Monday, August 24, 2020

Stress and Threats of Terrorism an Example by

Stress and Threats of Terrorism by Expert Marvelous | 28 Dec 2016 As we as a whole know, psychological warfare is in no way, shape or form new marvel, as it originally showed up with the beginning of the written history of the mankind. Be that as it may, with the improvement of the new advancements, for example, logical, social and efficient, fear mongering got a chance to raise and extend the circle of its office. Fear mongering is something in excess of a typical wrongdoing, whichs tended to against a specific individual, or a gathering of individuals. Need paper test on Stress and Threats of Terrorism subject? We will compose a custom paper test explicitly for you Continue Sri Lankan previous Foreign Minister, Lakshman Kadirgamar noticed that: the fear monger act is viewed as an assault on society all in all, on popularity based organizations. A fear monger assault is a demonstration of war against society. That is the reason the ongoing lift in the advancement of psychological warfare inconveniences both the legislators and the standard residents. These days most fear based oppressor associations have their underlying foundations in the nations, where the strict convictions are extremely solid, with the goal that the normal residents, when called up to safeguard and advance their strict perspectives, answer this call promptly. One of the distinctive highlights of the contemporary fear based oppression is that its undeniably strict in nature. The pioneers of the fear monger associations, who pursue their own objectives, for example, to fulfill their draw for influence, or individual enhancement, needed to build up an inspiration to enroll the regular individuals to their associations, the individuals who might achieve all the filthy work. Different investigates consider the conviction frameworks of the fear based oppressors to be the purpose behind their office. Martha Crenshaw noticed that the fear mongers activities depend on the emotional understanding of the encompassing scene, whichs directed by their strict convictions. Rex A. Hudson, the creator of the report committed to the human science and brain research of fear mongering, takes note of that the conviction frameworks of the psychological oppressors are shaped from the social customs of their general public, their political and social condition and the inside elements of their covert gatherings. He likewise expresses that paying little heed to the reality, that their activities frequently appear to be preposterous and unreasonable to the individuals from different social orders, the fear mongers may all things considered act soundly in their responsibility to following up on their feelings. There are numerous theories on why Muslims become fear mongers. The writer of the article in Psychology Today that manages the wonder of self destruction psychological warfare proposes that youngsters become psychological militants due to the despondency and dread. The creator additionally takes note of that one fourth of Palestinians, the inhabitants of the nation from which loads of fear based oppressors rise, are clinically discouraged. They don't have any point in life aside from battling, as there are no open doors for them in their nation annihilated by the nonstop wars. Before the ongoing improvement of psychological militant development happened, those lawbreakers had never had an entrance to the WMDs, as those were little gatherings, supported by some rich devotees or associations. These days, the size of terroristic development has expanded enormously, as they frequently get cash and backing straightforwardly from the administrations of certain nations, either Muslim or not. Loads of government officials are certain that the fear mongers have an entrance to the weapon of mass annihilation, yet they either are reluctant to utilize it or trust that a reasonable second will do it. The mishap which occurred in Jordan, April 2004, when the Al Qaeda endeavored to crush the Jordan government and murder 80 thousand individuals with the compound weapon, demonstrates that the fear based oppressors have the WMDs and are prepared to utilize it. Fortunately, their endeavor fizzled, however who knows, regardless of whether the counterterrorist will be effective next time. The writers of the book Countering the New Terrorism express that the inspirations for the fear based oppressors wont change during the data age, yet the techniques utilized by them to demolish their adversaries will. Fear based oppressors will utilize the new chances, gave to them by the recently evolved enlightening innovations. These days, along with the physical obliteration of the foe they start to destruct the enlightening foundations of the restricting nations. Not to sound stripped, lets review The Liberation Tigers of Tamil Eelams (LTTE) endeavors to disturb the E-mail correspondence frameworks of the Sri Lanka Government offices, which occurred in 1998. Aside from the melancholy and pity the occasions of 11 September brought to a large number of American individuals, it has additionally conceded the U.S residents the understanding that they are undependable living in confinement from the issues different nations experience. American government had consistently had zero resistance approach towards fear based oppression, however after the 9/11 a large number of the legislators and the common residents comprehended that the U.S government needed to act considerably more seriously to forestall other terroristic acts both on its domain and around the world. Martin A. Kalis in his article A New Approach to International Terrorism portrays the four primary standards of U.S arrangement towards psychological warfare. Those are: a). hit no arrangements with the psychological militants; b). carry them to equity for their violations; c). detach and apply pressure on states that support fear based oppression, to make them change their approaches; d). reinforce the counterterrorism capacities of those nations that work with the United States and need support. Fear based oppression is a horrendous danger to the life of individuals around the world. Living in steady dread that one, or his youngsters, companions or family members can turn into the casualties of the strict devotee is distressing and stressing. This is the reason measures ought to be taken to wipe out psychological oppression as opposed to attempting to speak with the pioneers of the fear based oppressor development. The experience demonstrates that strict fan are practically difficult to speak with, as they are unequipped for settling. In a similar time measures ought to be taken for to forestall the development of new psychological oppressor gatherings. As the examination appeared, usually youngsters become fear based oppressors as they don't have any points of view in their nations destructed by war. To forestall further reinforcing of fear based oppression the states of life ought to be changed in the Arabic and Asian nations to dispense with the purposes behind which psychological oppressors show up. Shockingly, at some point or another all the individuals pass on, and the fear based oppressors are not a special case from this standard. Their gatherings proceed with their organization in light of the fact that consistently new youngsters go along with them. In the event that the U.S counterterrorist associations would figure out how to ceil the progression of the youths to the fear based oppressor associations, than the psychological warfare would be crushed. It tends to be practiced by the promulgation of the Western way of life among the Muslim youngsters and adolescents, sorting out scholarly and social trades to make them see that Westerners are the standard individuals, with their standards and qualities, in a similar time separate to the good and strict estimations of others. Psychological oppression is an unpleasant marvel, as it makes individuals live in consistent dread for their companions and friends and family. It ought to be wiped out for to carry harmony into the contemporary world. The war with fear mongering isn't simple or snappy one. It requests heaps of time and solidarity to achieve, however the outcomes, which are the wellbeing of our youngsters and friends and family, and a large number of individuals around the world, are justified, despite all the trouble. References Regal Institute of International Affairs, Chatham House, London. (1998) Global Terrorism, Lecture. by Lakshman Kadirgamar. Recovered February 14, 2005 Crenshaw, Martha. (1992). Ebb and flow Research on Terrorism: The Academic Perspective. Studies in Conflict and Terrorism, 1-11. Lesser, Ian, Hoffman, B, Ronfelt, D, Zanini, M, Arquilla, J. (1999). Countering the New Terrorism. RAND Corporation. Kalis, Martin. (2001). A New Approach to International Terrorism. Worldwide Affairs Review. Vol .10, Num 2. Hudson, Rex. (1999). The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why?. Government Research pision, Library of Congress. Recovered February 14, 2005 http://www.fas.org/irp/danger/frd.html Perina, K. (2002). Self destruction psychological warfare: looking for thought processes past dysfunctional behavior. Brain research Today, 35 (5), p.15

Saturday, August 22, 2020

All About My Mother Pan’s Labyrinth Free Essays

How far do the accounts of the movies you have considered depend on sensational snapshots of showdown and how far on a progressively inconspicuous change after some time? The two altogether different Spanish movies about my Mother (AAMM) and Pan’s Labyrinth utilize complex accounts and character portrayals to investigate sexual orientation belief systems. I would recommend that the two movies depend to a limited extent on emotional snapshots of encounter yet in addition show a progressively inconspicuous change after some time; in this exposition I will clarify this view. We will compose a custom paper test on About My Mother Pan’s Labyrinth or on the other hand any comparative point just for you Request Now AAMM is an amazing acting, showing a significant number of Almodovar’s signature qualities and representing his exhuberant, testing post-Franco style. As an acting, it is not really astounding that there are numerous sensational minutes inside the account and all through the film we see different fierce minutes between the characters. For instance, as Manuela enters Barcelona in a taxi there is a viciously stunning scene which acquaints us with Agrado as she is attacked by a customer. She is insubordinate in her reaction and along these lines Almodovar sets his plan: this is a film which challenges customary sex jobs and our impression of what is and what ‘should be’. The scene is maybe all the additionally stunning on the grounds that up until this point, in Madrid, there has been high show in the unexpected demise of Manuela’s child yet her response to it is unobtrusively introduced and sex portrayals are unmistakably progressively customary and in accordance with the domineering perspective. As Manuela’s fairly detached journey to discover Lola proceeds, the account is punctuated by different sensational snapshots of encounter yet Almodovar’s goal is plainly not only to introduce a lot of over-misrepresented characters in unrealistic situations and it is maybe his nuance that permits the film to convey its genuine importance. In spite of the fact that Manuela is the principle character and it is her activities which move the story along at first, it is maybe through the entirety of his characters and their interlaced encounters that Almodovar all the more completely investigates sex and sexuality and questions domineering qualities. Every one of his characters goes on an excursion and while the clearly sensational story is the thing that keeps the crowd engaged (if to some degree disbelievingly) it is maybe the more unobtrusive hints of progress which we can just acknowledge once the film is done that contain its actual message. Manuela, the unceasing mother, gets an opportunity to be so to a newborn child once more; Agrado has discovered acknowledgment and reason which doesn't depend on the offer of her body; Huma is liberated from the ruinous and harmful Nina; Rosa’s mother, who speaks to maybe more than some other character the authoritative estimations of Spanish society that Almodovar is testing, is demonstrated to be cutthroat in the most noticeably terrible manner by dismissing her grandkid and consequently loses her entitlement to approach him. Rosa, obviously, is dead yet before her passing she had flawlessly transformed from sister to natural mother. I would contend that these progressions are inconspicuous and not dependent on snapshots of emotional showdown, and that really it is these progressions †these individuals †which are the film’s story. In spite of the fact that the sensational minutes are engaging, they are the bass line and the subtler changes are the song. As far as account, Pan’s Labyrinth is obviously very not quite the same as AAMM yet I would contend that regarding the significance of emotional snapshots of encounter versus subtler changes, there are a few similitudes. As a gothic fantasy/dream film set during the Spanish common war, we would expect sensational encounters as double restrictions are a key show of the class and showdowns a side effect of contention; and without a doubt, we are not disillusioned. The antagonist of the story, Captain Vidal, is at the core of the vast majority of the sensational encounters inside the film, with the Doctor, Ofelia, Carmen, the revolutionaries and in the long run, a definitive showdown with Mercedes which brings about his passing. As in AAMM, these minutes are positively key to the improvement of the account and serve to feature del Toro’s portrayal of Franco’s domineering manliness as vicious, controlling and fierce. Be that as it may, when we take a gander at the female characters in the film, as in fact we should, there is a conspicuously subtler and progressively delicate methodology both in their portrayal and in their jobs and capacities inside the story. Mercedes, as the ‘helper’, develops in quality and fortitude as the film advances, moving progressively from a to some degree sidelined spectator of Vidal’s dread to a courageous focal player and fruitful challenger, slaughtering the scoundrel and sparing the renegades (who happen to be men). Ofelia obviously, experiences gigantic change all through the story, losing her mom and going up against different animals just as Vidal as she goes however maybe more essentially, neglecting to defy her own dread of growing up and rather picking to remain a kid until the end of time. Carmen is spoken to as frail and fitting in with the authoritative belief system that ladies ought to be compliant to their spouses and she bites the dust during labor, maybe to show that this view is obsolete. In this film, the need for ladies to be moms is along these lines tested through both mother and little girl, as Carmen passes on for it and Ofelia transparently dismisses it. One end which could be drawn is that despite the fact that there are numerous snapshots of emotional encounter in Pan’s account, they maybe just veil the subtler changes occurring underneath them. Or on the other hand that del Toro has deliberately built these showdowns inside the universe of the men and inside Ofelia’s dreamland to permit us to see that subtler changes which they advance in our champion and her assistant. The inevitable outcome, obviously, being that the circumstance in Vidal’s ‘family’ mirrors that of the war with the dissidents: he neglects to perceive the inconspicuous changes happening around him and pays for it beyond a reasonable doubt. Since in fact, it is the female characters who are in charge and their encounters being investigated. As I stated, Vidal and the emotional snapshots of showdown that he is so much of the time some portion of, are the reason and the subtler changes inside the female characters the impact. Taking everything into account, I would state that similarly as with most stories, sensational snapshots of encounter help to move things along in both of these movies yet are in no way, shape or form totally depended upon to make meaning and speak with the crowd. The two movies, in various ways, are about ladies and their encounters and subtlely is additionally required to discuss these encounters with the impact and veritable inclination that they do. The most effective method to refer to All About My Mother Pan’s Labyrinth, Papers

