Thursday, October 31, 2019

U.S. HEALTH CARE SYSTEM EVOLUTION Research Paper

U.S. HEALTH CARE SYSTEM EVOLUTION - Research Paper Example Health insurance association define health insurances the coverage that provides payments benefits as a result of sickness or injury in summary they include accidental death and dismemberment, medical expense, disability expense and losses from accident (David, 1999). U.S is among the world industrialized countries it is however, a country without a national healthcare. The U.S citizens are still strangling to have a national healthcare. This call for the private sector, individual and the government to find a lasting solution to healthcare reform. During the genesis of 20th century, the medical care was relatively inexpensive; there were progressive attempts by reformers to protect workers against both wage loss and medical costs which was formulated at around 1915. Despite a general mood of complacency during the 1920’s, started to emphasize the illness cost instead of lost wages and advantage for sickness insurance, this was mainly done to the middle class due to the inadequacy of rural facilities (Edwin, 1998). Multiple changes were brought in by the great depression that ended in 20’s, the main historical changes that occurred was the enactment of the social security act in 1935. A Roosevelt administrations push to include health insurance was however, defeated by internal government conflict over priorities. After the depression, more severe cash flow was created for medical personal. This resulted to hospitals creating the first structured pooled financing mechanism for health insurance, which was against the advance of insurance professionals. Blue cross shield insurance company offered private coverage for hospital care in dozens of states. The cover was mainly originally limited to surgical procedures performed in the hospital however, later expanded to office visits lastly evolved into major medical coverage (Edwin, 1998). Simultaneously to the events, employers started to

Tuesday, October 29, 2019

Global Warming Essay Example | Topics and Well Written Essays - 500 words - 12

Global Warming - Essay Example The earth’s atmosphere contains trace gases whose purpose is to prevent some of the heat of the sun to escape into the atmosphere when it is reflected by the Earth. This helps maintaining a certain degree of acceptable temperature on the Earth. When these gases rise in concentration, they start absorbing sun’s heat which results in rise in temperature to an unacceptable degree. Due to the rise in temperature, much of the living organisms are affected most of which die. The concentration of gases occurs, for example, by the release of gases like CO2 in the atmosphere through natural processes and also by industries and factories that burn fossil fuels. â€Å"Around the world, the Earths average temperature has risen more than 1 degree Fahrenheit (0.8 degrees Celsius) over the last century, and about twice that in parts of the Arctic† (National Geographic Society, para.2). Human beings are the most important stakeholders of global warming. They will have to understand that their communities are at stake due to abrupt rise in sea level, massive storms and hurricanes, and heat and cold waves. For example, the year 2007 brought worst floods in the history of many countries like Malaysia, UK, North Korea, and other African countries. Pakistan saw the worst flood in 2010 that took millions of lives and took the shelter of thousands of people. After human beings, the next important stakeholders are the animals and plants. Hence, global warming is becoming a serious issue, according to 3,146 climate experts (CNN World). Businesses are the only stakeholders that will not make movements against the global arming issue so much so that they will even try to stop the decrease in global warming. This is because businesses tend to run such factories and industries that emit CO2 into the atmosphere and no business would want to end his business. But not all businesses work in this manner. For example, FedEx is such

