Sunday, December 29, 2019

Strategies For Competing International Markets - 931 Words

Strategies for competing in international markets The fast expanding world economy does offer the Walt Disney companies an opportunity and the companies in the entertainment industries have a higher competitive threat domestically as well as globally which drives them to come up with an international strategy to enter into the foreign market to expand their business. Disney like any other companies expanded into foreign markets to achieve an increase in profit, competitiveness and capitalize the core competencies to gain access to new customers and a lower production cost (Thompson, Peteraf, Gamble and Strickland, 2016). There are many strategies available for competing in the global markets and Disney is using the strategic alliances and partnership strategy (SNHU, 2016) to expand it s Parks in Japan, Europe, and China, and has about 11 Parks and many dozens of hotels surrounding Parks including international presence which gives a competitive advantage. Disney needs to expand Parks and entertainment business to keep up its market position strengthened. The expansion of Disney outside U.S is slow and Disney strategy of growing the business outside U.S is important and must continue to contribute to Disney s overall profit. There are many customers in poor foreign country dreaming about Disney characters and not in the position to afford a visit to any one of the Park and the expansion to many parts of the world is a win-win strategy for everyone. Disney has been a veryShow MoreRelatedThe Expansion Of The World Economy1230 Words   |  5 Pagesthe market by taking advantage of the global market that is opened up to the foreign companies closed previously. The rapid growth of the technology is shrinking the geographical boundaries and the global economy is expanding faster than it can expand. The expansion of the world economy is offering companies many attractive opportunities that come with the domestic as well as global threats. Companies in industries that have a higher competitive threats have a desire to come up with a strategy toRead MoreThompson and Strickland Essay Questions1432 Words   |  6 Pagesargue that good strategy-making and good strategy-implementing are valid signs of good management? 6. Why does crafting strategy have a strong entrepreneurial character? 7. What does an organizations strategy consist of? 8. Why is the task of strategizing an ongoing exercise? 9. Define and briefly discuss the significance of the following terms: a. mission b. strategic objective c. strategy d. strategic plan e. strategy implementation Read MoreGlobalization and the Information Revolution1535 Words   |  7 Pagessenior advisor of Intel Corp, Andrew Grove stresses a great importance on international competition by stating ‘you have no choice but to operate in a world shaped by globalization and the information revolution. There are two options; Adapt or die’. Grove’s statement effectively conveys a great importance of competing in a global economy in order to for an organization to expand, grow, and thrive. As of late, international competition and trade surfaced as one of the most important aspects of organizations’Read MoreVillage Roadshow s Marketing Team Focuses On Domestic Clientele1482 Words   |  6 Pagesfluctuation and overall decline in the international visitation to the Gold Coast Region. There has been a slight increase in international visitors in the last three years with the dominant international source marketing being China and New Zealand, however the domestic visitation is still approximately four times larger than the international tourist numbers. The decision to focus on the domestic market was heavily impacted by the decreasing number o international tourist. A thorough evaluation revealedRead MoreStrategy of Apple Brand1077 Words   |  5 PagesINTERNATIONAL BUSINESS STRATEGY OF PARENT COMPANY When a firm decides to go international with their business they must face many competitive decisions. Two of the most important decisions a company will face are the pressures for cost reduction and pressures for local responsiveness. The pressure of cost reduction forces a firm to lower their value of the cost of creation. Firms can outsource to places where costs of their products are much cheaper or they can mass-produce a standardized productRead More Avons Marketing Strategy in International Markets Essay1486 Words   |  6 PagesAvons Marketing Strategy in International Markets 1/ Which actors in Avons microenvironment and forces in the macro environment have been important in shaping its marketing strategies? We can explain what is exactly microenvironment and macro environment. Micro-environment is the factors in a firms immediate environment which affect its performance and decision-making; these elements include the firms suppliers, competitors, marketing intermediaries, customers and publics. Macro-environmentRead MoreBusiness Level Strategies of Apple1397 Words   |  6 Pages The corporation picked for this paper is Apple. The business level strategies that Apple applies are all relying on the same important concept: innovation. Innovation, as a business level strategy at Apple, does not mean only creating new products, but improving the existing portfolio of products. The company does not rely, nowadays, on revenues driven by new products, but rather by the consolidation and improvement of the existing line. For example, the new iPad models that appear are buildingRead MoreChinese Company: Haier Business Strategy963 Words   |  4 PagesChinas number one company and a leader in white goods market segment, had almost $15 billion in sales revenue and a growing presence in black/brown goods sector. Haier followed a distinct expansion strategy, entering developed markets in Europe and USA, at first as a niche player, and penetrating markets in Southeast Asia afterwards. Haier pursued a very aggressive globalization strategy and entered the Australian and New Zealand Markets in 2002. They diversified the production capacities, manufacturingRead MoreA Brief Note On Internal Analysis Of Internal Analysis And Strategic Issues Essay1163 Words   |  5 PagesMBA 7000 Business Policy and Strategy Indiana Tech Summary of Internal Analysis Strategic Issues Vera Bradley Company Internal analysis: 1. Current Strategy Vera Bradley’s company strategy is not working very well. Their company strategy involves offering a distinctive line of colorful women’s luggage, handbags and accessories. Sales are done through department stores and over the Internet. The company’s vision and mission is not clear. The company would like to open 300 full-time retail storesRead MoreTesco Entry Into the U.S.a Essay1066 Words   |  5 Pagesfinally enter the U.S. market branded as â€Å"Fresh Easy†. A year later, Tesco entered the U.S. market by applying new strategies for success and market entry compared to the ones that were used in the past. In the past, Tesco’s strategies for global expansion were (1) to aggressively enter markets in developing nations, (2) focusing on markets that were less competitive, and (3) entering through acquisitions. Tesco used completely different strategies to enter the U.S. market. First, the company

Friday, December 20, 2019

Nestle s Marketing Strategies For Nestle - 1091 Words

Nestle S.A. is a Swiss food and drink company. It has been the world’s largest food company measured by the revenues and other metrics, for the years 2014, 2015, and 2016. Nestle was ranked 72 on the Fortune Global 500 in 2014 and it was ranked 33 on the 2016 edition of the Forbes Global 2000 list of largest public companies. Nestle s products include baby food, medical food, breakfast cereals, tea and coffee, confectionery, bottled water, dairy products, ice cream, pet foods, snacks and frozen foods. Twenty-nine brands of Nestle have annual sales of US$1.1 billion which includes Nespresso, Nescafà ©, Kit Kat, Smarties, Vittel, Maggi, Nesquik and Stouffer s. Nestle has 447 factories and it operates in 194 countries. Nestle employs around†¦show more content†¦In 1882 Anglo-Swiss ventured into US, but the death of George Page changed the plan. In 1902, it sold its US-based operations, which paves the way for an eventual merger with Nestlà ©. Nestle started selling chocolate for the first time when it takes over export sales for Peter Kohler. Henri Nestle played an important role in the development of milk chocolate from 1875, by supplying his neighbor Daniel Peter with condensed milk, which later helped in developing the first commercial product in the 1880s. Marketing Mix of Nestle Products There are 4 distinctive vital business units within Nestle which are used to manage different food products. a) Beverages – Nestlà © wants to brew up interest in one of its oldest brands which is Nescafà © instant coffee (Revill, 2014). Nescafe is one of the well-known coffee brands and it belongs to the house of Nestle and is one of the major source of revenue for Nestle. Nestle has a worldwide distribution and has a wide range of variants. In India, Nestle has also launched Nestea. b) Milk and Milk products – Nestle every day, Nestle slim and Nestle Milk maid are some of the milk and milk based products from the house of Nestle. c) Prepared dishes and cooking aides – Prepared dishes and cooking aides is another category of Nestle’s products. The major revenue source of Nestle lies in this segment, which is Maggi Noodles. Maggi is one of the most widely sold ready to cook noodle brands. MaggiShow MoreRelatedMarketing Analysis Of Nestle s Marketing Strategy1070 Words   |  5 PagesIntroduction The following advertising campaign analysis with provide a product and target audience analysis on a chosen confectionery product that was advertised in Australia between 2014 and 2015. This analysis will focus on Nestlà © Kit Kat ‘Break Rescue’ campaign that ran from May to October 2014. The series of four television advertisements show a team of Breakguards that intervene when a break is in danger of being interrupted. Each advertisement is set in a relatable break environment thatRead MoreMarketing Strategy Of Nestle s Hot Pockets1244 Words   |  5 PagesMarketing Strategy Positioning Strategy Position Statement: Hot Pockets, the easy snack, Too HOT for the shelves The Marketing Mix Product Strategy Nestlà ©Ã¢â‚¬â„¢s Hot Pockets is a product line that belongs to the frozen food entrees. Frozen entrees are products that are convenient to the consumer. A consumer may spend minutes in the store comparing different brands based on the number of choices, prices, product packaging and nutritional value, but on average it takes about six seconds to make aRead MoreInternational Marketing Analysis Report For Nestle Essay1636 Words   |  7 PagesThis report is aiming to create an international Marketing Analysis report for Nestlà ©. This report will mainly focus on the evaluation of Nestlà © s international marketing activities and that of their key competitors. The latest trends and developments within this particular sector investigate will also be investigated. Nescafà ©, the instant coffee from Nestlà © is the most famous products of the company, therefore Nescafà © has been chosen as the company s products for the purpose of this report to conductRead MoreNestle Maketing Plan1637 Words   |  7 PagesNestle Marketing Plan Benjamin Tello ERAU Table of Contents Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.3 Company Overview†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..3 Market Segmentation†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.....5 The 4 Ps of Marketing†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦6 Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦...†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦7 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦.....8 Abstract Nestle is one of the major companies in the food processing industry. It was founded in by Henri NestleRead MoreUnilever V Nestle1235 Words   |  5 Pagesoperate in a global market place and to develop appropriate strategies. A global strategy is an organisational plan that takes into account these new global realities. Both Nestle and Unilever have developed global distribution and marketing networks, based on their powerbrands i.e. market leading brands that are recognisable in nearly every country in the world. Both Nestle and Unilever have many powerbrands. Key aspects of global strategy include: 1. Treating the global market as the domesticRead MoreMarketing Strategy of Nestle vs Cadbury1313 Words   |  6 PagesASSIGNMENT ON MARKETING STRATEGY OF NESTLE VS CADBURY (COMPARATIVE) [pic] PRESENTED BY: SWATI SAXENA SWATI SINGH URVASHI DUBEY TASMIYA Group:33 MANAGEMET OF BUSINESS ADMINISTRATION SHRI RAMSWAROOP GROUP OF PROFESSIONAL COLLEGES What is marketing strategy? Marketing strategy  is defined by  David Aaker  as a process that can allow an organizationRead MoreNestle Case Study : Nestle Company1522 Words   |  7 Pages 1.Introduction : Nestlà ©, a company who has a motto of Good Food, Good Life, was found in the year 1866 by Henri Nestle. Nestlà © s first product was a milk based food, made for those babies who were unable to be fed by their mothers. Within five years Nestlà © s milk was being sold all over the world as a food for not only babies, but also for all age groups. It had made it s name in the market very soon and grew rapidly, which made the company enter into the chocolate industry. Later the companyRead MoreThe Return on Marketing Investments of Nestle Company Essays1028 Words   |  5 Pageson Marketing Investment) refers to the incremental profit achieved over a short term period by measurable marketing activities such as sampling or advertising campaigns†. In attempt to success in creating own brands, marketers need to make use of marketing metrics which act as a measurement to count their performance, which is to measure which effective marketing strategies to use. This report consist the importance of marketing metrics and some brief definition on the return on marketing investmentRead MoreNestle s Marketing Pl Nestle961 Words   |  4 PagesEXECUTIVE SUMMARY Nestle is a multinational cooperative around the world that was found by Henry Nest in the year 1866. Nestle has more than 280,000 employees worldwide and factories are established and operate more than 86 countries. Nestlà © has launched an initiative to produce infant formula that provides babies who are intolerant to breast milk. Current customers are a very strong demand for children s products, especially in Europe. Many joint venture companies have operated on behalf of aRead MoreSwot Analysis Of Wensley ( And Nestle )1067 Words   |  5 PagesWensley (and Nestle) is a multinational company specializing in the production of canned foods is based in Vevey, Switzerland was a result of the merger in 1905 of two Anglo-Swiss Milk Company for milk products which was founded by brothers Paige in Switzerland in 1866 and the company Vary to Akti Henry Wensley which Henry Wensley was founded in 1867 and which was produced foods infant at the time Type a public shareholding limited liability company Inception Date Switzerland (1866) Headquarters