Monday, July 20, 2020

The Benefits of Galphimia Glauca Herbal Remedy

The Benefits of Galphimia Glauca Herbal Remedy Holistic Health Print The Benefits of Galphimia Glauca as an Herbal Remedy By Cathy Wong Medically reviewed by Medically reviewed by Richard Fogoros, MD on August 05, 2016 Richard N. Fogoros, MD, is a retired professor of medicine and board-certified internal medicine physician and cardiologist. He is Verywells Senior Medical Advisor. Learn about our Medical Review Board Richard Fogoros, MD Updated on February 03, 2020 Zen Rial/Moment Open/Getty Images More in Self-Improvement Holistic Health Happiness Meditation Stress Management Spirituality Inspiration Brain Health Technology Relationships View All Galphimia glauca, sometimes referred to as simply galphimia or thryallis, is an herb said to offer a number of health benefits. Extracted from a small evergreen shrub found in Mexico and Central America, galphimia is sometimes prepared as a homeopathic remedy. In traditional Latin American medicine, galphimia has long been used to treat asthma and allergies. Galphimia is also generally used as a homeopathic treatment for asthma and allergies. In traditional Mexican medicine, meanwhile, galphimia has long been used to treat mental disorders. In particular, galphimia is thought to alleviate anxiety. Benefits of Galphimia Extract To date, research on the health effects of galphimia extract is very limited. Still, theres some evidence that galphimia extract may be of some use in the treatment of anxiety. For instance, several animal-based studies have shown that galphimia extract may offer anti-anxiety benefits. In addition, a 2007 study published in Planta Medica indicates that galphimia extract may be useful in the treatment of anxiety disorders. For the study, 152 people with generalized anxiety disorder took either galphimia extract or the commonly-prescribed anti-anxiety drug lorazepam (brand name  Ativan) every day for four weeks. The study results revealed that the anxiety-reducing effect of galphimia extract was similar to that of lorazepam. Benefits of Homeopathic Galphimia Scientific support for the health effects of homeopathic preparations of galphimia is also fairly limited. The available research includes an older meta-analysis published in the Austrian journal Wiener Medizinische Wochenschrift in 1997. For the meta-analysis, investigators reviewed 11 clinical trials (with a total of 1,038 patients) on the use of homeopathic preparations of galphimia in treatment of hay fever. Overall, homeopathic preparations of galphimia were found to be superior to placebo in relief of eye-related symptoms, such as itching and watering of the eyes. There is a lack of more recent data on the potential health benefits of homeopathic galphimia. Caveats Little is known about the safety of using galphimia in the long term. However, theres some concern that taking galphimia in combination with certain medications (such as central nervous system depressants and blood-thinning drugs) may produce harmful effects. In addition, homeopathic preparations of galphimia may trigger a number of mild side effects, including fatigue and dry mouth. The safety of galphimia supplements has not been established in  pregnant women, nursing mothers, children, and those with medical conditions or who are taking medications. Always talk with your doctor before taking any kind of supplement. Where to Find Galphimia Available for purchase online, galphimia supplements and homeopathic preparations of galphimia are sold in many natural-food stores and in stores specializing in dietary supplements. Using Galphimia for Health Due to a lack of scientific support, its too soon to recommend galphimia for the treatment of any health condition. If youre considering the use of galphimia supplements or homeopathic preparations of galphimia, make sure to consult your physician. Its important to note that self-treating a chronic condition with galphimia and avoiding or delaying standard care may have serious consequences.

Thursday, May 21, 2020

LANG Surname Meaning and Family History

The last name Lang originated as a descriptive surname given to an unusually tall individual, from the Old English lang or long, meaning long or tall. LANGE is a common German variant, while LANG is more prevalent in Scotland and northern England. LONG is another common English variant. Lang may also have originated as a Hungarian surname, from  là ¡ng, meaning flame, perhaps a descriptive name for a passionate individual, or for someone who worked with fire, such as a blacksmith. The Lang surname is also found in China,  adopted by descendants of the founder of  Lang City in the state of Lu. Lange  is the 26th most common German surname, while  Lang is the 46th most common.  Long is the 86th most popular surname in the United States. Surname Origin: German, Scottish, English, Dutch, Swedish, Danish, Chinese Alternate Surname Spellings:  LANGE, LONG, LUNG, LAING, DE LANGE Famous People with the LANG  Surname Fritz Lang  - Austrian-born film directorDavid Lange -  former New Zealand prime ministerJessica Lange  - American actressJosephine Lang - German composerAlgot Lange - Swedish explorerJoseph Lange - Vienna actor and painter; Mozarts brother-in-law Where Is the LANG Surname Most Common? According to surname distribution from Forebears, the Lang surname is most common in Austria, where it ranks 24th in the nation, followed by Germany (35th), Switzerland (61st), Luxembourg (104th), Liechtenstein (132nd), China (193rd) and Vietnam (203rd). The Lange spelling of the surname, on the other hand, is most common in Germany (26th), followed by Greenland (47th) and Denmark (107th). Lang is more common in the United States than Lange. WorldNames PublicProfiler indicates a similar distribution, with the greatest percentage of individuals named Lang in Austria, followed by Germany, Hungary, Switzerland, and Luxembourg. Lange is most common in Germany, especially northern Germany, followed by Denmark. Genealogy Resources for the Surname LANG Meanings of Common German SurnamesUncover the meaning of your German last name with this free guide to the meanings and origins of common German surnames. Lang  Family Crest - Its Not What You ThinkContrary to what you may hear, there is no such thing as a Lang  family crest or coat of arms for the Lang surname.  Coats of arms are granted to individuals, not families, and may rightfully be used only by the uninterrupted male-line descendants of the person to whom the coat of arms was originally granted. LANG  Family Genealogy ForumThis free message board is focused on descendants of Lang  ancestors around the world. There is also a separate message board for discussion of the Lange surname. FamilySearch - LANG  GenealogyExplore over 5.8  million results from digitized  historical records and lineage-linked family trees related to the Lang surname and variations such as Lange on this free website hosted by the Church of Jesus Christ of Latter-day Saints. LANG  Surname Mailing ListA free mailing list for researchers of the Lang  surname and its variations includes subscription details and searchable archives of past messages. They also host  a mailing list for the Lange surname. DistantCousin.com - LANG  Genealogy Family HistoryExplore free databases and genealogy links for the last name Lang. GeneaNet - Lang  RecordsGeneaNet includes archival records, family trees, and other resources for individuals with the Lang  surname, with a concentration on records and families from France and other European countries. The Lang  Genealogy and Family Tree PageBrowse genealogy records and links to genealogical and historical records for individuals with the Lang  surname from the website of Genealogy Today. References: Surname Meanings Origins Cottle, Basil.  Penguin Dictionary of Surnames. Baltimore, MD: Penguin Books, 1967.Dorward, David.  Scottish Surnames. Collins Celtic (Pocket edition), 1998.Fucilla, Joseph.  Our Italian Surnames. Genealogical Publishing Company, 2003.Hanks, Patrick and Flavia Hodges.  A Dictionary of Surnames. Oxford University Press, 1989.Hanks, Patrick.  Dictionary of American Family Names. Oxford University Press, 2003.Reaney, P.H.  A Dictionary of English Surnames. Oxford University Press, 1997.Smith, Elsdon C.  American Surnames. Genealogical Publishing Company, 1997. https://www.thoughtco.com/surname-meanings-and-origins-s2-1422408

