both accounts of the signalmans spectres the narrator, an intelligent, formal man wants to help the signalman overcome his madness. He reacts similarly as he did after he heard the first account: . Across his temples in extremity of feverish distress. This again shows the narrator is at his wit end with what to do to help the signalman. The narrator in my opinion is a kind intelligent man. From the signalman we are able to work out what class of person the narrator is as the signalman refers to the narrator as: Sir From this we know the narrator is middle class and is a man of common sense and intelligence. So after there second meeting they decide to meet again. This itself shows two things one that he cares and two hes curious. We as readers now feel he is the mysterious wise old man. Men of common sense did not allow for coincidence in making the ordinary calculations of life This shows the narrator is an intelligent man of logic who thinks with common sense. After hearing of the recent ghost he is evidently scared and disturbed. So after much deliberation the signalman agrees to accompany him to a physicist. So the narrator leaves and the signalman, in his absence dies after being mowed down by a train. In my opinion the narrator becomes wiser. There is a certain twist in the tale that the signalmans prediction was actually a premonition of his own death as he told the narrator the exact words the train driver said after he had mowed the signalman down: Below there! Look out! Look out! For gods sake clear the way We can therefore see how Dickens created suspense and tension in The Signalman These devices ranged from suspense through the characters actions to the swapping of the views (First and Third) I think The Signalman is a bit dull compared to todays literature for example Philip Pullmans Dark Materials. It was written 100 years ago and the language and expectations of todays readers have obviously changed.

Wednesday, February 19, 2020

Contemporary Punk and Rock Bands In Religion Essay

Contemporary Punk and Rock Bands In Religion - Essay Example On the other hand, as science progresses to unparalleled heights, belief in a supreme being soars as well so that in a world of increasing chaos and confusion, the presence of individuals and groups that profess their found peace, calm, and sustenance serve as an oasis, if not an inspiration altogether for those who are in between. In many instances, personal beliefs and interests serve as jumping point for careers such as those who love cuisines putting up their own restaurants, divers serving a diving instructors, and related tasks and forms of occupations. This can be said about musicians, too. It is just a matter of interest and personal inspiration. But to some, it may go deeper, or elsewhere. This essay shall try to establish if faith weighs far more than fame for contemporary punk and rock bands through observation and previous literatures. I myself would have loved to interview bands to find it out but due to time and resources constraints would have to use any available sources. Discussion: Religion and Pop Culture It has been suggested that there was a notable relationship between religion and the construction of the identity of the United States of America as can be glimpsed in literatures (McCloud, 2004; Hendershot, 2004; Chidester, 2005). McCloud (2004) traced news coverage of religious movements from the 1950s banal tone and exoticism to brainwashing and coercion in the 1970s and beyond arguing that these served to reinforce assumptions that traditional Christianity is central in US life. Likewise, it also allowed the perceived "outsiders" of the white, middle class and heterosexual fold to be prejudiced. Hendershot (2004), on the other hand, offered an intriguing rationale traditional adherents engage in the consumption and development of a Christian retail industry, arguing further that "to purchase Christian products is to declare one's respectability in a country in which people are most often addressed by mass culture not as citizens but as consumers," (p 30). She proposed that Christian media have become more ambiguous citing crossover artists Jars of Clay, Sixpence None the Richer, Hansen and Creed in the Christian music industry who attained wider audience using insider language in order to appeal to evangelical supporters. Chidester (2005) suggested that "to recover the religious, creative, and imaginative capacity of America, we need to understand and appreciate the religious work and religious play of authentic fakes in American popular culture," (p vii). Butler's (2003) review on 1970s rock-an-roll band Black Oak Arkansas and their "Lord Have Mercy on My Soul" from the album Black Oak Arkansas had him comment that the "preoccupation with damnation and