Thursday, December 12, 2019

Development Of Health And Safety In The Workplace †Free Samples

Question: Discuss about the Development Of Health And Safety In The Workplace. Answer: Introduction Establishment of health and safety within the workplace is the basic requirement of each business organization. It is important for the organization to create a working environment where the health and safety of the employees will be valued, promoted and supported (Kossek et al. 2014). In order to ensure the health and safety in an organization, it is important to promote workplace health program, safety policies and bring environmental changes within this organization. To establish health and safety program in an organization changes in the organization and individuals behavior is crucial. It is important to increase the awareness among the individuals regarding the necessity of health and safety within the workplace. However, the establishment of a health culture in an organization can be achieved through changing the organizational structure, practices, and policies. Such organizational policies and practices need to align with the health and safety requirement of the employees. T his study deals with the individual and organizational changes to bring health and safety in the workplace. Critical evaluation of the approaches to organizational and individual change to promote health, safety and wellbeing performance in an organization Change is necessary to achieve some positive outcomes in an organization. In order to change the organization to promote health and safety implementation of the action model approach is beneficial. As commented by Edmondson et al. (2016), by following this model the human resource and health promotion professionals can work as a team. Such collaboration between thehuman resource management and the health promotion team is effective to maximize the performance of the well being as individuals can work together and share their idea. This approach also ensures the safety in a workplace. As criticized by Kim et al. (2016), understanding between the individuals is necessary while developing a collaborative work between the two departments otherwise; the organization may fail to meet the ultimate goal. Thus, for every organization, it is important to develop a clear understanding between the individuals while applying teamwork to maximize the performance of the wellbeing. Establishment of the new policy in an organization which meets the requirement of the international policy is effective to bring changes in an existing system. As for example, by following Occupational Health and Safety Act an organization is able to promote health and safety policy in their workplace. As for example, Singapore General Hospital follows such Act to ensure the workplace safety as well as the employees safety in the workplace. As argued by Kim et al. (2016), if the organization fails to comply with the legal norms while taking an approach to ensure workplace safety then it affects the entire operating process. Establishment of the education and training program to increase the awareness among the employees will be an effective approach to maximize the wellbeing performance. However, many organizations provide training to the employees to develop them professionally but the development of health safety-related training highlights the new change in an organization (McFadden et al. 2015). Such educational and training program helps the workplace parties to adopt the occupational health and safety policy. On the other hand, individual change refers to the role of the employees in an organization to bring changes. As for example, leaders of an organization play an important role in developing health and safety within the workplace. The leaders should be inspiring and confident. This type of leaders is able to increase the awareness among the employees regarding the importance of the safety in a workplace. Therefore, the senior level managers are involved in promoting health and safety at work ( Kossek et al. 2014). The managers can use their authority in order to comply with the occupational health and safety. This ensures the workplace safety. Individual change management to promote health and safety in workplace Individualchange management refers to the ability of a person to bring and manage the changes properly in an organization. However, individual changemanagement gives a primary framework to the people to give shape the changes in an organizational system (Cameron and Green 2015). Individual change allows an individual to go through a predictable path to an expected path. In an organization promotion of health and safety is vital, which can be done by maximizing the performance of the individuals. Managers of an organization play an important role in creating a positive health and safety culture by implementing change in an organization. However, senior managers of an organization are an integral part of promoting health and safety within the organization. Managers act as a media between the workforce and the board to manage the upward and downward communication to ensure the health and safety. Managers communicate with the health and safety executives and then share the information am ong the workforce. The managers are responsible to create a safety culture in the workplace. However, managers allocate resources and introduce training program to establish new changes and maximize the performance of the well being. As for example, in the Singapore Petroleum companymanagement has established a good monitoring and tracking process. They have reliable performance indicator to detect the hazards in the workplace (Spc.com.sg 2018). On the other hand, the managers recruit skilled staffs to work safely and identify any safety-related issues. Managers need to establish positive communication and staff engagement to give shape the organizational change. As for example, for the establishment of the no blame culture the managers have to show more concern to their staffs when things are genuinely going wrong. This insists the staffs to report any safety issue without any hesitation. This can be done through effective communication and staff engagement by the managers. As a result, the health and safety can be maintained along with increasing the performance of the individuals in an organization. Organizational change management to improve health, safety, and performance of the wellbeing Organizational change management refers to the management of the structural change and alternation of the existing business process. In order to achieve success and the business goal, organizational change management is necessary. Establishment of a safety culture or bringing changes in the existing safety culture is one kind of major organizational change (Kanaane et al. 2015). Vision, skill, action plan, resources, and value are the major components of the organizational change management. For an organization, it is important to develop a vision of what is the change and why the change is needed. Therefore, to maximize the performance of wellbeing skill is required. Skilled employees are also associated with the change management. In order to improve the safety in an organization allocation of the sufficient resources is required. To create a safety culture development of a positive value system is required. In order to bring changes in an organization, the change agents need to have a good knowledge of the current organizational culture. For a successful change management, the management needs to support the changes and empower the employees to involve in the change management process (Betancourt et al. 2017). A suitable communication strategy is required to establish safety culture in an organization. On the other hand, implementation of the new policy or legislation in the organization is crucial to manage change in an organizational safety process. According to the statistical data it has been found that in Singapore approx 9,261 people were injured in the workplace in 2006 (Mom.gov.sg 2018). Based on such injury rate different industries of Singapore have taken change management program to ensure their workplace safety. As for example, in Singapore General Hospital the authority has established workmens compensation program to ensure the occupational and workplace health and safety (Sgh.com.sg 2018). This program allows the employer to report all accidents regarding the workplace safety as well as an occupational disease to the ministry. As a result, the employees will get compensation for their any injury in the workplace. In order to manage such change in the safety program, Singapore General Hospital maintained a daily tracking process to record the workplace injury. They follow RIDDOR (Reporting Injuries, Diseases and Dangerous Occurrences Regulations), which helps them to track the workplace injury. This change management is helpful for such organization to ensure health and safety in their organization. Discussion of the Prosci change management methodology Change management is essential for every organization to meet the organizational goal. Prosci change management methodology is focused on the individual change management in an organization. However, the prosci change management model is also known as ADKAR model and Prosci 3-phase model (Rosenbaum et al. 2018). It is important for any organization to understand how to bring changes in an organization along with the change of individuals. This process is called Prosci ADKAR model. Awareness, desire, knowledge, ability, and reinforcement are the five main components of ADKAR model. In order to implement a change in an organization, it is important to create awareness among the employees regarding the importance of such certain change. In the next step every staff of an organization needs to participate in the change management program. Therefore, in the next step, every employee needs to have sufficient knowledge how to implement and manage the change in an organization. Therefore eac h individual in an organization should be capable to utilize their skill to implement the new changes in an organization (Kazmi and Naarananoja 2017). Finally, reinforcement is necessary to sustain the change. As for example, Singapore General Hospital always focuses on the health and safety management in their workplace for this purpose they have established workmen's compensation planning. This is a new change in their organization. Hence, application of ADKAR prosci model will be beneficial for them to diagnose the gap and develop corrective actions to give shape this new change. On the other hand, this model allows the manager and supervisor to support this change through individual change management process. The 3-phase process of prosci methodology includes preparation for change, management the change and reinforcement of the change (Karambelkar and Bhattacharya 2017). However, it is crucial for an organization to develop a plan before implementing the change. Then after creating the plan managing of the change is crucial. For an organization, an effective communication is crucial to manage the change in an organization. This enhances the stakeholder engagement in the change management process. Therefore, the training plan is crucial in the change management as it makes the employees flexible with the new environment. Finally, it is important for an organization to take some activities to ensure that the implemented change is sustained. Health and Safety In order to maintain health and safety in the workplace, proactive approach and reactive approaches are used by the organizations. Proactive approach The proactive approach is a process through which an organization can eliminate their problems before these occur in the workplace. In the workplace proactive approach is used to maintain the safety by reducing the number of failures in a system (K?r?lmaz and Erol 2017). However, proactive approach has been taken to create a safety culture in the workplace. Due to lack of proper safety culture in the workplace workplace injury has been increasing rapidly. As per the statistical data in the year the rate of workplace injuries were 1, 2351 in the year 2015, which has increased to 1,3014 in the year 2016 (Wsh-institute.sg 2018). Thus, it is crucial for an organization to use the proactive approach to ensure the safety in an organization. However, by following the proactive approach an organization can take necessary activities to prevent the occurrence of workplace injury. It has been found that in the construction company the workplace injury rate is high. As per the statistical data in the year 2010 the injury rate was 58% and in the year 2015 and 2016 it was 41% and 36% in comparison to other industries. As for example, SEF Construction Pte Ltd is a popular construction company of Singapore. They have adopted the proactive approach to prevent any dangerous occurrence in their place of work. They have implemented in-house safety rules and regulations. Therefore, they carry out daily safety inspection under the guidance of workplace health and safety officer (Sef.sg 2018). This activity ensures their workplace safety approach. Reactive approach The reactive approach is a process, which is taken to mitigate a problem after it has taken place. In order to maintain a long-term safety management in an organization reactive approach is used by the organization. In the reactive maintenance process, quick action has been taken to ensure the safety of an organization. This approach allows an organization to resolve any issue quickly. Reactive approach more expensive in comparison to the proactive approach. The reactive approach has taken in the emergency situation as a result; an organization has to pay the additional cost to cure the damage (Rahmani 2017). Maximum organizations avoid reactive approach as it is costlier and a complex process. Discussion of strategies and approach Strategies should be taken by the organization to create a safety culture in the workplace. One of the major strategies to maintain the workplace safety is to communicate with the stakeholders regarding the safety. However, the organization should talk about the importance of the safety during the work at the employee level, supervisory level and management level (Loeppke et al. 2015). This will increase the awareness among the employees and the management takes the necessary step to maintain the safety. As for example, Singapore General Hospital follows effective communication process to share the health and safety information among the stakeholders. Establishment of health and safety training is a crucial strategy for every organization to develop a safety culture in the workplace. In order to provide safety training to the employees implementation of OSHA, training system is a good approach to ensure the safety in an organization (Loeppke et al. 2015). SEF Construction Pte Ltd focuses on the OSHA training approach to enhance the knowledge among the workers regarding their safety. This training program is an excellent health and safety training program. In order to ensure the workplace safety risk assessment is mandatory for every organization. Therefore, the management needs to encourage the workers to report any health and safety concern time to time. Therefore, implementation of the positive changes should be done to enhance the health and safety in the workplace. Participatory ergonomics on health promotion and health protection in the workplace Participatory ergonomics or PE is associated with health promotion and health protection in the workplace. In this process, the workers are involved to address their health concern. This process is supported by the multilevel steering committee (Yazdani et al. 2015). PE is a process to involve the people to control their own work activities and utilize the power of knowledge in promoting health awareness. PE reduces the failures and improves health outcomes in a workplace. This approach enhances the worker performance and safety in the workplace. This process allows an organization to employ a staff-centered approach. As for example, Singapore General Hospital follows PE and they have established a teamwork in order to share the safety-related knowledge among the employees. This is helpful for this organization to enhance the health promotion and protect the health of both internal and external stakeholders by undertaking healthy activities. Performance of wellbeing Change management is crucial to maximize the performance of the individuals in an organization. Many organizations offer reward and performance appraisal to the employees to improve their performance level (Loeppke et al. 2015). Singapore Petroleum Company includes the healthy activity of the employees as a part of their employee performance. They provide an award to the employees who are conscious about health and safety in the workplace. Therefore, they give performance appraisal to the employees those show healthy activities during their work. This approach is beneficial to enhance the performance of the wellbeing by influencing them to adopt healthy activities in the workplace. Conclusion The entire piece of work reveals the role of change management in promoting health and safety in the workplace. It is important for every organization to establish a safety culture in the workplace as health and safety is an integral part of the workplace. It is important for the organization to bring changes in the existing safety culture of the workplace. However, changes in an organization can be done by individual change management and organizational change management. It is crucial for the organization to provide proper training to the employees to manage change and develop a safety culture in the workplace. References Betancourt, J.R., Tan-McGrory, A., Kenst, K.S., Phan, T.H. and Lopez, L., 2017. Organizational change management for health equity: perspectives from the Disparities Leadership Program.Health Affairs,36(6), pp.1095-1101. Cameron, E. and Green, M., 2015.Making sense of change management: A complete guide to the models, tools and techniques of organizational change. Kogan Page Publishers. Edmondson, A.C., Higgins, M., Singer, S. and Weiner, J., 2016. Understanding psychological safety in health care and education organizations: A comparative perspective.Research in Human Development,13(1), pp.65-83. Kanaane, R., Akabane, G., Peterossi, H. and Endler, D.C.N., 2015. Organizational change management in a strategic perspective.American Journal of Management,15(2), p.88. Karambelkar, M. and Bhattacharya, S., 2017. Onboarding is a change: Applying change management model ADKAR to onboarding.Human Resource Management International Digest,25(7), pp.5-8. Kazmi, S.A.Z. and Naarananoja, M., 2017. Collection of Change Management ModelsAn Opportunity to Make the Best Choice from the Various Organizational Transformational Techniques.GSTF Journal on Business Review (GBR),2(4). Kim, Y., Park, J. and Park, M., 2016. Creating a culture of prevention in occupational safety and health practice.Safety and health at work,7(2), pp.89-96. K?r?lmaz, O. and Erol, S., 2017. A proactive approach to supply chain risk management: Shifting orders among suppliers to mitigate the supply side risks.Journal of Purchasing and Supply Management,23(1), pp.54-65. Kossek, E.E., Hammer, L.B., Kelly, E.L. and Moen, P., 2014. Designing work, family health organizational change initiatives.Organizational dynamics,43(1), p.53. Loeppke, R.R., Hohn, T., Baase, C., Bunn, W.B., Burton, W.N., Eisenberg, B.S., Ennis, T., Fabius, R., Hawkins, R.J., Hudson, T.W. and Hymel, P.A., 2015. Integrating health and safety in the workplace: how closely aligning health and safety strategies can yield measurable benefits.Journal of occupational and environmental medicine,57(5), pp.585-597. Marn, L.S. and Roelofs, C., 2017. Promoting Construction Supervisors Safety-Efficacy to Improve Safety Climate: Training Intervention Trial.Journal of Construction Engineering and Management,143(8), p.04017037. McFadden, K.L., Stock, G.N. and Gowen III, C.R., 2015. Leadership, safety climate, and continuous quality improvement: impact on process quality and patient safety.Health care management review,40(1), pp.24-34. Mom.gov.sg. 2018.Occupational Safety and Health Profile. [online] Available at: https://www.mom.gov.sg/~/media/mom/documents/safety-health/reports-stats/wsh-profile/osh-profile-2006.pdf [Accessed 26 Feb. 2018]. Rahmani, D., 2017. A new proactive-reactive approach to hedge against uncertain processing times and unexpected machine failures in the two-machine flow shop scheduling problems.Scientia Iranica,24(3), pp.1571-1584. Rosenbaum, D., More, E. and Steane, P., 2018. Planned organisational change managementforward to the past? An exploratory literature review.Journal of Organizational Change Management, pp.20-56. Sef.sg. 2018.SEF Group. [online] Available at: https://www.sef.sg/our-businesses/sef-construction-pte-ltd/ [Accessed 28 Feb. 2018]. Sgh.com.sg. 2018.Singapore General Hospital. [online] Available at: https://www.sgh.com.sg/Pages/default.aspx [Accessed 26 Feb. 2018]. Spc.com.sg. 2018.HSE. [online] Available at: https://www.spc.com.sg/community-society/hse [Accessed 26 Feb. 2018]. Wsh-institute.sg. 2018.Workplace Safety and Health Report 2016. [online] Available at: https://www.wsh-institute.sg/files/wshi/upload/cms/file/WSH%20National%20Statistics%20Report%202016.pdf [Accessed 28 Feb. 2018]. Yazdani, A., Neumann, W.P., Imbeau, D., Bigelow, P., Pagell, M., Theberge, N., Hilbrecht, M. and Wells, R., 2015. How compatible are participatory ergonomics programs with occupational health and safety management systems?.Scandinavian journal of work, environment health, pp.111-123.

