Saturday, August 31, 2019

European EN and International ISO standards Essay

The abbreviations â€Å"EN† refers to European Norm while â€Å"ISO† refer to International Standards Organization. Endoscopy literally means â€Å"looking inside† and it is usually refers to look inside the body usually in relation to medical reasons using an instrument called an endoscope. It is used to examine the interior parts of a hollow organ or cavity of the body, and they are inserted directly into the organ. The endoscopes, especially flexible endoscopes are usually complex but can be reused but require very unique conditions for reuse in respect to their decontamination. It is not only their outer surfaces that are exposed, but also their air channels, water channels and even their accessories that enable them to function in the right manner. Their exposure to body fluids and other contaminants means that their reuse has to be very carefully looked into so as to avoid spread of diseases. It is also important to realize that most endoscopes are heat labile and cannot be autoclaved meaning they change under different heat conditions. European (EN) and International (ISO) standards that would be applicable to an endoscope decontamination unit (EDU) in the UK As abstracted from EN ISO 15883, information from the manufacturers should be given prior to purchasing the endoscope. This implies that the manufacturer provides information such the best disinfectants to use with that particular endoscope and what is expected when cleaning, for example the bacteria expected to be found there and also if the disinfectant in question is compatible with the automatic reprocessor in which it is being used. (Gurusamy Manivannan, 2008) As per BS EN ISO 15883-1, a temperature recorder having no fewer than ten sensors should be used, and the specifications are well indicated in the ISO standard. This is because the endoscopes are heat labile, and temperature may affect the chemical compositions of the accessories or other chemicals involved. The manufacturer should also establish the worst conditions under of the devices configuration. Such conditions encompass temperature, detergent concentration and surrogate device configuration. This also includes water flow pressure for use during testing. This may also be categorized in a similar manner as biocompatibility testing where limits such as residual limits are stipulated as per ISO 10993. (Denise Sheard, 20120 The calibrations should be checked in accordance with ISO 10012-1 for uniformity purposes. These are usually dictated by manufacturers using a validated method of applying a sensible reference. Each instrument should also be labeled with a unique reference number. This is important when measuring passage of fluids or drugs so as to get accurate and true results. The standard prEN ISO 15883-1-2004 has a clause that indicates that the manufacture shall all addition information associated with the use and decontamination of the particular endoscope. Information such as maximum flow and pressure of fluids within each channel in the device and the maximum possible permissible restriction of flow within each channel is deemed important and must be provided. (James Walker, 2014) There is also a standard similar to both that the manufacturers may be requested to give information concerning the device at any stage, and act as consultants. This is stipulated in prEN ISO 15883-1-2004. This is important when complications arise that personnel involved were not expecting References Gurusamy Manivannan, Disinfection and decontamination: principles, applications and related issues. Boca Raton : CRC Press/Taylor & Francis Group, 2008 Denise Sheard , A practical guide to decontamination in healthcare . Hoboken: John Wiley & Sons, 2012. James Walker, Decontamination in hospitals and healthcare. Oxford: Woodhead Publishing, 2014 Source document

Friday, August 30, 2019

Compare and Contrast Essay Good Boss Bad Boss

The difference between a good boss and a bad boss is perceived by the employee under supervision. The most important difference between the two types of bosses is whether you can be trusted to do your job and do it the correct way. The employees’ feelings towards their boss often show up in the work that her or she does and the way that the work is done. A good boss generally leaves the employees to do his or her work, but is available to help the employee if needed. As a result, employees tend to be happier, more at ease, and more likely to be more productive in his or her work environment. There are many qualities that make up a good boss. A good boss cares about their job as well as the employees who work under them. It is important to a good boss to do what they can to keep company they work for growing and to succeed every day. You can often tell a difference in the attitudes of a good boss and a bad boss because a bad boss may have a bad attitude and show no interest in wanting to be at work, while a good boss loves their job and goes above and beyond to succeed their company and themselves as well. In contrast, a bad boss keeps his or her door closed, and does not want or invite in communication with his or her employees and can be quite rude when interrupted. This behavior can often affect how employees feel about their job and how he or she does their work. Employees tend to be more stressed and annoyed when they are picking up the slack of their boss and when they are not receiving the correct answers to questions that may arise. Things may not get handled the way they should be handled if the boss does not show interest in step up and do their part. When a bad boss does not show interest in care in their employees that also affects how they do their work because employees may feel they are being taken advantage of and not receiving the credit they deserve for the work that they do. A bad boss may show disrespect and no interest in their employees and the company, but can put on an act to the higher up bosses and take all of the credit for the work of others. Typically a bad boss does not go above and beyond to better their company. A company can’t succeed without the people who get up and go to work every day and do their best to make that company a successful one. It takes more than one person to make a company succeed and that is why not only bosses but employees play a big role in maintaining a company. The way employees are treated is what keeps them enjoying their job, coming to work every day, putting their effort into their job, and providing good customer service. It is important to not only provide excellent customer service to whose entering a company, but to the employees as well. When customers are treated bad by those who are employed at a company then the customer tends to avoid that company and use other resources where they can get the help they need and are able to communicate with people who are helpful and respectful. This goes hand and hand with the way bosses treat their employees because like customers, employees who feel like they are being disrespected and not getter the proper help and training, they begin to not enjoy their job. When you do not enjoy your job and are being treated bad that shows up in the way you do your work. Employees may get that â€Å"I do not care attitude† or the bad attitudes from their bosses can rub off on the employees as well. Employees look up to their bosses because someday that could be the employee in the higher position. When becoming a boss most people look at that as an opportunity to do their best at their job and keep moving up to higher positions and more pay. It is not only the boss’s job to run a company and make that company successful but it is also their job to train and prepare their employees to be able to do their job one day. Becoming a boss of a company is a big deal and employees and bosses who enjoy their job do what is asked and expected of them so that they can have the chance to keep moving up the ladder of success. A good boss trains their employees the proper way, they even set aside down time to teach their employees how to do things that are the responsibility of the boss so that someday when the time comes they have been learning the proper duties of a boss and how to go about completing those duties. A good boss should always prepare their employees to someday take over their position and a good boss should feel confident that the employee is capable of doing so and maintaining a good work environment for others. A bad boss does not tend to care about employees desire to move up in the company therefore, the boss does not take the time to train the employee to be able to someday take over their job. A bad boss may teach the employees how to do certain aspects of the boss’s job only so the boss can push their work off onto their employees. In conclusion, the definition of a good boss and a bad boss is perceived by the employee working under that boss. Some may consider their boss a good or bad boss while others may think differently it is all how the employee feels that they are being treated by their boss and how they feel that their boss handles the job duties required of him or her. Many people have different views on certain aspects so only the employee can judge whether or not they believe their boss is a good or bad boss. Week 9: Completing the Essay  Resource: Appendix A posted in Course Materials ForumWrite a 1,050- to 1,400-word final draft of your compare-and-contrast essay. Include the following elements in your essay:  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   An introduction paragraph that includes an attention getter, background information, and your thesis statement placed last ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   At least three body paragraphs with topic sentences that directly address the thesis and clincher sentences  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Appropriate transitions within and between paragraphs that maintain momentum throughout essay ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A conclusion paragraph that begins with a restated thesis, reviews the main ideas and ends with a lasting thought. Post your paper as a Microsoft ® Word document to the Assignments link by Day Four. | Content and Development   160 Points| Points Earned150/160|   | Additional Comments:| All key elements of the assignment are covered in a substantive way.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The paper is focused on the approved topic.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The paper is a minimum of 1,050, but no more than 1,400 words in length and is concise. |   Excellent job in all areas! Your final essay shows how well your writing skills have developed since the beginning of this class. Missing—a reference list and in-text citations. This is very important to use. Otherwise a paper will look as if it is plagiarized. Conclusion needs to be stronger. Also, make sure to review APA format as this does not align with APA format. | The content is comprehensive and accurate and compares and/or contrasts at least two subjects. | | The paper develops a central theme or idea directed toward the appropriate audience.  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The paper remains focused on the key points and uses supporting information to support those points. |  ·Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Paragraphs contain topic sentences that directly address the thesis, supporting details that focus on a single idea, and a concluding sentence that provides closure. | | Major points are stated clearly and are supported by specific details, examples, or analysis; and are organized logically. | | The introduction provides sufficient background on the topic and previews major points. | | The conclusio n is logical, flows from the body of the paper, and reviews the major points. |   |   | Readability and Style   20 Points| Points Earned20/20| | Additional Comments:| Paragraph transitions are present, logical, and maintain the flow throughout the paper. | Very nice job with transitions. They work well and help the flow of the paper for the reader. Good use of strong sentences. | The tone is appropriate to the content and assignment. | | Sentences are complete, clear, and concise. | | Sentences are well constructed, strong, and varied. | | Sentence transitions are present and maintain the flow of thought. | |   |   | Mechanics 20 Points| Points Earned17/20| | Additional Comments:| Rules of grammar, usage, and punctuation are followed. |   Great work. I just noticed a few things as noted above. | Spelling is correct. | | Total 200 Points| Total Points Earned187/200| Overall Comments:Excellent job with your final essay. You should be proud of the document you ended up with. Just a few more things will take it to the next level. | *

