Friday, November 29, 2019

Software Requirements Specification free essay sample

Software Requirements Specification For SYSTEM TO AUTOMATE PAYROLL PROCESSING Team members: CH. SAIKIRAN (08R01A0580)-CSE KANTAM RAMESH (08R01A0549)-CSE M. SAIMADHAVI -IT BATCH NO. : 1 TABLE OF CONTENTS 1. Abstract 2. Requirements Specification (RS) 3. Database Fields Specification 4. Operating Environment a. Software Requirements b. Hardware Requirements 5. High Level Design 6. Low Level Design a. Login b. Administrator c. Clerk d. Employee 7. Database Design 8. Test cases Abstract of the project: Consider a medium sized IT establishment which manages its own payroll requirements. This project will aim to develop an automated system to pay employees their monthly wages. The system should store employee salary details and leave allowance. At the end of the month the system should automatically credit the employee’s bank account with their salary. Income tax and loan payments should be deducted at source and appropriate accounts credited. Salary slips should also be generated. This system can be integrated with Leave and loan systems to give a holistic solution to the organization. We will write a custom essay sample on Software Requirements Specification or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Requirements Specification (RS) |No. Requirement |Essential or |Description of the Requirement |Remarks | | | |Desirable | | | |RS1 |The system should have a login for |Essential |A login box should appear when the system is |The logins are assigned by the | | |Administrator | |invoked for Administrator with his/her user |admin. | | | |name and password. | | |RS2 |The system should have a login for |Essential |A login box should appear when the system is |The logins are assigned by the | | |staff. | |invoked for Staff with his/her user name and |admin. | | | | |password. | | |RS3 |Data Entry screens to maintain |Essential |Online screens should be created with inputs |The information maintained by | | |employee information. |from end user. |admin. | |RS4 |Data Entry screens to maintain |Essential |Online screens should be created with inputs |The information should be | | |Allowance information. | |from end user. |maintained by admin. | |RS5 |Data Entry screens to maintain |Essenti al |Online screens should be created with inputs |The information should be | | |Standard Deductions information. | |from end user. |maintained by admin. |RS6 |Data Entry screens to maintain |Essential |Online screens should be created with inputs |The information should be | | |Attendance information. | |from end user. |maintained by clerk. | |RS7 |Data Entry screens to maintain Other|Essential |Online screens should be created with inputs |The information should be | | |Deductions information. | |from end user. |maintained by | | | | | |Staff(clerk/employee). |RS8 |Automatic crediting of employee |Essential |These reports will created when a trigger is | | | |salary | |initiated by the user | | |RS9 |Generation of Salary slip |Desirable |Different Depreciation methodologies should be| | | | | |evaluated and uilt into the system. The end | | | | | |user should be allowed to choose any one. | | |RS10 |Generating Salary report |Desirable |Database can maintain the salary reports | | Database Fields Specification No. |Field Name |Data Type |Remarks | |1 |Employee Number |Text |This is the key field of the database as it is | | | | |unique for an employee. This will also serve as | | | | |the login for the system. This is a primary key | |2 |Employee Name |Text |Special characters like underscore are not | | | | |allowed. |3 |Email id |Text | | |4 |Address |Memo | | |5 |Contacts |Number | | |6 |Designation |Text |Designation like Clerk, Emp etc | |7 |Qualification |Text |This specifies the Qualification of a employee | |8 |UName |Text | | |9 |PWord |Text | | |10 |DOR |Date/Time |Date of registration of a employee | |11 |Bsalary |Currency |Fixed amount as per employee | |12 |HRA |Text Primary key | |13 |PPA |Text | | |14 |Maint_Allow |Text | | |15 |SPL_Allow |Text | | |16 |EDU_Allow |Text | | |17 |Wash_Allow |Text | | |18 |Sun_Allow |Text | | |19 |EPF |Text |Primary key | |20 |VPF |Text | | |21 |LIC |Text | | |22 |Canteen |Text | | |23 |Transport |Text | | |24 |ITax |Text |According to income tax rule | |25 |PTax |Text |Professional Tax is fixed as per policy | |26 |AttndMonth |Text | Current Attendance month. | |27 |TotalDays |Number | | | | | |Total working days of an organization per month. |28 |PrsntDays |Number |Present Days of an Employee in current month. | |29 |AbsntDays |Number |Absent Days of an Employee in current month. | |30 |ExtraDays |Number |Extra working days of an Employee in current | | | | |month | |31 |PayDays |Number |Payable days | |32 |EntryDate |Text |Attendance Entry date. |33 |HomeLoan |Number |25% of Basic salary | |34 |EDULoan |Number |15% of Basic salary | |35 |HealthLoan |Number |5% of Basic salary | Operating Environment: Software Requirement: Operating System: Windows 2000 or Higher Service Pack: 2+ Platform: JAVA Language: HTML, JSP JDBC Database :MS Access Web server : Tomcat server Hardware Requirement (Minimum) Processor: PIV Ram: 128 Mb Hard Disk: 1 GB Monitor: VGA Color (256) High Level/Detailed Design (HLD/DD): a. Login : This module accepts the username and password which on validation passes the control to the respective module. This checks for the authorized users before logging in. b. Administrator: This module is for the administrator who maintains the information of the employees each identified with unique id numbers. c. Clerk: This module is for the staff to maintain the attendance of the employee and generate the salaries for that current month. d. Employee: This is for the employee who on logging in can view their basic salary, allowances and standard deductions provided by the company. Low Level Design The system is split in to its design components. For each of the components, we provide information in the following format: 1. Login Module: This module accepts the username and password which on validation passes the control to the respective module. This checks for the authorized users before logging in. 2. Administrator Module: This module is for the administrator who maintains the information of the employees each identified with unique id numbers. Their basic salary, allowance and standard deduction percentages are specified by the administrator. He can view the salary reports of the selected employee for that month and for the given period. He can maintain the following information a. Employee info set by administrator b. Set Allowances c. Set Standard deductions. d. View Other deductions. e. View Attendance info. f. View Salary Slip. 3. Clerk: This module is for the staff to maintain the attendance of the employee and generate the salaries for that current month. The salary reports for that month and over the given period can be viewed by the staff. He can also view the employee information with allowance and Standard deduction. And he can view the other deduction and salary reports. He can maintain the following information a. View Employee info. b. View Allowances info c. View Standard deductions. d. Set Other deductions. e. Set Attendance info. f. Prepare Salary Slip. 4. Employee: This is for the employee who on logging in can view their basic salary, allowances and standard deductions provided by the company. They can specify their other deductions like Insurance, home loans etc which are to be deducted from the current month salary. These details are to be provide by the employee before the salary date. Employee can also view the attendance information, salary slip and salary information. He can maintain the following information a. View Employee info b. View Allowances c. View Standard deductions. d. Set Other deductions. e. View Attendance info. f. View Salary Slip. 5. Integration with leave and loan system if already existing, else create screens to key in leave and loan details. 6. Credit Employee bank accounts electronically. 7. Generate electronic or hard copies of pay slips. 8. Enable users to modify income tax details as these may change frequently. OVERALL USECASE DIAGRAM FOR PAYROLL SYSTEM: [pic] USECASE DIAGRAM FOR STAFF: [pic] USECASE DIAGRAM FOR ADMIN: [pic] USECASE DIAGRAM FOR EMPLOYEE: [pic]ACTIVITY DIAGRAM FOR PAYROLL: [pic] CLASS DIAGRAM FOR PAYROLL SYSTEM: [pic] Sequence and Collaboration Diagram for Login: [pic] Employee Info: [pic] [pic] Allowances: [pic]c [pic] Standard Deductions: [pic] [pic] Attendance Info: [pic] [pic] OtherDeductions: [pic] [pic] [pic] [pic] [pic] [pic] [pic]Database Design: Employee table |No. Field Name |Data type |Remarks | |1 |Employee Number |Number |This is the key field of the database as it is | | | | |unique for an employee. This will also serve as | | | | |the login for the system. | |2 |Employee Name |Text |Special characters like underscore are not | | | | |allowed. |3 |Address |Text | | |4 |Contacts |Number | | |5 |EMail |Text | | |6 |Designation |Text |This specifies the designation in org | |7 |Qualification |Text |This specifies the Qualification of a employee | |8 |DOR |Date/Time |Date of registration of a employee | |9 |Bsalary |Currency |Fixed amount as per employee | |10 |UName |Text | | |11 |PWord |Text | | |12 |Status |Text | | Allowance Table: |No. |Field Name |Data type |Remarks | |1 |HRA |Number |Primary key. |2 |EDU_Allow |Number | | |3 |Maint_Allow |Number | | |4 |SPL_Allow |Number | | |5 |Wash_Allow |Number | | |6 | Sun_Allow |Number | | Standard Deductions Table: |No. |Field Name |Data type |Remarks | |1 |EPF |Number |Primary key. |2 |VPF |Number | | |3 |LIC |Number | | |4 |Canteen |Number | | |5 |ITax |Number |According to income tax rule | |6 |PTax |Number |Professional Tax is fixed as per policy | Attendance Table: |No. Field Name |Data type |Remarks | |1 |EmpNo |Number |This is the key field of the database as it is unique for an | | | | |employee. This will also serve as the login for the system. | |2 |Attndmonth |Date | Current Attendance month. | |3 |Tdays |Number | | | | | |Total working days of an organization per month. |4 |Pdays |Number |Present Days of an Employee in current month. | |5 |Adays |Number |Absent Days of an Employee in current month. | |6 |Edays |Number |Extra working days of an Employee in current month | |7 |Paydays |Number |Payable days | |8 |Edate |Date |Attendance Entry date. | | | | | Other Deductions Table: |No. Field Name |Data type |Remarks | |1 |EmpNo |Number |This is the key field of the database as it is | | | | |unique for an employee. This will also serve as | | | | |the login for the system. | |2 |Homeloan |Number |25% of Basic salary | |3 |EDUloan |Number |15% of Basic salary | |4 |Healthloan |Number |5% of Basic salary | Test-Plan (Unit test-plan and integrated test-plan) |No. |Test case Title |Description |Expected Outcome |The requirement in RS|Result | | | | | |that is being tested | | |1 |Successful User |The login to the system should |Login should be |RS1, RS2 | | | |Verification |be tried with the login assigned|successful and the | | | | | |by the admin and the correct |user hould enter in | | | | | |password |to the system | | | |2 |Unsuccessful User |The login to the system should |Login should be |RS1, RS2 | | | |Verification |be tried with the login assigned|unsuccessful and the | | | | | |by the admin and the incorrect |user should enter in | | | | | |password |to the error page. | | |3 |Successful data entry |After login the user should |The data entry should |RS3 | | | |of employee information. |enter the correct employee |be successfull | | | | | |information. | | | | |4 |Unuccessful data entry |After login the user should |The data entry should |RS3 | | | |of employee information. |e nter the incorrect employee |be unsuccessfull | | | | | |information. | | | | |Successful data entry |After login the user should |The data entry of |RS4 | | |5 |of Allowances. |enter the correct Allowances |allowances should be | | | | | |information. |successfull | | | |6 |Unsuccessful data entry |After login the user should |The data entry of |RS4 | | | |of |enter the incorrect Allowances |allowances should be | | | | |Allowances. |information. unsuccessfull | | | |7 |Successful data entry |After login the user should |The data entry of |RS5 | | | |of Standard deductions. |enter the correct Standard |Standard deductions | | | | | |deductions information. |should be | | | | | | |successfull | | | |8 |Unsuccessful data entry |After login the user should |The data entry of |RS5 | | | |of Standard deductions. enter the incorrect Standard |Standard deductions | | | | | |deductions information. |should be | | | | | | |successfull | | | |9 |Successful data entry of |After login the user should |The data entry of |RS6 | | | |Attendance. |enter the correct Attendance |Other deductions | | | | | |information. should be | | | | | | |successfull | | | | |Unsuccessful data entry |After login the user should |The data entry of |RS6 | | |10 |of Attendance. |enter the incorrect Attendance |Other deductions | | | | | |information. |should be | | | | | | |unsuccessfull | | | |11 |Successful data entry of |After login the user should |The data entry of |RS7 | | | |Other deductions. enter the correct Other |Other deductions | | | | | |deductions information. |should be | | | | | | |successfull | | | |12 |Unsuccessful data entry |After login the user should |The data entry of |RS7 | | | |of Other deductions. |enter the incorrect Other |Other deductions | | | | | |deductions information. should be | | | | | | |unsuccessfull | | | |13 |Navigation between |Screen navigation should be |The screens navigated | | | | |screens is Role based |checked to ensure correct |should be based on the| | | | | |sequence of screens is thrown to|role of user | | | | | |the user. | | | | |14 |Database interactions |Values stored in the database |Data retrieved should | | | | |should be accurate |should be what the user intended|be what is stored in | | | | | |to store. the database | | | |15 |Boundary conditions |When scrolling options are |UI should support | | | | |should be checked |enabled on screens data between |boundry level | | | | | |different pages should be |conditions | | | | | |accurate | | | | |16 |Accurate reports should |The reports should be accurate | | | | | |be created. | | | | | Employee details, investment details, salary details, tax rules, leave details Data entry for employee details, Income tax rules, Leave rules, loan details Apply leave, key in investment details, Employee Salary Slips Administrator