Thursday, December 5, 2019

Diagram ENISA Data Security Infrastructure â€Myassignmenthelp.Com

Questions: Which Threat Would You Regard To Be The Most Significant And Why? What Could Be Done To Minimize Their Impact On The System? How Could The ETL Process Be Improved? Should ENISA Be Satisfied With Its Current State Of IT Security? Answers: Introducation The extensive collection is based on the data processes with the big data analytics that include the different and serious privacy concerns. The wider scale impacts of the surveillance, profiling is based on allowing the benefits without any invasion of the individual private spheres. The appraise big data is to integrate and focus on the protection of the data safeguards which aim at the support to handle the legal obligations. (Marions et al., 2012). ENISA works on the categorisation and the challenges which are used for the three cases mainly for the advancement in the Security Incident Event Management, the industrial control systems and the other telecoms. The privacy by the designing in big data is for processing the information with the big data analytics that have also given rise to the serious privacy concerns as well. The scale of the electronic surveillance, profiling and the other disclosures of the data is mainly to handle the integration with the data protection safegua rds that are set to work on addressing the different opportunities of the technology for privacy (Gorton, 2015). The security measures that have been taken are mainly for the smart grids which enable the efficient use of the energy. Along with this, ENISA works on the smart grid patterns where the analysis is for the risks assessment and to handle the set of the different theories (Barnard, 2014). The certification of the components and the meta-schemes are related to handle the supply chain view of the smart grid where the support comes from the dialogue among the stakeholders. ENISA works on the security network tools which have been used for the management of the technology and to handle the cyber security and for the data duplication. Here, the balancing of the threats is to target the different assets along with the management of the information. The control and the analysis is for handling the end user organisations with the relevant vendor markets. There are different security techniques which are important to be identified and worked on depending upon the attacks from SQL injection and the management to reduce the attack surface as well. The web based attacks are mainly important for the security experts which are considered to be greatest and handling the different risks. The different threats which are related to this are the traditional penetration testing which includes the exercising of the network with the attack target. The web based attacks mainly focus on the applications with the functional layers (Louis, 2013). Here, the web based attack is considered to be the major attack which leads to the malicious end user activity to breach the system protection mechanism. Along with this, there is a possibility that it includes the information gathered from the social security numbers and the other identity thefts which leads to the loss of information of ENISA (Fransen et al., 2015). Hence, for this, it is important that all the web application attacks are compromised or modified depending upon the parameters which are based on checking or handling the instruction spoofing. It includes the denial of service attack which includes the generation of the attack by the malicious users with the competitors and the script kiddies. Hence, it is also important to work on the authorisation control which is reliable and requisite based on guarding the sensitive information. The standards are set to meet the intellectual property rights with protecting the products of the intellect that includes the commercialised laws and the other literary or the artistic works. The business methods include the functioning and the standards set for the industrial purposes with different aspects of the attacks that are being conducted by an individual. It is important to focus on the applications with the attacks based on the target systems and associate with the suspected vulnerable applications. The applications also include the versions of the detection which could easily be performed through the banner grabbing (ENISA, 2013). The banner grabbing methods include the intrusion detection system and the preventive syste ms that are for the detective and the reactive devices which are set for the network and the other applications which include the targeted attacks. The standards are also set for the deployment of the demilitarized zones of the corporate networks and how it is easy to filter or block the attacks at the application layer services. The data manipulation attacks on the applications with the privileges on hosts relate to the different failures of the unauthorised logins and the access is done to the sensitive data as well. The malware is also another threat which can lead to the damages in the system which is considered to be the major global issue for the organisation. It also affects the system and the important files of the business where there is no possibility to recover them as well. The information could be set with the malware that are linked with URL of the websites and then it is installed in the systems. The software brings a major damage to the system (Theoharidou et al., 20 13). The threats are related to the media attention with the successful cyber-attacks, which creates the higher adaptability for the criminals. There are other agents like the cyber terrorists and the cyber criminals include the use of the Internet to conduct the different violent acts which leads to the threatening of the body. There are different terrorist activities which includes the use and relation to the deployment of disruption against the information system or primary purpose for creating alarms. This includes the use of the computer, network and the other public internet resources which leads to the failure and distribution for the personal objectives as well. The issues and the major concern is about the instances of cyberterrorism which includes the utilisation of the internet to connect and communicate with the supporters and even to recruit the different new members. The cybercrime is related to the computer or the network which includes the offences mainly related to the cr iminal motives to harm the reputation of the victim and then cause the physical and mental harm. There is a major loss which threatens the person with the national security and the financial health (Furnell et al., 2015). The governmental and the non-state actors engage in cybercrime which includes the financial theft and the other criminal cross borders. The standards are set with the altering, destroying or supressing mainly that leads to the concealing of any unauthorised transactions. The alterations or the deletion of the stored data has a major impact on the internet scam which includes the phishing and the social engineering effects, which includes the target on the consumers and the business. The cyberterrorism occurs on the website which includes the increased attacks on the corporate websites and how it includes the ability to operate and demand for the payments (Hopkins et al., 2015). The computer viruses, denial of service attacks and malware is considered to be the majo r issue which involves the lesser expertise in technical approach. The fraud and the identity theft is also considered to be the major issue which includes the use of the malware and the other hacking or the phishing targets. The tool includes the obscene with the offensive content that is mainly due to the communications done in between the people. ENISA focus on handling the harassment with taking hold of the self-motivated groups who work on the exploitation of the politics in the country. The cyber terrorists are also targeting all the large-scale sabotages with the national and the international security in the country. There are issues with the different trends which include the cyber maltreatment and how the identity theft or the collection of the private information, or the personalised data is set through the different operational activities (Levy et al., 2015). The process of ELS could be handled through the loading process which includes how the data is changed with the reduced forms of the categories that work on speeding up the higher volume of the ETL processes. With this, it also includes the different rows and the columns which includes the creation of the extra tables that tends to hold the data from any of the previous ETL processes. The use of the batching process could also be helpful in improving the performance where the standards are set to meet the data communication and handling the load on the network or any conflicts which are on the performing of the database. The flow of the user SQL Server Destination in the Data Flow Task need to work on the SQL patterns with handling the ETL processes by reducing any limitations and then working on the increased benefits. This will lead to the facilitation scenario and how communication could be done. From ETL 2013 to ETL 2015, it has been seen that there are different sets of the comprehensive information collection that is based on the source material. It includes the contexts and the other identification of the relevant content, like the threats or the agents and the trends. It includes how the ETL in 2014, works on the consolidation of the framework and check for the improvement of the different technological standards and the application areas (Prislan, 2014). This includes the references which works for the sources that are for the decision making, security and the other navigation processes through the threat landscape. In 2015, and in 2016, ETL has been working on the improvement of the system with smoother advancement of the maturity. Through this, there is a possibility to work on increased cooperation and the reactions for the cyber threats. This also works with the advancement of the malicious tools with obfuscation and striking power. Here, the objective is mainly to handle the provisions and work towards the identification and improving the processes (Skrzewski, 2014). It includes the leverages on the synergies and the use of the open source approaches, tools and the data. The objective is based on the project to work on the implementation of the improvement options with the ENISA working over the threat analysis procedures. Along with this, it is important for ENISA to focus on improving and handling the threats which are mainly through the deep research and from the references which includes the denial of service attacks. With this, ETL also includes the complex issues where there is a physical coating of the hardware devices. One need to identity the significant assets and the other assessments based on the standardised device interfaces. This includes the networks with the virtualisation that includes the centralised control over the networks, which includes the management of the network and the issues that relate to the data flow (Mayer et al., 2013). The attack is mainly on the component of the network with the major effect on the centralised control functions with the coupling that is over the data transmission through switches. The malware like the Trojans and worms are considered to be the challenging threats. This research is based on the conclusions where ENISA works towards the current state of the IT security standards which works on the different threats. This includes the prioritisation with the focus on the attack surfaces and how the injection attacks lead to the exploitation of the kits, spam and the phishing. The measures are mainly obtained through the ENISA which not only includes the reduced effects of the threats but also focus on the working over the security of the data. Here, the ETL processes are based on improving the data extraction and working on the insertion, and the medication patterns. This includes how the smoothening of the operations is possible with the different ETL processes (Furnell et al., 2015). The threats are generally related to the functioning which includes the embedded systems and how the hardware devices work on easy handling of the different components. This is based on the attacks and the breach of the data security measures. It is important to ha ndle the information leakage with the standards that include the higher security measures and the higher better security passwords which will help in easy and fast access of the information as well. With this, the study is also on how ENISA focus on the security framework which is based on providing and supporting with the better networking components (Bora et al., 2013). This includes the influence that comes with the processing and the working of the operations. The analysis is based on working over the security patterns and how it is easy to operate the functions based on the detailed information and the Threat agents. The social hacking issues also need to be resolved without any effect on the organisation. This is only possible, when there is a proper setup of the security tools and the impact of the services works on handling the current security standards and providing the brief. The strategies are based on the combating of the Insider Threats with the focus on how to handle the social hacking issues. The report discusses about the data that is related to the improvement of the ETL processes. This works on the handling of the balances of the security and then improving the maturity of the threat removal. It includes the proper balance of the threat and how the security measures can be handled along with working on the controlled analysis patterns. The strategies are depending upon the end-user organisations with the focus on improving the cyber terrorism activities and handle the big data with the secured passwords. ENISA need to work on the improvement with the firewall and Intrusion detection system. This will help in balancing and setting all the controlled analysis with the relevant marketing standards in the secured manner in the organisation (Weber et al., 2016). The effective coding practices with the proper reports are mainly for the improvement in the standards of the system. References Barnard-Wills, D. (2014). ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media.ENISA (The European Network and Information Security Agency). Bora, M. S., Singh, A. (2013). Cyber Threats and Security for Wireless Devices.Journal of Environmental Science, Computer Science and Engineering Technology (JECET),2(2), 277-284. ENISA, E. T. L. (2013). Overview of current and emerging cyber-threats.European Union Agency for network and information security. Fransen, F., Smulders, A., Kerkdijk, R. (2015). Cyber security information exchange to gain insight into the effects of cyber threats and incidents.e i Elektrotechnik und Informationstechnik,132(2), 106-112. Furnell, S., Emm, D., Papadaki, M. (2015). The challenge of measuring cyber-dependent crimes.Computer Fraud Security,2015(10), 5-12. Gorton, D. (2015). IncidentResponseSim: An agent-based simulation tool for risk management of online Fraud. InSecure IT Systems(pp. 172-187). Springer, Cham. Hopkins, M., Dehghantanha, A. (2015, November). Exploit kits: the production line of the cybercrime economy?. InInformation Security and Cyber Forensics (InfoSec), 2015 Second International Conference on(pp. 23-27). IEEE. Lvy-Bencheton, C., Marinos, L., Mattioli, R., King, T., Dietzel, C., Stumpf, J. (2015). Threat landscape and good practice guide for internet infrastructure.Report, European Union Agency for Network and Information Security (ENISA). Louis Marinos, E. N. I. S. A. (2013). ENISA Threat Landscape 2013.European Network and Information Security Agency. Marinos, L., Sfakianakis, A. (2012). Enisa threat landscape.Technical report. Mayer, N., Aubert, J., Cholez, H., Grandry, E. (2013, June). Sector-based improvement of the information security risk management process in the context of telecommunications regulation. InEuropean Conference on Software Process Improvement(pp. 13-24). Springer, Berlin, Heidelberg. Prislan, K. (2014). Efficiency of Corporate Security Systems in Managing Information Threats: An Overview of the Current Situation.Varstvoslovje,16(2), 128. Skrzewski, M. (2014, June). System network activity monitoring for malware threats detection. InInternational Conference on Computer Networks(pp. 138-146). Springer, Cham. Theoharidou, M., Papanikolaou, N., Pearson, S., Gritzalis, D. (2013, December). Privacy risk, security, accountability in the cloud. InCloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference on(Vol. 1, pp. 177-184). IEEE. Weber, R. H., Studer, E. (2016). Cybersecurity in the Internet of Things: Legal aspects.Computer Law Security Review,32(5), 715-728.

Thursday, November 28, 2019

The Politics of Punishment Media Framing and the Death Penalty in Crimes Against Dalits Essay Example