Thursday, August 29, 2019

How to Identify a Target Market Essay

In this part of my P2 course work, I have been asked to identify the target market by preparing an information pack about the target market, for my potential investors and also make a good question for my business survey. Market Research Market Research is a systematic, objective collection and analysis of data about a particular target market, competition, and/or environment. It always incorporates some form of data collection whether it is secondary research (often referred to as desk research) or primary research which is collected direct from a respondent. Purpose of Market Research The purpose of any market research project is to achieve an increased understanding of the subject matter. With markets throughout the world becoming increasingly more competitive, market research is now on the agenda of many organisations, whether they are large or small. Market research is also one of the most important pieces to your marketing plan that will determine how you will speak with these customers, where to find them, how to best convert them into your customer and retain them as a customer. There are two types of market research 1. Primary research / Field 2. Secondary research / Desk Primary Research When marketers conduct research to collect original data for their own needs it is called primary research. This process has the marketer or someone working for the marketer designing and then carrying out a research plan. Primary research is also collected in a research â€Å"instrument† designed to record information for later analysis. Marketing researchers use many types of instruments from basic methods that record participant responses to highly advanced electronic measurement where research participants are connected to sophisticated equipment. Primary research also refers to information that is directly collected from the source. Another simple method of primary research would be to directly talk to your customers and get their feedback. Primary research can be both qualitative and quantitative. Method of primary research Questionnaire – Questionnaires are one the main tools in the use of field research. A questionnaire contains a series of questions which gather primary marketing research data for the business. A face-to-face questionnaire might include different questions to an emailed questionnaire. An interviewer will be filling in a face-to-face qu estionnaire and the person may be able to ask for the question to be rephrased if they do not understand it the first time. Online surveys- Increasingly popular and relatively low cost, online surveys are widely used by small businesses as a way of capturing the views of existing and potential customers. Face-to-face surveys – Personal interviews conducted face-to-face is a costly, but good way to get detailed insights from an individual. Secondary Research Secondary research is a data that already exists and has been collected by someone else for another purpose. Secondary research involves the investigation of secondary sources of data. Sources of secondary data can come from within the firm itself – this is known as internal secondary data. External secondary data, on the other hand, is data that has been published by other organisations. Methods of secondary research Secondary Sources include journal articles, books, encyclopaedias, dictionaries, reviews, newspaper articles, specific essays, etc. Most research papers are based on secondary sources as they build on the research or studies others have done. It’s usually published in pamphlets, newsletters, trade publications, magazines, and newspapers. Secondary sources include the following: * Public sources. These are usually free, often offer a lot of good information, and include government departments, business departments of public libraries, and so on. * Commercial sources. These are valuable, but usually involve cost factors such as subscription and association fees. Commercial sources include research and trade associations, such as Dun & Bradstreet and Robert Morris & Associates, banks and other financial institutions, and publicly traded corporations. * Educational institutions. These are frequently overlooked as valuable information sources even though more research is conducted in  colleges, universities, and technical institutes than virtually any sector of the business community. My name is Mba Nduka Amogu. I am a Business studies student at Whitefield. I would like to take a few minutes of your time by completing my questionnaire for my business studies course work about my business survey. 1. Are you male or female? Male Female 2. Which age range are you? Under 20 21-30 31-40 40-above 3. Do you live within this area? Yes No 4. Would you like to visit our fruit shops if provided? Yes No 5. If our new shops were available today, how likely would you be to visit instead of visiting other fruits shops currently available from other companies? Very Likely Moderately Likely Slightly Likely Not at all likely 6. If you are not likely to visit our shop why not? Do not like our services Satisfied with other competing fruits shops currently available Cannot pay for our services and products Not willing to pay or shop with us 7. How important is it convenient to you, when choosing our products? Extremely important Very important Moderately important Slightly important Not at all important 8. Overall are you satisfied with your experience, shopping with us? Extremely satisfied Moderately satisfied Slightly satisfied Neither satisfied nor dissatisfied Slightly dissatisfied Moderately dissatisfied Extremely dissatisfied 9. If our new products were available today, how likely would you be to recommend it to other? Extremely Likely Very Likely Moderately Likely Slightly Likely Not at all likely 10. If our new service were available today, how likely would you be to use it instead of competing service currently available from other companies? Extremely Likely Very Likely Moderately Likely Slightly Likely Not at all likely 11. If you are not likely to use our new service, why not? Do not need a service like this Do not want a service like this Satisfied with competing service currently available Cannot pay for a service like this Not willing to pay for a service like this 12. How important is it convenient for you, when choosing a service this type of service? Extremely important Very important Moderately important Slightly important Not at all important 13. Overall are you satisfied with your experience using our new service? Moderately satisfied Slightly satisfied Neither satisfied nor dissatisfied Slightly dissatisfied Moderately dissatisfied Extremely dissatisfied 14. If our new service were available today, how likely would you be to recommend it to others? Extremely likely Very likely Moderately likely Slightly likely Not at all likely 15. How often will you visit my shop if available, having different variety of fresh fruits and vegetables for sell? Daily Weekly Monthly Quarterly In My questionnaire I interviewed a total of 20 people. Below displays the results of each question individually. 1. Are you male or female? * Male8 * Female12 2. Which age range are you? * Under 2010 * 21-305 * 31-403 * 40-above2 3. Do you live within this area? * Yes16 * No4 4. Would you like to visit my fruit shops if provided? * Yes12 * No8 5. If my new shop were available today, how likely would you be to visit instead of visiting other fruits shops currently available from other companies? * Very Likely6 * Moderately Likely5 * Slightly Likely4 * Not at all likely5 6. If you are not likely to visit my shop why not? * Do not like my services7 * Satisfied with other fruits shops currently available3 * Cannot pay for my services and products5 * Not willing to pay or shop with us6 7. How important is it convenient to you, when choosing my products? * Extremely important7 * Very important4 * Moderately important5 * Slightly important3 * Not at all important1 8. Overall are you satisfied with your experience, shopping with me? * Extremely satisfied9 * Moderately satisfied4 * Slightly satisfied3 * Neither satisfied nor dissatisfied0 * Slightly dissatisfied3 * Moderately dissatisfied1 * Extremely dissatisfied0 9. If my new products were available today, how likely would you be to recommend it to other? * Extremely Likely4 * Very Likely6 * Moderately Likely3 * Slightly Likely4 * Not at all likely4 10. If my new service were available today, how likely would you be to use it instead of competing service currently available from other companies? * Extremely Likely5 * Very Likely3 * Moderately Likely2 * Slightly Likely 7 * Not at all likely3 11. If you are not likely to use my new service, why not? * Do not need a service like this10 * Do not want a service like this 1 * Satisfied with competing service currently available 0 * Cannot pay for a service like this 2 * Not willing to pay for a service like this7 12. How important is it convenient for you, when choosing a service this type of service? * Extremely important13 * Very important3 * Moderately important2 * Slightly important1 * Not at all important1 13. Overall are you satisfied with your experience using my new service? * Moderately satisfied15 * Slightly satisfied0 * Neither satisfied nor dissatisfied1 * Slightly dissatisfied2 * Moderately dissatisfied1 * Extremely dissatisfied1 14. If my new service were available today, how likely would you be to recommend it to others? * Extremely likely10 * Very likely3 * Moderately likely2 * Slightly likely2 * Not at all likely3 15. How often will you visit my shop if available, having different variety of fresh fruits and vegetables for sell? * Daily15 * Weekly1 * Monthly2 * Quarterly3 1. The Gender of the people interviewed for my business surveys This pie chart shows the gender of people I interviewed for my business survey, which shows that 40 percent of them are male and 60 percent of them are female. 2. The age range for the people I interviewed for my business survey. This pie chart shows the age range for the people I interviewed for my business survey, which shows that 50 percent of the people I interviewed are under 20, 10 percent of them are 40 above, 15 percent of them are between 31 – 40 and 25 percent of them are between 21-30. 3. This is people that live and doesn’t live in that area but were interviewed by me for my business survey. This pie chart shows the people that live and doesn’t live in that area but they were still interviewed by me because of my business survey, which shows that 20 percent of the people I interviewed don’t live in this area and 60 percent of them live in this area. 4. Would you like to visit my fruits shops if provided? This pie chart show the amount of people who are willing to make a visit to my shops when they are provided and also people who are not willing to make a visit to my shop, which shows that 40 percent of the people I interviewed are not willing to visit my shop and 60 percent of them are willing to visit my shop. 5. If my new shop were available today, how likely would you be to visit instead of visiting other fruits shops currently available from other companies? This pie chart shows the range of people who are willing to make themselves regular customers to my shop and also visit my shop regularly, which shows that 30 percent of the people I interviewed are very likely to visit my shop, 25 percent of them are moderately likely, 20 percent of them are slightly likely and 25 percent of them are not likely at all to visit my shop. 6. If you are not likely to visit my shop why not? This pie chart shows the reasons about people who are not likely to visit my shop and why they are not likely to visit my shop, which shows that 33 percent of the people I interviewed do not like our service, 14 percent of them are just satisfied with other fruits shops currently available, 24 percent of them cannot pay for our service and products and 29 percent are not willing to pay or shop with us. 7. How important is it convenient to you, when choosing my products This pie chart show how important it is convenient for people when choosing my product, which shows that 35 percent of the people I interviewed said that my product are extremely important to them, 20 percent said it is very important to them, 25 percent said it is moderately important to them, 15 percent said it is slightly important to them and 5 percent said it is not important to them at all. 8. Overall are you satisfied with your  experience, shopping with me? This pie chart shows the overall rate of people who satisfied or dissatisfied with shopping with me, which shows that 45 percent of the people I interviewed are Extremely satisfied with shopping us, 20 percent of them are moderately satisfied, 20 percent are of them are moderately satisfied, 15 percent of them are slightly satisfied 0 percent of them are neither satisfied nor dissatisfied, 15percent of them are slightly dissatisfied, 5 percent of them are moderately dissatisfied and 0 percent are extremely dissatisfied. 9. If my new product were available today, how likely would you be to recommend it to others? This pie chart shows the people who are likely to recommend my product to others if it was available, which shows that 19 percent of the people I interviewed are extremely likely to recommend my products to others, 29 percent of them are very likely, 14 percent of them are moderately likely, 19 percent of them are slightly likely and 19 percent of them are not likely at all to recommend my product to others. 10. If my new service were available today, how likely would you be to use it instead of competing service currently available from other companies? This pie chart shows the people who are happy and likely to use my services, which shows that 25 percent of the people I interviewed are extremely likely to use my services instead of competing services from other companies, 15 percent of them are very likely to use my service, 10 percent of them are moderately likely to use my service, 35 percent of them are slightly likely to use my service and 15 percent of them are not likely at all to service my service provided. 11. If you are not likely to use my new service, why not? This pie chart shows people, who are not likely to use my service and why  they are not likely to use it. It shows that 50 percent of the people I interviewed do not need a service like this, 5 percent of them don’t want a service like this, 0 percent of them are satisfied with competing service currently available, 10 percent of them cannot pay for a service like this and 35 percent of them are not willing to pay for a service like this. 12. How important is it convenient for you, when choosing a service this type of service? This pie chart shows how important it is convenient for people when choosing this type of service, which shows that 65 percent of the people I interviewed, said that my service is extremely important to them, 15 percent of them said it very important, 10 percent of the said it is moderately important, 5 percent of them said it is slightly important, and 5 percent of them said that my service is not important to them at all. 13. Overall are you satisfied with your experience using my new service? This pie chart shows the overall rate of people who are satisfied or dissatisfied with my service, which shows that 75 percent of the people I interviewed are moderately satisfied with my service, 0 percent of them are slightly satisfied, 5 percent of them are slightly satisfied nor dissatisfied, 10 percent of them are slightly dissatisfied, 5 percent of them are moderately dissatisfied, and 5 percent of them are extremely dissatisfied with my service. 14. If my new service were available today, how likely would you be to recommend it to others? This pie chart shows the people who are likely to recommend my new service to others if it was available, which shows that 50 percent of the people I interviewed are extremely likely to recommend my new service to others, 15 percent of them are very likely, 10 percent of them are moderately likely, 10 percent of them are slightly likely, and15 percent of them are not likely at all to recommend my new service to others if available. 15. How often will you visit my shop if available, having different variety of fresh fruits and vegetables for sell? This pie chart shows the total amount of people who are willing to visit my shop daily, weekly, monthly, or quarterly, which shows that 71 percent of the people I interviewed are happy to visit my shop daily, 5 percent of them are happy to visit my shop weekly, 10 percent of them are happy to visit my shop monthly and 14 percent of them are happy to visit my shop quarterly. My Target Market My Market target is for the children, Tourist and adults to be aware of the current advice of five portions of eating different fruits and vegetables a day. Because fewer of us know that five portion should come from a variety of sources every day, so that they gain the maximum benefit from fruit, eat it fresh and if the skins are edible, eat them too and also help people balance their vegetable intake between the orange/red and green varieties. Conclusion In this part of my P2 Coursework, I have identified my target market by doing a market research for my business and preparing a questionnaire for my business survey to get people reactions towards my business.