Sunday, October 27, 2019

Software Process Development: Water Fall Model and the RAD

Software Process Development: Water Fall Model and the RAD Software Process Development Abstract Choosing the best suited Software development system (SDS) for any particular project is the first and foremost thing to do. If this step goes wrong or selecting an unsuited SDS for the project may lead to unsuccessful or incomplete or may be delayed to the time expected. Till now many surveys and investigations are done on finding new processes, rectifying the problems in the pervious projects, etc. the new processes every time comes with a new way of implementation of the software development process. In this project I am investigating on the basic implementation of the SDS with the water fall model and the rapid application development (RAD) model. For this a detailed study of the both the models are done, and then finding out which software development model is best suited for the development of windows applications. For this comparison the yahoo messenger (a windows application) is used as an example. Introduction Software development has become very difficult due to changing requirements, lack of standards, unpredictable schedules, and due to the insufficient training and more than that by the lack of effort by the professionals. After a lot of research, it was clear that the problem is with the process that is used for the software development, rather than the technology, which cause number of the problems in software development and in the maintenance phase. A new terminology is introduced with five levels of the SEI which is known as capability maturity model (CMM). Most of the software life cycle includes six processes they are: requirements engineering, design, programming, integration, delivery, and maintenance. Each of these phases in brief: Requirements Engineering In this phase first all the requirements that are required by the client a0re designers of the site collectively. Then the technique of rapid prototyping in which a prototype program is built that can illustrates the functionality of the desired software model. Using this prototype, clients can understand better how the final product would be, how would be the functionality and from that they can find out whether this is what they really need. If the requirements engineering process is not done properly, the resulting software product will not be useful to the client and it may not run correctly. Design In this process, the analysts and developers decide how to construct the software with the requirements specifications agreed in the requirements specification document. This way of designing is called stepwise refinement, and this allows the developers to control the complexity of the software. After completing the design, it is recorded in design specification document. Programming In this phase, programmers are divided into groups who write the actual code of the software. Before coding starts, the software is divided into separate units called modules. This modularization is done to reduce the complexity of the programming process. This is also responsible for proper documentation that describing the code and for testing the code to ensure that the code is free of bugs. Integration In this phase, the individual modules of the software are combined to form the complete software product. As the modules are developed separately, testing is very important in this integration process. Even when the design is good, some times incompatibilities between modules are likely to exist. All these problems are identified and corrected to complete the integration. Delivery In this phase, the developers deliver the completely working software product to the clients. Usually the clients will test the software to determine whether all the specifications agreed upon in the requirements specification document are fulfilled or not. If the client is satisfied with the software he accepts the software and installs it or else gives back for modifications. Maintenance In this phase, the software undergoes many changes after delivery in order to change the features or to fix the bugs, add new functionality, port the software to new platforms. Its not true that the work is over after delivering the product to client. Actually more work is to be done, after delivering the product, in this maintenance phase. From the investigation done the experts it is surprised to discover that of all the processes, the maintenance phase has the more cost of the life cycle. The diagram below shows the expected costs that are likely to be spending on each of the processes in the software life cycle. As maintenance cost is more, many developers started to use the design approaches that result in software, which is easier to maintain. History of Software Process Models The Software Engineering Institute was established at Carnegie Mellon University in Pittsburgh, Pennsylvania in 1984, under a Department of Defense contract. The mission of this institute is to provide the leadership in advance state of the practice of software engineering that helps to improve the quality of systems that are developed which depend on software. After two years the software process work has began. One of those results was the software process maturity model. In the year of 1987, the Software Engineering Institute and MITRE Corporation produced the first questionnaire on the maturity of a software in general, a set of question that has the options as yes-no are prepared that address organization, management issues and the technical software development process. In the next few years, the Software Engineering Institute developed two methods that are used for the questionnaire to test and conclude the report of an organizations software process. After many reviews, the Capability Maturity Model (CMM) for software was developed which replaced the software process maturity model in the year 1991. The CMM gives the detailed information of the levels of the firms that best suites for the general software process practices that are followed by the firms which are divided into five maturity levels. The questionnaire that are to be satisfied by the firms at there CMM levels , once the current level of operation is attained using the maturity, for further improvement of a companys software process involves in the implementation of the software engineering practices that are needed to reach each of the five levels in an order from the lowest to the highest level. Water Fall Model The water fall model is first and the basic model of software development. From this basic model only all other models were developed. The necessity of developing the water fall model was, until it was developed there was no model or software process work flow model. Thats the reason the water fall was the basic model for software development. Water fall model is divided into separate phases of software development. The phases in Waterfall model are: Requirement Specifications phase, Software Design, Implementation and Testing Maintenance. . All these phases are cascaded to each other so that second phase is started as and when defined set of goals are achieved for first phase and it is signed off, so the name Waterfall Model. All the methods and processes undertaken in Waterfall Model are more visible. All possible requirements of the system to be developed are analyzed in this phase. Requirements are set of functionalities and constraints that the end-user (who will be using the system) expects from the system. The requirements are gathered from the end-user by consulting the customer who have requested for the product. These requirements are analyzed for their validity and the possibility of incorporating the requirements in the system to be development is also studied. Finally, a Requirement Specification document is created which serves the purpose of guideline for the next phase of the model. Next comes the system and software design phase. In this phase, before starting for actual coding, it is highly important to understand what we are going to create and what it should look like? The requirement specifications from first phase are studied in this phase and system design is prepared. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture. In this phase the estimation of cost for developing the product is also analyzed depending on the requirements. The system design specifications serve as input for the next phase of the model. The next sequential phase is the implementation (coding) and unit testing the software. On receiving system design documents, the work is divided in modules/units and actual coding is started. The system is first developed in small programs called units, which are integrated in the next phase. So that it would be easy to develop the code by dividing the work into small units. Then each unit of work that is divided from the total work is developed individually by each developer and tested for that particular unit of work is done properly or not. This type of testing the individual unit code is called unit testing. In the next upcoming phases the small units of code is to be integrated into one single code and should be tested for the over all functionality. As specified above, the system is first divided in units which are developed and tested for their functionalities . These units are integrated into a complete system during Integration phase and tested to check if all modules/units coordinate between each other and the system as a whole behaves as per the specifications. After successfully testing the software, it is delivered to the customer. The maintenance phase is the most important and it is almost 70% of total software process life cycle. This phase of is virtually never ending phase (Very long). Generally, problems with the system developed (which are not found during the development life cycle) come up after its practical use starts, so the issues related to the system are solved after deployment of the system. Not all the problems come in picture directly but they arise time to time and needs to be solved; hence this process is referred as Maintenance. On the time ruin the problems may occur and the code may not accept the new type of data, and then there is the need to change the part of the code or correct that part of code. Due to some disadvantages of the water fall model later some other models are developed. The disadvantages are The main drawback of the waterfall model is the difficulty of accommodating change after the process is underway. One phase has to be complete before moving onto the next phase Inflexible partitioning of the project into distinct stages makes it difficult to respond to changing customer requirements. Therefore, this model is only appropriate when the requirements are well-understood and changes will be fairly limited during the design process. Few business systems have stable requirements. The waterfall model is mostly used for large systems engineering projects where a system is developed at several sites. Rapid Application Development (RAD) RAD is a software development process initiated by James Martin in 1980s. It is a very high level of application development techniques that uses prototype, iterative customization and CASE tools. RAD is a software development methodology that focuses on building applications in a very short amount of time, traditionally with compromises in usability, features and execution speed. Figure-Traditional RAD The traditional RAD software development cycle follows a rigid sequence of steps with a formal sign-off at the completion of each. RAD is not appropriate for all projects. This is bet suited for the projects that can be divided into small chunks and where scope is small. RAD has many core elements which make it unique are prototyping, iterative development, time boxing, team members, management approach and RAD tools. Prototyping: This part of the RAD can be done by the Computer Aided Software Engineering that focus on capturing requirements, converting them to a data model, converting the data model to a database, and generating code all in one tool. Iterative development: Iterative development means creating increasing functional versions of a system in short development cycles. Each version is reviewed and approved by the client to produce requirements that feed the next version. This process is repeated until all functionality has been developed. Time boxing: Time boxing is adding features to future versions of the software and developing it no time. It is very important aspect of RAD to complete the job in less time and get the best product out than other competitors. Team members: The RAD methodology recommends the use of small teams that consist of experienced, versatile, and motivated members that are able to perform multiple roles. As the client plays a vital role in the development process, dedicated client resources must be available during the initial Joint Application Development (JAD) Management approach: Active and involved management is required to reduce the risks of lengthened development cycles, client misunderstandings, and missed deadlines. In addition to enforcing a strict timeline, management must focus on team member selection, team motivation, and on clearing media or political obstacles. Coding phase: Developing Code in RAD process model takes very short span. At the time of development of these types of projects the there is no need or no time to make the code future enhancements. So the code developed using this process is not the most reliable code. Testing phase: In the testing phase the developed software or website is tested in two ways i.e. alpha testing and beta testing. Alpha testing is the testing done by the developers before delivering the product. This alpha testing can be done in two ways i.e. white box testing and the black box testing. The testing of all the models that are working properly or not and to ensure that each function is fully operational while at the same time searching for the errors in the code is called white box testing. Testing the internal and primitive operations and to sure that all are working according to the specification is called black box testing. Testing done by the customer to check weather all the specification requirements are working properly is called beat testing. If any problem occurs, then the error is set up and just added to the code at the appropriate position. Advantages: Speed and quality are the main advantages of Rapid Application Development, while potentially reduced scalability and feature sets are the disadvantages. The main goal of RAD is the speed delivery of the product using CASE tools, which helps in converting the requirements to code automatically. The speed delivery is the main feature of RAD because the product has the competitors and demand in the market. The software developed by the RAD has versions and each version is better, has new features or at least overcomes the defects of the previous versions. Disadvantages: Scalability and the reduced features are main drawbacks of the RAD Due to very less time using the time boxing the development of the product that can construct the advanced features is not possible. By using time boxing we have very less time to develop much more features and more enhanced features. Yahoo Messenger The versions of yahoo messenger that are developed with the features are: Version 3.0: Yahoo Messenger 3.0 (1.3 MB) The first basic yahoo messenger was version 3.0 with basic features of chat, webcam, file transfer and emoticons that can incorporate in between the text in chat box. Version 3.5: Yahoo Messenger 3.5 (1.9 MB) This version has the new features of mail updates of the user account and the option of my display image. This feature enables the user to show his picture to the person with whom he/she chatting. Version 4.1: Yahoo Messenger 4.1 (2.3 MB) In this version the send contact details, message archive are introduced. Send contact details option enables the user to send the messenger list in his account to others. If message archive option is set then all the conversations done by the account user can be stored in the local system where person chats. Version 5.0: Yahoo Messenger 5.0 (2.2 MB) This version has the new feature of photo share through which two persons can share the pictures by just dragging and dropping the pictures into the sharing box. This is the great feature that had made yahoo! messenger more popular. Version 5.5.1228: Yahoo Messenger 5.5.1228 (2.6 MB) This version has the option to change the skins and the option to join the chat rooms all over the world. Version 6.1922: Yahoo Messenger 6.1922 (4.5 MB) This version ahs the feature of play game with the other person in the chat. And the other new feature is buzz which alerts the with a sound. The chat box is provided with the text format tool bar. Version 7.0: Yahoo Messenger 7.0 (8.2 MB) This version has the drastic changes and much new features than the previous versions. The IM environment option that changes the backdrop of the chat box. Version 7.426: Yahoo Messenger 7.426 (8 MB) This version has the new feature called the voice chat. With this option a person can record his voice message and send it to this other person in the chat. This feature revolutionized the yahoo! Messenger and made popular. Version 7.437: Yahoo Messenger 7.437 (8 MB) In this version we have the plug-ins of yahoo! Games, yahoo! Music and yahoo! Weather. These features enable the users to play the games, listen to music and see the weather report in certain areas all over the world. Version 7. 