The Politics of Punishment: Media Framing and the Death Penalty in Crimes Against Dalits Essay The Politics of Punishment | Media Framing and the Death Penalty in Crimes Against Dalits| | Sabrina Buckwalter| | | When Ramdas Athavale, Republican Party of India (Athavale), announced that the death penalty verdict in the Khairlanji ruling (an infamous case of the rape and murder of a dalit family in 2006) was the first time such a sentence had been given in a caste crime, it was echoed by other activists, repeated by journalists and hailed as the coming of a new era in which the courts were finally acknowledging these crimes with serious punishment. The lone survivor of the massacre, Bhaiyallal Bhotmange, was pictured in newspapers with perhaps the first sign of a half smile anyone had seen from him in years, making peace signs with both his hands, surrounded by his group of supporters, all dressed in white. The significance of the ruling was the subject of editorials and became the anchor in communication about the case. The special public prosecutor in the case, Ujjwal Nikam had touted the sentencing as historic and remarked that, â€Å"This is a key judgment because it sends a very strong message that brutality, especially to low castes, will be dealt with very strictly. A supreme court judge was even overheard observing the seeming trend in capital punishment for caste atrocities. It turns out though that Khairlanji was the third case in which a crime committed against dalits was met with death penalty sentencing. No one who commented publicly on the ruling though had yet to hear of those cases perhaps because when the mass acres happened over 15 years prior, they didn’t receive the kind of media coverage the Khairlanji massacre garnered. We will write a custom essay sample on The Politics of Punishment: Media Framing and the Death Penalty in Crimes Against Dalits specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on The Politics of Punishment: Media Framing and the Death Penalty in Crimes Against Dalits specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on The Politics of Punishment: Media Framing and the Death Penalty in Crimes Against Dalits specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Less than two years later after the Khairlanji ruling, two more cases of death penalty sentencing in caste crimes were handed down, bringing the total of capital punishment cases to five. That meant that 80 percent of the death penalty sentencing in caste crimes was handed out within 17 months of each other. Most noteworthy is that those last two sentences were delivered even closer together, within just over a month of each other. Come June 15, the Indian Supreme Court’s decision on whether or not to stay the death sentence conviction in the Khairlanji case will be announced which could carry even more significance in the trend of capital punishment in caste crimes. With the historical absence of justice and punishment for crimes against dalits in India, how is it that the death penalty was a punishment never handed out in such cases just seven years ago, but today is a sentence that’s been awarded in five separate cases of caste atrocities? Through looking at another scholarly theory that argues the media framing of a particular issue shifts public opinion which in turn influences public policy and legal decisions, I make a connection to the Indian media’s recent portrayal of caste crimes and growing coverage of death sentencing to suggest an increasing support and subsequent rise in death penalty sentencing for crimes against dalits. In this paper, I will highlight the media coverage of the Khairlanji massacre and the Ranvir Sena dalit attacks in Bihar, illustrating a connection between the increased attention to caste crimes that preceded the rise of death penalty sentences. In the work done by three scholars at the University of Pennsylvania, the decreasing support for the death penalty in the U. S. is explained by media framing, specifically an â€Å"innocence frame† that has highlighted the wrongful conviction of people sentenced to death who were later found to be innocent. When various innocence projects at universities began discovering innocent people on death row, after DNA technology was proving innocence and when movies like â€Å"The Green Mile† depicted stories of innocent people sentenced to death, the media coverage of capital punishment began shifting from being portrayed as retribution for heinous crimes to it being the cause of wrongful death for innocent people. Capital punishment was ceasing to be a subject found in the context of justice-seeking and instead became an issue that appeared in the context of wrongful death. The scholars took over 50 years worth of New York Times indexed articles that mentioned capital punishment and coded each one for the level of positive or negative tone associated with the death penalty. They found a relationship between not only the frequency in coverage and public opinion but also the in the negative coded tone and public opinion. Through tracking public sentiment about capital punishment in polls, they were able to connect the declining support of the death penalty to the negative coded tones in media coverage. As the frequency increased with which the media began covering stories about death-row inmates who were falsely accused and other such stories, the public, over time, began to re-evaluate how they thought about capital punishment. â€Å"The result of this shift in framing has been a marked shift in aggregate public opinion and, even more strikingly, a dramatic decline in the willingness of juries to impose death sentences across the country. Framing drives policy making through a number of different channels, and key among these is public opinion. † For example, in stories that registered on their scale as pro-death penalty, certain key phrases would repeatedly show up, for example, â€Å"Retribution is warranted, family wants ‘justice’, certain crimes warrant this punishment. † Also, in articles where the victim was mentioned, 68 percent of them were pro-death penalty. When the defendant was mentioned, 79 percent of them were anti-death penalty. While this research highlights the causal relationship between media framing of the death penalty and its decline in public support, I believe it can also be used to highlight a similar connection between media framing of the death penalty in India and the rise in capital punishment sentencing. However, what’s important to point out is that a death penalty is rarely exercised in India. The last person to be executed was Dhananjoy Chatterjee in August of 2004 for the rape and murder of a young girl in 1990 and before that, Auto Shankar in 1995 for the death of six girls over the course of two years. Despite that incongruency, a death sentence award still carries an important message for death penalty supporters in India. The Khairlanji massacre and the role of the media In looking at one of the most notorious cases of caste atrocity in recent history, Khairlanji serves as the touchstone of dalit political uprising. If it weren’t for the media’s near month-long silence in telling the awful story of the Bhotmange family, it is fair to say that this news would have never received the sensational coverage it got. That such a massacre went undetected in the major media for month gave the story part of the shock-inducing value that drove the media interest in it after the story broke in the mainstream press on October 29, 2006. The massacre took place on September 29, 2006, in the village of Khairlanji outside of Nagpur. The Bhotmange family was one of the three lowest caste families in the village and the target of threats and intimidation by upper-caste villagers because of their land-owning status. One night, the tensions exploded and violence broke out. That evening at 6:00pm a mob had set out to the Bhotmange house in Khairlanji—they were carrying danda sticks, bicycle chains, axes and other blunt objects they could find. It is debatable whether or not the Bhotmange family would have even died that night though. The mob was looking for Surekha Bhotmange’s cousin, Siddharth Gajbhiye, a police patil, who employed a few of them at his store in town. Several weeks back before the attack on September 3, the men who worked for Siddharth, had already violently attacked him after he had failed to pay them for a month. The beating was cut short though when Surekha and her daughter Priyanka had witnessed the attack and reported it to the police. The men didn’t go to jail for several weeks, but once they did, they were released the same day—September 29—the day of the family’s attack. When they got out of jail that night, they assembled the mob ready to take revenge. They’d also heard  a rumor from local MLA Bhaskar Kawad that Siddharth’s brother had planned an attack on them, so they marched towards Siddharth’s store and when he wasn’t there, they decided to go after the Bhotmange family instead. The tension between the family and the villagers had been brewing for years by this point, even driving the family out to the edges of Khairlanji to escape the abuse. Their house stood out for its haphazardly constructed brick walls that sat stacked on top of one another without mortar to hold them together. The rest of the upper-caste homes were all made of solid, painted cement. Despite the outward appearance of such marked inequality, the Bhotmange family owned over seven acres of farm land, had a 19-year-old son who was in college working towards a degree in computer systems and a 17-year-old daughter who was one of few girls her age in school, 3rd in her class and working her way towards joining the army or police force. Such accomplishments did not go unnoticed and were repeatedly punished by other upper-caste villagers who took particular offense to Bhaiyallal’s land-owning status. In 2004, the villagers tried to claim two acres, claiming the land did not belong to him, in order to create a road. He relented, but when they demanded more land later, he refused. When Siddharth supported the family in conflicts like this it only added to the intensity of hatred the village had for this family. He would visit with them, look out for them, and it wasn’t long until rumors about an illicit affair between Surekha and Siddharth spread. Back on the night of the attack, on September 29, the mob reached the Bhotmange home where Priyanka was supposedly the first one the mob dragged out. She was stripped and raped repeatedly in the cattle shed located just 6 feet from their front door. The mob ordered her brothers to rape her and when they refused they mutilated their genitals. Surekha was stripped of her sari, left in just her petticoat and blouse. Their house was ransacked and red underwear, chili peppers and chili powder were all found scattered on the dirt floor of their house, suggesting chili peppers were used in the sexual assault of the women. Their beaten, stripped bodies were tied to bullock carts and paraded around the village till they reached the theatre in the village square. The mob of villagers standing in the audience demanded the Sarpanch to rape the women. Whether he did or not remains unknown but Priyanka’s vaginal cavity was allegedly stuffed with rods and sticks. Their bloodied bodies were eventually beaten to death and loaded back into the bullock carts and strategically thrown into various parts of the irrigation canal that skirted the village. During the attack Bhaiyallal returned home after he heard a commotion coming from the village. As he approached his home, he saw the mob but quickly retreated to Siddharth’s home for help. Upon hearing the news from Bhaiyallal, Siddharth called the police station at 7:07 pm to report the mob and seek assistance. The police inspector didn’t leave to investigate the mob report until 7:45pm and when he returned at 9:30 he had come back with little information. The next day, on September 30, Bhaiyallal went to the Andhalgaon police station to file an FIR to report his family missing, but was refused service and instead told to go look for his family again. Several hours later Priyanka’s body was found floating in the canal. As she was pulled out, a TV cameraman from local television station ETV filmed it, allegedly capturing evidence of the rods and sticks stuck inside Priyanka. There was also a photographer allegedly paid by police to take pictures as well. Priyanka’s body was then delivered to the hospital to conduct the post-mortem report. The official medical superintendent, Dr. Bante, received a phone call shortly after Priyanka’s body arrived and left the junior medical officer, Dr. Shende to carry-out the procedure. It was unusual that an urgent matter would take her away like that, but it was alleged she was lured away from the hospital by members protecting the mob who had money to pay various people to cooperate. Dr. Shende then conducted the post-mortem on Priyanka and despite being naked, failed to conduct a rape test as is customary when a body is found nude. Furthermore, he noted on the report that, â€Å"No injuries noted to the external genitals. †Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  On the following day, October 1, the bodies of Sudhir, Roshan and Surekha surfaced and were brought in for post-mortem reports. Though Dr. Bante had been present in the hospital that day, she again did not attend the post-mortem procedure. No genital injuries were noted in their reports either which was notable since both Sudhir and Roshan were stripped down to their underwear. That same day 28 people were booked and arrested in connection with the massacre. When the local newspapers first covered the attack, the reporting highlighted the alleged relationship between Surekha and her cousin Siddharth as the reason for the attack. In the Vidarbha Pulse, a local small town newspaper, the article outright blamed the deaths on an affair, â€Å"Four persons of a family were murdered over illicit relations at Khairlanji village near Mohadi in Bhandara district. †Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Not long after the first local news reports, various fact-finding missions from dalit and activist organizations conducted investigations. The Manuski Centre based in Pune was one of the first to visit Khairlanji and also the first to publish the pictures of the dead bodies. Consequently, the pictures were costly as the photographer asked for money before releasing them. Despite such a bribe, the pictures were crucial in communicating the horror of the attack. Nicolas Jaoul, a South Asian scholar based in France, traveled to Khairlanji not long after the attack and completed some of the most thorough research that exists on the massacre. In regards to the importance of pictures he writes, â€Å"These images played a major part in the protests and became the main incentive for producing collective