Wednesday, August 28, 2019

Electronic Medical Records Essay Example | Topics and Well Written Essays - 750 words

Electronic Medical Records - Essay Example The objective is to bring out essentials from business hype. These are rated reasonably well in forums (Health Technology Review) While EMR as a terminology gets routinely mixed up with Electronic Health records (EHR's), it is clarified early on that EMR's are different from EHR's. Electronic Medical Records are legal sources of information owned by Physicians and are fed to higher level systems like EHR. So, in our study a Centricity EMR would exchange patient information securely with an EHR like Veterans Health Information Systems and Technology Architecture (VistA) EMR's can be standalone "In Patient" or "Ambulatory systems" facilitating seamless exchange of information. They could be integrated with Practice Management Systems for use in a small practice or scaled adequately for a multi specialty practice. A comparative analysis as in the next section brings out key similarities and features of 3 different EMR systems. eClinicalWorks (eCW) is a leading Scalable Web based EMR system that has capabilities to work in small, mid and large setups. It is extensible and could be integrated with Practice Management systems. As a leader in "In Patient" and "Ambulatory EMR" systems that enhances a physician's ability to exchange information, eCW also decreases a provider's overhead. Physicians could ePrescribe medicines, avoid duplicate prescriptions, reduce costs related to chart pulls, transcriptions, etc. More importantly it offers patient care with accurate information that could be exchanged seamlessly and securely beyond the walls of a clinic or hospital. As per latest information eCW is used by 25000 providers and is well poised to leverage any regulations that may arise from stimulus packages arising out of "The American Reinvestment and Recovery Act of 2009 and the HITECH Act". It is a CCHIT2008 certified product in both ambulatory and child health for its EMR Version 8.0. It complies effectively w ith submission of reports on clinical quality measures. As per usage reports (health technology review), eCW is easy to familiarize with and takes about less time. It supports remote connections to access charts through Virtual Private Network. It can operate in connected and disconnected modes leveraging the latest in technologies. Wireless operations are supported at a provider's desk. A business optimizer helps to generate accurate reports. The user interface is intuitive and easy to navigate. Another competing EMR product is from NextGen Health Information Systems. While this EMR system also meets fundamental meaningful usage criteria like CCHIT certification, ePrescription, secure exchange of patient information and clinical quality measures, it stands out with respect to many others in its use of pre-defined templates catering to multiple practice specialties. This provides additional quality with respect to maintaining standard documentation formats for patient information exchange. Also ePrescription module validates with patient allergies, their existing medications and alerts physicians appropriately. True to its name, NextGen Advantage offers recording facilities for health care outcomes and assists in "Pay for Performance" programs. Its custom work flow

The Cancer Cell Essay Example | Topics and Well Written Essays - 750 words

The Cancer Cell - Essay Example For a long period, it has become clear that cancer frequently impinges on citizens who are above 50 years. Although the youthful populace also gets afflicted with such illnesses, the majority of populace suffering such ailments as cancer is the old populace (Hobson, 2009). Through the following observation, researchers have started to investigate the affiliation between biological procedures that direct disease and aging processes. Researchers have to this point been able to determine the connection between the two. Researchers have substantiated two ways of viewing the correlation between cancer and age. According to the findings provided, are that the forces that cause damage to human genes may be similar to the forces that compel both cancer and aging (Hobson, 2009). Therefore, this suggests that the processes guard against cancer, the genome and permanence. However, the second reason seems to be a bit complex concerning the correlation among the two. Naturally occurring tumor sup pressor molecules prevent the cells from reproducing or regenerating sporadically. The tumor suppressor cell provokes the fatality of the cells through a procedure regarded as apoptosis or it can shut down the cell’s ability to replicate. These two progressions produced by the suppressor molecules serve to protect the people during their reproductive periods. Therefore, as the populace gets older, the molecules abilities to guard the body through the two methods reduce. For this reason, the body becomes vulnerable to cancer attacks justifying the statement that the cancer cases are more extensive in the old people. For the young generation, the susceptibility is markedly reduced through the action of the suppressor molecules. The older people experience corporal changes that augment the probability of disease and disability and which interfere with the body’s ability to withstand cancer threats. Cancer occurs mainly because of any transformations or alterations on the oncogenes, tumor suppressor molecules and microRNA genetic material (Croce, 2008, 502). These modifications are usually somatic procedures, even though origin transmutation can dispose an individual to genetic or ancestral cancer. In cancer, a single alteration may not be sufficient to initiate cancer instead, cancer development is a multistep progression with alterations occurring in oncogenes (Croce, 2008, 502). Oncogenes are proteins that predetermine for the control of cell propagation, apoptosis or even the two processes. These genes are activated by structural transformations that originate from mutations or amplification (Croce, 2008, 503). Chromosomal reorganization, transmutations and gene extension, help in activation of oncogenes presenting an enlargement benefit or amplified continued existence of cells bearing such variations. In cases where, the oncogenes are activated by mutations, the preset protein is altered structurally in ways that allow for its transforming acti on. Myc is a replication regulator and its genes are usually translocated from the original chromosome to another chromosome. Chromosomal translocations help in joining the cellular oncogene together with immunoglobin that are believed to be vital, in the initiation of the oncogenic progressions in the developments of certain cell types. The translocation can be considered essential in essence, that it helps in the study of the means, heredity and biological outcomes of the translocations.

Tuesday, August 27, 2019

Cultural Differences between U.S. and U.K Essay

Cultural Differences between U.S. and U.K - Essay Example Since the paper is written from the perspective of UK Citizen, it is important to first discuss the different characteristics of the country at hand, which is the US.US culture can be termed as a Western culture because the presence of the influence from European countries can be felt. Although initially it was very much like European cultures, it has developed into a separate one, in terms of different music, values, folktales, dialect etc. Initially the culture was also biased towards some races too. Today, however, the US culture has become more and more racially and ethnically diverse because of the presence of people from different regions across the globe. Some characteristics of the US culture are as follows. Although the US has no official language, a majority of the population (in around 30 states) is fluent in English. Other than English, there are more than 300 languages, out of which Spanish is the most famous, that are spoken either by the natives of US or the people who have migrated from different areas around the world. Although US, like UK, has essentially the same language, the dialects are very different in both countries. The English spoken in the US, more commonly known as the American English, is similar to the language spoken in the UK in many ways. But dealing with a language which is similar to one’s own and yet has different turns of phrase, unexpected meanings and unfamiliar nuances is a problem that is often experienced by British who have gone to America and also by many Americans working in Britain. (Doke, 2004) The dialect of UK English is quite firm while that of US English is more informal. Often, for a UK citizen, it is hard to guess what an American is saying because Americans seem to nibble through the words as they speak. Even if the dictionary section is compared, there is a huge amount of difference. Firstly, it seems that Americans make little use of the letter ‘U’ so when the British spell ‘labo ur,’ Americans spell ‘labor.’ The same goes for other words like colour, behaviour, programme, centre etc. There is also a difference in the meanings of different words or phrases that are spoken in everyday language in both countries. For instance, a ‘1st floor’ in the US might mean the ‘Ground Floor’ in Britain. Similarly a ‘fag’ in UK is a term used for cigarettes while in the US; the same word is used for a gay person! (US2UK) It is amazing how the meanings can differ in two dialects of the same language. Folktales Most of the folktales in the US are the result of a very rich mythology of the Native Americans. The folktales are not just simply