5.0.647: Yahoo Messenger 7.5.0.647 (7.7 MB) This version has very slight difference than its pervious versions with only new feature that is calling pc-to-pc using the VOIP protocol that is developed for voice transmission over Internet. Version 8.0.0.506: Yahoo Messenger 8.0.0.506 (10 MB) This is the very advanced version of the yahoo messenger, which has an option sending the SMS to the mobile directly to the person who has signed in into his mobile device. And the persons who are have the account into the messenger list. The new and smart tool is the audibles tool bar for chat box, which has many prerecorded audibles in different languages and different animated pictures speaking out those audibles. This is how the 11 versions of yahoo! Messenger is developed using RAD. And many other versions are upcoming using this method of software developing such as yahoo! Messenger 8.0(Beta), which is under testing phase. With in 8 years the yahoo had developed 8 versions of Yahoo! Messengers with versions numbered from 3.0 to 8.0.0.506 with pc -to-pc talk and SMS to mobile. Developing Yahoo! Messenger with Water Fall Model The first and the foremost is that in water fall model all the requirements are taken at a time. The design and coding is done in the most common way i.e. from the design phase itself it is designed. Requiremental Analysis and Design: The requirements of the yahoo messenger are the login window, chat window, the server side application for maintenance. All these are the requirements that are required for the development of yahoo messenger. The client application requirements are Login window Frame window Chat window Manage Contacts Authentication message window Then after the language in which the coding is to be done is decided. Data base for the server side application should be developed; the entire design depends on the data base that is structure to store the data of every client. The design of the yahoo messenger is taken up by the minimum and basic requirements. The design is made normally with out nay future plans. Development Diagrams The UML diagrams play an important role in the software development diagrams. These diagrams illustrate the clear cut idea of the software that is being developed. Use case Diagrams: Use cases describe the behavior of the system when one of these actors sends one particular stimulus. This behavior is described textually. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviors that convert the inputs to the outputs. The text of the use case also usually describes everything that can go wrong during the course of the specified behavior, and what remedial action the system will take. Context diagrams: A context diagram is a data flow diagram, with only one massive central process that subsumes everything inside the scope of the system. It shows how the system will receive and send data flows to the external entities involved. Class Diagrams: Class diagrams are widely used to describe the types of objects in a system and their relationships. Class diagrams model class structure and contents using design elements such as classes, packages and objects. Class diagrams describe three different perspectives when designing a system, conceptual, specification, and implementation. These perspectives become evident as the diagram is created and help solidify the design. Data Flow Diagrams: A data flow diagram (DFD) is a graphical representation of the flow of data through an information system. A data flow diagram can also be used for the visualization of data processing. It is common practice for a designer to draw a context-level DFD first which shows the interaction between the system and outside entities. This context-level DFD is then exploded to show more detail of the system being modeled. Implementation and Coding: In this phase the actually the code is developed. Before that the total code is divided into independent modules, so that the coding becomes easy. So the coding part is divided into modules such as Integration and Unit testing : After the coding is done for individual modules such as data base structure, frame work and the data base or server connectivity module are integrated into one module of code for the code to work with all the functions full. Then this code is tested after the integration is done, to check weather the code is working collectively after integrating the all the modules into one single code. In the testing phase the developed software or website is tested in two ways i.e. alpha testing and beta testing. Alpha testing is the testing done by the developers before delivering the product. This alpha testing can be done in two ways i.e. white box testing and the black box testing. The testing for all the modules is done to check weather all the code is working properly or not and to ensure that each function is fully operational while at the same time searching for the errors in the code is called white box testing. Testing the internal and primitive operations and to sure that all are working according to the specification is called black box testing. Testing done by the customer to check weather all the specification requirements are working properly is called beat testing. If any problem occurs, then the error is set up and just added to the code at the appropriate position. Maintenance Phase: This is phase in which the maximum amount of resources are used. In this water fall model the yahoo messenger requires many changes in the features for adding new features such as the voice chat, video conference, pc to pc call etc. For all these new features the present code is not venerable to add the new models or to integrate, so that the reason why all the code is developed again with new features in the water fall model which consumes more time and resources. Developing Yahoo! Messenger with RAD Instant messenger is first lunched by yahoo named as Yahoo! Messenger on 21 July 1999. The first version of yahoo messenger is version 3.0 for MAC operating system with the features of webcam, file transfer, emoticons. The important requirement of an instant messenger is chat, and this chat is enabled between system to system because the messenger chat box communicate between two systems using there MAC (Message Authentication Code) address. Windows Application version of instant messenger and web messenger are the products of yahoo. Analysis Phase In this phase the requirements such as software hard ware requirements are analyzed and listed for the usage of the development of the product. The main problem is that the windows application cannot be directly connected to the remote database (for authentication, chat, offline message). For that the web service is the best solution that can connect database remotely and can call the methods in the remote classes. Because the web service transmits the data from the remote database, and it is in very robust form to destroy. Then its is to be decided in which platform the project should be developed either in java or Microsoft .net or etc. in some cases the customer itself asks the product to be done in a particular platform. If the customer did not ask for any particular platform we can chose the platform on our own. Estimation of cost is made in this phase itself. The total cost estimation for development, maintenance, etc. the cost for development is calculated in man hours of work. Requirement analysis: Actually the requirement of an software include the requirements of the customer that he want in the software and the other software and hardware requirements that are needed for the software development. The features of the yahoo instant messenger are enhanced form version to version. There are many version of yahoo messenger from version 3.0 to version 8.1. in each version the new changes and features had been added such as voice chat, pc-to-pc call, plug-ins, IM-Environment, SMS to Mobile etc. For developing software or windows application or a web application we need software to develop such as C++, VC++, Java or Microsoft Visual Studio etc. For instant messenger we need to develop a windows application that can be run at the clients pc and we a need a web service to communicate the client-client transaction. The windows application cannot directly communicate with the remote database and cannot communicate with the other client without a web reference. So web service is used a web service for checking the authentication of the users account and his details. The first version of the Yahoo! Messenger 3.0 has only few features such as chat, web cam, emoticons. In the later version the features such as voice chat, pc-to-pc call, plug-ins, IM-Environment, SMS to Mobile added. But all these features are not added at time. They are all added for the future versions of 3.0 to 8.1. With all these requirements a prototype model is prepared. And for designing the software that prototype model should be approved by the client. Hardware Requirements For developing an instant messenger an ordinary system is sufficient. But to make the instant messenger work we need a server that acts as web service for the instant messenger to communicate between the users of the instant messenger. The uninterrupted internet connection to the server is very much important so that no users finds incontinent to work. And steps need to be taken for a fast recovery at the time of crashing of the server. Design phase First the total development of the yahoo messenger is divided into modules. Then the software diagrams are drawn for the convenient for the developing the code. First the context diagram is drawn for the project. Then comes the data flow diagrams in which the flow of the data in the project is shown. The next diagram is the ER-Diagram in which the all the parameters of the total project are represented in diagrams. This diagram is very much useful in developing a database in which a column is made for every single column in the database. In this database the data should be maintained in the tables. And these tables should have the primary keys and foreign keys (primary keys of other table in the current table is called foreign key). In this design phase it self the use case diagrams, activity diagrams and sequence diagrams are developed. Then the use case diagrams which sub parts or modules of the project. Depending on these all diagrams the total project is divided into small modules and these modules are distributed to each team for development. Time boxing is adding features to future versions of the software and developing it no time. It is very important aspect of RAD to complete the job in less time and get the best product out than other competitors. In the design phase a first a prototype model is prepared with all the requirements that are analyses in the requirement analysis phase. And for designing the software that prototype model should be approved by the client. The total project is divided in small chunks so that it would be easy to develop the software in no time. The design phase has many sub phases, they are Software development diagrams: These diagrams are very important and help a lot in the development of the project. The diagrams are Context diagrams, Entity relationship diagrams, Data flow diagrams, Use case diagrams, Collaboration diagrams, Sequence diagrams. All these diagrams act as a blue print of the development of the project and will be very useful at the time of the software development. Development Diagrams The UML diagrams play an important role in the software development diagrams. These diagrams illustrate the clear cut idea of the software that is being developed. Use case Diagrams: Use cases describe the behavior of the system when one of these actors sends one particular stimulus. This behavior is described textually. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviors that convert the inputs to the outputs. The text of the use case also usually describes everything that can go wrong during the course of the specified behavior, and what remedial action the system will take. The use case diagram gives the details of the requirements, options in the product specified by the client. These requirements dont change whatever the software development procedure used, so that use case diagram is same as that of the diagram that uses water fall model for software development. why in water fall model there is only one main class and all the other sub classes or child classes are developed under it. When a product is developed in .net, default folder AppCode is created in which all the class files, script files are developed. In the figure shown below the the authentication, chat address book, preferences are separate classes developed under the AppCode. Database Design: The design of database consists of making the data tables that are used in the project. Designing the tables includes deciding the primary keys and foreign keys in the tables and the data types of the columns of the tables. After completing all these diagrams and the database design, the project is divided in chunks and distributed among the team members for development of the project. RAD is best