Wednesday, May 6, 2020

Symptoms And Treatment Of Sickle Cell Disease Essay

Introduction If you practice nursing on a pediatric unit, you are likely to encounter patients with sickle cell disease. It is important to understand the underlying causes and the complications of the disease. Acute chest syndrome is one of the leading causes of death associated with sickle cell disease. It is critical to understand how to care for these patients holistically. Pathophysiology Sickle cell disease is a genetic condition that causes a mutation in the hemoglobin molecule. Normal red blood cells are round and flexible. In a person with sickle cell anemia the blood cells are stiff and sticky. This causes the cells to be misshapen and can become stuck within blood vessels. The disease process also causes a lack of healthy red blood cells to carry adequate oxygen throughout the body (Porth, 2015). Acute chest syndrome is a type of pneumonia caused by these sickled cells blocking blood vessels in the lungs. The syndrome can cause chronic respiratory insufficiency and is a leading cause of death in sickle cell disease (Porth, 2015). Laboratory and Diagnostics Sickle cell anemia is diagnosed by performing a blood drawn to check for hemoglobin S, the defective form of hemoglobin. Blood cells can also be viewed using microscopy to view the sickled cells. Acute chest syndrome can be diagnosed by chest x-ray. The sickled cells that obstruct blood flow to the lungs manifests as infiltrates on the images. After diagnosis, hemoglobin and hematocrit levels areShow MoreRelatedSickle And The Sickle Cell Disease1369 Words   |  6 PagesThe sickle cell disease affects about 100,000 people in the America. The most common ethnic group the sickle cell anemia is seen in is African Americans and Hispanics. Approximately one in every ten African American and one in every one hundred Hispanic Americans have the sickle cell trait. Approximately two million people have the sickle cell trait in America. Approximately one in five- hundred African Americans and one in one thousand to one thousand and four hundred Hispanic-America ns have sickleRead MoreSickle Cell Anemia And A Wide Range Of Demographics1134 Words   |  5 PagesSickle cell anemia affects a wide range of demographics, from young to old. However, there are specific groups of people who are likely more prone to this disease than any other group. This disease affects millions of people worldwide regardless of age, but it is particularly common amongst those who derive from specific regions of the world. Sickle cell anemia is most common in those whose ancestors are derived from the sub-Saharan region of Africa. Furthermore, other regions that are known to haveRead MoreA Study On Sickle Cell Anemia868 Words   |  4 Pages Sickle Cell Anemia The gene or chromosome that is affected? The haemoglobin atom has combine parts: an alpha and a beta. Patients with reference to sickle cell suffering take on a variation in a gene on chromosome 11 that codes for the beta subunit of the haemoglobin protein. As an answer, hemoglobin molecules don t display suitably, causing red blood cells to be stiff and take on a concave shape (like a sickle used to trim wheat). These adequate shaped cells get hooked in the blood vessels andRead MoreAnatomy And Physiology : Sickle Cell Disease Essay910 Words   |  4 PagesPaper – Sickle cell disease Sickle cell disease, also called sickle cell anemia is a group of disorders that affects the molecule in red blood cells that deliver oxygen to the cells. Approximately 100,00 people in America are affected by this disease. Sickle cell disease is an inherited disease, which means it is passed from parents to their children. This disease occurs mainly in people if African, middle eastern, Mediterranean, and Indian decent. People who are born with sickle cell diseaseRead MoreCell Signaling Essay1583 Words   |  7 PagesDefects of Cell Signaling Over the past semester in cell biology, determining protein structure and functions of gene sequences have been some important discussions in class. On this discussion, many people will agree that the defects from the protein structure and gene sequences such as cell-signaling are the main factors of human disease. When it comes to the topic of human disease breast cancer and sickle cell anemia have been the most prevalent. The importance of these topics in reference toRead MoreSickle Cell Anemia1001 Words   |  5 PagesSickle Cell Anemia Prepared by: Jozalyn Velez Outline †¢ Definition †¢ Symptoms †¢ Causes †¢ Diagnosis †¢ Treatment/prevention †¢ conclusion Sickle Cell Anemia Sickle Cell Anemia is an inherited form of anemia, a condition in which there isn’t enough healthy red blood cells to carry sufficient oxygen throughout your body. Normally a person has flexible and round blood cells. With Sickle Cell anemia, Hemoglobin molecules in red blood cells, that carry oxygen in the bodyRead MoreSickle Cell Anemia1187 Words   |  5 PagesCase:- Doctor informed complete studies of a 9-year old child with sickle cell anemia. Her main complaints were cough, vague pains in legs (joints), night sweats, abdominal pain, less hunger, and increasing weakness. In a series of knowing experiments that involved taking venous blood from the arm under different conditions, the doctor showed a connection between oxygen tension and sickling of the red blood cells in vivo. When the oxygen pressure fell below 40-45mm Hg, the sickling was marked increasedRead MoreJacquelyn Sayikanmi. Understanding Sickle Cell Disease.1191 Words   |  5 PagesJacquelyn Sayikanmi Understanding Sickle Cell Disease Introduction Sickle cell disease (SCD) occurs in 1 out of every 365 African American births compared to 1 out of 16,000 Hispanic-American births (1). SCD is a group of red blood cell disorders in which patients have a sickle or moon-shaped red blood cell due to an abnormal S hemoglobin. While sickle cell disease is relatively rare in American births, this is an alarming statistic among people of Sub-Saharan (west and central) African descentRead MoreA Brief Description of Sickle Cell Anemia1165 Words   |  5 PagesAdams 1 Dwayne Adams Instructor: Croshaw Medical Terminology 1 18, April 2013 Sickle Cell Anemia Sickle-cell Anemia is a genetic blood disorder caused by the presence of an abnormal form of hemoglobin molecules in which the red blood cells loose their disc-shape and become crescent shaped. The shape also known as â€Å"hemoglobin S†. unlike normal red cells which are usually smooth and malleable, tend to collect after releasing oxygen, and cannot squeeze through small blood vessels. TheRead MoreSickle Cell Disease : A Blood Disorder1264 Words   |  6 PagesIntroduction Sickle cell disease is a blood disorder in which red blood cells take on an abnormal shape. Sickle cell anemia is when the red blood cells hemolyze, or die. Sickle cell disease is inherited from generation to generation and is the most common in inherited blood disorders. An estimated 70,000-100,000 people in America are currently suffering from this disease, most of which are African Americans. One is diagnosed with sickle cell disease in early childhood generally around four months