Monday, August 26, 2019

Business Policy Essay Example | Topics and Well Written Essays - 3000 words

Business Policy - Essay Example Strategic management is a complex process which has the following steps: Establishing the strategic intent: Strategic intents include defining the ‘mission, vision and the objective’ of the organization. Vision is that broad spectrum where the organization wants to go. It signifies what the organization wants to achieve. It is the long term goal which the organization wants to achieve. It is the purpose of the business. The vision of the company should be very clear so that the company could identify where it is heading to. Good visions can inspire and exhilarate the employees as well as the management. Mission statement links the organization with the society. It states why the company exists. Mission statements comprises of a set of activities which are related not only with the individual but also with the global and national needs and priorities. Mission statements should be short but clear, feasible and distinctive and should motivate the employees as well as the cu stomers. They must feel that working in that organization is worthwhile. The mission statement signifies how the company can achieve the objectives. Objectives can be defined as the set of targets which the company has to achieve in a given period of time. These are the short term goals of the organization. Objectives are specific compared to goals which are more general in nature. The organization’s vision is achieved through its objectives. It enables the management to concentrate on those areas where strategic decisions should be taken. Objectives should be clear and precise, time bound, measurable, achievable, challenging and should be made keeping in view the available recourses. All the objectives must correlate with each other. Strategy formulation: Once the vision, mission and the objective of the organization is determined the next step is to formulate the strategy. Strategy formulation involves deciding on the strategies which are to be implemented to achieve the or ganizational objectives. Formulation of strategy starts with scanning the environment. Environment includes both internal as well as the external environment affecting the organization. These environmental factors are then analyzed through various techniques; these are SWOT analysis, PEST analysis, Porter’s five force model etc. SWOT analysis enables the company to analyze its strength and weakness and also the opportunities it have and the threats it is facing. It is very important tool in making strategic decisions. PEST analyses the various political, economic, social and technological factors affecting the organization. After this the organization decides upon the corporate level strategies that is whether they have to integrate its activities or diversify. Decisions are taken on whether there will be vertical diversification that is a new product should be made or not, horizontal diversification that is whether the company should make a new brand or merge with someone to make that product or they shall outsource the work to some organization. In case the company is incurring loss then the company has to decide on the options of retrenchment, selling a part of the company that is divesture or whether they should liquidate the

Sunday, August 25, 2019

Singapore Prosperity Case Study Example | Topics and Well Written Essays - 250 words

Singapore Prosperity - Case Study Example Singapore has ultimately risen above all odds to become one of the world’s Economic power houses. It has been used as a bench mark of economic analysis across different parts of the world. However, of great importance is to focus on the several aspects that have contributed to this splendid success in almost all spheres of the Singaporean society. After forty years of economic reconstruction, Singapore has attracted the interests of not only economic analysts but also global investors that do not hesitate to invest in the island nation.Economic growth occurs at the predisposition of a conducive investment environment. The government definitely has a hand for the attainment of this conducive environment. This brings us to the analysis of the government structure and how its policies in one way or the other has contributed to Singapore’s spectacular economic growth. The people’s Action party has been greatly accredited of transparency, accountability and effective management not to forget sound policies that have been put in place to foster remarkable growth. Having only been ruled by just one party since independence, an aspect of stability has been initiated in the Singaporean political system which extremely puts great focus to economic growth rather than political destructions. It has developed policies that encourage domestic trade without much interference to the several foreign investors that have played a key role in its immense growth. Leadership transition has been peaceful playing a great role in stability making it a high affinity destination for investors. Singapore’s effective policies and able leadership was witnessed during the climax of the worst ever global recession that even shook economic giants such as the United States. The prime minister fostered bank lending of which the government also contributed without much interference to its GDP.Within no time after the introduction of this measures, Singapore bounced back to its economy fact living other economic titan states in the turmoil. Contrary to the common perspective that the private sector has got leverage over public enterprise, Singapore has stood the test of time to prove otherwise. It goes against the popular notion and treads its own economic course which baffles both its admirers and Critiques

Saturday, August 24, 2019

Public Finance Essay Example | Topics and Well Written Essays - 3250 words

Public Finance - Essay Example Effective tax system aims at complementing government’s budget plans. Any shortfall in tax collection will lead to budget deficit that will lead to fiscal deficit. High government debt is detrimental for economic prospects of a country. It signifies weak federal structure which will affect foreign investment. Foreign investors look out for stable economies to invest their money which will yield higher returns. Governments of different nations aim at promoting its export sector to boost its foreign exchange earnings. Thus, an effective tax system would look to compensate for the high subsidy bill that is given for promoting underdeveloped and export oriented sectors. Tax system across the world are categorised in three ways i.e. regressive, proportional and progressive. In general taxes are levied on individuals and businesses. Government usually impose a certain percentage or slabs to determine the taxability of individuals and companies. There is another classification for taxes which is based on the impact and incident of taxation. It is direct and indirect. Direct taxes imply where the impact and incident is on the same individual and which cannot be shifted. Income tax, corporation tax are examples of direct taxes. Whereas consumption tax, excise duty, customs are indirect taxes. Such taxes have different points of impact and incident i.e. the burden of the tax can be shifted from the producers to consumers. In certain countries an amount is deducted from the income of individuals towards insurance contributions like NIC in UK (James, 2009). There are certain features that are attributed to the tax system to ensure equity at all levels. Governments across the world usually follow either of the three tax systems i.e. regressive, proportional and progressive. Fiscal authorities design the tax structure in a way that ensures a balance between savings and expenditure. It is a major trade off for the

Friday, August 23, 2019

Explaining a Concept Research Paper Assignment Example | Topics and Well Written Essays - 1000 words

Explaining a Concept Research Paper - Assignment Example rism because there were differences in believes and opinions amongst its members because of the liberation movements that were occurring all over the world, and the right to self-determination. Because of the emergence of these differences, it was very difficult for the UN to come up with a single definition of the term terrorism. A term that is acceptable to all the countries forming the United Nations, and one that is legally binding to all the states that form the United Nations. Despite the inability of the UN to come up with a single definition of the term terrorism, the International Community has developed a series of definitions to depict the various forms of terrorism, criminalizing them in the process. In condemning terrorism attacks in various parts of the world, the UN General Assembly usually use a political description to the term terrorism (Fisher, 15). According to this political description, terrorism is a criminal act whose intention is to create a situation of terror to the public, a particular individual, or a group of individuals for political reasons. These acts are unjustifiable, no matter the philosophical, political, religious, or ethnic reasons given to justify the terrorist act under consideration. Scholars denote that it is possible to define the term terrorism by analyzing its var ious characteristics. The following are the various characteristics of terrorism; A definition by Fisher (26) stresses the importance of tactical and psychological aspects of terrorism. According to this definition, terrorism is a political violence, which occurs in an asymmetric conflict, designed to create psychic fear, and terror. This will occur by violently victimizing and destroying non-combatant areas/ targets. Through such activities, the terror group will be sending a message to the government or relevant agencies concerned about their demands and desires. On this note, terrorists aim at exploiting the media, with the intention of achieving maximum

Thursday, August 22, 2019

Promoting the Integration of Therapeutic Touch in Nursing Practice Essay Example for Free

Promoting the Integration of Therapeutic Touch in Nursing Practice Essay 1. Describe the patient group in the study. English speaking adults with Dx of cancer expected to be on the unit the day following the intervention, whose medical conditions did not preclude their ability to comfortably receive TT or participate in the interview, and were able to give informed consent; 34 patient-participants completed the research process (16 women and 18 men), age range of 22 to 77 with an average age of 52 years 2. What was their health problem? Bone marrow transplant Patients. The focus of the study? Explore the experiences of nurses and patients on an inpatient oncology and bone marrow transplant unit when nurses had time preserved for exclusive offering of TT. 3. Who was providing the care? Two staff nurse-interventionists who were experienced and participated in TT education, and three nurse-interviewers who discussed the TT intervention with patient-participants the day following TT treatment. 4. What was the setting for the care? The study was conducted in an academic medical center on a 26 bed hematology/oncology in patient unit with bone marrow transplantation program. 5. What were the findings? 1) TT is a vehicle for comfort, caring, and presence that creates possibility and healing 2) TT invites a shift from disease-state focus to personhood focus that is freeing and reawakens the essence of nursing 3)TT is an intervention that illuminates the transformative power of nursing theory-research-practice. 6. What were the recommendations? Having a complementary nursing strategy, such as TT, that allows nurses an additional way to offering care that facilitates comfort, assists with anxiety reduction, and enhances sleep is of major significance. 7. How practical/useful is this information to a practicing nurse? I am not sure how practical TT is. First, you would have to have additional staff to allow for the time to educate seasoned nurses in TT and then to perform TT on the patients. You would also have to have the support of the administrative staff. However, I do believe that laying on of hands is an effective therapeutic tool. 8. What I wonder is†¦.. would there be a similar outcome in other specialty areas that patients have not had the opportunity to establish a trusting relationship with the nursing staff prior to TT.