salvation [] is no aberration in the southern rock movement [] bands [] often expressed a seemingly earnest preoccupation with religious matters. The songs lyrics and personal lives of southern rockers demonstrate a constant struggle between sin and salvation." (p 73). He also noted that the use of evangelical ethos is seemed to be easily camouflaged with the rebellious lyrics. Spiritual Punk Rock But this essay will not look further. The most notable punk rock band Nirvana, or its late frontman Kurt Cobain will be the focus here. Zajicek (2006) quoted lecturer Dennis O'Brien, "I think he was a very religious man. He was very much influenced by Christianity, and if you listen closely enough to Nirvana, you'll find all kinds of religious thematics. You'll find that's true in a lot of rock music," referring to Cobain. In his "Smells Like Teen Spirit" 1991 anthem, Cobain wails, "I'm worse at what I do best With the lights out it's less

Tuesday, February 4, 2020

Program Enhancement Essay Example | Topics and Well Written Essays - 250 words

Program Enhancement - Essay Example Under this program, young teenagers who have pleaded guilty of minor crimes are taken to a court that is run by teenagers who act as judges, attorneys, and bailiffs. The Teen Court then sets the punishment for the offenders, which include community service, touring a jail, writing apology letters or essay on assigned topics, or attending school regularly (Boys Scout of America, 2010). The Teen Court is effective since it is teenagers who offer judgment and punishment to the offenders. In addition, giving the fact that defendants must also serve in the court as judges, there is less likelihood that they will take part in crime again since they would also have participated in punishing a crime (Boys Scout of America, 2010). In order to enhance the effectiveness of the program, repeat crime either minor or major should warrant for formal prosecution at the juvenile justice system. Secondly, the program should ensure that teenagers who participate in the court proceedings are sourced from other regions so that they remain unknown to the court offenders and hence give an opportunity for fair

Monday, January 27, 2020

Can A Suspect Be Interviewed Without Legal Representation?

Can A Suspect Be Interviewed Without Legal Representation? A suspect is in custody for robbery and the OIC wants to interview him as soon as possible without legal representation. The custody officer declines this request and a solicitor is brought to the police station. During questioning, it became necessary, in order to clarify the interviewees account, to pose questions which had already been asked. The solicitor argued that this is not permitted. There is then a break in the interview and when it is re-commenced the solicitor reads out a pre-prepared statement. Consider the above paragraph and paying particular regard to legislation, case law and the PACE Codes of Practice comment and critically evaluate under what circumstances can a suspect be interviewed when legal representation has been withheld. Secondly whether the solicitor is correct in his assumption that questions which have already been posed cannot be repeated. Thirdly the dangers for the defence in submitting a pre-prepared statements. Word Limit 2500 Word Count 2415 Circumstances under which a suspect can be interviewed when access to legal advice is withheld: In order to look into circumstances in which a suspect can be interviewed in the midst of delayed legal advice access, the criteria which must be met to make this delay must first be explored. The relevant legislation which governs the delay of legal advice comes from s.58 of the Police and Criminal Evidence Act 1984(PACE), in particular part (6) of the section, which states; Delay in compliance with a request is only permitted (a) in the case of a person who is in police detention for a serious arrestable offence; and (b) if an officer of at least the rank of superintendent authorises it. The request, for the purposes of this section, is a request to have legal access delayed for the suspect. The legislation is succinct; however, the codes of practise which need to be followed in order to successfully prevent legal advice from attending the interview, presents an officer of rank equal to or higher than superintendant, with a number of criteria which must be fulfilled before the delay is granted. Failure to follow these codes could bring the relevant officers up for disciplinary proceedings. Such failure occurred in the case of R v McGovern  [1]  , where the defendant was of limited intelligence and was unable to understand the caution. She was denied legal advice, and as such the subsequent confession she made was not admissable in court. Following from this breach of s.58 PACE, the second interview in which she was granted legal advice resulted in a confession. However, the conduct in the first interview was deemed to have tainted the second, and so this confessi on was also denied. Delay can only be made for a time period of up to 36 hours, after which legal advice must be granted, regardless of circumstances.  [2]   Under Annex B(Para.1) of PACE, there are 4 criteria from which an officer must find good reason to request a delay; Failing to exercise the delay would: (i) lead to: à ¢Ã¢â€š ¬Ã‚ ¢ interference with, or harm to, evidence connected with an indictable offence; or à ¢Ã¢â€š ¬Ã‚ ¢ interference with, or physical harm to, other people; or (ii) lead to alerting other people suspected of having committed an indictable offence but not yet arrested for it; or (iii) hinder the recovery of property obtained in consequence of the commission of such an offence  [3]   Specific circumstances must be in place to delay access to a solicitor, and there must be clear evidence that the solicitors presence will result in one of the four criteria above occurring. This was the case in R v James Ors  [4]  , where confessions were obtained whilst in the absence of legal advice. The court heard that there was no specific evidence with regards to the unlawful conduct under part (ii) (above), of the individual solicitor, and that, with regards to the decision making process in passing this delay the number of times that a police officer could genuinely be in that state of belief will be rare. Furthermore, the suspect must not have been charged with the offence  [5]  , before the delay can be enforced. This was the case in R v Samuel  [6]  , where the original conviction was quashed on the basis that at the time of the interview of the defendant, at which the presence of a solicitor was denied, there had already been a charge of the offence. In addition to this, and in relation to the criteria above, it was deemed that access to a solicitor could not be denied simply by the belief that access might lead to other suspects in connection with the offence being alerted; the probability had to be high. A well-referenced quote was made in this case, from Hodgson LJ, which stated that entitlement to free legal representation was one of the most important and fundamental rights of a citizen. Equally, a breach of s.58 PACE does not always result in a quashed conviction. In R v Alliadice  [7]  , the grounds for refusal of legal advice for an interview included the worry that the solicitor may inadvertently warn other persons linked with the offence. The appeal against conviction was refused, as although there was a poor decision on the part of the officer for delaying advice, it was at the judges discretion to reverse the conviction. The judge decided against excluding the evidence under s.78 PACE, as the defendant was aware of his rights, exercised them (including the right to silence), and as such the presence of legal advice would not have changed the outcome of the interview. Finally, the offence with which the suspect is under question for must be a serious arrestable offence. S.116(1) of PACE lists the offences which fall under this category, and any factors which may cause a normal arrestable offence to become a serious one. Robbery is not normally an arrestable offence, and so for the delay in legal advice to be allowed, there must be exceptional circumstances as detailed in the section.  [8]   Providing that these criteria have been met, and that correct evidence is present, a suspect interview is permitted to be conducted under Code C (para 6.6) of PACE, a part of the code which otherwise would prevent such interviews from taking place. Is repeating questions previously posed, permissible? There is no mention of limits on repeating questions in the PACE codes of conduct; However, guidelines on the subject of investigative interview aims and techniques were published by the Home Office in 1992. Amongst these guidelines were the seven principles of investigative interviewing.  [9]  Following these guidelines, which were devised with existing Human Rights legislation in mind  [10]  , interviewing officers have a framework within which they can work without overstepping the line with regards to the treatment of suspects. In particular, there is one guideline which influences how repeat questioning can be posed. Principle number 4 states; Investigators are not bound to accept the first answer given. Questioning is not unfair merely because it is persistent. Therefore, persistent questioning, considering these guidelines, published under the title of The National Investigative Interviewing Strategy 2009  [11]  is permitted. But at what point does persistent questioning become oppressive? Oppressive behaviour can