Monday, November 25, 2019

What micro environmental factors Essay Example

What micro environmental factors Essay Example What micro environmental factors Paper What micro environmental factors Paper What micro environmental factors have affected Xeroxs performance since the late sass? BY lady 7 What micro environmental factors have affected Xeroxs performance since the late sass? Xerox has dominated the industry by inventing photocopying but changes in the internal environment shook its fortune and market value. At the beginning of technological change, Xerox lacked a solid management level. Poor leadership makes poor marketing decisions. Restricted product options limited necessary opportunities for growth and staying atop competition. They were stuck on the copying and printing technology at the time when the customer market moved on to sharing documents and information digitally. The inability to meet customers demands drove down the stock price and cost the company profits. To stay in business, Xerox had to make changes in marketing channel firms, namely the revision of suppliers, by outsourcing to China. It improved product cost, while preserving quality and creating better customer value. Vast management modifications, in form of attaining good leadership, cutting down on workforce, and changing focus room selling product to fitting customer needs, saved companys economics from declining. It is until the recession of 2001 that negatively marked all economic activities; to recover, Xerox made a major decision to acquire ACS, an IT company. Incorporation has equipped the company with new expertise, capabilities, and business channels to proceed with a new business plan. Importantly, innovations allowed improving document management process, Xeroxs new production and marketing focus, dropping the number of technological errors and lowering labor to complete tasks. As the company expanded offering a broad portfolio of document management technology and services products, it redefined its name and altered Xeroxes competitors from copy machine producers to IT companies like HP and IBM. A new strong competition usually inspires more effort to serve customers better. These changes in the Xeroxs micro environmental factors have positively affected the companys ability to serve its customers. Being in business for more than 50 years brings the company advantages in the form of branding and strong reputation with consumers and other customers.