Friday, October 25, 2019

The Turn of the Screw - A Look at a Criticism :: Henry James Turn Screw Essays

The Turn of the Screw - A Look at a Criticism There are many different ways to interpret The Turn of the Screw, by Henry James. Many critics over the past century have voiced their opinions about the story. Each critical analysis of the story disagrees with the beliefs expressed in another. Robert B. Heilman is a critic who wrote in the mid-twentieth century. He interprets The Turn of the Screw to be a representation of the conflict between good and evil. Heilman's points are clear and obviously well thought out, but there are flaws in his argument that make his interpretation questionable. In his 1948 essay, Robert Heilman explores the suggestion that The Turn of the Screw is a symbolic representation of the conflict between good and evil. Heilman interprets the apparitions of Peter Quint and Miss Jessel as evil forces. He explains that the ghosts only appear to the governess because evil lurks in subtlety before it strikes. It is the duty of the governess to "detect and ward off evil." She must protect the children from the awful ghosts. The governess describes Miles and Flora as beautiful little cherubs whose only fault is their gentleness (James, 18-19). Heilman views the children's beauty as a "symbol of the spiritual perfection of which man is capable." Heilman explains the ghosts' attempts to reach the children by explaining that evil forces will always try to conquer and possess the human soul. Heilman continues to draw from the descriptions of Miles and Flora to support his theories. He points out that the two children are described as having an "angelic beauty " and a "positive fragrance of purity" (James 9, 13). The governess describes them as if they are perfect and beautiful in every way. This repeated vision of beauty, radiance, and innocence parallels the image of Eden. The house at Bly also resembles this image, "I remember the lawn and the bright flowers..." (James 7). The governess makes mention of the "golden sky" and of Flora's "hair of gold," which Heilman believes connects Bly and Flora with these images of golden hues (James 7, 9). Robert Heilman perceives that the ghost of Peter Quint is a direct representation of the serpent that plagues the Garden of Eden. Heilman supports this with the description of Quint found in the text, "His eyes are sharp, strange- awfully; .