General Security Policy Free Essays

string(53) " owner of information has the responsibility for: 1\." Sample Information Security Policy I. POLICY A. It is the policy of ORGANIZATION XYZ that information, as defined hereinafter, in all its forms–written, spoken, recorded electronically or printed–will be protected from accidental or intentional unauthorized modification, destruction or disclosure throughout its life cycle. We will write a custom essay sample on General Security Policy or any similar topic only for you Order Now This protection includes an appropriate level of security over the equipment and software used to process, store, and transmit that information. B. All policies and procedures must be documented and made available to individuals responsible for their implementation and compliance. All activities identified by the policies and procedures must also be documented. All the documentation, which may be in electronic form, must be retained for at least 6 (six) years after initial creation, or, pertaining to policies and procedures, after changes are made. All documentation must be periodically reviewed for appropriateness and currency, a period of time to be determined by each entity within ORGANIZATION XYZ. C. At each entity and/or department level, additional policies, standards and procedures will be developed detailing the implementation of this policy and set of standards, and addressing any additional information systems functionality in such entity and/or department. All departmental policies must be consistent with this policy. All systems implemented after the effective date of these policies are expected to comply with the provisions of this policy where possible. Existing systems are expected to be brought into compliance where possible and as soon as practical. II. SCOPE A. The scope of information security includes the protection of the confidentiality, integrity and availability of information. B. The framework for managing information security in this policy applies to all ORGANIZATION XYZ entities and workers, and other Involved Persons and all Involved Systems throughout ORGANIZATION XYZ as defined below in INFORMATION SECURITY DEFINITIONS. C. This policy and all standards apply to all protected health information and other classes of protected information in any form as defined below in INFORMATION CLASSIFICATION. III. RISK MANAGEMENT A. A thorough analysis of all ORGANIZATION XYZ information networks and systems will be conducted on a periodic basis to document the threats and vulnerabilities to stored and transmitted information. The analysis will examine the types of threats – internal or external, natural or manmade, electronic and non-electronic– that affect the ability to manage the information resource. The analysis will also document the existing vulnerabilities within each entity which potentially expose the information resource to the threats. Finally, the analysis will also include an evaluation of the information assets and the technology associated with its collection, storage, dissemination and protection. From the combination of threats, vulnerabilities, and asset values, an estimate of the risks to the confidentiality, integrity and availability of the information will be determined. The frequency of the risk analysis will be determined at the entity level. B. Based on the periodic assessment, measures will be implemented that reduce the impact of the threats by reducing the amount and scope of the vulnerabilities. IV. INFORMATION SECURITY DEFINITIONS Affiliated Covered Entities: Legally separate, but affiliated, covered entities which choose to designate themselves as a single covered entity for purposes of HIPAA. Availability: Data or information is accessible and usable upon demand by an authorized person. Confidentiality: Data or information is not made available or disclosed to unauthorized persons or processes. HIPAA: The Health Insurance Portability and Accountability Act, a federal law passed in 1996 that affects the healthcare and insurance industries. A key goal of the HIPAA regulations is to protect the privacy and confidentiality of protected health information by setting and enforcing standards. Integrity: Data or information has not been altered or destroyed in an unauthorized manner. Involved Persons: Every worker at ORGANIZATION XYZ — no matter what their status. This includes physicians, residents, students, employees, contractors, consultants, temporaries, volunteers, interns, etc. Involved Systems: All computer equipment and network systems that are operated within the ORGANIZATION XYZ environment. This includes all platforms (operating systems), all computer sizes (personal digital assistants, desktops, mainframes, etc. ), and all applications and data (whether developed in-house or licensed from third parties) contained on those systems. Protected Health Information (PHI): PHI is health information, including demographic information, created or received by the ORGANIZATION XYZ entities which relates to the past, present, or future physical or mental health or condition of an individual; the provision of health care to an individual; or the past, present, or future payment for the provision of health care to an individual and that identifies or can be used to identify the individual. Risk: The probability of a loss of confidentiality, integrity, or availability of information resources. V. INFORMATION SECURITY RESPONSIBILITIES A. Information Security Officer: The Information Security Officer (ISO) for each entity is responsible for working with user management, owners, custodians, and users to develop and implement prudent security policies, procedures, and controls, subject to the approval of ORGANIZATION XYZ. Specific responsibilities include: 1. Ensuring security policies, procedures, and standards are in place and adhered to by entity. 2. Providing basic security support for all systems and users. 3. Advising owners in the identification and classification of computer resources. See Section VI Information Classification. 4. Advising systems development and application owners in the implementation of security controls for information on systems, from the point of system design, through testing and production implementation. 5. Educating custodian and user management with comprehensive information about security controls affecting system users and application systems. 6. Providing on-going employee security education. 7. Performing security audits. 8. Reporting regularly to the ORGANIZATION XYZ Oversight Committee on entity’s status with regard to information security. B. Information Owner: The owner of a collection of information is usually the manager responsible for the creation of that information or the primary user of that information. This role often corresponds with the management of an organizational unit. In this context, ownership does not signify proprietary interest, and ownership may be shared. The owner may delegate ownership responsibilities to another individual by completing the ORGANIZATION XYZ Information Owner Delegation Form. The owner of information has the responsibility for: 1. You read "General Security Policy" in category "Papers" Knowing the information for which she/he is responsible. 2. Determining a data retention period for the information, relying on advice from the Legal Department. 3. Ensuring appropriate procedures are in effect to protect the integrity, confidentiality, and availability of the information used or created within the unit. 4. Authorizing access and assigning custodianship. 5. Specifying controls and communicating the control requirements to the custodian and users of the information. 6. Reporting promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 7. Initiating corrective actions when problems are identified. 8. Promoting employee education and awareness by utilizing programs approved by the ISO, where appropriate. 9. Following existing approval processes within the respective organizational unit for the selection, budgeting, purchase, and implementation of any computer system/software to manage information. C. Custodian: The custodian of information is generally responsible for the processing and storage of the information. The custodian is responsible for the administration of controls as specified by the owner. Responsibilities may include: 1. Providing and/or recommending physical safeguards. 2. Providing and/or recommending procedural safeguards. 3. Administering access to information. 4. Releasing information as authorized by the Information Owner and/or the Information Privacy/ Security Officer for use and disclosure using procedures that protect the privacy of the information. 5. Evaluating the cost effectiveness of controls. 6. Maintaining information security policies, procedures and standards as appropriate and in consultation with the ISO. 7. Promoting employee education and awareness by utilizing programs approved by the ISO, where appropriate. 8. Reporting promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 9. Identifying and responding to security incidents and initiating appropriate actions when problems are identified. D. User Management: ORGANIZATION XYZ management who supervise users as defined below. User management is responsible for overseeing their employees’ use of information, including: 1. Reviewing and approving all requests for their employees access authorizations. . Initiating security change requests to keep employees’ security record current with their positions and job functions. 3. Promptly informing appropriate parties of employee terminations and transfers, in accordance with local entity termination procedures. 4. Revoking physical access to terminated employees, i. e. , confiscating keys, changing combination locks, etc. 5. Providing employees with the opportunit y for training needed to properly use the computer systems. 6. Reporting promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 7. Initiating corrective actions when problems are identified. 8. Following existing approval processes within their respective organization for the selection, budgeting, purchase, and implementation of any computer system/software to manage information. E. User: The user is any person who has been authorized to read, enter, or update information. A user of information is expected to: 1. Access information only in support of their authorized job responsibilities. 2. Comply with Information Security Policies and Standards and with all controls established by the owner and custodian. 3. Refer all disclosures of PHI (1) outside of ORGANIZATION XYZ and (2) within ORGANIZATION XYZ, other than for treatment, payment, or health care operations, to the applicable entity’s Medical/Health Information Management Department. In certain circumstances, the Medical/Health Information Management Department policies may specifically delegate the disclosure process to other departments. (For additional information, see ORGANIZATION XYZ Privacy/Confidentiality of Protected Health Information (PHI) Policy. ) 4. Keep personal authentication devices (e. g. passwords, SecureCards, PINs, etc. confidential. 5. Report promptly to the ISO the loss or misuse of ORGANIZATION XYZ information. 6. Initiate corrective actions when problems are identified. VI. INFORMATION CLASSIFICATION Classification is used to promote proper controls for safeguarding the confidentiality of information. Regardless of classification the integrity and accuracy of all classifications of information must be pr otected. The classification assigned and the related controls applied are dependent on the sensitivity of the information. Information must be classified according to the most sensitive detail it includes. Information recorded in several formats (e. g. , source document, electronic record, report) must have the same classification regardless of format. The following levels are to be used when classifying information: A. Protected Health Information (PHI) 1. PHI is information, whether oral or recorded in any form or medium, that: a. is created or received by a healthcare provider, health plan, public health authority, employer, life insurer, school or university or health clearinghouse; and b. relates to past, present or future physical or mental ealth or condition of an individual, the provision of health care to an individual, or the past present or future payment for the provision of health care to an individual; and c. includes demographic data, that permits identification of the individual or could reasonably be used to identify the individual. 2. Unauthorized or improper disclosure, modification, or destruction of this information could violate state and federal laws, result in c ivil and criminal penalties, and cause serious damage to ORGANIZATION XYZ and its patients or research interests. B. Confidential Information 1. Confidential Information is very important and highly sensitive material that is not classified as PHI. This information is private or otherwise sensitive in nature and must be restricted to those with a legitimate business need for access. Examples of Confidential Information may include: personnel information, key financial information, proprietary information of commercial research sponsors, system access passwords and information file encryption keys. 2. Unauthorized disclosure of this information to people without a business need for access may violate laws and regulations, or may cause significant problems for ORGANIZATION XYZ, its customers, or its business partners. Decisions about the provision of access to this information must always be cleared through the information owner. C. Internal Information 1. Internal Information is intended for unrestricted use within ORGANIZATION XYZ, and in some cases within affiliated organizations such as ORGANIZATION XYZ business partners. This type of information is already idely-distributed within ORGANIZATION XYZ, or it could be so distributed within the organization without advance permission from the information owner. Examples of Internal Information may include: personnel directories, internal policies and procedures, most internal electronic mail messages. 2. Any information not explicitly classified as PHI, Confidential or Public will, by default, be classified as Internal Information. 3. Unauthorized disclosure of this information to outsiders may not be appropriate due to legal or contractual provisions. D. Public Information 1. Public Information has been specifically approved for public release by a designated authority within each entity of ORGANIZATION XYZ. Examples of Public Information may include marketing brochures and material posted to ORGANIZATION XYZ entity internet web pages. 2. This information may be disclosed outside of ORGANIZATION XYZ. VII. COMPUTER AND INFORMATION CONTROL All involved systems and information are assets of ORGANIZATION XYZ and are expected to be protected from misuse, unauthorized manipulation, and destruction. These protection measures may be physical and/or software based. A. Ownership of Software: All computer software developed by ORGANIZATION XYZ employees or contract personnel on behalf of ORGANIZATION XYZ or licensed for ORGANIZATION XYZ use is the property of ORGANIZATION XYZ and must not be copied for use at home or any other location, unless otherwise specified by the license agreement. B. Installed Software: All software packages that reside on computers and networks within ORGANIZATION XYZ must comply with applicable licensing agreements and restrictions and must comply with ORGANIZATION XYZ acquisition of software policies. C. Virus Protection: Virus checking systems approved by the Information Security Officer and Information Services must be deployed using a multi-layered approach (desktops, servers, gateways, etc. ) that ensures all electronic files are appropriately scanned for viruses. Users are not authorized to turn off or disable virus checking systems. D. Access Controls: Physical and electronic access to PHI, Confidential and Internal information and computing resources is controlled. To ensure appropriate levels of access by internal workers, a variety of security measures will be instituted as recommended by the Information Security Officer and approved by ORGANIZATION XYZ. Mechanisms to control access to PHI, Confidential and Internal information include (but are not limited to) the following methods: 1. Authorization: Access will be granted on a â€Å"need to know† basis and must be authorized by the immediate supervisor and application owner with the assistance of the ISO. Any of the following methods are acceptable for providing access under this policy: . Context-based access: Access control based on the context of a transaction (as opposed to being based on attributes of the initiator or target). The â€Å"external† factors might include time of day, location of the user, strength of user authentication, etc. b. Role-based access: An alternative to traditional access control models (e. g. , discretionary or non-discretionary access control po licies) that permits the specification and enforcement of enterprise-specific security policies in a way that maps more naturally to an organization’s structure and business activities. Each user is assigned to one or more predefined roles, each of which has been assigned the various privileges needed to perform that role. c. User-based access: A security mechanism used to grant users of a system access based upon the identity of the user. 2. Identification/Authentication: Unique user identification (user id) and authentication is required for all systems that maintain or access PHI, Confidential and/or Internal Information. Users will be held accountable for all actions performed on the system with their user id. a. At least one of the following authentication methods must be implemented: 1. strictly controlled passwords (Attachment 1 – Password Control Standards), 2. biometric identification, and/or 3. tokens in conjunction with a PIN. b. The user must secure his/her authentication control (e. g. password, token) such that it is known only to that user and possibly a designated security manager. c. An automatic timeout re-authentication must be required after a certain period of no activity (maximum 15 minutes). d. The user must log off or secure the system when leaving it. 3. Data Integrity: ORGANIZATION XYZ must be able to provide corroboration that PHI, Confidential, and Internal Information has not been altered or destroyed in an unauthorized manner. Listed below are some methods that support data integrity: a. transaction audit b. disk redundancy (RAID) c. ECC (Error Correcting Memory) d. checksums (file integrity) e. encryption of data in storage f. digital signatures 4. Transmission Security: Technical security mechanisms must be put in place to guard against unauthorized access to data that is transmitted over a communications network, including wireless networks. The following features must be implemented: a. integrity controls and b. encryption, where deemed appropriate 5. Remote Access: Access into ORGANIZATION XYZ network from outside will be granted using ORGANIZATION XYZ approved devices and pathways on an individual user and application basis. All other network access options are strictly prohibited. Further, PHI, Confidential and/or Internal Information that is stored or accessed remotely must maintain the same level of protections as information stored and accessed within the ORGANIZATION XYZ network. 6. Physical Access: Access to areas in which information processing is carried out must be restricted to only appropriately authorized individuals. The following physical controls must be in place: a. Mainframe computer systems must be installed in an access-controlled area. The area in and around the computer facility must afford protection against fire, water damage, and other environmental hazards such as power outages and extreme temperature situations. b. File servers containing PHI, Confidential and/or Internal Information must be installed in a secure area to prevent theft, destruction, or access by unauthorized individuals. . Workstations or personal computers (PC) must be secured against use by unauthorized individuals. Local procedures and standards must be developed on secure and appropriate workstation use and physical safeguards which must include procedures that will: 1. Position workstations to minimize unauthorized viewing of protected health information. 2. Grant workst ation access only to those who need it in order to perform their job function. 3. Establish workstation location criteria to eliminate or minimize the possibility of unauthorized access to protected health information. 4. Employ physical safeguards as determined by risk analysis, such as locating workstations in controlled access areas or installing covers or enclosures to preclude passerby access to PHI. 5. Use automatic screen savers with passwords to protect unattended machines. d. Facility access controls must be implemented to limit physical access to electronic information systems and the facilities in which they are housed, while ensuring that properly authorized access is allowed. Local policies and procedures must be developed to address the following facility access control requirements: 1. Contingency Operations – Documented procedures that allow facility access in support of restoration of lost data under the disaster recovery plan and emergency mode operations plan in the event of an emergency. 2. Facility Security Plan – Documented policies and procedures to safeguard the facility and the equipment therein from unauthorized physical access, tampering, and theft. 3. Access Control and Validation – Documented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision. . Maintenance records – Documented policies and procedures to document repairs and modifications to the physical components of the facility which are related to security (for example, hardware, walls, doors, and locks). 7. Emergency Access: a. Each entity is required to establish a mechanism to provide emergency access to systems and ap plications in the event that the assigned custodian or owner is unavailable during an emergency. b. Procedures must be documented to address: 1. Authorization, 2. Implementation, and 3. Revocation E. Equipment and Media Controls: The disposal of information must ensure the continued protection of PHI, Confidential and Internal Information. Each entity must develop and implement policies and procedures that govern the receipt and removal of hardware and electronic media that contain PHI into and out of a facility, and the movement of these items within the facility. The following specification must be addressed: 1. Information Disposal / Media Re-Use of: a. Hard copy (paper and microfilm/fiche) b. Magnetic media (floppy disks, hard drives, zip disks, etc. ) and c. CD ROM Disks 2. Accountability: Each entity must maintain a record of the movements of hardware and electronic media and any person responsible therefore. 3. Data backup and Storage: When needed, create a retrievable, exact copy of electronic PHI before movement of equipment. F. Other Media Controls: 1. PHI and Confidential Information stored on external media (diskettes, cd-roms, portable storage, memory sticks, etc. ) must be protected from theft and unauthorized access. Such media must be appropriately labeled so as to identify it as PHI or Confidential Information. Further, external media containing PHI and Confidential Information must never be left unattended in unsecured areas. 2. PHI and Confidential Information must never be stored on mobile computing devices (laptops, personal digital assistants (PDA), smart phones, tablet PC’s, etc. ) unless the devices have the following minimum security requirements implemented: a. Power-on passwords b. Auto logoff or screen saver with password c. Encryption of stored data or other acceptable safeguards approved by Information Security Officer Further, mobile computing devices must never be left unattended in unsecured areas. . If PHI or Confidential Information is stored on external medium or mobile computing devices and there is a breach of confidentiality as a result, then the owner of the medium/device will be held personally accountable and is subject to the terms and conditions of ORGANIZATION XYZ Information Security Policies and Confidentiality Statement signed as a condition of employme nt or affiliation with ORGANIZATION XYZ. H. Data Transfer/Printing: 1. Electronic Mass Data Transfers: Downloading and uploading PHI, Confidential, and Internal Information between systems must be strictly controlled. Requests for mass downloads of, or individual requests for, information for research purposes that include PHI must be approved through the Internal Review Board (IRB). All other mass downloads of information must be approved by the Application Owner and include only the minimum amount of information necessary to fulfill the request. Applicable Business Associate Agreements must be in place when transferring PHI to external entities (see ORGANIZATION XYZ policy B-2 entitled â€Å"Business Associates†). 2. Other Electronic Data Transfers and Printing: PHI, Confidential and Internal Information must be stored in a manner inaccessible to unauthorized individuals. PHI and Confidential information must not be downloaded, copied or printed indiscriminately or left unattended and open to compromise. PHI that is downloaded for educational purposes where possible should be de-identified before use. I. Oral Communications: ORGANIZATION XYZ staff should be aware of their surroundings when discussing PHI and Confidential Information. This includes the use of cellular telephones in public areas. ORGANIZATION XYZ staff should not discuss PHI or Confidential Information in public areas if the information can be overheard. Caution should be used when conducting conversations in: semi-private rooms, waiting rooms, corridors, elevators, stairwells, cafeterias, restaurants, or on public transportation. J. Audit Controls: Hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use PHI must be implemented. Further, procedures must be implemented to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. These reviews must be documented and maintained for six (6) years. K. Evaluation: ORGANIZATION XYZ requires that periodic technical and non-technical evaluations be performed in response to environmental or operational changes affecting the security of electronic PHI to ensure its continued protection. L. Contingency Plan: Controls must ensure that ORGANIZATION XYZ can recover from any damage to computer equipment or files within a reasonable period of time. Each entity is required to develop and maintain a plan for responding to a system emergency or other occurrence (for example, fire, vandalism, system failure and natural disaster) that damages systems that contain PHI, Confidential, or Internal Information. This will include developing policies and procedures to address the following: 1. Data Backup Plan: a. A data backup plan must be documented and routinely updated to create and maintain, for a specific period of time, retrievable exact copies of information. b. Backup data must be stored in an off-site location and protected from physical damage. . Backup data must be afforded the same level of protection as the original data. 2. Disaster Recovery Plan: A disaster recovery plan must be developed and documented which contains a process enabling the entity to restore any loss of data in the event of fire, vandalism, natural disaster, or system failure. 3. Emergency Mode Operation Plan: A plan must be developed and documented which c ontains a process enabling the entity to continue to operate in the event of fire, vandalism, natural disaster, or system failure. 4. Testing and Revision Procedures: Procedures should be developed and documented requiring periodic testing of written contingency plans to discover weaknesses and the subsequent process of revising the documentation, if necessary. 5. Applications and Data Criticality Analysis: The criticality of specific applications and data in support of other contingency plan components must be assessed and documented. Compliance [ § 164. 308(a)(1)(ii)(C)] A. The Information Security Policy applies to all users of ORGANIZATION XYZ information including: employees, medical staff, students, volunteers, and outside affiliates. Failure to comply with Information Security Policies and Standards by employees, medical staff, volunteers, and outside affiliates may result in disciplinary action up to and including dismissal in accordance with applicable ORGANIZATION XYZ procedures, or, in the case of outside affiliates, termination of the affiliation. Failure to comply with Information Security Policies and Standards by students may constitute grounds for corrective action in accordance with ORGANIZATION XYZ procedures. Further, penalties associated with state and federal laws may apply. B. Possible disciplinary/corrective action may be instituted for, but is not limited to, the following: 1. Unauthorized disclosure of PHI or Confidential Information as specified in Confidentiality Statement. 2. Unauthorized disclosure of a sign-on code (user id) or password. 3. Attempting to obtain a sign-on code or password that belongs to another person. 4. Using or attempting to use another person’s sign-on code or password. 5. Unauthorized use of an authorized password to invade patient privacy by examining records or information for which there has been no request for review. . Installing or using unlicensed software on ORGANIZATION XYZ computers. 7. The intentional unauthorized destruction of ORGANIZATION XYZ information. 8. Attempting to get access to sign-on codes for purposes other than official business, including completing fraudulent documentation to gain access. — ATTACHMENT 1 — Password Control Standards The ORGANIZATION XYZ Information Security Polic y requires the use of strictly controlled passwords for accessing Protected Health Information (PHI), Confidential Information (CI) and Internal Information (II). See ORGANIZATION XYZ Information Security Policy for definition of these protected classes of information. ) Listed below are the minimum standards that must be implemented in order to ensure the effectiveness of password controls. Standards for accessing PHI, CI, II: Users are responsible for complying with the following password standards: 1. Passwords must never be shared with another person, unless the person is a designated security manager. 2. Every password must, where possible, be changed regularly – (between 45 and 90 days depending on the sensitivity of the information being accessed) 3. Passwords must, where possible, have a minimum length of six characters. 4. Passwords must never be saved when prompted by any application with the exception of central single sign-on (SSO) systems as approved by the ISO. This feature should be disabled in all applicable systems. 5. Passwords must not be programmed into a PC or recorded anywhere that someone may find and use them. 6. When creating a password, it is important not to use words that can be found in dictionaries or words that are easily guessed due to their association with the user (i. e. children’s names, pets’ names, birthdays, etc†¦). A combination of alpha and numeric characters are more difficult to guess. Where possible, system software must enforce the following password standards: 1. Passwords routed over a network must be encrypted. 2. Passwords must be entered in a non-display field. 3. System software must enforce the changing of passwords and the minimum length. 4. System software must disable the user identification code when more than three consecutive invalid passwords are given within a 15 minute timeframe. Lockout time must be set at a minimum of 30 minutes. 5. System software must maintain a history of previous passwords and prevent their reuse. How to cite General Security Policy, Papers