amount to inadmissibility of evidence; examples including confessions  [12]  . In R v Fulling  [13]  , Lord Lane CJ said that oppression occurred following behaviour which included excercise of authority or power in a burdensome, harsh or wrongful manner  [14]  . In R v Paris  [15]  , also known as the case of the Cardiff Three, over the course of 13 hours worth of interview time, a statement was put to the defendant forcefully, along with the question of whether he had committed the offence detailed, over 300 times. Despite no violence being used, this conduct was deemed to be oppressive. Another case which illustrates when questioning becomes beyond what is expected of the police officer, is that of R v Hero n  [16]  . In this case persistent badgering and questioning along the lines of getting a confession for the murder of a 7 year old girl resulted in the case being thrown out of court. This was despite the tone of the questioning not being aggressive or harsh; It was merely the style and purpose of the questioning with which the judge took issue. The result of a report into the actions taken during this enquiry found that the line between robust questioning and oppressive questioning was difficult to draw  [17]  . However, these are exceptional circumstances in which repeated questioning has been deemed to have gone too far; there are few reported cases. For the main part, the investigative guidelines are the key to allowing repeats of questioning. Code C (para.11.5) of PACE also guides the police officer to not use oppressive behaviour whilst conducting an interview. For the PEACE model of investigative interviewing, repeats of questions mentioned previously are a fundamental of the account clarification section of the model. The model is the standard start point from which all policing interviews are carried out in the United Kingdom, and as such, the guidelines must be clear. Without the freedom to ask questions repeatedly which may have either not been answered fully previously or without any conviction, then it becomes harder to ascertain the truth behind events; the main aim of investigative interviewing. Another of the principles of investigative interviewing confirms this; When conducting a suspect interview, police officers are free to ask questions in order to establish the truth The Dangers of Submitting Pre-Prepared Statements The purpose of handing in a pre-prepared statement is to provide a written copy of the details of the case, from the defences point of view, usually at the beginning of a suspect interview. If the statement contains adequate levels of detail, and covers any facts which are mentioned in court fully, then it has the power to negate the drawing of adverse inferences. An instance of when such inferences can be drawn can be found under s.34(1)(a) of the Criminal Justice and Public Order Act 1994(CJPOA), which reads; Where, in any proceedings against a person for an offence, evidence is given that the accused- at any time before he was charged with the offence, on being questioned under caution by a constable trying to discover whether or by whom the offence had been committed, failed to mention any fact relied on in his defence in those proceedings. As questioning under caution is mentioned, the statement should be handed in once the caution has been given. But what happens when the statement fails to give sufficient evidential value? Mentioning a fact in court which was not mentioned in the pre-prepared statement, but would have been reasonable to include in such a document, is one danger. In R v McGarry  [18]  , the defendant relied on facts which were not present on the statement which was handed in. There was merely flesh on the bones of that account, and an adverse inference can be drawn based on the reliance of such evidence in the proceedings, as in s.34(1)(a) CJPOA. Failure to mention basic facts which would have been reasonably expected in a vital piece of evidence is another danger in submitting a pre-prepared statement without thorough planning. Planning can be done prior to any interview in private between defendant and legal advisor, as the pre-prepared statement is a legally privileged document, and as such the police have no right to enforce access to it. In R v Bourgass  [19]  , the appellant had picked up a knife and stabbed 4 officers. He was convicted of murder, and then appealed based on admissibility of evidence. When analysed, the pre-prepared statement which was given at the beginning of the original interview provided no insight as to the reasoning behind why the appellant wished to escape, nor did it try to persuade that the use of the knife was in self-defence. In court the appellant relied solely upon this statement, and gave no other testimony in front of the jury; yet it contained such little in the way of a defence of his actions that the statement proved pointless, and the appellants conviction was held. It is not the failure to answer questions which can introduce the possibility of adverse inferences; but rather the failure to provide sufficient answers in the prepared statement, as in R v Knight  [20]  . In this case, despite failing to answer any questions in interview, the defences pre-prepared statement was enough to negate any wrong doing under s.34  [21]  , and so the appeal was allowed and the conviction was overruled.  [22]  However, this ruling came with a warning from the presiding judge; We wish to make it crystal clear that of itself the making of a pre-prepared statement gives no automatic immunity against adverse inferences under section 34  [23]   Adverse inferences can also be avoided providing what is said in the interview is in line with evidence found in the pre-prepared statement, as in R v Ali Ors  [24]  . The credibility of the suspect can be put under question if 2 statements which do not match in character and account are put to the court; A pre-prepared statement and an oral statement. Under s.119 of the Criminal Justice Act 2003, (1) If in criminal proceedings a person gives oral evidence and- (a) he admits making a previous inconsistent statement, or (b) a previous inconsistent statement made by him is proved by virtue of section 3, 4 or 5 of the Criminal Procedure Act 1865 (c. 18), the statement is admissible as evidence of any matter stated of which oral evidence by him would be admissible. This legislation means that both types of statement must be taken into account by the court, and both are admissible when the jury are making their decision. The decision must be made in light of the ruling in R v Argent  [25]  , where 6 guidelines were put in place to decide when an inference could be inferred; There must be proceedings against a person for an offence; The alleged failure to mention a fact at trial must have occurred before charge, or on charge; The alleged failure must have occurred during questioning under caution); The questioning must have been directed to trying to discover whether or by whom the alleged offence was committed; The alleged failure of the accused must have been to mention any fact relied on in his defence in those proceedings; The alleged failure must have been to mention a fact which in the circumstances existing at the time the accused could reasonably have been expected to mention when so questioned. Bibliography Cases: R v Argent [1997] 2 Cr.App.R. 27 R v Knight [2003] EWCA 1977 Paragraph 13 R v Ali Ors [2001] EWCA Crim 683. R v Knight [2003] EWCA 1977 R v McGarry[1998] EWCA Crim 2364 (16th July, 1998) R v Bourgass[2005] EWCA Crim 1943 (19 July 2005) R v Fulling[1987] 2 WLR 923 R v Paris (1993) 97 Cr. App. R. 99 R v George Heron, (November 1993) Unreported R v Samuel [1988] 1 QB 615 R. v Alladice[1988] Crim. L.R. 608 R v James Ors [2008] EWCA Crim 1869 (30 July 2008) R v McGovern(1991) 92 Cr. App. R. 228 Case Study: Depression and Dementia Care Case Study: Depression and Dementia Care Introduction Mr X is a 78 years old gentleman who has been admitted to a busy dementia unit six months ago. He was admitted from home following increasing lethargy, depression and reduced mobility. Prior to the admission he was diagnosed inter alia with Vascular Dementia. He communicates verbally with no difficulties, using very wide vocabulary however can mix up words and situations. He was assessed as lacking capacity to make informed decisions. Mr X has one daughter who is of the opinion that her father lacks insight into the difficulties he was having at home believing that he was managing fine. Mr X’s wife (Eva) died few months ago, in a hospital suffering from breast cancer. Mr X was very involved into her care throughout the illness and cannot accept the loss. Problem assessment Mr X, does appear to have an understanding of the sourroundings albeit he is very quiet most of the times almost like having no intrest of what is happening around him. He appears unable to generate any enthusiasm. Mr X remains independent in terms of personal care, use of facilities, eating and drinking and requires minimum assistance and maximum encouragement and prompting. He is able to mobilize with a zimmer frame, though seem to feel best sitting in a chair in his room, even at â€Å"meals or activities times†. In relation to the above three main problems that interlock have been identified 1. Depression and its effects Mr X cannot reconcile yourself to the loss of his wife, changes in life his physical and mental health resulting in depression and progress in dementia. He appears isolated, lost a lot of weight; apathy and withdrawal are present affecting seriously his