anger. In Bhandara, Asit Bagde, an Ambedkarite activist who was among the first to take up the issue, explained to me: ‘We were able to use the pictures to speak about the murder (†¦) the same way that the photograph affected me, I could explain it to the next brother and he could explain to the next one; this way publicity spread orally in the first ten days. In the first ten days, it was only oral, and it went like this: this happened and it happened like this, and then they were murdered in this manner. ’ The news thus spread rom activist to activist, at the pace of a rumor, creating distress and building the tension in the local Buddhist community. †   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  In fact, this is also the same way in which the story came to me—through dalit activists who had come to Mumbai from Nagpur to share this story with other dalit activists in the city, who would share the story with me. I was as a journalist for The Times of India then in 2006, based ful l-time out of Mumbai. I had received a call from a friend of mine Deelip Mhaske who was an activist I had just profiled for his work in the city. He asked to set up a meeting with me at the Indian Institute of Technology-Powai to meet with the other activists who had traveled from Nagpur about a rape and murder that occurred over 700 miles away. After hearing the gruesome details of the rape and murder with clues that seemed they’d undoubtedly reveal corruption, after reading the physical copy of the Vidarbha Pulse article that summed up the murder as a result of an affair and after hearing about the years of struggle and intimidation the Bhotmanges faced in Khairlanji, I pitched it to my editor. Though the circumstances and facts that surrounded the case were markedly grisly, it was the fact that the news had remained underground for a month that hooked my editor into supporting my coverage of the story. He knew our newspaper would be the first to break the news and understood how that could be used as a platform to spark the rest of the media outlets to cover it. The next day I left for the village with Deelip and one other activist friend. The account of the massacre I’ve shared here thus far is a result of that investigation. I filed the story from Nagpur and returned home after a week in Bhandara. The article, run on Sunday, October 30, 2006, titled, â€Å"Just Another Rape Story,† harbored a taunting tone for the silence that kept this story unnoticed. It ended with a paragraph written by my editor: â€Å"Bhaiyallal’s desperate wails, unburdened to anyone who is willing to listen, now echoes in the desolation of Khairlanjis perpetual anonymity. The little media interest that had surfaced when the bodies were first fished out from a canal has now almost entirely disappeared. Apparently, this is just another crime story in India today. †   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The first major outlet to pick up the story after that was NDTV the next day on October 30. After that was Tehelka on Saturday, November 4, by Shivam Vij. Four days later, the riots began. On Tuesday, November 6, 22 dalits were arrested in Kamptee, Maharashtra in connection with rioting. They threw stones, damaged police vehicles and lit them on fire. Six policemen were injured. That same morning in Nagpur, major riots began with 200 people that blocked roads and lit tires on fire. The role of fire in the Khairlanji case played an important part in drawing media attention, demanding justice and creating a spectacle that represented a rage much larger and more dangerous than a collective group of protestors could muster themselves. On Wednesday, November 7, after the fires and damage that broke out, over 18 different English-language and vernacular newspapers depicted the rioting on their front page. Later that same day more fires erupted and a curfew was installed in Nagpur. In Mumbai, protestors barged into Chief Minister Vilasrao Deshmukh’s office demanding justice and protestors outside his office staged a dharna. On Thursday, November 8th, the fires continued and were burning all over Nagpur, but protesting had spread out to other towns and cities. Television news stations began covering the chaos every day and as a response to the huge jump in media coverage, the activists planned a walk called â€Å"The Long March,† set to take place on November 12 taking them from Nagpur to Khairlanji. In the nine days since news of the massacre had finally made it to the mainstream press, Bhaiyallal received 600,000 rupees in compensation as stipulated by the Prevention of Atrocities Act, 19 more people were arrested, the case was cleared to be taken over by the Central Bureau of Investigation and the case was approved to be put on a fast-track court. In any of the other caste atrocity cases, this might have taken months or even years. When the mainstream media first picked up this story and began covering it, the activists/protestors took immediate advantage and staged rallies and protests to further engage the media. When the first day of fires were set, the media responded with a huge swell of coverage. And when the activists/protestors reacted, the fires got bigger and more widespread which drew more media coverage to the cause in general. Without all the activists and protestors who capitalized on the media attention and organized their efforts, there would be no newsworthy element to cover. And if there had been no media interested in engaging with the activists and protestors, it would very difficult to produce the type of attention Khairlanji got—the relationship was very symbiotic. Bathani Tola In the cases of the dalit massacres in Bihar by the Ranvir Sena, the numbers of dead, the brutal manner in which they were killed and the repeated frequency with which they happened, made these series of riots some of the worst in India’s history. The Ranvir Sena formed in 1994 as an upper-caste landlord militia to protect land and retaliate against Naxal violence. The Naxalites had organized and formed a coalition of two Communist Marxist-Leninist parties who, â€Å"advocated the use of violence against the upper castes in organizing Dalits to achieve land reform. It’s worth mentioning that not all lower-caste villagers in predominantly Naxalite areas were Naxalites, Narula points out. So when the Ranvir Sena would carry out attacks against dalit villagers in retaliation for Naxalite violence, many innocent people were killed. On July 11, 1996, at Bathani Tola, in Bihar, 19 dalits and Muslims, mostly women and children, were killed in an attack where 60 R anvir Sena members lit houses on fire, beat villagers with lathis, used swords and shot them. During that time the Communist Marxist-Leninist parties were organizing to demand higher wages for agricultural workers. If they didn’t receive the raise, they wouldn’t work. Therefore in an effort to intimidate and prevent a strike, they planned their attack. In the aftermath it took four years to even charge those who were guilty in the attack, with 62 accused in March 2000. However, today, it now stands as the most recent case for which the death penalty was awarded. On May 12, 2010, Judge A. K. Srivastava handed out the death penalty to three people and life sentences to 20 others. According to a news report the charges were filed under the Indian Penal Code and Arms Act and not the POA Act. It is worth pointing out because like Khairlanji in which the POA Act was not observed, this practice could have long-standing consequences for the special rights granted under the POA Act. Laxmanpur-Bathe One of the most infamous dalit massacres in history, the Laxmanpur-Bathe attack took place a year and a half later after the Bathani-Tola massacre on December 1, 1997. Sixty-one dalits were killed over the supposed demand for more equitable land distribution in the village. Sixteen children, 27 women and 18 men were killed and at least five girls were raped before being shot and killed. In Smita Narula’s book, â€Å"Broken People: Caste Violence Against India’s ‘Untouchables’,† she describes the Human Rights Watch visit with survivors of the attack—accounts that are very rare to read. In the case of the rapes that took place, one witness, Surajmani Devi, tells them: â€Å"Everyone was shot in the chest. I also saw that the panties were torn. One girl was Prabha. She was fifteen years old. She was supposed to go to her husband’s house two to three days later. They also cut her breast and shot her in the chest. Another was Manmatiya, also fifteen. They raped her and cut off her breast. The girls were all naked, and their panties were ripped. They also shot them in the vagina. There were five girls in all. All five were raped. All were fifteen or younger. All their breasts were cut off. † Part of the strategy of the Ranvir Sena was intimidation by way of sexually assaulting the women and killing children. In media reports and in Narula’s account, Sena members were quoted as saying, â€Å"We kill children because they will grow up to become Naxalites. We kill women because they will give birth to Naxalites. † In this case, the police were compliant in the violence because of their refusal to act on tips of impending violence. The Ranvir Sena had openly been touring the surrounding area of the village to fundraise for their attack. The police knew about their planning meetings, but did nothing about them because according to one officer, â€Å"It’s like crying wolf. The Communist Party of India (M-L) keeps sending us complaint letters every week; we can’t take action every time. Throughout the course of its existence, the Ranvir Sena has committed over 40 separate attacks against dalits, CPI (M-L) members, Muslims and other groups killing hundreds of people. They had approximately 400 troops and were financed by wealthy landowners. In 2000, each member of the militia was paid between 1,100 and 1,200 rupees per month for their work in the attacks. Each member was also insured. If they died during a massacre, the ir family would receive 100,000 rupees. In both the Bathani-Tola and Laxmanpur-Bathe massacres, media coverage did not match that of the Khairlanji massacre though the death toll was much higher. Various media reports and fact-finding missions covered the atrocities, but for various reasons it did not spark the same kind of interest and similar protests demanding justice that occurred in Khairlanji. However, it was just 17 months after the Khairlanji death penalty sentencing that this case became the next caste crime where the death penalty would be handed out. On April 7, 2010, 16 persons were sentenced to death by a court in Patna, Bihar, while 10 others got a life sentence. Those not sentenced to die were also ordered to pay a 50,000 rupee fine. Media framing and the death penalty in India While resistance to the death penalty is documented in Hindu texts as early as the Mahabharata, and despite the fact that several Hindu rulers refrained from imposing it, it was used by many. In some references capital punishment was supported as the fourth kind of punishment allowed to be inflicted, behind bodily punishment, punishment by fine and punishment by words. Today, the death penalty is a buzzword in caste atrocity crimes, routinely called for as a means for retributive justice in cases where dalits have been murdered at the hands of upper-caste mobs. While I do not possess the resources to carry out the review and coding of all the articles in a newspaper like The Hindu, or something comparable, to provide evidence for the connection between a pro-death penalty tone and the rise in capital punishment sentencing, I can point to the increased attention given in covering atrocity cases as highlighted by the Khairlanji case study, in addition to providing recent media examples in which capital punishment has a observable pro-death penalty tone as defined by Baumgartner. In the Laxmanpur-Bathe atrocity case, one of the prosecution lawyers was quoted as saying, â€Å"As Laxmanpur-Bathe was one of the biggest carnages, the court took strong view of the killing of the Dalits in a brutal manner and sentenced 16 people to death treating it as the rarest of rare case. † That it’s mentioned that the court took a strong view of the killing in light of the sentence can be seen as providing a justification for a pro-death stance. Former Union Minister of Law Arun Jaitly has made very clear statements that suggest a possible pro-death opinion: â€Å"The low rate of conviction leads us to the conclusion that crime in India is a very high profit and a low risk proposition. You commit a heinous crime and there is a 93. 5 percent possibility that you will get away with it. He made the comments in the context of communal and caste riots that fail to receive any convictions or trials. Kiran Bedi, the social activist and former Indian Police Service officer, uses justice and the death penalty in the same sentence, casting no doubt about her pro-death opinion, â€Å"The death penalty is necessary in certain cases to do justice to societys anger against the crime. In an op-ed piece in The Hindu, explaining the complexity of the Khairlanji death sentencing, Navanaya publisher S. Anand mentions the death penalty as an unfortunate form of justice for some people, â€Å"Given such pervasive apathy and hopelessness, the death penalty in the Khairlanji case, even when the judgment jettisons caste as a ground for the crime, deludes people into thinking that there is some justice, at last. And in the most recent death sentencing case (although outside the realm of caste violence), the trial of Ajmal Amir Kasab, the lone survivor in the 26/11 terrorist attack, the judge openly claims there is no other solution than capital punishment, stating, â€Å"In the courts opinion, Kasab has no chance to reform. Keeping such a terrorist alive will be a lingering danger to the society and the Indian government. So while a thorough examination of decades of Indian media and its framing of capital punishment cannot be undertaken here, it has been my intention to highlight the media’s ability to shift how not only how caste crimes are regarded, (as was demonstrated by the lack of coverage and slow justice in the Ranvir Sena cases compared to the robust media coverage and speedy justice in the Khairlanji case) but how the increased attention on it and subsequent rise in death penalty sentencing will only contribute to an even greater rise of capital punishment in crimes agains t dalits. As I do not want to advocate for the death penalty per say, I have tried to illustrate the difference and inequality between a death sentence and an actual execution by showing the disparity between actual executions and death penalty sentences. As I mentioned, though a death sentence usually never means a person will be hanged to death, it still carries a strong message for those who support it for retributive justice.