Sunday, April 26, 2020

Mythology of the Ford Motor Company

Introduction Ford Motor Company was incorporated on June 16, 1903 when Henry Ford and other eleven business associates signed articles of association and memorandum of understanding. The capital of the company was $28,000 (Nevins Frank, 1962). It was listed in American stock exchange on February 24, 1956. The number of employees today is approximately 300,000 who are distributed in its 108 plants worldwide.Advertising We will write a custom research paper sample on Mythology of the Ford Motor Company specifically for you for only $16.05 $11/page Learn More The headquarters for the company is Dearborn, Michigan (US). As market changes, there is a change in the technology adopted and currently the company is on track of making electric motor vehicles. It enjoys a strong brand name, which works to its benefit in today’s motor industry. Its first managing director was Henry Ford while the current managing director is Alan Mulally. This paper takes a look at the mythology of Ford Motor Company; it will give a brief history of the company’s founder (Ford Company Limited official website, 2010). Henry Ford He was born on 30th July, 1863. Henry was the initiator of Ford Company and an esteemed American entrepreneur. He was born to William Ford (1826–1905) and Mary Litogot Ford (1839–1876), in Greenfield Township near Detroit, Michigan. In 1888, he got married to Clara Ala Bryant (1865–1950) and was blessed with one child called Edsel Bryant Ford (1893–1943). A professional engineer, Ford worked as a chief engineer (1883) with Edison Illuminating Company. He is said to be an aggressive intelligent man. He died 7th April, 1947(Baldwin, 2000). Henry at 25 yearsAdvertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Henry in 1919. Mission statement and vision of Ford Motor Company The mission and vision s tatement of the company is as follows. The company aims at continuously improving its processes to satisfy the needs of various classes of customers that it enjoys. To do this it empowers its staffs through appropriate training and offering a good career path. There is an environmental policy, which is managed at a departmental level where the company is responsive to dangers that its processes would cause to the environment. This is on top of its social corporate responsibilities. Basic Product Classes Ford is an American motor vehicle producing company which employs different strategies to remain competitive in motor industry. It manufactures passenger cars and trucks for various purposes. Currently, there are eight brands from the company, which are Aston Martin, Ford, Jaguar, Land Rover, Lincoln, Mazda, Mercury, and Volvo. Ford motor vehicle model are known to be fuel efficient and last longer (Rubenstein, 1992). They are made in response to the needs of customers and every mea sure taken to ensure that customer feedback is acted upon.Advertising We will write a custom research paper sample on Mythology of the Ford Motor Company specifically for you for only $16.05 $11/page Learn More A timeline of Ford â€Å"firsts† which consist of stated accomplishments by Ford that were initiated by other automobile companies. Ford has been producing different brands with some being a success whereas others have failed. It has also sold some of its branches to international firms for instance, it sold Jaguar (in March 2008) to Tata limited (of India); the sold plant was in United Kingdom. Year of introduction to end year model 1903–present Ford 1939–2010 Mercury 1922–present Lincoln 1958-1960 Edsel, 1985-1989 Merkur 1989-2007 Aston Martin The above is a sample diagram of a ford model of 1919 pickup. The company is known for production of long distance trucks. Reference List Baldwin, N. (2000). Henry Ford and the Jews: The Mass Production of Hate; PublicAffairs, ISBN 1-58648-163-0 Ford Company Limited official website (2010). Ford. Retrieved from https://www.ford.com/ Nevins, A., and Frank, E. (1962). Ford: Decline and Rebirth, 1933-1962. New York: Charles Scribners’ Sons. Rubenstein, M. (1992). The Changing U.S. Auto Industry: A Geographical Analysis. London: Routledge.Advertising Looking for research paper on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This research paper on Mythology of the Ford Motor Company was written and submitted by user Dan1M00nstar to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Wednesday, March 18, 2020