Wednesday, August 21, 2019

Social Movements Essay Example for Free

Social Movements Essay Social movements are created by groups of people who are connected through their shared interest of affecting social change. The United States of America was founded a social movement. Colonists used rallies, boycotting goods, violence, and protest to break away from Englands monarchy and create their democracy. It could be said that US democratic agency is a product of protest. As Donna Lieberman would agree, that democratic agency thrives when the people have the right to voice their opinions. A significant amount of social movements go on in the United States. I feel that our right to exercise freedom of speech is what creates social change. The United States was founded by revolution and continued to have social movements to bring fourth much needed change. This is demonstrated through events like Shays rebellion, the civil war, the civil rights movements, suffrage and feminist movements, prohibition, Vietnam war backlash and LBGTQ movement. The United States democracy is for the people, by the people which is translated as the people hold the power of the country. The people have the right of speech, press, religion and petition according to the first ten amendments. This is significant because when the constitution was being created there were individual who spoke up in favor of giving freedom to the citizens. The founders of the country knew that making the laws of land flexible was in the only way to keep the citizens from revolting like the colonists did to English rule. It was this dissent that created changes in the drafting of the Constitution. The first amendment is the right of speech, press, religion and petition. By being the first amendment it stresses the importance of opinion and gives the right of expressing difference. Democracy is then fueled by the first amendment because freedom of protest, speech, press and religion is how the government creates changes of policy. For example, Plessy v. Ferguson case in 1896, the Supreme Court ruled in favor segregated public facilities under the doctrine of separate but equal. Fifty Eight years later, the Supreme Court case Brown v. Board of Educated overturned separate but equal and paved the way for desegregation of schools and other institutions. This is only one example but there are hundreds in through history. Events like Rosa Parks refusal  to give up her seat or individuals representing the 99% occupying Zuccotti Park are catalysts of social change and strengthens the democratic process. Donna Lieberman says that, what is vital for democracy is the freedom to protest. Only when everyone has the right to speak out can a democracy thrive. This point seems to be evident because if the people of a democracy cannot voice the opinion how could the officials know how to represent and govern in accordance with the values and needs of the people. It was the voice of Harvey Milk that gave attention to the rights of the gay community and changed a tiny portion of San Francisco legislation. Sadly, even the assassination of Milk represents opposition to the change but, also strengthens the LBGTQ community goal of political involvement and rights as citizens. Voices of the people move the government hand on creating policies that affect the country. When women rallied together for the right to vote, it caused the government to give it to them. Albeit, the government does not always listen to the people. For instance, President Bush met opposition when he decided to invaded Iraq. Some Americans believed that because of the 911 tragedy war was necessary and others believed it was unnecessary loss of lives. Regrettably war was the outcome but this gave way for the upcoming politicians to use the anti-war sentiments to get votes. Dissent why democracy works because it creates change of laws or change of political party. Donna Lieberman argues that, And the test of our democracy is the protection we offer not to the protests we like, but how we treat those we find offensive be they the Nazis in Skokie or the Klan. This is a valid point because the first amendment gives every individual the right to speech, press, religion, and petition. Any violation of the first amendment is unjust. By letting both sides express their opinion it allows people to come to their own conclusion about what it good for change. It would not be fair for only one side to be heard. Case in point, the south was allowed to voice their opinion about the rights of blacks via de-jure segregation but, it was the voice of African Americans could not be muted and this created equal rights legislation. All First Amendment exercises those that work and those that dont have shaped our history, made it better, and are crucial to how we come to understand ourselves as a people. The hateful voices of West Boro Baptist church are needed to understand and gauge the importance of LBGTQ rights. Offensive protests are useful in gaining numbers in support of the defensive. Offensive protests allow people to pick a side and start pushing for changes. Offensive protests should be allowed because it is a first amendment right. I do believe that protests whether offensive or not are the reason there are social movements. If there was not dissent how then could society move forward. Society would not be able to change. It would be stuck, it would not be the advanced society we know today. We will still have slavery, women would have no rights, children would be working in sweatshops, and homosexuals would be mass murdered. By seeing opposition, it gives rise to stronger social activism and changes for the country. It allows the government to be run for the people by the people which is the true meaning of democracy. In retrospection, it makes the country know where it comes from and maybe not to where it is heading but, it shows us that our voices can determine where we go from here.

The Advantages And Disadvantages Of Operating Systems Information Technology Essay

The Advantages And Disadvantages Of Operating Systems Information Technology Essay Level of involvement is one of the characteristic of honeypot and this level of involvement is used to measure the degree of interaction of the attacker with the operating system. Commonly a low-involvement honeypot will provide certain fake services [Spi01] and these services can only be implemented if somebody listen on a specific port. It is not possible to catch complex protocols communication with such a simple solution. An SMTP handshake will not give much useful information because an answering service is not listening. On a low-involvement honeypot there is no real operating system on which the attacker can operate and this will minimize the risk as there will be no complexity of the operating system. This is a disadvantage as it is not possible to watch an attacker interacting with the operating system. Role of this low-involvement honeypot is very passive as it is like a one-way connection in which we can only listen, but we do not ask questions ourselves. Figure 5.1: Low-involvement honeypot: A low-involvement honeypot does reduce risk to a minimum by minimizing interaction with the attacker Both low-level involvement honeypot and passive IDS are comparable as both the systems will not alter any traffic or interact with the attacker or the traffic flow. If the incoming packets match their patterns they are used to create logs and alerts. 5.1.2 Mid-involvement Honeypot A mid-involvement honeypot provides more interaction, but doesnt provide a real operating system. The fake daemons have deeper knowledge about the particular services they provide and are complicated. And risk will also increase. As the complexity of the honeypot increases the probability of the attacker to find the security hole or vulnerability is getting bigger. As there are no boundaries for the security and logging mechanisms built for this kind of events, a compromise of this system is still unlikely and certainly no goal. In the higher level of interaction, there is a possibility of more complex attacks and can be logged and analyzed. In general, the attacker has more possibilities to interact and probe the system and gets a better illusion of a real operating system. It is complex and time consuming for developing a mid-involvement honeypot and special care has to be taken for checking the security as all developed fake daemons must be as secure as possible. The developed versions must be very secure than their real counterparts, because this is the main reason to substitute these with fake variants. As each protocol and service must be understood in detail the knowledge for developing such a system must be very high. Figure 5.2: Mid-involvement honeypot: A mid-involvement honeypot does interact with the user in a minimal way 5.1.3 High-involvement Honeypot A high-involvement honeypot consists of an operating system and this leads to a much higher risk as the complexity increases and also at the same time, the possibility for gathering information, the possible attacks and the attractiveness increases a lot. One of the goal of the hacker is to gain root and to have the access to a shell,connected to the Internet 24/7. Such an environment is offered by high-involvement honeypot. As soon as a hacker gains the access, his real work and the interesting part begins. To get this level of freedom the attacker has to compromise the system, and then he will have the root rights on the system and can do everything at any instance on the compromised system. According to se, this system is not secure and even the whole machine cannot be considered as secure. This doesnot matter if he is in a sandbox, in a jail or a VMW box as there can be ways to get out of these software boundaries. Figure 5.3: High-involvement honeypot: A high-involvement honeypot has great risk as the attacker can compromise the system and use all its resources. This honeypot is very time consuming and the system should be kept under observation most of the time. If a honeypot is not under control then it is not of much help and it can become a danger or security hole itself. As the honeypot can be used by the blackhats as if its a real compromised system,it is very important to limit a honeypots access to the local intranet. As the danger once a system is fully compromised can b e reduced, limiting outbound traffic is also an important point to consider. If a full operating system is provided to the attacker, he can upload and install new files. As all actions can be recorded and analyzed, here a high-involvement honeypot can show its strength. One of the main goals of a high-involvement honeypot is to gather new information about the blackhat community and legitimates the higher risk. 5.1.4 Overview There are advantages and disadvantages of each level of involvement. Table 5.1: Overview of each level of Involvement advantages and disadvantages The danger is reduced as much as possible by choosing the lowest as possible risk honeypot. While choosing a honeypot and its level of involvement the required maintenance time must be considered. Honeynets are another possible honeypot architecture. 5.2 HONEYNETS NETWORK TOPOLOGIES Here the discussion is regarding the placement of honeypots in a network and a special, more complex version of honeypots which can also be called as honeynet. 5.2.1 Honeypot Location A honeypot does not require a specific environment to live as it is a standard server with no special needs. A honeypot can be placed anywhere a server is placed but some places are better for some approaches than others. Based on the service required, honeypot can be used on the internet as well as on the intranet. If the detection of some bad guys in a private network had wished it would be better to place a honeypot on the intranet which can be useful. Since this system can easily be compromised without immediate knowledge, it is important to set the internal thrust for a honeypot as low as possible. A honeypot can be placed at two locations with Internet as the main concern:  · In front of the firewall  · Behind the firewall (intranet) There are advantages and disadvantages of each approach. Because of the fact that placing a server in front of a firewall is simply not possible or not wished it is sometimes even impossible to choose freely. 5.2.1.1 In Front of the Firewall The risk for the internal network does not increase by placing the honeypot in front of a firewall. Behind the firewall the danger of having a compromised system is eliminated. This can be a problem if no additional firewalls are being used to shield some resources or if the IP is used for the purpose of authentication. A lot of unwished traffic like portscans or attack patterns will be attracted and generated by a honeypot and by placing a honeypot outside the firewall such events does not get logged by the firewall and an internal IDS system will not generate alerts. Or else, lot of alerts will be generated on the firewall or IDS. The biggest advantage of the firewall or IDS and any other resources, is that they need not be adjusted as the honeypot is outside the firewall and viewed as any other machine on the external network. Therefore if a honeypot is running it will not increase the risk of the internal network nor does it introduce new risks. If the honeypot is placed in front of the firewall then internal attackers cannot be located or trapped that easy, particularly if the firewall limits outbound traffic and therefore limits the traffic to the honeypot. 5.2.1.2 Behind the Firewall New security risks to the internal network can be introduced by a honeypot behind the firewall, in particular if the internal network is not secured against the honeypot through additional firewalls. A honeypot provides a lot of services; most of them are not used as exported services to the Internet and are blocked by the firewall. It is inevitable to adjust the firewall rules and also the IDS signatures by placing the honeypot behind the firewall, as it can be wished not to generate an alert every time the honeypot is attacked or scanned. If internal honeypot is compromised by an external attacker the biggest problem will arise. He can then access the internal network through the honeypot. This traffic will not be stopped by the firewall as it is regarded as traffic to the honeypot only, which in turn is granted. It is mandatory for securing an internal honeypot, in particular if it is a high-involvement honeypot. The main reason for placing a honeypot behind a firewall is to detect internal attackers. By making use of the internal honeypot it is possible to detect a mis-configured firewall. It is not possible to place a honeypot in front of a firewall sometimes because no external IPs are available nor access to the network in front of the firewall is possible. 5.2.2 Honeynets A honeypot is a single machine which is used for running multiple virtual operating systems. As the traffic goes directly on to the network it is not possible to control the outbound traffic. Preliminary firewall can be used to limit outbound traffic. Such a complex environment is honeynet. Multiple honeypots and a firewall (or firewalled-bridge) to limit and log network traffic is contained by a typical honeynet. To watch the potential attacks and decode and store network traffic on the preliminary system an IDS can be used. Figure 5.5: Different types of honeypot topologies: Simple honeypot, honeynet and a virtual honeynet If a firewall is placed in front of a honeypot (or multiple honeypots) the risk based on the honeypot can be reduced. Both the inbound as well as the outbound connections can be controlled; it is possible to control the network flow. As logging of network traffic can be done on one centralized location for all honeypots it is very easy. The data that is captured need not be placed on the honeypot itself and the risk of this data detection by an attacker is eliminated. More hardware is required by introducing new machines to the honeypot itself. Only one machine solution is thinkable. It is possible to set up multiple virtual systems on a physical machine by making use of Virtualization software. By this attempt, a firewall can also be placed on the same machine as all virtual honeypots but the security of this solution is not that good compared to different physical machines. If the honeynet is a virtual environment, the attacker could be able to break out of the virtual machine and the system could be compromised. As the attacker cannot see the bridge it is safe to place the bridge with firewall capabilities in front of a honeypot. As the bridge has no IP it is not possible to attack the bridge and therefore no attack point exists. There is complexity of the environment raised when additional hardware is introduced. In order to provide best security networking and associated tools must be understood.