ability to perform everyday tasks. According to him, to his daughter and to the information gained on assessment using Initial Dementia Assessment (IDA) he used to enjoy reading books, travelling and had an outgoing personality. The IDA indicated that the dramatic change and deterioration in his condition was noted when his wife passed away and he was told that he is having dementia. On the Mini-Mental State Examination (MMSE) Mr X scored 20/30 which could suggest that his dementia is not severe and that there may be other reasons for his withowal. His score could have been slightly inflated because well educated people like Mr X find thequestions â€Å"easy† to answer (Marshal at al 1983) but he could be described as â€Å" mildly confused†. One of the MMSE questions related to language skills was about writing a sentence about anything. Mr X wrote a short statement â€Å"Eva is not here and I have dementia†. Research show that coping and getting along with the diagnosis of dementia is a time-consuming process often related to a range of emotions such as: fear, shame, guilt, sadness, bitterness, isolation and helplessnes. (Alzheimer Europe, 2009) Mr. X appeared to feel overwhelmed by those emotions. Paying attention to non verbal signs of Mr X bevaiour helped staff to investigate his case further. He often avoided eye contact, showed no inattentiveness his appetite decreased and his posture expressed â€Å"tiredness of living†. Studies of nonverbal behaviour indicators in show that this type of signs are often related to post traumatic stess disorder ( PTDS) and that men are more likely to show depression in a form of isolation and withrowal (Stratou at al, n.d.). 2. Upset family relationships Assessment tools demonstrated that family was very important to Mr X. When communicating with the daughter lack of understanding dementia, depression and PTDS were identified as an important factor contributing to Mr X situation. Evidence show that above named health issues have an impact on family members; relationship difficulties are common and it it not easy to understand the â€Å"loved one†. ( Alzheimer’s Society, 2013). The main concern was no communication with the father and unwillingness to spend time with him to enable him to accept his chalanging situalion. She could not imagine that her normally happy and sociable father was so depressed, and in addition diagnosed with dementia which meant he became â€Å"a stranger† to her. 3. Challenging behaviour Whilst staff members were doing their best trying to motivate and encourage Mr X to get more involved into his care and the care home life, Mr. X refused everything or simply ignored them. The efforts had a negative impact on him and caused reactions such as pretending to be dependent and irritating staff. These types of reaction have been identified by Wallbridge as types of aggression called â€Å" active resistance† ( Wallbridge, n.d.). Staff then presented negative attidude and disaffection towards Mr X. Evidence suggests that behaviours, including uncooperativeness, staff find difficult to cope can lead psychological stess amongst staff and discourage them to deepen knowledge related to the health problem of the patient. ( Brodaty at al, 2003) Planning From the above assessment a list o goals have been created in order to improve the quality of life for mr X which is aimed to be archived through: creating an environment where Mr X could feel emotionally safe, supported and understood helping him understand, manage and accept his condition . Lowering the level of lethargy and depression and stimulate functional ability, social contact and activity by encouraging him to talk and listen to what he is saying Stimulating and motivating Mr X to create new habits related to maintain his physical independence, eating and help him use his potential involving Mr X’s daughter into care and help her understand the complexity of her father’s condition to make the psychosocial interventions better and improve Mr X behaviour and mood as well as increase his acceptability of the care home settings. Encourage her to let Mr X know that she cares about him and to stay in contact with him by visiting him, taking him out, calling etc to minimise the isolating experience training for staff in relation to challenging behaviour and dementia awareness, communication, behaviour and work related stress management The desired outcome is partially based on the outcomes from the research done amongst people with mild dementia and suffering on depression that have successfully managed to improve their lives, that was done was done by the social work department of University of Stirling for the Scottish Executive. (Scottish Executive Social Research 2005) Implementation In relation to problem 1 Assessment using IDA and MMSE