10 Things I Hate About You Essays

Taming of the Shrew/ 10 Things I Hate About You Essays Taming of the Shrew/ 10 Things I Hate About You Paper Taming of the Shrew/ 10 Things I Hate About You Paper Essay Topic: The Taming Of the Shrew The story of The Taming of the Shrew is one that raises important issues both in the Shakespearean text and in the modern appropriation 10 Things I Hate About You. How does each composers use of this story reflect the time in which each was composed The Taming of the Shrew was written in the Elizabethan Era in England at a time when men were considered to be superior to women. The patriarchal society of this time is reflected to a large extent in the text and various implications of traditional values can be noted. The modern appropriation, Ten Things I Hate About You, goes along the same story line however it is quite evident that the different context has a significant impact upon the content. The most obvious indicator of the type of society is given through the medium that each text is presented in. The Taming of the Shrew is a play and was staged for audiences during the early 17th century. The fact that Shakespeare chose to write a play rather than, say, a comic strip or screenplay, indicated that it was the most popular form of entertainment at the time. The best way for Shakespeare to have his work known was through the most popular form of entertainment. The language of the text is another tell-tale sign of the type of culture prevalent in Shakespeares era. Shakespearean English is used, which is much more poetic and refined than our present day dialect, hence the people in society had quite sophisticated speech. In the film Ten Things I Hate About You, the language is fairly colloquial and rough-edged. Kat is called a heinous bitch by her peers, and the Principal of the school, someone in an authoritative position, has no problem with relaying that information to Kat. This is a large contrast to the Katherina of the Shakespearean text, whom others called a shrew and a wild beast. This exposes the crude English that society has developed, and that is being used by teenagers. The fact that a person in a position of power doesnt hesitate to use such language emphasizes that it is accepted not only by adolescents but by adults as well. Yet another illustration of the popular culture of modern society is the medium that Ten Things is shown via. Choosing to adapt the play, The Taming of the Shrew, as a film shows that it was one of the most popular forms of entertainment of the 20th century. Society in the Renaissance period was highly dominated by males, and they exercised their power over women quite regularly. We can immediately come to this conclusion after reading the beginning of the text, The Taming of the Shrew. Katherina is being defined by Gremio and Lucentio, and after their first meeting with Katherina Gremio states . .. though her father be very rich, any man is so very a fool to be married to hell Through the mens definitions the audience is given the first opinions of Katherina and she is not given a chance to voice her own opinion or thoughts on the matter. The appropriated version of Katherina, Kat, is a character that is given much more freedom. She is a non-conformist and an outsider at her school. She is defined by her own words, I dont like to do what people expect, why should I live up to other peoples expectations instead of my own, and her actions in the English Class Scene. Kat makes references to Sylvia Plath and Charlotte Bronte, both feminist writers, and we are led to believe that Kat holds strong feminist views. The music in the film also signifies how Kat feels, for example the beginning song that has the lyrics I dont give a damn about my bad reputation. In the film Kat is also given a chance to explain the reasons for her different behaviour when she tells Bianca about her relationship with Joey. Katherina of The Taming of the Shrew is never given the chance to explain herself and her actions therefore we can conclude that it is because her society does not allow for women like herself to have an opinion. Choice is a prominent symbol of the cultures that each text reflects. In the Taming of the Shrew Katherina is forced to marry Petruchio and she is not given any choice in the matter because it is unacceptable to go against the will of ones father. The culture of the early 17th century placed strong emphasis on the respect that children must show for their parents. Although Katherina rebels against many other customs she reluctantly marries out of respect for her father. In Ten Things Kat is given the choice of going out with Patrick or not. Patrick is given money to woo Kat but he never forces her to take up his offer because, in the society that they live in, it is not acceptable. This reflects that, in the modern context, men and women have greater equality, and also that parents have little or no part in the relationships that their children build with members of the opposite sex. The fathers in each of the two texts give a very good insight into the culture of the society in their particular eras. The Ten Things father is very protective of his daughters. He is aware of the availability of drugs and alcohol in teen culture, and the probability teens retain of having sexual relations. This shows that these are all prominent issues in society in the 90s. Baptista, from the play, is a contrast to the Ten Things father. He very much desires his daughters to get married because he doesnt want to risk losing his familys good reputation. We can tell that it is normal for daughters to be married by their fathers and the father is not worried about sex, drugs or alcohol, so we can gather that these issues were not around during the Renaissance. Hence it can be concluded that the culture of the time was not exposed to such matters, and did not need to concern themselves with them. The biggest force in society at the time Ten Things was made was peer pressure, and still is. We find this out when Kat talks to Bianca about her relationship with Joey. She said everyone was doing it so I did it. We can gather that Kat was a victim of this peer pressure and her reaction was to cut herself off from all the conformists and become her own person. Kat is not the only person in society that has a feminist view, though, and this is shown at Club Skunk where her favourite band performed. Kat was not the only girl listening to the band so one can assume that Kats interests were not entirely individual. Whereas Katherina of Shakespeares play is only one voice in the male hierarchical system and she is never aware of any similar voices so her oppression in society was inevitable. In modern society, it has become normal for all teenagers to attend university. In Ten Things Kat talks about wanting to attend a University out west, something her father isnt keen on, as the western Universities are known for their better marks and overall higher intelligence. Kats desire to go against her fathers will reflects that parents and children of the 20th century were more equal than they were in the Elizabethan period. Kats thirst for knowledge and attendance at a western university highlights her strong personality as she is willing to go against her father to get what she wants. In The Taming of the Shrew an indication of a characters wealth is by the number of servants they have, the size of their property, and the positions they hold in society. This is a direct reflection on Renaissance society as many of the richest people owned a fair few servants. This is fairly similar to today and in Ten Things, the movie illustrates the Kats familys wealthiness through their large pristine house, their fathers occupation as a Doctor, and the dialogue. In Shakespeares time wealth was admired a great deal. Men would marry women because of their fathers wealth and the good deal they could close. Well off men were much respected in society. The reason for Petruchios marriage to Katherina was solely because he wanted to have a share in her wealth. In the end the audience never finds out whether Petruchio and Katherina love each other but previously they didnt so it can be assumed either way. In Ten Things not much reference is paid to the impacts your wealth had on the respect you received in society. Bowy Lowenstein, on of the computer group is not considered cool because he spends a lot of time at his computer and not socializing, yet he is very wealthy. Overall The Taming of the Shrew and Ten Things I Hate About You contain many elements that reflect the society through which they were composed. The historical, cultural, and social context of the Taming of the Shrew influenced much of the action in the play and the film appropriation gives an insight into 20th century teen culture.

Monday, March 2, 2020

Critical Analysis of Your Own Writing

Critical Analysis of Your Own Writing Critical Analysis of Your Own Writing Critical Analysis of Your Own Writing By Guest Author This is a guest post by Alice Peterson . If you want to write for Daily Writing Tips check the guidelines here. So you think you have something to say? How do you get past the stymieing effect of self-analysis? Is this good enough? Will your target audience be provoked to the point of discomfort? Are you â€Å"okay with that?† American literature today is in danger of being hampered by the three-minute attention span. Educators are being taught that that there is a â€Å"generational culture† (isn’t that an oxymoron? I’ll save that for a later article) wherein our audience no longer has the abstract-thinking ability to solve a complex problem. Our literary contributions are bound to suffer. How can we sidestep this problem and improve our critical thinking skills for writing? Here is I challenge I have for you: attempt to read the passage below and answer the following questions in four minutes. Are the characters consistent with their time and place? Is the dialogue appropriate to both the audience of the writer and the character? Is the writing original and thought-provoking? Some might call Big J a megalomaniac. Although a tradesman by day, he threw lavish outdoor parties on weekends in his fishing village of Golly Me for anyone who would listen to his bombastic diatribes against the status quo. He was known for preparing local cuisine with few calories but full satiety, for this strategy ever-expanded his circle of close friends. Tonight, with a full belly and the feeling of being in an exclusive club, I felt a sense of purpose and renewed energy in my middle age. I was ready to hear Big J’s pronouncements for the week. â€Å"I am the alpha and the omega,† he broadcast to 5,000 of us with only a megaphone to help his voice carry. Heads in the crowd restlessly turned right-to-left and left-to-right. Confused faces repeated the words in their native English. Sure, Big J is the smartest guy in the room. Few of us had been to college and studied foreign languages. What was he talking about? It was Greek to me. 1. â€Å"Why here, why now?† This is the simplest tool of critical thinking. Why did I have the character suddenly speak in a language foreign to his fictional audience? No one in my story was well-travelled, or had been to college yet. They might not even read well or at all. Perhaps it was to establish J as â€Å"the smartest guy in the room,† well-travelled and culturally astute. I have to determine if this anachronism detracts from the scene, or if it is worth it so I can later sell simple fish trinkets that are coincidentally shaped like the Greek letter alpha. 2. What about the first paragraph? Is it realistic to say low-calorie, highly satisfying food is a crowd pleaser? We are in a fishing village, so the local cuisine is fish. We know most fish contains protein and healthy fats which do produce a full feeling for fewer calories than meals heavy in carbohydrates. 3. What about the megaphone? Have I ever been at an outdoor event at the back of a crowd of 5,000 and heard the entertainment clearly over a megaphone? Personally, I am not a fan of the outdoor concerts with sophisticated electronic s and speakers. Just a few hundred people or so between myself and the stage will greatly reduce my acoustical enjoyment. Although we all look for time-savers throughout our day, practice is truly the best way to improve skills. This exercise probably took you between four and five minutes to complete. Keep applying this tool to everything you read and write, and you will be rewarded with expert skills, and maybe a little discomfort. Alice Peterson serves on the editorial review board for the Journal of Neuroscience Nursing. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Writing Basics category, check our popular posts, or choose a related post below:When to Use â€Å"That,† â€Å"Which,† and â€Å"Who†"Wracking" or "Racking" Your Brain?Glimpse and Glance: Same or Different?