Friday, November 22, 2019

Personal statement for Hult International Business School

For Hult International Business School - Personal Statement Example I have acknowledged that a brighter future awaits if I pursue higher educational degrees in the field I am most interested in. Since the start of my bachelor degree, I have focused on delving in International Business at Hult International Business School due to the shared commitment for â€Å"personal growth, intellectual integrity, global sensitivity, local engagement, and civic values, so that students are able to flourish in the global economy and are empowered to contribute meaningfully to their business and community† (Hult: Mission, 2010). In this regard, I am looking forward into changing cities to face new challenges and experiences. After completing Master of International Business, I plan to pursue a job in finance or real estate, concurrent with past experience in my family’s business. Likewise, after a few years of work experience, I am determined to return to Hult to pursue my MBA.   For my long-term goals, there is this entrepreneurial drive to take over my familys real estate firm in Belgrade, pursuant to the encouragement of my parents. Equipped with the theoretical framework and skills honed through the academe, I am determined to expand it and to seek new business opportunities to capture Balkans’ growing market. The course in International Business would effectively develop the needed knowledge and skills to venture into opportunities in the local market (initially) and eventually in global and emerging markets. My current course in Economics with focus on finance and administration would provide the theoretical background to indulge in higher education on an analogous field on endeavor. As I have been part of our family business, I was exposed to the rigors of entrepreneurship, management, operations, and human behavior in organizations. These experiences, in conjunction with the academic framework, provide the impetus for making my plans viable and credible, both in the short-term and

Wednesday, November 20, 2019

See Order Instructions Essay Example | Topics and Well Written Essays - 1000 words - 1

See Order Instructions - Essay Example Ð…ince itÃ'• unveiling in early 2004, BaÃ'•ecamp, the hoÃ'•ted project management application from 37Ã'•ignalÃ'•, haÃ'• received a lot of kudoÃ'•. BloggerÃ'• have praiÃ'•ed itÃ'• clean interface, major newÃ'•paperÃ'• have extolled itÃ'• focuÃ'• on collaboration and product reviewerÃ'• have applauded itÃ'• low price. I, too, waÃ'• impreÃ'•Ã'•ed when I previewed BaÃ'•ecamp'Ã'• featureÃ'• in Ð…oftware Development'Ã'• People and ProjectÃ'• NewÃ'•letter in May 2004. However, aÃ'• I've grown more familiar with BaÃ'•ecamp, I've found it hard to overlook one important detail: The application haÃ'• no way to produce a Gantt chart. Gantt chartÃ'•â€”thoÃ'•e horizontal bar chartÃ'• that Ã'•how dependencieÃ'• between taÃ'•kÃ'• and the eÃ'•timated time in which they might be completed—have been the mainÃ'•tay of project managerÃ'• ever Ã'•ince mechanical engineer Henry Gantt demonÃ'•trated in the early 1900Ã'• how one can be uÃ'•ed to track taÃ'•kÃ'•, workflow and Ã'•cheduling all at once. The Ã'•yÃ'•tem became Ã'•o popular that it'Ã'• Ã'•aid that managerÃ'• working on the Hoover Dam and the U.Ð…. interÃ'•tate highway Ã'•yÃ'•tem uÃ'•ed Gantt chartÃ'• to keep track of their projectÃ'•. Unfortunately, Gantt chartÃ'• haven't retained their popularity. Ð…ome criticÃ'• now argue that they pull a project manager'Ã'• focuÃ'• away from the project and onto perfecting pretty graphÃ'• that don't match reality.

Monday, November 18, 2019

Historiographical perspectives of the Cold War Essay

Historiographical perspectives of the Cold War - Essay Example While the explanations of the origins of the conflict in academic discussions are complex and diverse, several general schools of thought on the subject can be identified. Historians commonly speak of three differing approaches to the study of the Cold War: "orthodox" accounts, "revisionism," and "post-revisionism." Nevertheless, much of the historiography on the Cold War weaves together two or even all three of these broad categories. The first school of interpretation to emerge in the U.S. was "orthodox". For more than a decade after the end of the Second World War, few U.S. historians challenged the official U.S. interpretation of the beginnings of the Cold War. This "orthodox" school places the responsibility for the Cold War on the Soviet Union and its expansion into Eastern Europe. Thomas A. Bailey, for example, argued in his 1950 America Faces Russia that the breakdown of postwar peace was the result of Soviet expansionism in the immediate postwar years. Bailey argued Stalin violated promises he had made at Yalta, imposed Soviet-dominated regimes on unwilling Eastern European populations, and conspired to spread communism throughout the world. From this view, U.S. officials were forced to respond to Soviet aggression with the Truman Doctrine, plans to contain communist subversion around the world, and the Marshall Plan. U.S. involvement in Vietnam in the 1960s disillusioned many historians with the premises of "containment", and thus with the assumptions of the "orthodox" approach to understanding the Cold War. "Revisionist" accounts emerged in the wake of the Vietnam War, in the context of a larger rethinking of the U.S. role in international affairs, which was seen more in terms of American empire or hegemony. While the new school of thought spanned many differences among individual scholars, the works comprising it were generally responses in one way or another to Williams' Apple man landmark 1959 volume, The Tragedy of American Diplomacy. Williams challenged the long-held assumptions of "orthodox" accounts, arguing that Americans had always been an empire-building people, even while American leaders denied it. Following Williams, "revisionist" writers placed more responsibility for the breakdown of postwar peace on the United States, citing a range of U.S. efforts to isolate and confront the Soviet Union well before the end of World War II. According to Williams and later "revisionist" writers, U.S. policymakers shared an overarching concern with maintaining capitalism domestically. In order to achieve that objective, they pursued an "open door" policy abroad, aimed at increasing access to foreign markets for U.S. business and agriculture. From this perspective, a growing economy domestically went hand-in-hand with the consolidation of U.S. power internationally. "Revisionist" scholars challenged the widely accepted notion that Soviet leaders were committed to postwar "expansionism". They cited evidence that the Soviet Union's occupation of Eastern Europe had a defensive rationale, and that Soviet leaders saw themselves as attempting to avoid encirclement by the United States and its allies. In this view, the Soviet Union was so weak and devastated after the end of the Second World War as to be unable to pose any serious threat to the United States; moreover,