indicated that Mr X condition is affected by depression. Further investigation has been done. GP and the Liason Psychiatric Nurse have been contacted and involved. Mr X scored 23/30 in the Geriatric Depression Scale (GDS) indicating severe depression. (Yesavage et al, 1982) It has been decided that his depression should be addressed first because it was the major factor preventing Mr X from enjoying life similarly to like he used to. It is known that the effects of depression go far beyond the mood ( Smith at el. 2014). In Mr X case this had an impact not only on his energy, appetite, and physical activity but also on his relations with family and staff. In relation to the weight loss Malnutrition Universal Screening Too (MUST) (BAPEN, n.d.) has been used. Initial MUST score was 0 with healthy BMI but due to his poor appetite the score rose to 1 within 3 months. Therefore his dietary intake was documented in a form of Food and Fluids Record Chat ( Care NHS UK, n.d) and his weight was monitored every two weeks. In relation to diet intake Mrs X was offered meals according to his likes suggested by his daughter and accepted by himself which significantly increased the likehood of an â€Å" consumed meal† . After 2 months his weight stabilised. He remains â€Å" poor eater† and therefore his meals contain more calories. His weight is currently monitored once a month and is not a concern anymore. Changes are documented in his care plan that is evaluated every month. Studies show an association between depression and increased mortality in older adults. Factors identified in Mr X case included poor adherence , lack of physical activity, cognitive impairment. ( Gallo et al 3013) From the point of his medication, a rviewd was requested by the GP and and it has been suggested to discontinue Paroxetine(Seroxat) and commence on Amitriptyline. Both belong to antidepressants but vary in side effects. ( NHS Choice, 2013). In addition it has been requested to commence Mr X on regular laxatives as episode of constipation have been noted. Currently Mr X bowels are monitored and documented on bowels chart on daily basis. No concerns have been noted. In relation to problem 2 Reduced sense of purpose was identified as the main co-existing factor To help Mr X overcome this problem (which he expressed clearly during the MMSE mentioning the loss of his spouse and dementia diagnosis) his daughter was asked to participate and although she was initially sceptical she brought meaningful memoralia and small pieces of furniture to help him feel like home. Staff gave her assistance and explanation in relation to dementia and depression. She was also offered help and given reassurance in a form of Family Support Meetings organised by the home. The initial scepticism disappeared with gaining awareness of the illness. She became Mr X advocate and currently holds medical and financial power of attorney for him. ( Office of the Public Guardian, Scotland, n.d.) Furthermore her two sons come regularly to visit Mr. X, they often take him out for a meal or call him to find out how he is. Staff has also managed to discuss one the most sensitive matters related to Mr. X’s End of Life such as DNACPR certificate that is present in Mr X file in the event of need. Mr. X’s relationship with his daughter and grandsons appears happy. The daughter stated that this helped also her to resolve personal problems she feels acknowledged by her father and therefore valued. There is a Family/Relatives Communication part in Mr X care plan and a book in Mr X room where any suggestions, complaints or comments can be made by staff members or by the family .(U.S National Library of Medicine, 2011) The relation with staff can be defined as very good. A person’s family is often the most important, long-standing connection in their life. Therefore, the ability of staff to work positively and inclusively with families and carers is a core staff skill. In relation to problem 3 Most of the staff required training to help them understand the nature of behaviour that challenges. The importance of the training this became so vital that it is now one of the mandatory trainings every member of staff has to attend. Skills that were aimed to be improved included addressing challenging behaviour, person centred approach and communication skills (Skills for Care, 2013) Many staff showed the need to be trained in related to stress management (Wallbridge, n.d.) The future aim is to create a team that focuses on people’s assets and life outcomes. A team that is confident of their roles and impact on Mr X and any other client, willing to contribute and encouraging new members of staff to learn. Evaluation Summarising, Mr. X case has been an example of mostly successful process of assessment and implementation of the