Tuesday, August 20, 2019

The Australian Legend and Feminism :: essays research papers fc

The Australian Legend And Feminism Until recent years it has been believed that there are two sexes, being male and female, and with these there are two genders, with these being masculinity and feminity. It may also be argued that sex is biology determined where as gender is socially and culturally constructed as studies of societies, both present and past, have shown that there is no relationship between social roles and biological sex (Abercrombie, Hill & Turner, 2000). With the introduction of post modernist feminist theories we have begun to question whether or not there are only two genders and how to classify transgender (Flax, 1990). It can be argued that masculinity has socially and culturally been constructed as dominant within the public world. In western countries, such as Australia, it is upon men that â€Å"autonomy, control over the world and mastery of others† (Porter, 1998, p. 27) has been placed. Parsons (Porter, 1998) suggested five alternative sets of positioned values which are structured as being either expressive or instrumental. Parsons (Porter, 1998) was of the belief that men embodied the instrumental values of affective neutrality (capable of unemotional and impersonal interaction), self-orientation (primary pursuit of own interests), universalism (making objective evaluations when interacting with others), achievement (ability to achieve set goals and related status) and specificity (interacting or working within a specific role). Parsons theorized that these five instrumental values were associated with western ‘advanced’ societies (Porter, 1998). In Australia, women and children are seen to be subservient to the male superiority. Parsons (Porter, 1998) believed that women embodied the expressive values of affectivity (highly emotional), collective orientation (putting others interests before your own), particularism (responding differently towards different people), ascription (having status ascribed regardless of intrinsic qualities), and diffuseness (role covers a wide range of interests and is non-specific). To Parsons these roles were seen to belong to primitive society and in modern times were to be associated with women and private life (Porter, 1998). These roles have been reinforced through popular media, for example by the bible which is the worlds’ best selling and most distributed book (Guinness World Records). Within the bible the word "man" may be found 5,335 times in 4,536 verses whilst â€Å"woman† may be found 379 times in 347 verses (Christ Unlimited Ministries, n.d.). Passages of the bible may also reinforce the notion of male superiority for example in Genesis 1:26-28 (Christ Unlimited Ministries, n.d.) which tells of god creating Adam in his own image and then creating for Adam a helper, Eve, whom God calls Woman as she is created from the rib of man.

Monday, August 19, 2019

A Comparison of Hamlet and The Turn of the Screw :: comparison compare contrast essays

Hamlet vs. The Turn of the Screw    Although Hamlet and The Turn of the Screw are very different works, both William Shakespeare and Henry James use the themes of love and ghosts to complicate their work. By having these themes, both authors make the readers question and wonder if the accounts the characters are having really exist. Are these two main characters, Hamlet and the governess , mentally ill or does the stories explain their actions?    The most obvious commonality, between Hamlet and The Turn of the Screw, is the use of ghosts. On one hand, Hamlet speaks with the ghost of his father, Hamlet. When Hamlet firsts sees the ghost he asks, "Be thou a spirit of health or goblin damned,/ Bring with thee airs from heaven or blasts from Hell,/ Be thy intents wicked or charitable," (I. 4. 40-42). When Hamlet finally meets the ghost and converses with him, the ghost creates a problem that lasts throughout the whole play. On the other hand, the governess sees the two deceased workers, Peter Quint and Miss Jessel. These ghosts also create a problem. Speaking with Mrs. Grose, the governess tells her there was a ghost. After Mrs. Grose asks what the ghost wants, the governess says, "Heaven forbid! The man. He [Quint] wants to appear to them [the children]." Are the ghost real? Do the children see the ghosts and lie?    In both works, love also plays a role. Hamlet's love, Ophelia, sees Hamlet at his worse. To make the people around him think he's crazy, Hamlet visits Ophelia and acts mad. When speaking with her father, Ophelia says, "Lord Hamlet, with his doublet all unbraced,/ No hat upon his head, his stockings fouled,/ Unaltered , and down-gyvà ¨d to his ankles," (II. 1. 77-79). Soon, his mother and the king think Hamlet is insane. Is Hamlet really crazy? In The Turn of the Screw, the ghosts appear to the governess while she is thinking about the master, her infatuation, or his heir, Miles. The governess states, "...the only way to be sure he knew would be to see it, and the kind light of it, in his [the master`s] handsome face" (James 23). Suddenly Peter Quint appears in a high window. A Comparison of Hamlet and The Turn of the Screw :: comparison compare contrast essays Hamlet vs. The Turn of the Screw    Although Hamlet and The Turn of the Screw are very different works, both William Shakespeare and Henry James use the themes of love and ghosts to complicate their work. By having these themes, both authors make the readers question and wonder if the accounts the characters are having really exist. Are these two main characters, Hamlet and the governess , mentally ill or does the stories explain their actions?    The most obvious commonality, between Hamlet and The Turn of the Screw, is the use of ghosts. On one hand, Hamlet speaks with the ghost of his father, Hamlet. When Hamlet firsts sees the ghost he asks, "Be thou a spirit of health or goblin damned,/ Bring with thee airs from heaven or blasts from Hell,/ Be thy intents wicked or charitable," (I. 4. 40-42). When Hamlet finally meets the ghost and converses with him, the ghost creates a problem that lasts throughout the whole play. On the other hand, the governess sees the two deceased workers, Peter Quint and Miss Jessel. These ghosts also create a problem. Speaking with Mrs. Grose, the governess tells her there was a ghost. After Mrs. Grose asks what the ghost wants, the governess says, "Heaven forbid! The man. He [Quint] wants to appear to them [the children]." Are the ghost real? Do the children see the ghosts and lie?    In both works, love also plays a role. Hamlet's love, Ophelia, sees Hamlet at his worse. To make the people around him think he's crazy, Hamlet visits Ophelia and acts mad. When speaking with her father, Ophelia says, "Lord Hamlet, with his doublet all unbraced,/ No hat upon his head, his stockings fouled,/ Unaltered , and down-gyvà ¨d to his ankles," (II. 1. 77-79). Soon, his mother and the king think Hamlet is insane. Is Hamlet really crazy? In The Turn of the Screw, the ghosts appear to the governess while she is thinking about the master, her infatuation, or his heir, Miles. The governess states, "...the only way to be sure he knew would be to see it, and the kind light of it, in his [the master`s] handsome face" (James 23). Suddenly Peter Quint appears in a high window.

Sunday, August 18, 2019

Essay On Origins Of World War -- essays research papers

The thesis in the article ‘The origins of the World War’, by Sidney B. Fay, can clearly be stated as the explanation for World War I. Fay states that no one country is responsible for the creation of the war. Furthermore, he goes on to explain that each of the European country’s leaders did, or failed to do ‘certain’ things to provoke the other countries into a war. Fay states, â€Å"One must abandon the dictum of the Versailles Treaty that Germany and her allies were solely responsible. It was a dictum exacted by victors from vanquished, under the influence of the blindness, ignorance, hatred, and the propagandist misconceptions to which war had given rise.† (Fay, The Origins of the World War). His main arguments are his explanations of how each country was responsible for the creation of the war. His first explanation is that of how Serbia was partly responsible. Fay explains that Serbia knew that by not co-operating with the Austrian governm ent over the implications of the Archduke Francis Ferdinand assassination they were indirectly preparing for a war they would fight but did not want. Fay says that Austria was more responsible for the war than any other power but not in military attack, but more in the form of self-defence. He makes it clear that Austria was justified in their battle and that they didn’t have to, â€Å"sit back and await the dismemberment at the hands of its neighbors.† (Fay, The origins of the World War). Fay believes that Berchtold wanted a local war with Serbia but knew and was content with the fact that the rest of Europe could very easily become involved with the war. Fay’s third country’s explanation was that of Germany. He believed that Germany did not want a war and tried to avert one completely. It is his belief that since Austria was Germany’s only dependable ally, they were dragged into the war. Furthermore, he explains that Germany’s geographical location, being in the middle of the conflict between France and Russia, they had little choice in the matter and had to defend their territory as well as Austria-Hungary’s. Fay’s fourth country and major power discussed, was Russia. He believed that Russia supported Serbia because of the frequent guidance and encouragement given at Belgrade, and if a war were to break out they would more than happy to fight along with the belief of France and Britain helping out. Furthermore, at the same ... ...to win this continental war, if it was to come to that. They also in turn had the belief that ‘France may panic, and advise peace’. This would have been a diplomatic win in the German’s books. This would have ‘split Russia from France and isolate both without war’. Although this second point was believed to be unlikely by the German’s it still was a happy, and reassuring possibility. Fischer then went on to say that Hollweg told Bulow that any war that was to occur would last at the most three to four months. Hollweg then went on to explain the possibilities of a ‘friendly relationship’ with England, and then through England, a similar friendship with France. He then stated that this would bring forth a triple alliance with England, France, and Germany all extinguishing the existence of Russia, which would easily threaten the civilization of Europe. Fischer then concludes his essay in Hollweg’s address to the Central Com mittee of the Reichstag at the beginning of October during the ever increasing debate on the unlimited submarine warfare. Fischer states that, â€Å" †¦ this outlines Germany’s real guilt, her constant over-estimation of her own powers, and her misjudgment of realities.†