Saturday, November 16, 2019

Conflict Analysis of Main Character in “The Clinic”

Conflict Analysis of Main Character in â€Å"The Clinic† Conflict Analysis of the Main Character in â€Å"The Clinic† Movie Synopsis Proposal CHAPTER I INTRODUCTION 1.1 Background of the study Literature is intimate experience of an author carefully expressed in concrete images, through the use of structure, imaginative style and luxurious metaphors. It is not practical or logical communication, but an aesthetic experience. Literature can be divided into three parts. They are prose, poetry, and drama. Literary works is a life reflection of human living relating to conditions, interactions and conflict in the stories (Taylor, 1981, p. 5). Literary works contain aspects and elements that occur in the real life, such as: love, sufferance, struggle, happiness and sadness. In addition, literary works consists of several basic elements. They are plot, theme, character, point of view, and setting. The common parts of a plot are: the exposition or preliminary situation, the inciting or exciting force, or challenge, the rising action, or complication, the climax, or turning point, and the denouement, or resolution. Movie is a kind of literary work that explores that human imagination using imagery, adventure and experiences, in order to see life more interesting (Boggs, 1999, p. 3). In the movie there are a lot of character, the characters are important to make the movie run smoothly. 1.2 Identification of the study Thrillers movie is one of genres movie that offers mystery and suspense to the audience. â€Å"The clinic† is included as thriller movie. â€Å"The Clinic† movie talk about the struggles of the woman who is loss of their infants. Their struggles breeds many conflict, like that happened in Beth’s character when she struggle to find her infant. Conflict is the basic drama of the opposition experienced by characters as response to the dramatic emergence of these forces (the conflict could be quarrels between character with the idea or the environment)†. 1.3 Limitation of the study The analysis of this research is limited to internal and external conflict of the main character in â€Å"the clinic† movie. 1.4 Formulation of the study 1. what are conflict faced by the main character based on Lewis Coser theory? 2. how are the conflicts in â€Å"the clinic† movie ? 1.5 Objective of the study 1. To describes how Beth faces her own conflict. 2. To describe how are conflicts in â€Å"the clinic† movie 1.6 Significance of the study There are several significance of this research, there are: a. To increase the readers and me knowledge about literary work especially conflict. b. To improve the interest of the readers in understanding of movie. c. To increase the readers and the writer knowledge about character, main character and minor character in the movie. d. To help the next researcher or the students of English Department in understanding of conflict in the movie. CHAPTER II REVIEW OF RELATE LITERATURE The description of Movie Movie is dramatized representation of reality and it is included in one of fiction. According to Griffith (2011, p. 20) â€Å"fiction to describe prose works that tell a story about events that never happened in real life† According to Bluestone (1956, p. 6) â€Å"films are originally a product of a genuine folk-art. At the very beginning of things we find the simple recording of movement, galloping horses, railroad trains, fire-engines, sporting events, street scenes†. Berry Keith Grant (in Virginia, 2002, p. 163-164) categories of genres as fellow: comedy film, crime film, disaster films, suspense or thrillers film, epic films, erotic films, film noirs, gangster films, horror films, melodramas, musical films, science fiction films, sports films, war films, and western films. 2.1 Character Character is very important element in literary works. The character can be human, or even animal. In a movie, the character usually dominated by human as the character. The personality of the character will lead the character to act such emotional, behavior, and all the logical things that deals with the problems which be faced by the character. The character according to Robert (1993:20): â€Å"characters are the person present in dramatics of narrative work, who are interpreted by reader as being endowed with the moral and dispositional qualities that are expressed in what they say in the dialogue and what they do in action.† 2.1.1 The main Character A major is main character that develops the plot of the story and always appears on the story. The major character has significance roles in the story. It means that major character occupies most part in plot or events that are occurred in a story. The main character is sometimes called a protagonist whose conflict with an antagonist may spark the story’s conflict. Beth and Cameron are the main character in â€Å"The clinic† movie. 2.1.2 The Minor Character The minor characters can be defined as the supporting characters of the major characters that their function is to illuminate the major characters. The appearance of minor characters is usually infrequently. The minor characters role are also seems not important as the role of the main characters, although the minor characters sometimes related to the major character directly. Veronica, ivy, Allison, Hank, Ms. Shepard, Duncan, etc are the minor characters in this movie. 2.2 Conflict The conflict of the human happened because human has a limited and restricted capacity to satisfy most of his need. When human endure the conflict, this can cause human to react and brings out the extremes of human energy, human may take action, decision, response, and interactions toward the conflict which they are facing. 2.2.1 The definition of conflict Conflict is necessary to every fiction works; there is usually one major conflict. Conflict is also the essential part to the plot, without conflict there will be no plot. The conflict usually becomes clear to the beginning of a story. Conflict is a struggle over values and claims to scarce status, power and resources in which the aims of the opponents are to neutralize, or eliminate their rivals. 2.2.2 Types of conflict Internal conflict is more commonly referred to as â€Å"man vs. self â€Å", as the name suggests, it deals with a character having to overcome and change something about his or her being that they are struggling against what they have in mind. External conflict is the struggle of the character against the force from outside. There are several kinds of the external conflict that the character might face. First, the character against another characters. Second, the character against the society, third, the characters against the nature force. CHAPTER III RESEARCH METHODOLOGY In order to gather and compose the data in this research, the library research is applied as the method of analysis in this research. The relevant data that found as the source of the data idea which support to the topic being discus in this research all are collected and then applied in finishing this research. 3.1 Technique of collecting data In making this research, the researcher went through various stages of collecting the data. First, the researcher went to the movie corner and found out this movie. Then, the researcher watched the movie. Having watched the movie, the researcher made the topic and outline of the study. After deciding the problem formulation, the researcher to analyze the courage which can be found in the character of Beth, and the researcher went to the library and browsed the internet to find more info. Technique of analyzing data The data analyzing applied when all the primary data from the movie is collected and selected, as the data from movie is in the dialogue, which concern about the classification of conflict found from the main characters that has been chosen to the most significant data, then the data will be interpreted and to be brought into this research as the subject matter of the analysis, that is the main characters conflict found from the movie. Next the analysis will be stated by explaining the conflict of the main characters based on the definition and the classification of the conflict as descriptions above which reflected in â€Å"The Clinic† movie. BIBLIOGRAPHY Deetz, Stanley. A and Sheryl. L. Stevenson. 1986. Managing interpersonal Communication. New York: chapter Row Publisher. Diyanni, Robert. 2001. Literature Reading, Fiction, Poetry, and Drama. McGraw Hill International Edition. Nurgiyantoro. Burhan. 2012. Teori Pengkajian Sastra. Gadjah Mada University Prees.