Thursday, October 24, 2019

Individualism in Literature Essay

Individualism is one of the most wondrous themes of literature because of its contribution to the pursuit of human dignity. Individualism is a moral stance and a philosophical concept which puts emphasis on the moral worth and the supreme and intrinsic value of human beings (Lukes 51). Literature has proved to be an outlet for an artist’s own definition of individualism. Due to the fact that such philosophical concept is associated with so many aspects of life including society and culture and art, authors have devoted ample time in using individualism creatively while demonstrating social awareness and way of life. Among the authors who explore the concept of individualism are Ayn Rand, Charlotte Gilman and Margaret Atwood. The characters in the literary works of such authors reflect how the pursuit for individualism can be disturbed ans stunted with the occurrence of love. Rand’s dystopian book called Anthem explores the turbulent period in which mankind is forced to live with the harsh setbacks of irrationality and collectivism, and the failures of socialistic upbringing and economics. In Anthem, a youth named Equality 7-2521 finds himself in a hidden tunnel, isolating himself from an anti-individualistic society and realizinng how much solace and solitude suit him. But his search for individualism is being disrupted by the Golden One, a beautiful peasant girl whom he considers as a valuable element in his eyes (Rand 19). In Gilman’s novel titled Herland, three adventurous friends journey into an all-female land called Herland and its women deprived of social realities of the modern world and the contribution of masculinity to their maternal well-being (Gilman 95). Atwood’s novel, The Handmaid’s Tale presents to readers the search for individualism in a Puritan society established using ruins of war. Atwood explores how love can redefine and inflluence a person’s search for human dignity in The Republic of Gilead that discourages the pursuit for individualism and legalizes slavery (Atwood 8). Individualism in Herland Herland is a novel that sees women in an isolated land become fascinated with the beauty and mystery of the real world where there is a sense of conformity and recognition for femininity and masculinity. One of the characters in book, Moadine, affirms such fascination to the societal settings of the real world by declaring how wonderful and supremely beautiful man’s civilization must be due to the countless contribution of science and technology (Gilman 96). It is clearly manifested that Moadine, being one of older women who teaches the three men in the way of life of Herland, has fallen into the conundrum of the Utopian society of the modern world. Moadine’s curiosity on the civilized ways of man which women in Herland are being deprived with becomes an avenue for them to enter in the mysterious homeland of the three men. Moadine is in charged in guarding one of the three male captives, Terry, a classic male chauvinist attempts to fascinate Moadine with his knowledge and control over the female mind (Gilman 37). Terry is a portrait of individualist kind of male who only recognizes the strength of the males and perceives women to be as secondary beings. Terry deeply resents women in Herland who can exist without the help of men and dares to call them sexless, epicene, and undeveloped neuters (Gilman 157). But the bitterness of Terry and his negative attitude towards the women are set aside upon his realization that he is madly in love with Alima (Gilman 157). Alima is one of the girls of Herland and embodies the attitudes and non-conformist traditions of the land. She is a tall long-limbed lady, well-knit and strong and agile (Gilman 18). The personality and upbringing of Alima voices out female superiority over men and her individualist character is deeply rooted out from her self-confidence and belief that women should never consent to an unequal relationship with the opposite sex. Alima’s eyes are full of splendor and mirrors out her wide, fearless and reluctance to pain and losing which is indicative of her interest as more that of an intent male playing in the field than of a female lured by ornaments and gentleness of romance (Gilman 19). Knowing that women love to mastered, Terry is convinced to woe Alima using sheer brute force, pride and passion of his strong masculine side (Gilman 146). Alima eventually fall in love with Terry and eventually marries him. Their love confirms the failure of individualism as they both try to live in the Utopian society as husband and wife. Another character in the story who reflects the failure of individualism is Jeff, one of the three explorers who found out about Herland. Jeff is the complete opposite of Terry and is strongly challenged by the independent and athletic girls of the isolated land. Jeff’s individualist attitude is seen upon his involvement with the almost natural advantages of Herland and its people (Gilman 137). Jeff becomes confounded with Herland’s way of living and declares his personal love for the land (Gilman 138). Prior to the discovery of the land, it is known that Jeff is so much absorbed with the realities of the Earth but maintains a priestly and angelic approach to masculinity and womanhood. But his individualist view of the modern world is changed upon the discovery of Herland that makes him realize that there is a better world than the real one. His profound appreciation for the Herlandian culture is evident in the way he treats it women and Jeff has refined conception about the women in Herland and deep thoughts about the idealized femininity. Jeff is strongly in love with Celis, showers her with a mystique kind of romance, and keeps on insisting that he take care of her rather than doing the typical thing of treating her as his equal better half. Jeff worships Celis and the ideals which she presented (Gilman 137). Celis’s mild-mannered attitude and vulnerability force Jeff to think that twice of going back to the real world together with Celis (Gilman 149). Van, one of the explorers and also the narrator in the novel, thinks of Herland critically and philosophically. Van has always stood at the middle ground, thinking of the Herlandian culture using science and used to argue about the physiological limitations of sex (Gilman 11). As the girls of Herland think that sex is just for procreation, both Van and Jeff have learned to overcome difficulties concerning sex. Van used to declare the discovery the land is aiming at friendship, a civilized attitude on both sides (Gilman 24). Both Jeff and Van do not want to leave the different kind of utopian society which Herland has for their own patriarchal and male-dominated world. In this notion, it is evident that Van falls in love with the perfection of Herlandian culture and the ways of its women. It is seen in the attitude of Van that he is no longer interested with the pursuit of individualism as he is so much swept off by the beauty and perfection of Herland. Van’s wife Ellador is equally intelligent as Van and is being motivated by her curiosity of the utopian modern society of her husband as well as her love for Van. Ellador explains things sweetly and kindly and thinks of Van as a wise man with no foolishness (Gilman 117). Such concept of him makes Van reluctant to rejoin the realities of his world and present to Ellador the harshness and stupidities of the Earth (Gilman 117). Individualism in Anthem The story of Anthem revolves around its protagonist, the youth named Equality 7-2521. Equality 7-2521 finds himself in an unspecified date in which mankind is forced to negate all the concepts of individuality and conform to the productive and capitalist values which technological advancement brings. It is clearly manifested in the novel that the author tries to eliminate the philosophical idea of individualism by eliminating the pronoun â€Å"I† and replacing it with â€Å"We† and â€Å"our† and other plural pronouns which are all indicative of conformity. Being the protagonist in the story, Equality 7-2521 struggles between individualism and collectivism. In the beginning part of the story, it is already given that the protagonist fears to be alone and dreads the consequences of having one head and one body (Rand 1). The protagonist is caught up in a world that views individualism as an illegal act, great transgression and source of all evil (Rand 1). Equality 7-2521 is a street sweeper who believes in the concept of individualism and discourages the collectivist society which the Council has established. He can be described as vain and self-centered, brave and intelligent. His curiousity and desire for freedom are what makes him fearless of the society of brainless drones who surround him. The protagonist is a symbol of superiority of a singular intellectual being to the homogeneity of the whole society which does not have the courage to think for themselves and is indistinguishable from each other. In order to hide from the evils of the Palace of the Great Council, Equality 7-2521 hides in an underground tunnel where he is alone and fulfils his longing for solitude (Rand 23). He describes the feeling hiding inside an abandoned tunnel and writing about his sentiments on the world which has gone wrong as a liberating experience. According to the protagonist, the air is pure and odorless in the tunnel which gives him enough strength to survive underground (Rand 23). One of the sentiments of Equality 7-2521 is that there is no solidarity among the brotherhood because almost everyone seem to have their own personal problems, ideal and aspirations. Fraternity 2-5503 is described by the protagonist as a quiet boy with gentle eyes who suddenly cries without reason and whose body shakes at night with unexplainable sobs (Rand 24). Solidarity 9-6347 also belongs to the brotherhood and is described by Equality 7-2521 as an intelligent and bright youth, sometimes fearless, and screams in his sleep at night (Rand 24). These observations instigate an idea that the protagonist may be different from those around him and realizes how disturbing and troubling it is to be different. Such realization makes him regret his differences and attempts to bring himself into conformity which the Council continuously promotes. The friendship of Equality 7-2521 and International 4-8818 is said to be an evil thing as they both exist in a time of great Transgression of Preference that declares loving someone better than the others in the brotherhood as illegal as it is written that they should love all men and make friends with all of them (Rand 11). The friendship of Equality 7-2521 and International 4-8818 is suggestive of the protagonist’s half-hearted attempts to erase all of his preferences for individual people, to help and care for each person equally, and to be identical to his fellow brothers. International 4-8818 considers the protagonist as a prophet. When he and Equality 7-2521 found out about the tunnel, he is torn between loyalty to his friend and to the Council. He represents an individual who secretly search for his own meaning but is disrupted in his pursuit because of the fear of breaking the law of the Council. Another character from the story is The Transgressor of the Unspeakable Word. The protagonist describes the Transgressor as young and tall and has hair of gold and blue eyes (Rand 26). The Transgressor suffers no pain as he is burned alive and his tongue had been torn out so that he can no longer speak of the true essence and meaning of individualism (Rand 26). It is said that the Transgressor has an honorable death as there was no pain in his eyes and no hints of agony in his body (Rand 26). It is said that there was only joy and pride, a pride holier than what is fit for the human pride (Rand 26). The Transgressor’s fate is reflective of the Council’s resentment of the word â€Å"individualism† which The Transgressor had been longing to proclaim. Collective 0-0009 is the leader of the World Council of Scholars. Equality 7-2521 considers Collective as the oldest yet the wisest of the Council who hates and fears him (Rand 42). Collective 0-0009 questions the superiority and the intelligence of the protagonist and accuses him of breaking the laws of the Council and boasting infamy (Rand 44). The individualistic view of Collective 0-0009 is seen through his appreciation of the Council as the sole brain of the society (Rand 44). Collective 0-0009 symbolizes the thinking force behind the evils of the collectivism in the society. Though he resents Equality 7-2521, the Collective 0-0009 is shapeless and cowardly and deeply reliant on the Council. When Equality 7-2521 meets the Golden One, his search for individualism is destroyed because he enters into a new phase in his life in which there is more to life than battling collectivism. He ventures into perfection and utopia that love insinuates as he no longer desires to deny that he prefers some of his fellows over the others. The Golden One is the name given to Liberty 5-3000 (Rand 19). Because the protagonist thinks about her all the time and his desire for love is overwhelming, he gives himself to the illegal deed. In so doing, he no longer presents to readers an individualistic Equality 7-2521, but shows to them that he is swept off by the utopia which love brings. Moreover, the Golden One gives the protagonist the privilege of having a meaningful relationship with another human being. According to Equality 7-2521, he feels all of a sudden that the Earth is good and that it is not a burden to live (Rand 19). It is evident from the beginning that the Golden One tends to be haughty and proud and does not recognize all of the constituents of the society except for Equality 7-2521. The Golden One strongly adores the protagonist because he is the bravest and the sharpest among the brotherhood. Such qualities of the protagonist make her subservient to him almost instantly as she initiates to take care of him as early as the third time they meet. When she follows him to the Uncharted Forest, she becomes the possession of Equality 7-2521 totally and she remains in that manner until the end. Individualism in The Handmaid’s Tale Atwood’s novel explores the theme of female subjugation set in the Republic of Gilead, a totalitarian and theocratic country that has replaced the United States of America in the map (Foster 6). The story is being narrated by Offred, one of the handmaids in the state. It is noted that the handmaids in the country are assigned to bear children for rich couples that have trouble conceiving. The country is founded by a male chauvinist, theocratic-organized military coup as a radical response to the pervasive social, moral and ecological degradation of the country. At the first chapter, the narrator briefly describes the differences between the social setting of the country prior to the establishment of the new republic and the present time in which women are seen as objects whose value depends on their ability to give birth (Atwood 9). The novel presents to readers an individualistic view of women as utilities for childbirth. Offred, the narrator, considers herself as a walking womb because of her duty as a handmaid whose only duty is to help maintain the declining white population (Foster 6). In the newly established country, women are stripped off of their economic and social opportunities and privileges and are recognized for their role of giving birth. The wife of the Commander, Serena Joy, fails is ashamed of herself because of her inability to conceive and somewhat envies Offred for her reproductive capacity (Atwood 20). Offred is a patronymic slave name that refers to the Commander which she serves, such as Fred. Offred is the protagonist in the story who reflects the failure to possess an individualistic attitude by engaging in an affectionate affair. Following a continuous prodding by the Commander’s wife, Offred succumbs to an illegal affair with Nick to save herself from the uncertainties which lay ahead (Atwood 226).