Saturday, August 17, 2019

A Case Study Bank Of China And Hsbc, London

China’s rapidly developing economy is dependent on a banking industry which is controlled by the state. The four public banks of China and the People’s Bank of China have a strong hold over the country’s financial system. The advent of China in WTO in 2001 and globalization has led to a felt need for transformation in the Chinese economy to integrate it with the global economy. The financial sector will need to support this change. An assessment of the state of the Chinese banking industry at present and its future growth is therefore essential.Ideally this can be achieved by benchmarking a Chinese bank and a European Bank, for which purpose a case study of Bank of China and HSBC, London has been carried out. The aim of the research is therefore to undertake an analysis of the Chinese banking systems, processes and products through a case study of the above mentioned banks while the objectives of the research indicate assessment of the overall state of the Chines e banking industry, evaluate implementation of various processes and systems and highlight the areas for growth. A deductive – inductive approach with emphasis on case study has been adopted for the research.Apart from extensive secondary research through literature survey, a detailed questionnaire has been administered to 40 clients across a wide cross section of personal and corporate customers of Bank of China and HSBC, London which has formed the key primary resource for the research. A review of the research sources and questionnaires has revealed that Bank of China has been able to quickly adapt itself to the changing requirements of a globalised financial environment and is providing both personal as well as business banking services to meet its customer’s requirements.HSBC which considers itself as the World’s local bank is providing a complete package of services to the corporate as well as personal client and has been successful in implementing the sam e throughout the World. Its initial forays into China have also underlined the success story. The quality of service in both the banks was seen to be similar, however HSBC provided better follow up and also more services on the internet than Bank of China. The growth trajectory of both the banks indicates that, while HSBC is attempting to grow throughout the World; Bank of China is growing primarily within the Chinese banking system.There are a number of areas for improvement identified in the research which could well be undertaken by Bank of China to include greater efficiency and better customer service, improvement in technology and customer follow up and exploitation of niche areas such as credit cards. The entry of foreign banks will see greater competition in the Chinese banking sector. The need for Chinese banks to adopt global practices is also underlined and it is anticipated that the entry of more global banks as HSBC in China will provide the impetus to this growth.ANALY SIS CHINESE BANKING INDUSTRY SYSTEMS, PROCESSES AND PRODUCTS: A CASE STUDY BANK OF CHINA AND HSBC, LONDON Chapter 1 – Introduction China is a rapidly growing economy which is considered as a model for emerging countries all over the World. The dynamism of an economy lies in an efficient and effective financial system led by the banking sector. The impact of the banking sector on economic growth in China and its contribution to public life has been a matter of debate over the years.China has a banking system which is controlled by the State and thus has a very large influence on the economy. Exclusively controlled by the central government, the four state banks and People’s Bank of China have a very strong hold over the financial system both internally and externally. (China’s Economic System, 2004). However the rapid growth of China towards a socialist market economy has been affecting the banking sector in various ways and Chinese banks have undertaken measures to enhance their efficiency and contribute effectively to the economy.China’s entry into the WTO in 2001 has also necessitated adoption of liberalized norms in line with the global banking and financial industry. To what extent China has been able to adapt these new practices and how these are affecting or likely to affect the growth of the Chinese economy is an issue of great relevance. As China’s economy gets increasingly integrated with the global economy, its financial markets will have to support this union. It is therefore essential to assess the state of the Chinese banking industry at present and its trajectory of growth in the future.A case study approach to this issue is considered relevant for which Bank of China and HSBC, London are selected for review of the systems, processes and products to provide an insight of the financial needs and their fulfillment today and tomorrow. Bank of China is one of the principal banks in the country; it is one of the four banks which are owned by the State in China. (About Bank of China,. 2006). It has been a key central bank of China which has carried out international exchange as well as provided funds and been a point for foreign trade in the country over a period.It conducts a wide variety of services including commercial banking, insurance as well as investment banking. It is one of the largest banks in Asia and has been placed at the 18th position by the Banker Magazine in 2005. (About Bank of China,. 2006). It also has a large overseas presence in 27 countries. The systems, processes and practices followed by the Bank of China would be a good indicator of the state of the Chinese banking industry in both its internal and external dimensions. HSBC is an epitome of a modern bank.Based in London, the Bank had its origins in provision of finance for trading with China in the 19th Century. After China adopted a nationalist communist economy and banking system, HSBC’s presence in the country was limited. However the bank has now retuned with a vigor and strives to make inroads in the highly competitive financial sector where banks with a state monopoly are said to enjoy unprecedented advantage. The Bank is also taking benefit of its old legacy and is already earning profits to the tune of $ 161 million for the first half of 2005.(Schuman, 2006). HSBC in some ways can be seen to be a competitor to the Bank of China, though its reach within China is limited to only 20 branches. (Schuman, 2006). The investments made by HSBC in Chinese financial sector are reported to be $ 4 billion and include almost one fifth stake in China’s fifth largest bank, Bank of Communications and its second largest insurance company, Ping An Insurance with which the Bank of China too has many contracts.A comparative analysis of BOC and HSBC would thus provide us an effective understanding of the state of the banking industry in China in all its operational facets. The dynamic nature of th e research will entail application of a deductive-inductive approach which in practice is adopted by a number of similar research projects keeping in view the importance of both qualitative and quantitative findings. Aim and Objectives. The aim of the research is to undertake an analysis of the Chinese banking industry systems, processes and products through a case study of Bank of China and HSBC, London.Objectives. The research objectives are as follows :- 1. Assess the overall state of the Chinese banking systems, processes and products. 2. Evaluate implementation of systems, practices and processes of the modern banking industry. 3. Evaluate areas for further growth and development by Chinese banks. Chapter 2 – Research Methodology This chapter aims to illustrate the methodology of the research. It describes; common research philosophies, research approaches and the research strategy.Veal (2000) has described research as â€Å"systematic and careful inquiry and search for the truth† or an investigation into a subject to discover facts. What is Research? Research is a well defined area of study of a particular problem or issue in its totality or in specific to a particular area of concern. (Veal, 2000). Research should entail the following characteristics, which will be kept in mind by the author while evaluating the subject (Morgan, 2000):- (a) Systematic collection of data.(b) Analytical interpretation of data. (c) Developing a theory and conclusion. The Research Philosophy Modern research has three models; these are positivism, realism and interpretivism. (Cantrell, D. C. (n. d. )). Positivism Positivism entails a scientific stance for research and interpretation of data. Thus only those phenomenon which are observable and measurable are regarded as knowledge. Positivists maintain an independent and objective stance. (Cantrell, D. C. (n. d. )). Phenomenology (Interpretivism)This is opposite of the positivistic approach and is known as interp retivism or phenomenology. (Cantrell, D. C. (n. d. )). Though positivistic and interpretivism paradigm are two extremes, most researchers use elements of both practices, which is implied in realism. This approach is considered the most appropriate for the project as the writer will be carrying out a comparative analysis of the Chinese and the British Banking system with a case study of the Bank of China vis a vis HSBC, London.Since banking systems are not just financial and economic systems but involve social issues in the context of a broader socio-political environment, a realistic approach to research is considered the most suitable. Research Approach There are two strands, which can be adopted, deductive and inductive. The deductive approach is used when a hypothesis is developed and the research design has to test that hypothesis. The deductive approach is amplified by means of a diagram at Figure 1 (Trochim, 2000). –