Sunday, November 24, 2019

Mao Zedong Essays

Mao Zedong Essays Mao Zedong Essay Mao Zedong Essay Mao Sedona BY Ceaselessly Mao Sedona was the Leader of the Communist Party of China from 1893-1976. He was a key figure in the cold war, which resulted in millions of deaths for the Chinese Republic. This ruthless dictator did whatever he could to keep his power. He did many horrendous things one major problem was his stance on the Cultural Revolution. This power struggle could have gone to ways: no violence or violence. Sedona chose to strongly support the force of violence.. He alone can be to blame for of 70 million deaths which is more that both Hitler and Stalin. Many brutal stories of his actions still haunts people. One such story was that people use to lie about how much food and good they could supply so that they could live in somewhat prosperity. Although the stories get much worse than this, there Is always the debate if he was a good or bad figure in our history. This argument has changed much to do with pubic affairs. As the Republic of Chinas loyalty has shifted and changed from ruler to ruler so to the change in how they feel about the situation. This argument seems very petty considering that he was responsible or the death of so many of his own people but is It possible that these deaths were able to make China as strong as It is today?

Thursday, November 21, 2019

Delivering HIGH QUALITY CARE and working with people to provide a Essay

Delivering HIGH QUALITY CARE and working with people to provide a positive experience of care is a fundamental part of the nurse - Essay Example Advocating sometimes also calls for nurses to defends patient views that even they do not agree with. In such cases, nurses will put aside their personal opinions as health care is basicallt concerned with the patient needs, and not the feelings of the patient’s caregivers. The role of nurses as temporary legal advisers comes up because most patients tend to feel overwhelmed when confronted with the treatment options available for them. This is particularly true when the patient has been diagnosed with a terminal or life-threatening ailment. Many times, patients also turn to their nurses when seeking advise on how to handle matters that have to do with insurance. Nurses do not merely act as the advocates of the needs of their patients in a hospital setting, but also in government conventions discussing matters to do with the health sector (Yea-Pyng, Watson and Yun-Fang, 2012). Nurses can share their experiences with various patients with policy makers in such meetings and even give suggestions on how different aspects of the health sector can be improved. In most cases, nurses do not supervise or seek to monitor the way in which other medical practitioners, whether doctors or nurses, perform their responsibilities. However, nurses, because of their closeness in proximity to all patients, may be able to detect signs of maltreatment or the wrong treatment being given to a patient that is not under their care. In such cases, the nurse can exercise legal rights on behalf of the patient by reporting such an incidence to a higher authority. This is a special circumstance that calls for the urse to appeal to higher authorities because the patient’s health may be in jeopardy. Most nurses take this step after due consideration of the consequences because there might be contractual obligations that will result in disciplinary action being taken against the nurse if his or her complaint is misunderstood a defamatory action or breach of the patient and his or her caretaker’s privacy. The role of the Nurse from an Ethical perspective Nursing ethics are descriptive of the doctrines that govern how nurses act towards patients and their families. Nurses have a distinctive relationship with their patients. They tend to people at their most vulnerable point when the patients are unable to make decisions for themselves; and are thus entrusted by their charges with a greater amount of trust than is accorded to even religious leaders (Matiti and Trorey, 2008). Nursing ethics objectives include safe guarding the information volunteered by the patient and protecting his or her rights and giving practical guidance on treatment alternatives inspite of any difference in personal ideologies. Due to the rapid technological developments that have been witnessed in healthcare sector, nurses have had to re-examine the issue of ethics in the present settings. Even though nurses are expected to make ethical decisions in matters concerning their patie nts, they also have to take into account various factors that may affect them. For instance, a nurse may have to make the decision to give expensive treatment to pungent homeless people, drug abusers, or

Wednesday, November 20, 2019

International Business Essay Example | Topics and Well Written Essays - 750 words - 14

International Business - Essay Example In the year 2008, more than 1 million people acquired certification in IELTS (IELTS Press Release, 2008). Every year, more than 2 million people hailing from nearly 135 countries appear for IELTS (IELTS Press Release, 2008). Amongst them, a vast number of candidates happen to be from India. With the opening up of economy and the onset of globalization, every year a vast number of Indian citizens, aspiring to study or immigrate abroad, appear for IELTS (McDaniel, 2004). Considering the fact that a majority of these candidates give great importance to this test, owing to its pivotal role in the achievement of their career goals, setting up a chain of IELTS coaching centers in India stands to be a very positive business proposition. A majority of the employees recruited for this venture will be Indians. This is because they are apt to possess the local cultural competencies, which will go well with the Indian customers. Hence, awareness of cultural dimensions and characteristics will play a pivotal role in the chalking out of an effective business strategy in India. However, as IELTS is a test with an international appeal, care will be taken to introduce at least one native English speaking teacher at each center. The planning and administration will be such as to show sensitivity for the cultural norms and values of the Indian employees and customers. Specific effort will be made to make decisions guided by the insights gained into the values and attitudes of Indian employees. Locations: Due to strategic reasons, the first five coaching centers will be started at New Delhi, Kolkata, Mumbai, Chennai and Chandigarh. The reason is that these cities stand to be urban and economic hubs in India. The employees here will be more likely to be open to cultural convergence. The value system of administrators and employees recruited from these places are more probable to be in consonance with global values and norms. They will be more willing to customize their