Wednesday, October 23, 2019

Business Law: Man U Break Clause Rooney Essay

‘Manchester united Footballer Wayne Rooney signs new contract worth  £30 million’. Discuss the essentials of such a contract with particular reference to the function and efficacy of the ‘break clause’ and ‘confidentiality agreement’ it contains. 1,500 words. Guidance: You do not have to discuss Wayne’s actual contract; you do have to discuss the essentials of a contract. You must discuss express terms. What is a ‘break clause’? What is a ‘confidentially agreement’? What is the purpose of such clauses? Do they protect the parties to the contract? Do not forget to cite case law. The issue that will be discussed in this essay is the break clause/exemption and confidentiality agreement with regards to Wayne Rooney’s contract with Manchester United. An exemption clause, like any other term, will be incorporated into a contract if it is contained in a signed document; this was shown in the case of L’Estrange v Graucob (1934) where the purchaser of a vending machine was bound by a very wide exemption clause contained in the small print on the order form which she had signed. A break clause is a term in a tenancy agreement that allows a tenant to leave before the tenancy period comes to an end, without incurring any financial penalty. It is not unusual for a contract clause regarding proprietary information to also be included in many types of agreements. Break clauses are inserted as standard in contracts in Spanish football, and are generally related to the total wages the player will earn throughout his contract. The insertion of a break clause gives the player (Rooney) the freedom to move if his valuation is met, but it also protects the club against players who try to force cut-price deals’. In terms of Wayne Rooney and Manchester United FC, ‘Wayne Rooney is thought to have negotiated a break clause in his new five-year contract with Manchester United’ says an article in the Times. The striker can leave for as little as  £30 million if certain targets are not met on a year-by-year basis. Article 17 of the FIFA Transfer Regulations states that players can unilaterally cancel their contract with their club after a certain protected period has expired if an amount of compensation is paid to their original club. For players over the age of 28 the protected period for their contract is two years, meaning they will be able to unilaterally terminate their contract when they are two years into it. This rule applies to footballers under the age of 28. Rooney is 24 and therefore his protected period for contract is three years, meaning he will be able to unilaterally terminate his contract once he is three years into it however Rooney is not bound by this because he has his own break clause within his own contract that allows him to leave at any time if he is offered a minimum of  £30 million. Some contracts have what is known as a confidentiality agreement, this is a written legal contract between an employer and employee. The confidentiality agreement lays out binding terms and conditions of which prohibit Wayne Rooney from disclosing company confidentials on Manchester United. The purpose of a confidentiality contract is that it; creates certainty, establishes a contractual obligation, ensures enforcement and supports a claim under general law because it creates the relationship of confidence that is the basis of many claims and it sets out in detail the conduct which the disclosing party expects from the recipient). A confidentiality agreement is in effect for the duration of an employee’s employment and for a period of time following employment termination of which is the period of 5 years in this case. In the following case by Seager Limited v Copydex Limited [1967] 2 All ER 415, Lord Denning MR established the principle that even if you do not have a confidentiality agreement in place, under equity law a person who has received information in confidence cannot take unfair advantage of it. That person must not make use of it to the prejudice of the person who gave it without obtaining his or her consent. A contract is an agreement between two or more parties. A contract is defined as, an agreement made between two or more persons or entities with specific terms made between two or more persons or companies promising to do something in return for money or money’s worth. A contract begins with an offer. The offer is an expression of willingness to contract on certain terms. It allows the other party to accept the offer and provides the basis of the agreement. To be effective, an offer must be communicated, this is to say that there cannot be acceptance of an offer without knowledge of it. A valid contract requires: an agreement; an intention to create legal relations as shown in the case of Balfour v. Balfour [1919] 2 K.B. 571, here the courts found that both parties must intend that an agreement be legally binding in order to be an enforceable contract; and consideration (unless the Contract is made by deed). Whilst each of these three requirements receives separate treatment, they must in reality be looked at together. The rights and duties of both employers and employees are to be found in the contract of employment, they are referred to as terms of a contract. Some of these terms are express terms; that is they are expressly or specifically stated, either orally, say at the initial interview, or in writing. Express terms include things like pay, hours and holidays. The law states that certain express terms must be put in writing and handed to the employee in the form of a written statement of particulars within 8 weeks of starting work. There are other contractual terms called implied terms. These are not expressly or explicitly stated because, in the main, they are fairly obvious to both parties to the contract of employment. Occasionally the courts will imply a term in a contract of employment where an important term has been left out. Implied terms include statutory rights, such as the right to equal pay and duties such as a duty of care. Each contract clause contained within an agreement is aimed at defining the rights, privileges, and commitments that each party has determined represent the terms govern their working relationship. This is the purpose of such clauses. For example, in this football employment contract, Manchester United agrees to provide Wayne Rooney with a specific set of benefits, such as salary, health insurance, a retirement plan, a football team transfer and any other benefit that both parties have agreed is necessary. At the same time, the contract will contain clauses that determine the range of services that Rooney will provide in exchange for these benefits. The idea is to include as much detail as possible, so that there is very little room for misinterpretation of what is expected of each party.