Friday, August 16, 2019

Henkel: building a winning culture Essay

Introduction: CEO in 2008: Kasper Rorsted, Studied Economics and has experience in technological companies. Management style was based on face-to-face conversations and pushing for more efficiency. Henkel until 2008 Founded in 1876 as a producer of detergent, by 1920 it was a leading German detergent en glue producer. After WWII: company restarted as a producer of detergent, glues and personal care products. In 2008: 14 billion euros sales over 125 countries: EMEA: 64% North America: 19% Asia-Pacific: 11% Latin America: 6% Executive team mainly Germans and members of the Henkel Family 3 major business units: Adhesive Technologies (48%) Laundry and Home care (30%) Cosmetics/Toiletries (22%) Competition: P&G, Unilever and L’Oreal (See exhibit 1,2,3) 2012 Goals; 14% EBIT Margin 2008: 14 billion in sales (+8%) EBIT-margin (10,3%) => no competitive spirit?! (â€Å"The happy underperformer†) 2nd part of 2008: Financial crisis: Price increase by Henkel => growth in all the business units fell. Reaction of Rorsted (CEO): transform the company into a leaner and more performance driven company by setting 4-year financial goals (2012) for Sales growth (3-5%) EBIT-margin (14%) EPS (Earnings per Share) (above 10%) Reaction of the market: they will not make it. Building a winning culture Rorsted knew that the targets were high, but he wanted to get there by installing â€Å"a winning culture† within the company. 3 main strategic priorities: Achieve the full business potential Focus more on the customers Strengthen the global team 2008-2009: investments in top-performing brands and high potential markets: e.g. – Biggest acquisition ever of 3,7 billion euros for the adhesives and electronic material businesses of the National Starch and Chemical Company. – Dial brand: high investments in North-America => top brand in body wash markets. Selling underperforming brands. Searching for cost-efficiencies. 2009-2012: from promise to reality Rorsted: first do the hard things (close plants, lay off people) then the softer things. For the â€Å"softer things† everybody in the company needed to be on board = emotional buy-in. redefining Henkel’s vision and values  implementing a new performance management system Vision and Values Focus on financial goals and priorities => becoming a winning competitor 10 values (see exhibit 5): but they had little meaning inside the company BUT: the CEO Thought they had..2010: Henkel: â€Å" a global leader in brands and technologies† putting customers central value, challenge and reward people drive excellent sustainable financial performance sustainabilitybuild the future on the family foundation They organised workshops all over the company to introduce the employers to these new values. New tagline: â€Å"Excellence is our passion† in early 2011 performance management A lot of employees have careers of over 20, 30 or even 40 years within the company. 2009: new performance management system for 4 layers of management. For each employee there was: 1) the current rating of his  performance and 2) potential performance for the future. These were put in a grid (exhibit 7) with scores going from L (low), M (moderate) to T (Top) For potential performance numbers were used from 1 to 4 with 4 the limit of performance of someone. These rankings were set up during a Development Roundtable (DRT), a collaborative forum with a group head and his direct reports. Afterwards, the results were discussed during a one-to-one with the employee. DRT-processes were done bottom-up. Targets were set about how many employees should be fitted in a certain category. E.g; 5% had to be L => caused a new way of evaluation within the company. Bonus compensation Bonusses were linked to the overall company financial performance, team performance and individual performance. Group performance: KPI (e.g. EBIT,..): 3 per year Team performance: idem Individual performance: Performance on 2 equally weighted individual KPIs Performance from the DRT process.Each manager could get a target bonus as well. A round table discussion with Henkel Executives about the â€Å"Winning culture†.See case.

Thursday, August 15, 2019

Nature vs. Nurture Controversy

The nature versus nurture debate concerns the relative importance of an individual's innate qualities (â€Å"nature,† i. e. nativism, or innatism) versus personal experiences (â€Å"nurture,† i. e. empiricism or behaviorism) in determining or causing individual differences in physical and behavioral traits. The phrase â€Å"Nature versus nurture† in its modern sense was coined[1][2][3] by the English Victorian polymath Francis Galton in discussion of the influence of heredity and environment on social advancement, although the terms had been contrasted previously, for example by Shakespeare (in his play, The Tempest: 4. ). Galton was influenced[4] by the book On the Origin of Species written by his cousin, Charles Darwin. The concept embodied in the phrase has been criticized[3][4] for its binary simplification of two tightly interwoven parameters, as for example an environment of wealth, education and social privilege are often historically passed to genetic off spring. The difference being that wealth, education and social privilege are not part of the human biological system, and so cannot be directly attributed to genetics.The view that humans acquire all or almost all their behavioral traits from â€Å"nurture† was termed tabula rasa (â€Å"blank slate†) by philosopher John Locke, and proposes that humans develop from only environmental influences. This question was once considered to be an appropriate division of developmental influences, but since both types of factors are known to play such interacting roles in development, most modern psychologists and anthropologists consider the question naive—representing an outdated state of knowledge. 5][6][7][8] In the social and political sciences, the nature versus nurture debate may be contrasted with the structure versus agency debate (i. e. socialization versus individual autonomy). For a discussion of nature versus nurture in language and other human universals, see also psychological nativism.

Sports Comparing Them to Now and in the Early 1920’s

Hi my name is Gilbert I was born on September 7th, 1901 and play baseball for the Yankees. I have now been playing on the Yankees for 7 years, since 1921. Baseball for America is our most popular sport and everybody watches it. It is what everybody does and follows their players and team. We players are very skilled and this all comes to us naturally through hard work and effort. We don’t play this game for money and fame; we do it because we love it and put so much passion into it.Hi my name is Peyton Manning I play quarterback for the Denver Broncos. I chose to play here because I got offered to pay the most here. I also decided to play here because the division is going to be easy and I figured it would be easy to win. Football is a great game because it is the sport now that everybody loves in Americas, people love going to games and following their teams and doing stuff like fantasy football. Football takes a lot of skill effort but now days it is driven by money and fame .The similarities in the two stories is that both sports take a lot of effort and skill, the two sports were Americas most popular sport at the time, and lastly both were players that played on the teams. The differences is that the most popular sport used to be baseball now it is football, the players don’t just do it cause they love it, they do it for money and fame. Also some more differences is back in the day players did it naturally and now a lot of times today they use steroids.

Wednesday, August 14, 2019

Assessment Of My Health Record Samples

My health record (MHR) was developed to assist the patients and the healthcare industry, and it is successful in achieving the targets. However, the system is not perfect and has problems associated with it. Out of the many problems associated with the technology, one of the most concerning is the implementation and skills to operate the system. The reason behind the above-made statement lies on the fact that the implementation of the system is costly and requires additional expenses in training and providing the training resources to the stakeholders (McAlearney et al., 2015). The training is provided to make the stakeholders comfortable and aware of the systems operations and uses. Additionally, maintaining the system also demands expertise which the healthcare units have to hire to maintain their servers and systems. Another problem that is associated with the MHR technology is the difficulties that the healthcare experts face in updating the data of the patient regularly. The people who are not comfortable with the technology also finds organising the data according to the priority a difficult task. The older patients also prefer the traditional method of their medical records because they feel comfortable with it. Other people think that the data is stored on the internet which makes the technology insecure and vulnerable to cyber-attacks (Dinev et al., 2016). Hence, in conclusion, it can be stated that no real problem is associated with the system except for the perception towards it. The problem with the implementation cost can also be ignored if the systems long-term benefits are measured. The discussed technology was designed to assist in the medical industry, and it is fulfilling its objective. The capabilities of the technology are vast, and one of the most significant of them is the e-documentation. E-documentation refers to maintaining individual’s health record including the past and present condition electronically (Walsh et al., 2017). The documents are made available online to omit the hassle of carrying the documents and worrying about their safekeeping. The documents stored electronically can also be shared with healthcare units and experts in dire situation electronically with proper authentication. As discussed in the problems, one of the biggest challenges to the deemed system is the perception of the people that the system is insecure is a myth. The reason for the above-stated statement is that the data uploaded on the servers are kept encrypted, and appropriate authentication are provided to keep it protected from the trespassers. Additionally, a unique identification is provided to the users to enhance the security even further. The system stores data electronically which offers it the capability of managing and accessing the data from geographically diverse location. The system is also capable of enhancing the capabilities of the experts and the healthcare units. The experts and the healthcare units can test and evaluate new technologies and method in the deemed platform ("eHealth Reference Platform - Australian Digital Health Agency", 2018). The system is also capable of assisting the healthcare units in managing the inventory and offer notification when needed. The deemed system’s capability has been discussed in the above section which can be evaluated to determine the benefits of the system. On evaluation, it is evident that the system offers ease in the medical process. Hence, it can be stated that the system reduces the hassle in expert and patient communication and even enhances the caring of the patients which can be of great assistance for the people with disability and seniors (Hemsley et al., 2016). One of the capabilities of the deemed system is that it offers notification to the experts which helps the experts to cite proper attention towards the patient. The documentation part is also simplified which also preserves the expert’s time which he/she can use in caring for the patients. It is evident from the discussion above that the deemed technology is costly. However, it is partially correct as after the implementation the system saves a lot of money.   For the healthcare units, the capital is preserved inventory management and testing of new systems and techniques which they can perform with assistance from the system. While the patients are financially benefitted by omitting the mailing costs and the transportation cost that the patients incur in visiting the healthcare units. The system is capable of assisting in large geographical domain which offers the benefits of assisting in the dire situation (Turvey et al., 2014). In case, the expert is not physically available to the patient due to geographical distance then the former can offer medical advice or even refer the latter to another suitable expert. Hence, it can be stated that the deemed system provides multiple benefits which should be entertained by everyone. Dinev, T., Albano, V., Xu, H., D’Atri, A., & Hart, P. (2016). Individuals’ attitudes towards electronic health records: A privacy calculus perspective. In  Advances in healthcare informatics and analytics  (pp. 19-50). Springer, Cham. eHealth Reference Platform - Australian Digital Health Agency. (2018).  Digitalhealth.gov.au. Retrieved 11 March 2018, from https://www.digitalhealth.gov.au/get-started-with-digital-health/what-is-digital-health/features-of-the-my-health-record-system/ehealth-reference-platform Hemsley, B., Georgiou, A., Carter, R., Hill, S., Higgins, I., van Vliet, P., & Balandin, S. (2016). Use of the My Health Record by people with communication disability in Australia: A review to inform the design and direction of future research.  Health Information Management Journal,  45(3), 107-115. McAlearney, A. S., Hefner, J. L., Sieck, C. J., & Huerta, T. R. (2015). The journey through grief: insights from a qualitative study of electronic health record implementation.  Health services research,  50(2), 462-488. Turvey, C., Klein, D., Fix, G., Hogan, T. P., Woods, S., Simon, S. R., ... & Wakefield, B. (2014). Blue Button use by patients to access and share health record information using the Department of Veterans Affairs' online patient portal.  Journal of the American Medical Informatics Association,  21(4), 657-663. Walsh, L., Hemsley, B., Allan, M., Adams, N., Balandin, S., Georgiou, A., ... & Hill, S. (2017). The E-health Literacy Demands of Australia's My Health Record: A Heuristic Evaluation of Usability.  Perspectives in health information management,  14(Fall).