Wednesday, November 13, 2019

To Live in a Vermin’s World: A Marxist View of Kafka’s The Metamorphos

To Live in a Vermin’s World: A Marxist View of Kafka’s The Metamorphosis One of the honors for ‘greatest theories’ in contemporary civilization has to be awarded to Marxism. Invented in late 19th century by Karl Marx and Frederick Engels, Marxism has had great influences on the development of modern society. Despite its eventual failure, Marxism once led to numerous revolutions that working classes raised against the ruling parties in different countries. Consequently, it paved the way for the erection of the Berlin Wall, the formation of the Warsaw Treaties—communist camp confronting NATO, and the establishment of a world super power, the Soviet Union at the dawn of this century. Even decades later, after all those Marxist milestones have collapsed, China, with one fifth of world’s population, still faithfully believes in this theory. It is certain, then, Marxism’s effect on people’s thoughts is deep and profound. It is natural for people living in the birthplace and at the birth time of Marxism, Franz Kafka for i nstance, to have been affected by this theory to a greater extent. As an author, Kafka’s affiliation with Marxism was revealed in his novella, The Metamorphosis. It tells about a German travelling salesman Gregor Samsa, who awoke one morning only to find himself transformed into a bug. Thereafter, Gregor was soon deprived of his job and was no longer able to financially support his family as he had been. Confronted with this sudden change, the family members started to discard Gregor one after the other. Not only the father, who was eager to get rid of his bug-shaped ‘son’ right after Gregor’s disaster, his mother and sister finally retracted all their love and care as well. Ending with Gregor’s miserable death, ... ...ncy of interest lies in the fact that Gregor’s family members have to sacrifice leisure and go on work after his transformation while Gregor himself switches from a provider to a consumer. Thus, it is easy to observe a match between Gregor’s outcome and that of proletarians. Gregor is not a bug physically, but mentally he is. A story about his denial of a life in oppression, Gregor’s metamorphosis is as well a story about his pursuit of a life with fairness. Marked by Marxist characteristics, the transformation conforms to a proletarian struggle in that they have 1) like motives--unjust social and economic position; 2) like natures—both the target and the form; and 3) like outcomes--a wretched collapse. Though noticed and commented on by few critics, Marxist thoughts are clearly presented by Kafka in terms of Gregor’s decisive turning: to live in a vermin’s world.

Monday, November 11, 2019

Legal Aspects

Talking about the legal aspects of healthcare administration means taking into consideration the law that governs all the transactions that are carried out within the medical field so as to protect both the medical practitioner and the patient, with a dominant motive of bringing about improved quality of life devoid of diseases. It is believed widely that knowledge and the strengthening of these legal aspects will also bring ameliorations in the field of medicine and to this end, efforts are being made to make this set of information on the legal aspects as accessible as possible by feeding them into both the electronic media such as computers, televisions, and radios among others, and print media comprising the newspapers, journals, magazines, and periodicals among others. The ninth edition of the legal aspects of health tried to fulfill this purpose by taking a historical approach to the legal aspects of health care so as to showcase the accruals that have been made through these undertakings plainly when addressing their counterparts who are the pharmacists, physicians, physical therapists, assistant physicians, imaging technicians and respiratory therapists among others. Apart from the eighth edition chapter which revised the important issues of patient safety and sought to provide self assessment in evaluating the prospects of healthcare organizations, the World Wide Search chapter sought to inculcate global awareness in health and law –related spheres. This culminated in the ‘’last chapter journey to excellence’’ which after a decade of survey introduced an exotic approach into bolstering these laws to better the medical field by bringing healthcare institutions together (Pozgar & Santucci, 2006). On the other hand, the basic concepts of insurance portend the derivative, a table which shows the financial transactions that occur between two players; the insurer and the insured, in the field of insurance. The balance between what the two should pay each other being directly proportional to the magnitude of the danger involved for both parties. Although this concept is used as a formula to calculate the â€Å"expected payoff†, it is not yet adequate since it ignores the concept of inflation. According to Durbin, (1990) this problem can be solved by â€Å"discounting payoffs by a risk less return† and â€Å"using risk –adjusted probabilities that is â€Å"risk-neutral probabilities†. When calculating the payoffs. In a case whereby the insurer fails to dissolve risks through decentralization, the standoff can be resolved by â€Å"assuming the market price to be the value which will be used to infer the risk-neutral probabilities that determines these values† Durbin maintains that workers compensation insurance differs from liability insurance since in the former it is mandatory for employers to subscribe for their employees with the major cost component of workers compensation being loss of wages. This also covers occupational injuries and diseases picked at work-the employer assumes responsibility regardless of whose fault it was. It covers against dangers ranging from injuries, diseases, rehabilitation of the employee, loss of salary, medical treatment, to death. Conversely, liability insurance is a coverage that protects against claims against the insurance holder of property damage, personal injury, and negligence. The complainants could be the employees, the repair people, delivery people who may come into contact with the business property. There are two types of liability insurance: liabilities to non-members which covers mostly under a Comprehensive General Liability (CGL) terms and to members of the firm comprising employees and partners. The CGL normally covers payments resulting from accidents, immediate medical expense as a result of the above, the attorney fee and investigation expenses and the cost of court bonds. The difference between claims made and occurrence coverage is that the latter caters for claims made and reported to the insurer while the contract remains in force. During the primordial years when the policy is being renewed, the premium increases to take into account the potentiality of claims being reported from both current and previous policy periods. The former, normally regarded as the traditional form of coverage on the other hand is used to provide professional liability insurance. It caters for injury or damage incurred during the policy period regardless of when the claims are reported. Occurrence coverage also provides long term protection for any covered claims that may arise at any time in future (Robinson & Scherlen, 2007). Reference. Durbin, D. & Borba, P. (1993).Workers compensation. United States: Kluwer Academic. Durbin, T.B. & Durbin, T.B. Jr. (1990).Group insurance: basic concepts and alternatives. United States: American College Insurance Group Pozgar, G & Santucci, N. (2006).Legal aspects of healthcare and administration. United States: James &Bartlett Publishers. Robinson, M. & Scherlen R. (2007). Drug control. United States of America (USA): State University of New York Press.   