Tuesday, October 22, 2019

Elizabeth I essays

Elizabeth I essays Queen Elizabeth I was actually born named Elizabeth Tudor on September 7, 1533. She was born at Greenwich Palace and was the daughter of Henry VIII and his second wife (after Englands split from the Catholic Church), Anne Boleyn. She was crowned Queen of England on January14, 1559 and reigned for the next 44 years and 4 months. She was of average height, had red hair and brown eyes. Apparently she had a very pleasant smile, even with her black teeth. She is remembered by such names as the Virgin Queen and Good Queen Bess. Her childhood was a rather tumultuous one, with her father paying very little or no attention to her. Her governess had to even write to him saying that Elizabeth needed some clothes because all of the ones that she had were too small. Her mother was executed when she was 2 years old after being accused of adultery, incest etc. Basically Henry VII needed a way of getting rid of her for not bearing him a son. Elizabeth had three stepmothers in the first eight years of her life, two of who died. After her fathers death, the throne went to her Catholic half-sister Mary. But her policies if burning Protestants at the stake and an unsuccessful war with France, wherein she lost Callais, made her less than popular. She was always particularly suspicious of Elizabeth and kept her highly guarded after Thomas Wyatt launches a rebellion to ruin Marys plan to marry a Catholic Spaniard. Wyatt wanted Elizabeth to marry the Earl of Devon to keep Britain Protestant after Elizabeths ascension to t he throne. But when on trial, she was accused of being an accomplice of Wyatt, she proved her innocence. In her final years, Mary was unwillingly forced to acknowledge Elizabeth a successor to the throne. At age 25, she became Queen and now she would make all of the decisions. As Queen, She had many pastimes that kept her busy when she was not dealing with state matters. She played instru...

Monday, October 21, 2019

Marijuanas history in the United States Essays

Marijuanas history in the United States Essays Marijuanas history in the United States Essay Marijuanas history in the United States Essay Marijuanas history in the United States dates back to its colonization. In fact many prominent historical American figures such as George Washington and Thomas Jefferson have grown marijuana on plantations. This was mostly for the plants fiber known as hemp. Although in Washingtons case there are suspicions of weather or not he was growing for personal use as well (Andrews p. 403). But even with our presidents growing pot it was still largely unknown as a drug of abuse until the early 1940s when it was becoming popular among famous jazz musicians such as Miles Davis, and Charlie Mingus, and due to the fact that most jazz musicians who were using marijuana in this time period were black, white America saw it as a low class black mans drug. (www. erowid. org/plants/cannabis/cannabis_timeline. php3). This led to white America launching what is known as the Reefer Madness campaign. A propaganda campaign built on lies and hearsay such as, marijuana smokers, or dope fiends as the Reefer Madness films referred to them, are deviant criminals who will murder you in the street for drug money (Andrews p. 229). The campaign seemed to be working during the 40s and 50s because marijuana was still largely unknown to middle America, but in the 60s marijuana use came back in a big way with young college students, hippies, and popular musicians (Earleywine p. 295). This led people to see the truth about marijuana. That it is relatively harmless and can be used safely for recreation. Which brings us to today and the debate about whether or not marijuana should be legalized. Today in the United States Marijuana is classified as a DEA schedule I drug in all of its forms. A drug that is classified as DEA schedule I is a drug that has a high potential for abuse, has no accepted medial use in treatment in the united states, and has a lack of accepted safety for use of the drug under medical supervision. This federal scheduling was disputed in 1988 by judge Francis Young, an administrative law judge for the DEA, who recommended that marijuana be re-classified as schedule II on the grounds that if a respectable minority of doctors endorse it then it has a currently accepted medical use. (www. erowid. org/psychoactives/law). But even with the efforts of people like Judge Young, the United States is known for having fairly harsh marijuana penalties. In Britain marijuana is schedule I class B, and on July 10th 2002 was moved from class B to class C due to the British home secretary David Blunkett. Now in Britain simple possession is treated on a simple seize and warn basis. After making the decision to downgrade marijuanas scheduling Blunkett said that Cannabis is a potentially harmful drug and should remain illegal. However, it is not comparable with crack, heroin, or ecstasy. A greater differentiation between drugs which kill and drugs that cause harm is both scientifically justified and educationally sensible. (www. guardian. co. uk/drugs/story/0,2763,580507,00. html). Since this move towards decriminalization the United Kingdoms street crime numbers have been cut in half. The numbers of robberies and muggings in southern London have fallen nearly 50 percent. And in the Lambeth borough police reported 468 robberies and muggings in April as compared with the 916 last October (www. norml. org/index. cfm? Group_ID=5309). Canada is another country that is making steps toward decriminalization. On September 4 2002 members of a special Senate committee unanimously urged Parliament to amend federal law to allow for the regulated use possession and distribution of marijuana for recreational use and medicinal purposes. The committee said in its 600 page report that Scientific evidence overwhelmingly indicates that cannabis is substantially less harmful than alcohol and should be treated not as a criminal issue but as a social and public health issue Whether or not an individual uses marijuana should be a personal choice that is not subject to criminal penalties. [Therefore,] we have come to the conclusion that, as a drug, it should be regulated by the state much as we do for wine and beer, hence our preference for legalization over decriminalization. ( norml. org/index. cfm? Group_ID=5405). The researchers believe that marijuana prohibition poses a greater risk to health that marijuana use. They said in their report that We believe that the continued prohibition of cannabis jeopardizes the health and well-being of Canadians much more then does the substance itself or the regulated market of the substance. In addition, we believe that the continued criminalization of cannabis undermines the fundamental values set out in the Canadian Charter of Rights and Freedoms. Canada has also seen a drop in serious crime as a result of lax marijuana enforcement over the past decade. So if decriminalizing pot in other countries has worked than why cant it work in the United States. Studies show that Marijuana is safer then cigarettes and alcohol ( norml. org/index. cfm? Group_ID=5405), and that decriminalization will allow law enforcement agencies to concentrate their efforts on more serious problems, and will generate more money for the economy. Studies show that the health issues that marijuana raises are actually less hazardous then cigarettes. Studies also show that marijuana is not a gateway drug, it does not lead to the commission of crime, and that users are not likely to become dependent. One study also showed that it is easier for underage teens to obtain pot then tobacco ( norml. org/index. cfm? Group_ID=5386) despite the fact that tobacco is targeted at adolescents (Shepard, Greene p. 213). This shows that our nations drug war is failing and that our resources need to be targeted elsewhere. Canadian justice minister agrees with this statement saying that If you look at the system [America] has in place, keeping marijuana criminal is not very efficient, police currently spend too much time and resources prosecuting marijuana offenders. ( norml. org/index. cfm?Group_ID=5350). Legalizing marijuana would also have positive effects as well. A Nevada proposal to regulate and tax marijuana use by adults would raise an additional $28. 6 million in annual state revenue, according to a study by the Center for Business and Economic Research at the University of Nevada at Las Vegas (UNLV). The Center based its financial calculations by estimating that 75,000 people five percent of the states population would use an average of 12 grams of marijuana per month. The Center imposed the same tax rate on marijuana that already exists on tobacco products (norml. org/index. cfm? Group_ID=5439). In conclusion marijuana should be legalized in the United States for not only medicinal but recreational use as well. The evidence makes it obvious that marijuana is not dangerous and can make our country better if we legalize it. The appointees in the Shaffer commission knew it when they recommended the decriminalization of pot to President Nixon in 72 (www. erowid. org/plants/cannabis/cannabis_timeline. php3), Jimmy Carter knew it when he endorsed the decriminalization of marijuana in 77, and now you know it.