Monday, November 18, 2019

Articles Summary Essay Example | Topics and Well Written Essays - 3750 words

Articles Summary - Essay Example The chapter, however, argues that these traditional distinctions do not properly investigate international migration. Instead, the chapter indicates that international migration should be investigated comprehensively, involving the impact that the migratory patterns have on both the host country and the country the person came from. The chapter then goes on to examine economic theories of migration. The first theory examined is the neoclassical theory. The text argues that neoclassical theory positions migration as occurring because of push and pull factors. Namely, economic conditions push some people out of their regional areas and pull them to different geographical areas. A notable aspect of this theory is that it assumes that people maximize all available opportunities presented to them. One considers that this may be an overly idealistic portrayal of the motivation behind international migration movements. Another theory examined is dual labor market theory. This theory expands some of the neoclassical elements by including the importance of race and gender in motivating migration. The third approach is the new economics of labor migration model. This perspective argues that rather than rooting migration behavior in a single individual, migration must be examined in terms of larger social units; specifica lly, these social units involve families, households, and communities. These varying theories of migration are recognized as significant because they influence a variety of policy decisions that are regarding immigration. Adding to this complexity is the recognition that these varying economic theories may operate at identifying different levels of immigration. This complexity leads the chapter to consider that rather than imagining a singular type of migration, it may be more productive to consider a large array of migrations. As a means