Saturday, February 15, 2020

Fighting Violent Religious through Self-Governance and Economic Research Paper

Fighting Violent Religious through Self-Governance and Economic - Research Paper Example Both air and ground bombardments of the extremist groups and toppling of the extremist regimes like the previous Saddam Hussein government have failed in ending religious extremist violence. This paper will discuss the origins of the extremist groups and offer solutions to ending religious extremist violence (James and Mason 10). II. Background and history of religious extremism Unlike the popular beliefs, religious extremism and violence is not an element of any religion. Although Islam religion has Jihad, the religion prohibits the use of violence and terrorism. The root cause of religious extremism is false radical doctrines that cause frustration and anger among the extremists. Religious extremist groups are willing to use violence to maintain the status quo. Unfortunately, America has numerous hate groups and religious extremists that are always willing to use violence to achieve their terrorism objectives. Religious extremist groups make powerful denunciation of people with dif ferent lifestyles and dehumanize the non-believers in their religion. These groups make idealizations of past eras and devalue the events of the world since they intensely focus on life after death. These groups try to maintain the traditional roles of women and use violence to those who disagree with their beliefs. One common belief of all religions is the purpose of preservation of human life and living according to the will of God. Islam is committed to attaining peace through commitment to God’s will. Muslim Brotherhood, the most influential political organization in the Muslim world, has embraced radical ideologies by asserting that the Arab world is currently corrupted by Western influences. Modern Islamic extremist groups include Hamas, Hezbollah and Al-Qaeda. Islamic extremist has been triggered by the US occupation of Iraq, the globalization of the Western culture and the ongoing Palestinian-Israel conflicts where countries dominated by Christianity beliefs are suppo rting Israel in the occupation of the contested regions (James and Mason 40). Christian extremist groups also exist with the objective of using violence against members of other religions in order to transform the US to a biblical law government. Christian extremists groups have in the past used violence against citizens who live against the biblical teachings like gay people, pro-abortion groups and stem cell researchers. The goal of the Christian extremist groups is to impose their moral values in the US constitution and eventually create a â€Å"Christian America† that is ruled by Christianity beliefs and teachings. The aftermath of the Holocaust that claimed the lives of more than 6 million Jews led to the formation of Jewish religion extremist groups. The clash of cultures and faith between the extremist Muslims and extremist Christians has threatened the global peace since numerous terrorism attacks have been facilitated by the extremist groups. Islamic extremist groups have the objective of dismantling democratic governance and capitalist ideas and replace them with communist values. The return of the Palestinian State to Muslims and the total destruction of Israel is one of the objectives of religious extremism in the Israel-Palestinian crisis. Religious extremism is a part of the greater social problems experienced in the society. Historically, Islam religion was peaceful due to excellent living conditions and flourishing economies. Christians

Sunday, February 2, 2020

Chapter 17 Assignment Example | Topics and Well Written Essays - 250 words

Chapter 17 - Assignment Example On the other hand, when a person has a high external locus of control, he would probably perceive his achievements and disappointments as caused by luck or fate or any other environmental factor. Stability simply means whether causes vary over a period of time. In controllability, there are causes and factors that a person can control such as abilities as opposed to causes that cannot be manipulated such as fate, chance, and actions done by others. In relation to the attribution theory, we judge people in different ways because we give meaning to their behavior, whether it was caused internally or externally A good example is when a friend does not reply to your text messages. You might feel hurt, confused, or even angry thinking that she is doing it out of her own volition and avoiding you on purpose. What you might not know is that her phone’s battery might have died down, or that her phone got stolen. There are always two sides to everything and we make a mistake when we tend to look and pay more attention to one side than the other. More often than not, the first thing that we learn about someone tends to be our basis or plays the major role in giving attributes to that person commonly known as â€Å"first impression†. This tendency gives rise to perceptual errors such as self-fulfilling prophecy and stereotyping. In self-fulfilling prophecy, when other people expects highly of you, you tend to rise up to tha t level. For example in a basketball team, when the coach thinks highly of its players, the likely result is that the team will be one of the strongest in the league. In stereotyping, we pass judgment on a person depending on the group he belongs in. Just like in the movie â€Å"Mean Girls†, if you joined the Math Club, they considered it social suicide because of the notion that its members are geeks and nerds. Because of these misconceptions,

Saturday, January 25, 2020

Time Cat by Lloyd Alexander Essay -- Time Cat Lloyd Alexander Outline

Time Cat by Lloyd Alexander Type of story: Fictional Setting: 1.Time: Historical period: the story jumps from different times. While traveling though they go from 2700b.c. to 55b.c. to 998b.c. to 411b.c. to 998a.d. to 1468 to 1555 to 1588 to 1600 to 1775. 2. Place: Geographical location: This story as well as switching from time to time it also switches from place to place. While traveling they go the places of Egypt, Rome and Britain, Ireland, Japan, Italy, Peru, The Isle of Man, and finally to America. Scenes: The story starts out in Jason’s room and from there it goes to Egypt where Gareth and Jason go down the Nile river and to a the pharaoh’s palace. From there they Rome and Britain where the spend there time out in forest along seas, in king’s castles, in tribal areas. Main Characters: 1.Name: Jason Physical Features: Jason is tall and skinny; he has short brown hair and deep blue eyes. 2. Personality description: In the beginning of the story Jason is laying in bed and crying because of what a bad day he has been having so that probably shows that he is a sensitive boy. He has a large imagination, this he shows because he does believe his cat (Gareth would talk to him if he wanted to. He is rough and is easily bugged but other than that Jason is sweet and cares dearly for the ones he loves. How does this character change through out the story?: Jason has no change to him, he stills believes in what he believed in before, his attitude is the same; he doesn’t grow kinder but also not meaner. Jason is the same boy he was in the beginning. Character #2 Name: Gareth Physical Description: Gareth is a black cat with orange eyes, Sometimes, when he hunched his shoulders and put down his ears, he looked like an owl. When he stretched, he looked like a trickle of oil or a pair of black silk pajamas. When he sat on a window ledge, his eyes half-shut and his tail curled around him, he looked like a secret. Personality Description: Gareth is a smart, loving cat. He seems to be a problem solver or conflict solver. He has a sly personality to him or like, if you were to just meet him then you’d be very cautious around him because of the way he seems to be. The Problem of the Story: There are a few conflicts to this story, every time Jason and Gareth go to a new place ... ...lly the conflict of this story is the people believe Gareth is a witches slave. Mistress Ursulina’s problem: Miss Ursulina’s problem was that the people of the village believed that she was a witch and right when she was caught she should burned to death. 9.America in the year of 1775: NO CONFLICT. The Plot: 1. Jason is sitting in his bed frustrated because of the horrible day he has and then out of nowhere his cat, Gareth, begins to talk to him. 2. Jason and Gareth travel to Egypt where the meet the pharaoh, Neter-Khet, who they give a valuable lesson to. 3. Jason and Gareth travel to Ireland where they meet the beautiful Diahan who introduces them to Sucat (the herdsman), the magician, and her father, the king. 4. Jason tries proving to the king that his cat is much more useful than the magician in keeping the mice away and does not have to use magic and will not have to be paid. 5. Jason and Gareth have to go home and they have to say good-bye because Gareth tells Jason that he will never be able to speak to him again. 6. Jason wakes to realize that all had happened with Gareth and traveling was a dream. THE END!!!