Saturday, November 9, 2019

Effects of Social Networking Sites Essay

As the world moves into the second decade of the 21 st century, one of the major markers of this era is the rise and use of online communities. In particular, a paradigm called Web 2.0 describes recent technologies that focus on networking mass numbers of individuals into distinct communities over the Internet (O’Reilly, 2007). Social networking sites (SNS) are online communities designed to connect individuals to wider networks of relationships, and are one major example of Web 2.0 applications. Sites such as Facebook have exploded in membership. In a short period of 2007 – 2010, Facebook estimates that its membership has grown from 50 million to over 400 million users (Facebook, n.d.). Online social networks are now an integrated part of daily life and compel questions of how these media platforms affect human development, relationships, and interaction. Teenagers are among the most avid users of technology in general and social network sites in particular (Lenhart, Madden, Macgill, & Smith, 2007b). Recent reports find that youth spend nearly 10 hours per day using some form of technology, with socially networked media playing a large role in their daily lives (Rideout, Foehr, & Roberts, 2010). New technologies are deeply intertwined with adult perceptions about teenage life. Mimi Ito and colleagues observe that, â€Å"Although today’s questions about ‘kids these days’ have a familiar ring to them, the contemporary version is somewhat unusual in how strongly it equates generational identity with technology identity† The clear finding is that today’s youth are increasingly connected to the world through socially networked media. While teenagers are engaged with technology, they are ever more disengaged from another major component of their lives – school. Read more:  The Effects of Social Media on College Students National analyses find that nearly 30% of high school students do not obtain their diploma on time (Cataldi, Laird, KewalRamani, 2009). High school completion rates are difficult to measure, but various independent studies also suggest that nearly one-third of students ultimately drop out of school (Barton, 2005). When one compares these competing aspects of teenage life – technology versus education – a simple strategy clearly emerges. Perhaps if educators begin to integrate social technologies into learning, they will increase student engagement and achievement in school. Heeding the call of scholars (i.e. Jenkins, 2006; Ito et al. n.d.) recent policy and research efforts are now racing to develop new social media platforms and technologies for learning. For example, the  Federal Department of Education and organizations such as the MacArthur Foundation have invested millions of dollars to build social media platforms, video games, and other digital tools for learni ng (Whitehouse, n.d.). Despite the optimism that social media tools might improve student engagement and learning, the stark reality is that these new technologies often conflict with the practices of K-12 schools. Surveys find that the vast majority of school district leaders believe social technology can improve student learning. However, these same district administrators typically block student access to online resources like social network sites (Lemke & Coughlin, 2009). The decision to ban students from accessing social network sites underscores a major conundrum for educators. Online social networks widen a students’ access to resources and social support and may have beneficial effects on their development. Conversely, as student access to the world widens they are inevitably exposed to potentially negative material and interactions. The simplest strategy to limit liability and safeguard school districts is to ban access to these new digital tools. However, such policies neglect the potentially large benefits of using social media in the classroom. To alleviate this dilemma, educators and policymakers need a deeper understanding of social media and youth. Several questions are critical in the area of youth learning with social technologies, including: †¢ Which youth are using particular social technologies? †¢ How do they use these technologies to communicate, develop relationships, socialize, and learn? †¢ What are the effects of these technologies on youth development? †¢ What are the effects of these technologies when applied in educational contexts such as the classroom? In this dissertation, I explore these questions by examining a particular technology: the social network site. Communities such as Facebook and MySpace mediate teenage life, affecting how youth communicate and learn from one another. In addition, social networks are intertwined into just about every major online community today (Livingstone, 2008). These factors make SNS a particularly salient focus for evaluation. Throughout the following chapters I examine different questions surrounding the phenomena of social network sites and teenage youth. In Chapter 2, I review the extant research literature that examines SNS. I consider several controversies around SNS and youth: (a) What kinds of youth are using social networking sites? (b)  Does student participation in these online communities affect their privacy and social relationships? (c) Do student activities in SNS influence their personal development in terms of self-esteem and psychological well-being? (d) Does SNS use affect student grades and learning? The review highlights how research in this field is only just emerging. The few stud ies that examine social network sites are mainly exploratory. However, media researchers have a rich history of scholarship from which to draw new insights. I integrate previous thought on Digital Divides, Psychological Well-being, Social Capital Theory, and Cognitive and Social Learning theories to guide SNS researchers in future studies. In Chapter 3, I present an empirical analysis using a national dataset of teenagers from the Pew Internet & American Life Project (Lenhart et al., 2007b; Pew Internet & American Life Project, n.d.). In this study, I ask whether demographic variables such as education, socioeconomic status, and access to the Internet are significantly related to whether teenagers participate in social network sites. This line of analysis is typical of digital divide studies that examine whether particular populations have less access to new technologies. If new technologies do have positive benefits for individuals, but under- represented populations do not have access to such tools, there are tremendous issues of equity and access yet to be addressed (Jenkins, 2006). Most studies of digital divide and SNS examine adult and college-age populations. I present an analysis of teenage populations to examine their usage patterns. The results of this paper highlight how the association between demographic indicators and social media use are weaker in 2007 than seen in earlier studies. Teenage youth of all backgrounds increasingly find ways to connect with others using social network sites. In Chapter 4, I consider a question of particular importance to teachers and education leaders. Through a large-scale experiment, I examine whether using social network sites in urban classrooms has any causal effect on students’ social capital, engagement with school, or academic achievement. I build an experimental social network site that approximates the functionality seen in sites such as Facebook and MySpace. The key difference in this experimental condition is that the site is private to two urban, school districts and explicitly for use to exchange educational information. Working with 50 classrooms and nearly 1,400 students, I utilize a cluster-randomized trial,  where class periods are randomly assigned to use the experimental site. Employing this randomized trial design, I find that an academic social network site does not necessarily improve student engagement with their peers, their classes, or increase student achievement. However, I find exploratory evidence that existing social network sites such as Facebook and MySpace improve students’ feelings of connection with their school community. The study offers evidence for one compelling idea: Perhaps schools should attempt to leverage students existing social networks, rather than block access to them or impose their own. In Chapter 5, I outline what is needed in future research about social network sites, and new technologies in general, to better inform the policies and practices of schools, educators, parents, and those interested in youth development. In particular, previous scholarly thought has focused on either a technologically deterministic or social agency perspective. Technological determinism suggests that a media tool itself affects social outcomes such as learning, but a long history of research underscores the fallacy of this philosophy. Scholars who focus instead on social agency, explore how individuals use new technologies in cultural and social contexts. However, this stream of research neglects rigorous evaluation of how new media affect youth. Both perspectives in isolation offer incomplete analyses o f how new media, such as SNS, impact youth. I argue that future researchers must develop and test finer hypotheses that simultaneously consider the technological affordances of social network sites, the social and cultural institutions within which SNS are used, and the actual interactions between individuals that occur in these online communities. The chapters in this dissertation examine the phenomena of social network sites and youth through different but complementary lenses: theoretical, descriptive, and experimental. The summative contribution of these analyses is a deeper picture of how teenage youth use SNS and its effects on their academic and social development. The studies show that youth of all backgrounds are increasingly connected via online social networks. The empirical analyses also show that social network sites are no silver bullet for improving learning in high school classrooms. The technology itself does not improve learning, but social media might help students become more connected and engaged with their school communities. The implications for educators and  schools are numerous. Problems such as student disengagement with education are profoundly significant issues, and additional research is needed to better understand how online networks influence youth development and learning. The current tools of teenage communication go by a peculiar set of names. Wall Posts, Status Updates, Activity Feeds, Thumbs Ups, Facebook Quizzes, and Profiles are some of the ways that youth today communicate with one another. These tools are features of social network sites (SNS), such as Facebook and Myspace. SNS are part of a suite of recent web applications, also called social media, which utilize Web 2.0 principles. The term Web 2.0 defines websites that are designed to: (a) rely on the participation of mass groups of users rather than centrally controlled content providers, (b) aggregate and remix content from multiple sources, and (c) more intensely network users and content together (O’Reilly, 2007). People use these web