Friday, November 15, 2019

Drinks That Cause Tooth Decay Health Essay

Drinks That Cause Tooth Decay Health Essay The content in the drinks that causes tooth decay is the acidic content in our food and beverages. In general, drinks with a pH below 5.0 5.7 have been known to trigger dental erosion. Previous scientific research findings have helped to warn consumers that the pH level in beverages could lead to tooth erosion, the breakdown of tooth structure caused by the acid and leads to tooth decay. The acidity level in popular beverages that we consume everyday contributes to the erosion of enamel. Dental erosion is the irreversible loss of a tooth due to chemical dissolution by acids not of bacterial origin. There is generally widespread ignorance of the damaging effects of acid erosion; this is particularly the case with erosion due to fruit juices, because they tend to be seen as healthy. Erosion is found initially in the enamel and if unchecked, may proceed to the underlying structure of a tooth. Numerous clinical and laboratory reports link erosion to excessive consumption of drinks, frui t juices such as orange juice (which contain citric acid) and carbonated drinks (citric and phosphoric acid). This essay examines scientific research of the issue to determine if, in fact, acidic drinks do cause tooth decay. As part of my research, I conducted my own experiment, using human teeth and different types of drinks. After considering the results I obtained, as well as other research, I conclude that acid contain in the drinks is the cause of tooth decay. The acid content will slowly dissolve the enamel of the teeth. It dissolves the calcium molecules from the teeth surface, thus the teeth will erode. This essay will examine the validity of acid content in the drinks as the real culprit to tooth decay, evaluate the extend of the damage and recommendations for proper tooth care. Introduction Tooth decay is the loss of enamel from the tooth surface. When sugary drinks are consumed by bacteria in the mouth, it turns the sugar into acids. These acids corrode the enamel of the teeth, which leads to cavities. Dental erosion is the irreversible loss of a tooth to chemical dissolution by acids not of bacteria origin. Tooth decay is the most common chronic disease for children aged 5 17 although it is only recently that it is recognized as a dental health problem. There is generally widespread ignorance of the damaging effects of acid erosion, this particularly due to fruit juices, because they are perceived to be healthy. Erosion is initially found in the enamel and if left unchecked, may proceed to the underlying structure of a tooth. Numerous clinical and laboratory reports linked erosion to excessive consumption of sweet drinks, carbonated drinks and fruit juices. Previous scientific research findings have help to warn consumers that the pH (potential of hydrogen) level bel ow pH 5.0 5.7 may initiate dental erosion. The consumption behaviour plays a major role in oral health. However, public awareness on dental erosion is not high. Sources of acids can be endogenous or exogenous, and erosive intensity is modified by quality and quantity of saliva. Acidic beverages are the most common extrinsic factors that cause dental erosion (tooth decay). Because of these identified factors, I am interested to do this research to clear my curiosity. Basically this experiment is done to support my hypothesis. The experiment consists of gathering extracted human teeth of various shapes and sizes, disinfection and the submission in the selected beverages. Duration of 5 months is needed to complete the whole experiment. With the findings, I will be convinced and able to convince that acidic beverages cause tooth decay. Review of Literature Lemon Juice The juice extracted from fresh lemon is used as refreshing beverage. People go for lemon juice because they are able to cool down our body temperature. This is why when people are sick, they are advised to drink more citric juices so that the body system can be cooled down and recover the patients. Besides that, lemon juice also has high content of Vitamin C which is essential to our body immune system. 2.2 Coke Coke is a very famous carbonated drink. Despite the fizzy feeling and sweet tasting of the drink, it is actually one of the main contributors to tooth decay. Coke is a very sweet beverage making it able to promote the growth of oral bacteria, which is known as Streptococcus mutan  [1]  as the sugar contained in coke can feed the bacteria. Coke contains phosphoric acid and has the ability to corrode the tooth enamel. Plus, coke can stain the teeth and forms caries on the surface of the teeth  [2]  . 2.3 Coffee Coffee causes calcium loss in our bone mass, which leads to the excretion of calcium from our bones, doesnt matter which part of our body it is. This causes the thinning of the teeth which in turn, causes the teeth to become weak and is vulnerable to corrosion or break. Furthermore, coffee is also mostly acidic, which also causes tooth erosion, then leads to tooth decay  [3]  . 2.4 Energy Drink Energy drinks can also cause tooth decay. The pH level of the drink can lead to tooth erosion and hypersensitivity. It causes the breakdown of the tooth structure. In energy drinks, it is not the acidity of the drink that cause tooth erosion, but it is the buffering capacity of the drink that corrodes the tooth. Buffering capacity is the ability to neutralize acid  [4]  . Energy drinks have high buffering capacity, making them to have the strongest potential to cause tooth erosion. 2.5 Sugar Solution Sugar is scientifically known as sucrose, a sweet tasting organic compound, derived from glucose and fructose. Streptococcus mutans which live in our oral cavity will react with the sugar and form lactic acid which will also causes tooth erosion. Sucrose will be converted into dextran which favors the bacteria to be attracted to the teeth. Dextran is the food for the oral bacteria and lactic acid is their waste product  [5]  . Therefore, those bacteria will just stick to the teeth. This will make it difficult to remove those bacteria  [6]  . 2.6 Tap Water Tap water will not cause tooth decay as it does not have any effects on our teeth. Tap water is fluoride-enhanced, and it serves the purpose of making the teeth stronger and protects the teeth, making it an important teeth-protecting agent. Therefore, tap water will not stand the possibility of causing tooth decay. 2.7 Tooth Anatomy As the function of the teeth is to bite and chew food, hence, they are the first step in the digestion of food. The long, sharp canine teeth tear up food. The wide, flat molars grind and mash up food. Teeth also help us say certain sounds. Human have two sets of teeth in their lives, the primary teeth (also called the baby, milk or deciduous teeth) and the permanent teeth. Children have 20 primary teeth; they are replaced by the permanent teeth by about age 13. Adult have 32 permanent teeth. 7 Diagram of a tooth anatomy 3.0 Hypothesis Acid in drinks is the cause of tooth decay. Acidic drinks such as orange juice and lemon juice, the acid content will slowly dissolve the calcium in the teeth, corroding the enamel. The process starts from the surface of the teeth, towards the inner structure of the teeth. Method Development Planning In order to carry out this research successfully, materials have been carefully chosen to give a more promising and accurate result. Materials were carefully studied through several researches and readings from various useful sources. For my research, I have studied and researched on drinks such as lemon juice, coke, coffee, energy drink (100-Plus), sugar solution and tap water. The choice of tap water in my experiment is because of the neutral pH and fluoride enhancement. I have been studying about the compositions of the drinks and how they actually contributed to tooth decay. This experiment was carried out in the Health Laboratory of a Government Health Clinic in Sibu. All the research work was done during each of my college holidays. I was fortunate because I was consented to use the apparatus like digital weighing scale, microscope and more. All the extracted human teeth were supplied by the dental clinic with consent granted by the dental officer. I was also being taught the proper way of disinfecting the teeth with a proper disinfectant by the health staff in the laboratory. The main reason I chose to do my experiment here is because of the proper equipment available. Besides, I can also handle the teeth in a correct way to prevent myself from the bacteria. During the planning stage, Ive done a thorough research in choosing the appropriate drinks to be tested in my experiment. I chose only those drinks is because they are some of the popular drinks and are consumed the most nowadays. Besides that, these drinks are easily available in the market, regardless whether it is in the urban or rural area. And since I am studying of the effects of these drinks on human, so children can be a good subject for me because these drinks are mostly consumed by children. These drinks are also very affordable, so there wont be any financial problem in carrying out this experiment. As for the teeth, various types of teeth were used in this experiment. However, no specific tooth is being used due to the unavailability. These teeth range from Incisors, Canine, premolar to molar. Tooth that is with minimal erosion noted is selected for this experiment as no perfect human tooth is being extracted and readily available for such an experiment. 30 human teeth are used in this experiment. Only 30 teeth are used because it is quite difficult to get human teeth as human teeth are really dirty and dentists usually dispose them off immediately due to hygienic reason. Besides that, as for the solutions, 200ml of each solution is used. The same amount of solutions are also used each and everytime when I change the solutions in each beaker, once a week. This experiment takes approximately 5 months in order to obtain a more significant and accurate result. Initially the duration of the experiment was only 10 weeks as planned; however no significant change can be seen. Therefore, the duration of the experiment was extended to 5 months instead because the teeth required a longer period of time to witness a significant change in the structure of every tooth. The experiment was carried out at room temperature, which is approximately at. This is because oral bacteria can function well at such temperature, which may contribute to a more accurate result. The experiment was done, with permission, for using the equipment at a Clinic laboratory of a Healthcare facility in Sibu. All the extracted teeth for this study were taken from the Dental Clinic of that facility with each tooth weighs between 0.510 gram and 2.280 gram depending on various types of teeth (molar, premolar, canine and incisor) extracted and the weight of these extracted teeth. After being thoroughly washed and disinfected (to prevent any possible infections during the process of this experiment), specimens (extracted teeth) were alternately immersed, 5s, in each different types of drinks place in a labelled beaker ranging from A to F as follows: Beaker A Lemon juice Beaker B Coke Beaker C Coffee Beaker D 100 Plus Beaker E Sugar Solution Beaker F Tap Water This study was done for duration of 5 months. This is to enable me to note significant changes. This is necessary in order for me to chart and document accurately the gradually changes to these teeth. A shorter duration will not show any significant changes which could be documented. The first reading will only be done after 1 month post immersion in each of the marked beaker filled with the experimented drinks. These readings include the documentation of the colour, contour (mass) and the weight of each tooth after which at the end of my study I would be able to determine which of the 6 beakers show significant changes in the tooth mass. The inspection of each beaker will be done monthly for the next subsequent 5 months. Beaker A (lemon juice) Beaker B (Coke) Beaker C (coffee) Beaker D (100 Plus) Beaker E (sugar water) Beaker F (tap water) In the meantime, a clean 200ml beaker was used to measure 200ml of lemon juice and the beaker is labelled accordingly. The pH of each drink is being measured to determine their acidity level. pH Chart from the journal of dental hygiene is being used as a guideline for my experiment. The diagram below show the various pH levels of frequently consumed foods and drinks below pH 5.0 5.7 which may initiate dental erosion. This step was repeated to measure out the same amount (200ml) of Coke, coffee, 100 Plus, sugar water and tap water. In the experiment, tap water acts as a control. After that, 30 teeth of almost the same size were cleaned and disinfected thoroughly with antiseptic disinfectant. The teeth must be clean and are without plague in order to detect new changes to the mass and contour of the teeth. Then, the teeth were dried with a hair dryer to ascertain that the teeth are totally dry and no residual water detected. This is done to make sure that the result will not be temper ed. The initial mass of each tooth was also weighted and the measurements were recorded. After the measuring processes, each of the teeth was immersed into their respective beakers ranging from beaker A to beaker F, 5 teeth per solution per beaker due to the limited amount of human teeth available. Those teeth must be immersed completely in their respective solution. After that, those 6 beakers were left in the laboratory under standard room temperature and humidity. After a month, every tooth in the 6 beakers was individually checked and the changes which had taken place on the surface of the teeth were observed and documented with each of the tooth mass measured. Then these teeth are re-immersed with fresh drinks (to ensure the potency of these drinks does not decline) for the subsequent month documentation. This process will be carried out at a monthly interval with fresh solution to detect any changes occurring to the mass and contour of the teeth, be it acute or gradual. At the end of the experiment which lasted for 5 months, the teeth were removed from each of the solutions and they were cleaned. After cleaning process, the teeth were dried using a hair dryer until each of them was totally dry. The final mass of each tooth was weighted and all the measurements were recorded as shown in the table below. At last, the data collected, which is the final mass (quantitative data) and the observation on the teeth (qualitative data) were tabulated for analysis. 8 Diagram of the pH level of frequently consumed food and drinks below pH 5.0-5.7 may initiate dental erosion. 5.0 Materials and Procedure 5.1 Materials Materials Quantity Extracted tooth 30 Lemon juice 200ml Coke 200ml Coffee 200ml 100 Plus 200ml Sugar solution 200ml Tap Water 200ml 5.2 Apparatus Apparatus Quantity 200ml beaker 6 Forceps 1 Electronic balance 1 Magnifying glass 1 Hair dryer 1 Microscope 1 5.3 Variables Variables Independent variable Different types of drinks (lemon juice, coke, coffee, 100 plus, sugar water, tap water) Dependent variable Condition of the teeth Constant variable Volume of drinks used Type of teeth used Temperature of the drinks Duration of the experiment Number of teeth used 5.4 Methodology Prepare 6 clean and empty beakers. Label all the 6 beakers with alphabets, ranging from A to F. Beaker A Lemon juice Beaker B Coke Beaker C Coffee Beaker D 100 Plus Beaker E Sugar solution Beaker F Distilled water In the mean time, use a clean 200ml beaker, measure 200ml of lemon juice. Repeat step (3) with coke, coffee, 100 Plus, sugar water and distilled water. The distilled water acts as the control experiment. Then, clean 30 teeth of the same size thoroughly. Make sure that there is no plaque on them. Dry the teeth with a hair dryer. Weight the initial mass of the teeth. Record the measurements. Immerse the each of the teeth into respective beakers. Label the teeth with numbers 1, 2, 3, 4 and 5 for easy recognition. Make sure that the tooth is completely immersed in their respective solution. Leave the 6 beakers in the laboratory with a standard surrounding temperature. After 24 hours, check on the tooth in the 6 beakers and observe the changes which are taken place on the surface of the teeth. Remove the teeth from the solutions and clean them. Dry the teeth with a hair dryer and make sure that they are totally dry. Weight the final mass of the teeth. Record the measurement. Tabulate the data. Data Collection 6.1 Quantitative Data Drinks pH Value Lemon Juice 2.10 Coke 2.30 Coffee 4.95 100 Plus 3.78 Sugar Solution 7.00 Tap Water 7.00 The table shows the pH level of each drink for this study. Type of Drinks pH Value () Month Mass of Teeth/mg () Tooth 1 Tooth 2 Tooth 3 Tooth 4 Tooth 5 Lemon Juice 2.10 1 2.37 2.68 1.80 2.22 1.05 2 2.37 2.67 1.79 2.21 1.04 3 2.35 2.65 1.78 2.20 1.03 4 2.33 2.63 1.75 2.18 1.01 5 2.29 2.60 1.72 2.14 0.98 Coke 2.30 1 1.82 2.33 2.06 1.80 2.46 2 1.81 2.32 2.06 1.80 2.44 3 1.79 2.30 2.04 1.78 2.43 4 1.75 2.28 2.01 1.76 2.41 5 1.75 2.26 1.98 1.74 2.39 Coffee 4.95 1 1.55 1.74 2.34 2.26 1.37 2 1.55 1.73 2.33 2.26 1.36 3 1.54 1.73 2.32 2.25 1.36 4 1.52 1.71 2.31 2.25 1.35 5 1.50 1.69 2.29 2.24 1.33 100 Plus 3.78 1 2.67 2.64 2.75 1.30 2.14 2 2.66 2.63 2.75 1.30 2.12 3 2.64 2.61 2.73 1.28 2.10 4 2.62 2.60 2.71 1.25 2.08 5 2.60 2.58 2.69 1.23 2.06 Sugar Solution 7.00 1 1.37 1.46 2.06 1.47 2.33 2 1.37 1.45 2.04 1.46 2.32 3 1.35 1.45 2.03 1.44 2.30 4 1.34 1.44 2.01 1.43 2.29 5 1.33 1.43 2.00 1.42 2.28 Tap Water 7.00 1 2.65 2.43 2.86 1.43 2.63 2 2.65 2.43 2.86 1.43 2.63 3 2.65 2.43 2.86 1.43 2.62 4 2.64 2.43 2.85 1.43 2.62 5 2.63 2.42 2.84 1.43 2.61 The table shows the mass of the teeth throughout the experiment. 6.2 Qualitative Data Type of Drinks Month Colour Contour Mass Lemon Juice 1 No change No change No change 2 No change No change Slight decrease 3 Yellowish Microscopic flaking and softening of enamel Slight decrease 4 Yellowish brown Erosion noted Significant decrease 5 Brown Erosion noted Consistent decrease Coke 1 No change No change No change 2 No change No change Slight decrease 3 Yellowish No change Slight decrease 4 Yellowish brown Erosion noted Significant decrease 5 Brown Erosion noted Consistent decrease Coffee 1 No change No change No change 2 Yellowish No change Slight decrease 3 Yellowish brown Microscopic flaking and softening of enamel Slight decrease 4 Brown Erosion noted Significant decrease 5 Brown Erosion noted Consistent decrease 100 Plus 1 No change No change No change 2 No change No change Slight decrease 3 Yellowish Microscopic flaking and softening of enamel Slight decrease 4 Yellowish Erosion noted Significant decrease 5 Yellowish brown Erosion noted Consistent decrease Sugar Solution 1 No change No change No change 2 No change No change No change 3 Yellowish No change Slight decrease 4 Yellowish brown Erosion noted Significant decrease 5 Yellowish brown Erosion noted Consistent decrease Tap Water 1 No change No change No change 2 No change No change No change 3 No change No change Slight decrease 4 No change No change Slight decrease 5 Yellowish No change Slight decrease The table shows the observations obtained throughout the experiment. 7.0 Data Processing Analysis 7.1 Data Processing 7.1.1 Calculation for the difference in mass of the teeth. Formula: Difference in mass =Mass in month 1- Mass in month 5 Example, The 5th month (lemon juice), tooth 1: Difference = = *Same calculation applied to others. Type of Drinks Difference in mass/mg () Tooth 1 Tooth 2 Tooth 3 Tooth 4 Tooth 5 Lemon Juice 0.08 0.08 0.08 0.08 0.07 Coke 0.07 0.07 0.08 0.06 0.07 Coffee 0.05 0.05 0.05 0.06 0.04 100 Plus 0.07 0.06 0.06 0.07 0.08 Sugar solution 0.04 0.03 0.06 0.05 0.05 Tap water 0.02 0.01 0.02 0.00 0.02 The table shows the difference in mass of each tooth throughout the 5 months for each drink. 7.1.2 Calculation for the uncertainties of difference in mass Formula: Uncertainty of the initial mass + uncertainty of the final mass Example, Therefore, difference in mass for tooth 1 in lemon juice: Difference = *Same calculation applied to others. 7.1.3 Calculation for the average difference. Formula: Example, For lemon juice: *Same calculation applied to others. Type of Drinks Average difference in mass/mg Lemon juice 0.08 Coke 0.07 Coffee 0.05 100 Plus 0.07 Sugar solution 0.05 Tap water 0.01 The table shows the average difference in mass of the teeth in each drink. 7.1.4 Calculations for the Standard deviation of the average difference in mass. Due to the complexity of the calculation, the standard deviation is calculated by using the Graphic Display Calculator (GDC). Steps: Press the STAT button. Press the ENTER button. List the data (the average difference in mass of the 5 teeth per solution) in one of the column. Press the STAT button. Press > button so that the CALC image on the screen is highlighted. Press the ENTER button. Beside the 1 Var Stats words on the screen, type the 2ND button and the name of the column that contains the data (name of the column used in step 3). Press the ENTER button. The standard deviation is equal to. The above steps are repeated to calculate the standard deviation for the teeth in the rest of the drinks. Example, For lemon juice, Key in the difference in mass of the 5 teeth in the 1st column. Based on the steps above, the GDC automatically calculated the standard deviation, which is,. *Same calculation applied to others. Type of Drinks Average Difference in Mass/mgStandard Deviation Lemon juice 0.080.004 Coke 0.070.007 Coffee 0.050.007 100 Plus 0.070.008 Sugar Solution 0.050.011 Tap water 0.010.009 The table shows the average difference in mass of the teeth with the standard deviation. 7.1.5 Calculation of the rate of reaction between the teeth and the drinks. Formula: Calculations: Lemon Juice Rate of Reaction = = Coke Rate of Reaction = = Coffee Rate of Reaction = = 100 Plus Rate of Reaction = = Sugar Solution Rate of Reaction = = Tap Water Rate of Reaction = = 7.1.6 Calculation for the standard error of the rate of reaction. Formula: Where, = uncertainty of the mass = rate of reaction Example: Lemon juice Coke Coffee 100 Plus Sugar Solution Tap Water Type of Drinks pH Value Duration of Experiment/ months Average Difference in Mass/ mg Rate of Reaction/ mg/day Lemon juice 2.10 5 0.080.004 Coke 2.30 5 0.070.007 Coffee 4.95 5 0.050.007 100 Plus 3.78 5 0.070.008 Sugar solution 7.00 5 0.050.011 Tap water 7.00 5 0.010.009 The table shows the summary of the calculations in the experiment. 7.2 Data Presentation 7.3 Statistical Analysis 7.3.1 T-test lemon juice and sugar solution. 1st Month: t-Test: Paired Two Sample for Means Variable 1 Variable 2 Mean 2.024 1.738 Variance 0.39683 0.18467 Observations 5 5 Pearson Correlation -0.933627334 Hypothesized Mean Difference 0.286 df 4 t Stat 2.38114E-16 P(T 0.5 t Critical one-tail 2.131846786 P(T 1 t Critical two-tail 2.776445105 To do a T-test, I came up with two hypotheses, which are as followed: The difference between the average mass of the teeth in lemon juice and sugar solution for the 1st month is not significant. The difference between the average mass of the teeth in lemon juice and sugar solution for the 1st month is significant. From the result of T-test generated by Microsoft Excel 2010, the value of is and the value of is. Thus, . Therefore, is accepted and is rejected. This means that from the T-test, the difference between the average mass of the teeth in lemon juice and sugar solution for the 1st month is not significant. This is because all the teeth used in this experiment have an average mass initially. 7.3.2 T-test between lemon juice and sugar solution 2nd Month: t-Test: Paired Two Sample for Means Variable 1 Variable 2 Mean 2.016 1.728 Variance 0.39858 0.18127 Observations 5 5 Pearson Correlation -0.938299713 Hypothesized Mean Difference 0.288 df 4