Thursday, January 16, 2020

Environmental policy Essay

â€Å"Environmental policy can’t be based solely on efficiency arguments. Issues of ethics are at least as important.† Discuss The above statement is true to a certain extent and in the course of this essay a balanced discussion will be presented in the hope that the outcomes will prove this to be true. To begin, the thoughts of some Russian intellectuals will be put forwards on the subject of Utilitarianism and why efficiency is self-destructive in the long run, thus supporting the statement â€Å"Environmental policy can’t be based solely on efficiency arguments.† To lead on from this there will be a dialogue as to the problems faced by old command and control (hence forth referred to as CAC) policies such as direct regulation and emissions fees from an efficiency and ethical viewpoint. Then, these methods of environmental policy and the ideas of Ronald Coase will be highlighted as an example of ethical influence in possible environmental policy as well as from an efficiency standpoint. Following this will be an outlining of the development of the U.S Tradable permits approach to air pollution control and the ethical influences therein. Taking the ethical issues point raised in the title statement one step further then leads onto the idea of ethical considerations. These have been based around an anthropocentric perspective, thus far and so at this point some views from an eco-centric stance will be considered. To do this, A. Leopold’s ‘The Land Ethic’ will be looked at. The rights of nature will be brought under the umbrella of Ethical issues and discussed from a policy perspective. What economists mean by â€Å"economic efficiency†, is that â€Å"in an ideal economic system, goods worth more than they cost to produce get produced, goods worth less than they cost to produce do not.† (D. Friedman. 2004) This holds firm throughout this discussion, along with the idea of efficiency as it is defined as both: â€Å"The production of the desired effects or results with minimum waste of time, effort or skill,† (dictionary.com 2004) and as â€Å"A measure of effectiveness; specifically, the useful work output divided by the energy input in any system† (dictionary.com 2004). In different aspects of environmental policy, these different definitions of efficiency hold true, though it is clear that they all have the same thing in mind when referring to efficiency. As it Stands, Utilitarianism (the theory of Jeremy Bentham) is an example of efficiency if it were to be applied to policy. Valdimir Odoevsky, â€Å"one of the most brilliant and influ ential representatives of progressive thought [in Russia]† (A. Frolova 1998) of his time, produced a development of the utilitarian theory of J. Bentham, which is illustrated in Alla Frolova’s article ‘Ecological reasoning: Ethical alternatives’. The utilitarian approach to life as put across by Odoevsky, who states that â€Å"utility is an essential driving force of all human actions,† (A. Frolova 1998) it is said to be the driving force for all laws, legislations, activities and morals. It is also suggested that under the notion of utilitarianism, utility should be allowed to take the place of all notions of so called consciousness, so called inborn feeling, all poetical dreams and fantasies. This is a very powerful tool for the representation of efficiency as the sole driver of any policy decisions, even environmental ones, however it is a valid viewpoint where ethics is not taken into consideration. Odoevsky talks of a civilization called Benthamia where under the concept of utility everything runs in a sustainable way. However it is when a new civilization is founded outside of Benthamia that the problems associated with a system void of ethics emerge. Through the use of political intrigues, deceit, and bribery, as well as organizing quarrels among any rival civilizations that emerge in order to weaken them for the benefit of Benthamia, the Benthamites extend their power. After they have sufficiently weakened a civilization to the point where that civilization is of no further use to Benthamia, the weakened civilization is taken into full possession either by the acquisition of it (at the cheapest efficient price) or by the use of force. All of these points are seen to be ethically wrong in today’s world where ethics is â€Å"A set of principles of right conduct† (A. Frolova 1998) and even when there is a call for utilization of â€Å"deserted islands† (A. Frolova 1998) rather than taking over the crushed neighbors of Benthamia, the suggestions are condemned and those who put them forwards are said to be â€Å"idle dreamers† (A. Frolova 1998). In Odoevsky’s vision of utilitarianism, Benthamia is torn apart from within due to different self interests associated with differing social situations throughout the growing civilization and as it is put by Odoevsky â€Å"One day glorious Benthamia ceased to exist.† (A. Frolova 1998) Odoevsky perceives nature as sensitive and responsive in regard to human morals and this representation of efficiency as the sole driver of decision making shows that ethics are important in every aspect of what we do. Less extreme examples of efficiency in environmental policy can be seen when looking at cases such as the policy relating to dealing with the inefficiencies associated with the production of steel. Classic approaches to the problem of the externalities of steel production include direct regulation by the government based on telling the steel industry how much they can pollute, as well as emission fees (called Pigouvian taxes). Emission fees are based around the concept of charging steel companies for the damage done by its pollution. The idea of direst regulation is seen to be an inefficient environmental policy whereas emission fees are said to produce an efficient amount of steel as well as an efficient amount of pollution control. In the real world however emission fees policy is not efficient as it is difficult to measure what the damage caused is as well as it being inefficient to spend time looking for the damage caused. These two policies are based around the idea of efficiency in the steel industry (as an example), though with the insight of R. Coase and the introduction of what many have dubbed â€Å"Coase Theorem† social cost can be associated with efficiency to create a better overall way of viewing the problem of externalities through the introduction of property rights. Rather than a system whereby the government defines the measures that need to be taken by industry or where it is left to the polluter to deal with the control methods as with the previously mentioned CAC policies, the idea of Coase’s theorem defines a policy where, â€Å"if transaction costs are zero – if, in other words, any agreement that is in the mutual benefit of the parties concerned gets made, then any initial definition of property rights leads to an efficient outcome† (D. Friedman. 2004) The way that his argument is put across in the article entitled ‘the Swedes get it right’ is based around the cost of abatement of pollution in a steel factory Vs. the cost of changing downwind land use from a resort to a timber forest. The article, written by D. Friedman, puts forwards a very efficient environmental policy whereby the distribution of property rights leads to the internalization of externalities and the most cost effective outcome on a social level. Under the notion of Coase theorem, if it is cheaper for the resort to pay the factory for the cost of pollution abatement rather than change his own land use then this should be done, producing a situation where everybody is happy and the overall conditions are more desirable. This efficiency based policy is seen to be an advancement of old efficiency based policy though there are still problems associated with it due to the fact that ethics are not considered. One of the largest problems noted by Coase is the idea of the â€Å"Public Good Problem† (D. Friedman. 2004). If there are many different people living downwind of a factory and they contribute to the abatement of the pollution, then if one person does not pay because doing so wont make a difference to whether the abatement is paid or not and the abatement does go through, then that person is seen to be a â€Å"free rider† (D. Friedman. 2004) getting abatement for free. This is why air pollution in Southern California still persists, as there are millions of people living in the area it is hard to get a situation where everyone pays for the abatement of pollution and it is not possible to re-locate this vast number of people. Coase argues that it is not the externalities that essential ly create the problem, but that it is the transaction costs. A policy approach to the environment that has taken ethical issues into consideration can be seen in the US formation of a tradable permit approach to air pollution control. In the discussion about the US system ethical consideration is defined in either of two contexts: â€Å"(1) when the decisions seem to reflect altruistic concerns which transcend self-interest and (2) when the decisions seem to provide special treatment to ‘rights’ which seem to have a special moral justification† (T. Tietenberg. 1998). The emissions trading program is set out as a straight forwards, flexible market based policy where the trading of permits is allowed and efficiency is increased due to the self interests of the participating industries. Through the acquisition of an â€Å"emission reduction credit (ERC)† (T. Tietenberg. 1998) this trading can take place and to acquire this ERC a company must lower its emissions to a point below the required level put forwards by the Cle an air act. Further efficiency is established by the way that the ERC system allows new firms to come into the market, thus, â€Å"by introducing the offset policy EPA [the Environmental protection agency] allowed economic growth to continue whilst insuring progress toward attainment.† (T. Tietenberg. 1998) The efficiency of the tradable permits system can be seen by analysis, which concluded that â€Å"the proposed 0.01 g per leaded gallon (gplg) standard would result in $36 billion ($1983) in benefits (from reduced adverse health effects) at an estimated cost to refining industry of $2.6 billion.† (T. Tietenberg. 1998) As well as being implemented at a national level. Tradable permit systems have also been applied at a regional scale, with air pollution in California being an example of this. RECLAIM (Regional Clean Air Incentives Market) shifts the burden of identifying the appropriate control strategies from the control authorities to the polluter (a point that made direct regulation an inefficient policy based solution, as previously mentioned), and thus the system again proves to be effective due to the fact that now, pollution prevention is given an economic underpinning. Along with these examples off efficiency, the tradable permits system, when compared to emissions char ges and emission standards comes out as a far more effective environmental policy. Ethics can be observed in the Tradable permits approach however, and evidence seen in the paper ‘Ethical influences on the evolution of the US tradable permit approach to air control’ suggests that ethical considerations have played a role in shaping the environmental objective, the choice of instruments, the definition of the tradable commodity, the treatment of shutdown credits, the relationship to traditional regulation and the rules governing permit trades. Thus it is the opinion of the author T. Tietenberg, that ethical influences on the evolution of the US tradable permit approach have been â€Å"blended with pragmatic and political concerns to forge a compromise approach† (T. Tietenberg. 1998). This means that even if ethical issues are considered they do not hold as much weight as efficiency arguments and result in efficiency bias compromises. This can be seen in the case of shut down credits. Among the various ways of creating credits this has been the most controversial point. It is controversial, ethically, because the economic incentive should be targeted at positive actions to reduce pollution through the investment of new control equipment and not through shut-down (which is where a factory is shut down to create a large number of tradable ERC’s). As a result the compromise has produced a situation whereby â€Å"all shut-down credits either revert to the control authority or they could be freely transferred to buyers† (T. Tietenberg. 1998). This is a result that doesn’t stop the process of shut-downs (as would be ethically acceptable) but allows the process to continue but with efficient outcomes rather than hoarding of ERC’s. The ethical issues that have been represented in the case study of Tradable permits in the US have been examples of human-centric ethics focusing on welfare. Some environmentalists, such as A. Leopold focus more on eco-centric ethics and present an argument that through social evolution the land itself should be considered as a member of the community which is taken into account in environmental policy. Leopold, in his article, ‘The Land Ethic’ explains his concept and the problems associated with achieving this goal. It is said to be the case that our educational and economic system is heading away from, rather than towards â€Å"an intense consciousness of land† (A. Leopold. 1949) . Leopold shows through the use of specific examples how there are essentially two different types of conversationalists, as Leopold puts it there are the â€Å"economic value grabbers† (A. Leopold. 1949) and those that see â€Å"land as biota† (A. Leopold. 1949) and worr y about the secondary functions of things such as forests. Leopold gives a good illustration of this through the use of sport and meat. Group A, the economic value grabbers, when presented with the idea, will think efficiently about the subject, being satisfied with the thought that these are things that ‘come from’ nature. Group B however, worries about biotic side issues, for example the cost in predators of producing a game crop. Whereas the ideas associated with Coase’s theorem are related to the health issues and other things that affect humans living downwind of the factory, it is the conclusion of Leopold that, â€Å"A land ethic, then, reflects the existence of an ecological conscience, and this in turn reflects a conviction of individual responsibility for the health of the land† (A. Leopold. 1949). This view holds that the land is to be conserved or protected as some sustainability policies are currently leading towards. It is the opinion of Leopold that sustainability policy should be based around ideas of eco-centric ethics rather than being based around the idea that it is a ne cessity to promote sustainable policies from a human centric point of view. To conclude it can be said that efficiency is still the main focus of environmental policy making however over time the emergence of ethics in policy has emerged, though ethical issues are not considered to be at least as important as efficiency arguments. It has been said that â€Å"without some kind of ethic (a theory of right and responsibility) and some kind of axiology (or value theory) we lack guidance and direction for tackling problems, whether global, environmental, or otherwise† (R. Attfield. 1999). The discussion in this essay has led towards an outcome that supports the statement to a certain degree. It has been shown through the use of the utilitarian argument and some CAC policy methods that efficiency is not the only thing that has to be considered in environmental policy making, and the US case-study supports the notion that a certain amount of ethics has to be involved. But the nature of the ethics that is applied is essentially Human-centric and to consider ethical issues in environmental policy to be as important as efficiency the idea of a land ethic is an important one. As Leopold says himself the idea of a land ethic is not yet public opinion and in fact is only being kept alive by a minority who has revolted against modern trends of efficiency and human-centric ethics. Ethical issues are not as important as efficiency arguments in environmental policy though if the land ethic were to become a popular opinion through re-education and a shift in social thinking then there is a hope that in time the statement will be completely justified. References A. Leopold (1949) The Land Ethic. In: A Second County Almanac. Oxford University Press. Oxford. Alla Frolova (1998) Ecological reasoning: Ethical alternatives. Ecological Economics, 24. p.169-182. Dictionary.com (2004) http://dictionary.reference.com/ David Friedman The Swedes get it right. http://www.daviddfriedman.com/Libertarian/The_Swedes.html (2004) Robin Attfield (1983) The Ethics of Environmental Concern. Basil Blackwell. Oxford. Robin Attfield (1998) Existence value and intrinsic value. Ecological Economics, 24. p. 163-168 Robin Attfield (1999) The Ethics of the Global Environment. Edinburgh University Press. Edinburgh. Robert Elliot (1995) Environmental Ethics. Oxford University Press. Oxford. Tom Tietenberg (1998) Ethical influences on the evolution of the US tradable permit approach to air pollution control. Ecological Economics, 24. p. 241-257. Student no. 00020854702E