applications to interact in hyper-aware ways and the scale of this mass communication phenomena is significant. As of May 2009, Facebook ranked as the 4 th most trafficked website in the world and Myspace ranked 11 th highest (Alexa, n.d.). That high school youth are connected to these global online communities is both a frightening prospect for parents and educators and an intriguing area for social science research. Educators and parents in the United States face difficult quandaries concerning students and SNS. No one denies that youth use these technologies to communicate with the world, and they do so with high frequency and intensity (Lenhart et al., 2007b). Many scholars suggest that students learn in new ways using social media and that educators should embrace these new platforms (Ito et al., n.d.; Jenkins, 2006). In a recent national survey, the vast majority of school district leaders report that they view social media as a positive development for education (Lemke & Coughlin, 2009). Nevertheless, 70% of districts also report that they banned all access to SNS in their schools. Despite the clear understanding that social media can be vital to student learning and digital literacy, educators currently struggle with how to comply with regulations like the Children’s Internet Protection Act (CIPA), as well as overcome general fears about student interactions in social network sites. To inform both the policy concerns of district leaders and  the local practices of teachers and parents, research is needed to understand how youth use SNS and what effects it has on their social and academic development. In this chapter, I consider several key controversies around youth usage of SNS, and review relevant research that begins to inform these debates. I first define the media effects framework and outline how this research tradition attempts to understand the effects of new technologies on social outcomes. Second, I define social network sites and describe studies that capture how youth use these technologies to develop relationships, hang out with friends, and learn new skills. Third, the chapter reviews relevant research that informs several controversies concerning SNS and adolescents. I also connect these contemporary debates with previous scholarly thought about students’ out-of-school time (OST) and traditional concerns about the effect of technology on learning. The specific controversies reviewed are: †¢ What kinds of youth are using social networking sites? †¢ Does student participation in these online communities affect their privacy and social relationships? †¢ Do student activities in SNS influence their personal development in terms of self-esteem and psychological well-being? †¢ Does SNS use affect student grades and learning? Finally, I outline the overall condition of research on SNS and youth. The current state of the literature is suggestive of the effects on adolescent social and academic development, and primarily consists of ethnographic and cross-sectional data. I outline the future questions that will be critical for the field and suggest relevant methodological directions to move this emergent research stream forward. What Can We Learn from a Media Effects Framework? Many of the controversial questions concerning social network sites ask what kinds of effects these technologies have on youth development. Given this focus, I work primarily from a media effects tradition of research. Media effects scholars examine the outcomes that arise when people use new technologies. Talking about effects engenders important theoretical discussions that must be laid clear when examining studies. Most significantly, the term implies a focus on causality. Studies in this framework imply that a media form, or the features of the technology, causally influences some outcome (Eveland, 2003). The structure of questions from this perspective is usually in the form of: Does media affect learning? Does television influence student achievement? Or do social  net work sites affect the psychological well-being of adolescents? Media effects scholars in a variety of fields have quickly come to realize that the answers to these questions are more complex. Very rarely, if ever, is there a direct causal relationship between a technology and a social outcome such as learning (Clark, 1983; Clark, 1991; Schmidt & Vandewater, 2008). Early media questions often used a technological framework or object-centered approach (Fulk & DeSanctis, 1999; Nass & Mason, 1990). Such a perspective assumes and tests whether a technology itself causally affects a social outcome. For example, in Education a major question of technology research is whether media affects learning. Education researchers now firmly conclude that media does not affect student learning (Clark, Yates, Early, & Moulton, In Press). Numerous studies show that the media tool neither improves nor negatively impacts learning when compared to the same teaching strategy in the classroom (Bernard, Abrami, Lou, Borokhovski, Wade, Wozney et al., 2004; Clark, 1983; Clark, 1991). What matters is not the computer, but the learning behaviors that occur within the software or educational program. T he findings of non-significant media effects on student learning do not mean that technology has no influence. For example, Richard Mayer (2001) shows through a series of experiments that the design of a multimedia presentation affects student learning of a topic. Putting words and pictures closer together on the screen, when they are relevant to each other, helps students retain more knowledge than when the elements are placed further apart on the screen. These results do not validate a technological orientation, where one expects that the computers themselves improve learning. Rather, the pedagogical strategy of placing relevant words and images together in a presentation affects cognition. Media researchers understand that the features of a technology afford certain possibilities for activity. A multimedia video on the computer allows one to design words and images on the screen, while a computer simulation might guide a learner using models of real-world cases. A media tool allows for different possible learning behaviors (Kozma, 1991). This subtle difference in theoretical orientation is what scholars call an emergent perspective (Fulk & DeSanctis, 1999) or a variable-based approach (Nass & Mason, 1990). Scholars using an emergent or variable-based approach view technology as a structuring factor. Features of  a technology, not the technology itself, enable and constrain how one uses that tool. Conversely, social forces such as cultural norms and behavioral practices influence how one ultimately uses a technology. William Eveland (2003) offers five characteristics of media effects research that help define how studies take into account both technological and social variables. Media effects studies have: (1) A focus on an audience, (2) Some expectation of influence, (3) A belief that the influence is due to the form or content of the media or technology, (4) An understanding of the variables that may explain the causality, and (5) The creation of empirically testable hypotheses. A focus on audience compels researchers to understand the characteristics of the youth who use SNS. Knowing who uses, or does not use, social network sites is an important sociological question for scholars of digital divide. In addition, Hornik (1981) notes the possible differential effects for disparate populations, â€Å"If communication researchers have learned anything during the previous three decades, it is that communication effects vary with members of the audience† (p. 197). Current media studies also focus on the form or content of a technology, and move away from making black-box comparisons between technologies. Questions that ask whether Facebook is related to lower grades, or if MySpace is unsafe for children, are broad and uninformative directions for future media effects studies. Instead, the pivotal questions explore how the features of SNS enable or constrain behavior. Future media studies about SNS and youth should not frame questions using a technologicall y deterministic perspective where one expects the technology to cause an outcome. Instead, media scholars identify how youth interaction, communication, and information sharing are the critical variables in understanding SNS effects on social and academic outcomes. This understanding of media effects research helps define finer-grained hypotheses of why a tool like SNS might affect student development, under what uses, for whom, and when. What are Social Network Sites and How Do Youth Use Them? When a teenager joins a site like Facebook they first create a personal profile. These profiles display information such as your name, relationship status, occupation, photos, videos, religion, ethnicity, and personal interests. What differentiates SNS from previous media like a personal homepage is the display of one’s friends (boyd & Ellison, 2007). In addition to exhibiting your network of  friends, other users can then click on their profiles and traverse ever widening social networks. These three features – profiles, friends, traversing friend lists – represent the core, defining characteristics of social networking sites. One will notice that SNS also include other media tools such as video and photo uploading and many websites now employ social networking features. For example, YouTube is primarily a video sharing service, but users can add others as their friends or subscribe to a member’s collection of videos. Using boyd & Ellison’s (2007) definition, YouTube can be included as a type of social network site. As resear chers examine the effects of SNS on social behaviors, they will undoubtedly come across these blurring of technologies. Sonia Livingstone (2008) notes that SNS invite â€Å"convergence among the hitherto separate activities of email, messaging, website creation, diaries, photo albums and music or video uploading and downloading† (p. 394). This convergence of technologies may complicate what one means by the term social network site. Amidst the sea of what websites can be termed SNS, the technical definition of social network sites still provides a shared conceptual foundation. Comparing across common features – i.e. profiles and friend networks – researchers can begin to understand how various communities co-opt these characteristics to create entirely new cultural and social uses of the technology. Patricia Lange’s (2007) ethnographic study of YouTube shows that users deal with issues concerning public and private sharing of video. Some YouTube users post videos intended for wide audiences, but share very little about their own identities. Their motivations might be to achieve Internet fame and gather viewers. Other members upload videos intended for a small network of friends and may restrict the privacy settings to only allow access to those individuals. The concepts of friend and social networ k for these users are entirely distinct. Dodgeball, an early and now defunct mobile-SNS, is another social network site that has been studied. In Dodgeball, a user broadcasts their location via cell-phone to their network of friends:

Thursday, November 7, 2019

Introduce, Discuss, and Analyze The Ethics of Selling Organs essays

Introduce, Discuss, and Analyze The Ethics of Selling Organs essays The purpose of this paper is to introduce, discuss, and analyze the essays "The Body Bazaar" by Karen Wright and "'Strip-Mining' the Dead: When Human Organs Are for Sale" by Gilbert Meilaender. Specifically, it will compare and contrast the writers' perspectives on selling and transplanting body organs. The moral and ethical issues surrounding human organ transplant and sale are many, and many of them are ingrained with society's fear of death, dying, and money. Some people feel it is incomprehensible to even think about selling or donating a loved ones organs after death, but there are thousands of transplant patients waiting for organs or they will die and there lies the moral dilemma. Families of transplant patients waiting desperately for transplants so they can survive are always emotional and heart wrenching. Equally moving are the stories of families who donate their loved ones vital organs after a tragic accident trying to find some meaning in their loved ones' untimely deaths. Yet millions of transplant victims are still on waiting lists every year, and many people simply would not consider donating an organ, no matter how drastic the need. These two authors discuss the ethics and morality of donating organs, but they also discuss another aspect of organ transplant, the sale of donor organs for profit, something that most people are much more squeamish about even considering. Author Meilaender notes, "It's not hard to understand our national reluctance to permit the buying and selling of human organs for transplant, for it expresses a repugnance that is deeply rooted in important moral sentiments" (Meilaender). In contrast, Wright's essay at first dis cusses body part harvesting as a business just like any other. She writes, "Core-blood banking is just one of many enterprises that make up the late-twentieth-century trade in body parts and products" (Wright,?, p. 476). Clearly, this is the same issue, but vi...

Monday, November 4, 2019

Despite the costs of organising nutrition support teams in hospitals, Essay

Despite the costs of organising nutrition support teams in hospitals, there is an overall saving in health care cost - Essay Example The nutritional support team provides artificial nutrition and maintains itself as the supreme source of evidence-based information about nutritional assessment and support. It audits practical standards of care and organizes ways to nutritional screening, monitoring, and assessment for doctors, nurses, and pharmacists. Nutritional Support Team also assesses different feeding routes and advises on alternative treatment options. Nutritional Support Team activities contribute to a shorter hospital stay, lower mortality rate, improved nutrition, and reduced complications (IrSPEN, 2013; Tan Tock Seng Hospital Nutrition and Dietetics Department 2015). Therefore, Nutritional Support Team decreases complications and healthcare costs through reductions in unrequited treatments and prevention of complications. Organizing of nutritional support teams incurs several costs. The costs are incurred in the clinicians or departments involved in the provision of adequate nutrition for patients. First, we have the catering staff. It is concerned with providing sufficient quantities of quality food to limit the unnecessary use of nutrition support. Patients who cannot feed on their receive food in a favorable environment. Therefore, there is spending of much cash in the provision of quality food and maintaining a healthy environment. Secondly, there are the dietitians who are concerned with the provision of nutritional support for patients who are unable to derive adequate nourishment from food. Dietitians provide nutritional screening and assessment, together with the stipulation of supplementary through oral, parenteral, and enteral routes to patients undergoing malnutrition. However, it is expensive to maintain the dietitians hence many finances spent. Third, the ward nurses look after the patients, undertake screening process, and instigate associated care pathways. They ensure

Saturday, November 2, 2019

Contriversal Thesis on Nathaniel Hawthorne Research Paper

Contriversal Thesis on Nathaniel Hawthorne - Research Paper Example In this novel, the writer delved deeper in the sinfulness, issues, rigidity and hypocrisy of the American Society Puritanic laws during the 19th Century. Thesis Statement The Scarlet Letter in comparison to anything else, portrays the criticism of America in the 19th Century. Given the controversial statement above, the following points will be discussed for purposes of supporting the statement. The points are such as, the hypocrisy of America as illustrated through genocide and slavery of the Native Americans, the biography of Nathaniel Hawthorns clearly shows his disillusionment with the United States of America In analyzing the history of America as illustrated through the genocide and slavery of Native Americans, it is argued by historians that, racial scapegoat was vital for American state consolidation. This is because they believed that, intra-white conflict could only be resolved through institutionalizing similar prejudices against the black people (Antony 96). For instance, various reports that assessed the September attacks impact on the politics of Americans politics claimed that the attacks were significant in reordering racial divisions. As a result, nationalism has been clearly defined as† the wish to suppress the internal divisions within the nation and define people outside the group as untrustworthy as allies and implacably evil as enemies.†(Arthur 600). When individuals speak of genocide being performed against the blacks in the world, then people perceive it as white supremacy work system. Few years after the American Revolution, a policy known as the â€Å"conquest theory† was adopted by the United States towards the American Indians. As such, the Europeans viewed themselves as a culture that was superior thus bringing civilization to cultures they considered inferior. The culture of the Native Americans was viewed as having beliefs that were pagan in nature. Therefore, the conquest was viewed as a necessity evil that wou ld help in bestowing upon Indians who were heathen a moral consciousness that would help in redeeming their amorality. The world perception which converted self interest in economics into mortal, noble, motives was a Christianity notion as a religion which demanded fealty from all the available culture. This is what made the Americans ignite war with the native Americans for purposes of expanding their empire, accumulating treasure, cheap labor and land. The war resulted to incarceration of indigenous youths, slavery where the Native Americans were forced into manual labor among other evil deeds ( Mokdad 245). By looking at the Church of England and pluralism, it is evident that the quality in the life of the church differed immensely. Majority of the parish clergy were workers who were very faithful. On the other hand, some were notoriously absent and immoral. Pluralism was among the accepted abuses in the system of the parish. The main reason for such an occurrence was that distin ct amounts of income were offered to the parishes. Individuals acquired their livings for the sake of money and status. The lives of some clergy men can also be portrayed in the life of Nathaniel Hawthorne. Because of his income that was insufficient as a writer, he was forced to enroll in a career as â€Å"Custom House Measure† in Boston. By bad luck, in three years time he got dismissed from his career. Through his writing, by