planned actions. There was and so called â€Å"multi agency† approach to Mr X needs. Assessment tools helped in the identification and articulation of the needs and contributed to positive changes leading to holistic, personalised approach to them. Recent changes to the social care management and the need to comply with the Public Services Reform Scotland Act 2010 contributed to the awareness in relation to staff due to the accent on the importance of systematic and sensitive assessment. Mr X’s continuing care did not require up to now any specific nursing interventions. The difficulty consisted of identifying the roles and the division of work. Mr X’s case proved that there are different functions staffs have to complete that contribute to the optimum health and overall wellbeing of older people such as: psychosocial and emotional support enabling life review – where the family support was crucial but required time to function work aimed at maintaining his independence and functional ability that continues to be improved through the aspiration of a well functioning team work. educative teaching self-care activities by encouraging physical activity managerial- directions in terms of who and when undertakes the administrative and supervisory responsibilities could have been improved. All the above reduces to good knowledge, awareness, and experience, will power to change things for the better and to a well functioning team work. Many things would have been done sooner or could have been dealt with better if we were aware of the need and knew how. This is why it would be recommended to pay more attention to training needs in relation to new regulations, staff assessments, achieving and evidencing outcomes, person-centred care planning. References Office of the Public Guardian( Scotland)( n.d.) http://www.publicguardian-scotland.gov.uk/whatwedo/power_of_attorney.asp Care NHS UK ( n.d.) Food and Fluid Record Chart http://www.glos-care.nhs.uk/images/Food_and_Fluid_chart_-_attachment_31_copy_copy_copy.pdf (BAPEN, n.d.) Malnutrition Universal Screening Tool http://www.bapen.org.uk/pdfs/must/must_full.pdf Skills for Care (2013) Supporting staff working with people who challenge services Guidance for employers http://www.skillsforcare.org.uk/Document-library/Skills/People-whose-behaviour-challenges/Supporting-staff-working-with-challenging-behaviour-(Guide-for-employers)vfw-(June-2013).pdf U.S National Library of Medicine (2011) no author Communicating with families of dementia patients Can Fam Physician Joulrnal Vol 57(7): 801–802 http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3135450/ NHS Choice ( 2013) Antidepressantshttp://www.nhs.uk/conditions/Antidepressant-drugs/Pages/Introduction.aspx Melinda Smith, M.A., Lawrence Robinson, and Jeanne Segal, Ph.D. Last updated: February 2014. Depression in Older Adults the Elderly http://www.helpguide.org/mental/depression_elderly.htm Gallo, J., Morales, K.H.,Bogner, H.R, Raue, J.P, Zee,J, Bruce M.L and Reynolds C.F(2013) BMJ Helping doctors making better decisions Long term effect of depression care management on mortality in older adults: follow-up of cluster randomized clinical trial in primary care http://www.bmj.com/content/346/bmj.f2570 Scottish Executive Social Research (2005) Effective Social Work with Older People http://www.scotland.gov.uk/Resource/Doc/47121/0020809.pdf Wallbridge, H. ( n.d.) When pushed to the limit:Moving beyond a difficult situation http://www.alzheimer.mb.ca/handouts/When%20Pushed%20to%20the%20LimitMoving%20Beyond%20a%20Difficult%20Situation.pdf Alzheimer Society (2013) Understanding and respecting the person with dementia file:///C:/Users/GEORGE/Downloads/Understanding_and_respecting_the_person_with_dementia_factsheet.pdf Stratou,G., Scherer,S., Gratch,J. and Morency, L.P. (n.d) University of Southern California, Institute for Creative Technologies, Los Angeles Automatic Nonverbal Behavior Indicators ofDepression and PTSD: Exploring Gender Differences http://ict.usc.edu/pubs/Automatic%20Nonverbal%20Behavior%20Indicators%20of%20Depression%20and%20PTSD-%20Exploring%20Gender%20Differences.pdf Alzheimer Europe (2009) no author Facing the diagnosis Diagnosis of dementia http://www.alzheimer-europe.org/Living-with-dementia/After-diagnosis-What-next/Diagnosis-of-dementia/Facing-the-diagnosis Marshal F. Folstein, MD; Lee N. Robins, PhD; John E. Helzer, MD (1983) The Mini-Mental State Examination JAMA Network Journal Archives of General Psychiatry Vol 40, No. 7 http://archpsyc.jamanetwork.com/article.aspx?articleid=493108 National Chronic Care Consortium and the Alzheimer’s Association (2003) Tools for Early Identification,Assessment, and Treatment for People with Alzheimer’s Disease and Dementia http://www.alz.org/national/documents/brochure_toolsforidassesstreat.pdf