Sunday, October 20, 2019

How and When to Control Paper Wasps

How and When to Control Paper Wasps Though paper wasps are beneficial insects, they tend to nest in close proximity to people, putting us at risk for stings. In some cases, it may be necessary to control paper wasps to minimize such risk. What Are Paper Wasps? Paper wasps construct the familiar, open-celled paper nests we often see suspended from eaves or porch ceilings. Most paper wasps  in North America belong to the genus Polistes. Although their tendency to sting in defense of their nests can be of concern, these wasps do serve an important ecological purpose as predators of other insects. They collect caterpillars, beetle larvae, and other insect prey to feed their young. Dont be too quick to get rid of a paper wasp colony if it isnt causing a problem.   Each year, the paper wasp queen must build a new nest, which she does by masticating wood fibers into a pliable pulp. After she raises her first generation of eggs, these offspring will assume the role of construction workers, expanding the nest to meet the needs of the growing colony. By summer, the paper wasp nest can be quite large, reaching a width of 6–8 inches. In fall, freezing temperatures will kill all but the queen, who seeks shelter and hibernates for the winter. The nest degrades over winter and is rarely reused the next year. As with any insect, its important to identify it before determining how and when control is necessary. Be sure you know the differences between wasps, yellowjackets, and hornets before taking action. Do Paper Wasps Sting? Paper wasps can and will sting in defense of their nest or when threatened. Unlike honeybees, which have barbed stings and can sting only once, paper wasps can sting multiple times. A paper wasp can call other colony members using alarm pheromones, chemical messages that tell other wasps to help defend the nest from a threat. Try to stay calm and avoid swatting at paper wasps. Consider Coexisting Peacefully Before you do anything to get rid of paper wasps around your home, ask yourself if you can tolerate their presence. Paper wasps help keep hungry caterpillars and other plant pests in check, benefiting your landscape and garden. If a paper wasp nest is located on your property but away from high-use areas, consider leaving it alone. Although they do sting, they do so only in response to a threat. Humans and paper wasps can often coexist peacefully. Obviously, when someone in your household has a wasp venom allergy, you may need to remove any nests to minimize the risk of an allergic reaction to a sting. Use Caution Around Wasp Nests If a nest is located near an entrance to your home or by a porch or deck where you spend a lot of time, you may need to take action to control paper wasps. Check eaves, shutters, and other high-traffic areas in your yard early in the spring, when paper wasp queens are first building their nests. If you find one early in the spring, before the first generation of workers has reached adulthood, you can simply knock the nest down with a broom to discourage the queen from nesting in that location. Larger nests, or those found later in the season, should be handled cautiously. Never attempt to remove an active wasp nest during the day, when the insects are actively flying in and out of the nest. Wait until evening, when the paper wasps have settled in for the night, to treat or remove any nest. During periods of cool weather, you may be able to treat wasp nests, as the insects become lethargic when temperatures dip down to 50 F or lower. Advice on Using Sprays Chemical pesticides should be used as a control method of last resort for any insect pest. In this case, the safest method of eradicating paper wasps in a problem area is, indeed, with a commercial wasp spray. Look for a product labeled for use on wasps and hornets, and remember, the label is the law. You must read the label and follow all directions for using any pesticide product. Wasp sprays usually come with a propellant that allows you to spray the pesticide from a safe distance. Coat the nest in the pesticide, covering all the cells of the nest. Never stand directly below a paper wasp nest while applying the pesticide. Wasps may drop from the nest, and you also risk getting the chemical in your eyes or on your skin. Check the nest the next day for any signs of wasp activity. Before you remove a nest, you must be sure that no workers survived the pesticide application. Wasp sprays kill on contact. Wasps that were absent from the nest at the time you sprayed may return to the nest site. If you dont observe live wasps near the nest, use a broom or other long-handled tool to knock it down. Dispose of the nest by putting it in a sealed baggie and placing it in your household trash. Sources Cranshaw, Whitney. Garden Insects of North America.North Carolina Cooperative Extension. Controlling Paper Wasps In And Around Structures.University of Minnesota Extension.  Wasp and Bee Control.

Saturday, October 19, 2019

Water Privatization in Argentina Essay Example | Topics and Well Written Essays - 1250 words

Water Privatization in Argentina - Essay Example Owing to the presence of outstanding externalities, there is the need for the proper elimination of sanitation residuals that taint the sector. Water privatisation seeks to participation of the private sector with regard to provision of sanitary and water services to residents of the said region. The concept of water privatisation has remained controversial the world over, with the proponents presenting the efficiency and quality services delivered. Privatisation in the water industry often entails three aspects namely outsourcing, design, building and operation, and asset sale. This way, private companies can be contracted to provide various water and sanitary services in accordance to the stipulations agreed on. The companies are often required to design, build and operate a comprehensive system for the dispensation of water services to residents. The process also involves the release of government-owned assets or companies to the private sector for running and maintenance. This pa per seeks to highlight water privatisation in Argentina with regard to history and aspects relating to effects in the society. Privatisation was widespread throughout Latin America in the 1990s including Chile, Brazil, Bolivia, and Argentina to name but a few. During the early 1990’s privatization of services and liberalization of exchange and trade systems was regarded as an easy solution to the problems of deteriorating infrastructure and unbalanced public finances. These changes contributed to economic stability and increased growth as part of a program of direct foreign investment that began in 1995 until the late 1990’s when political instability and social tensions affected economic performance. Argentina forms a prime example of privatisation in the water sector that received backing from the International Monetary fund and the World Bank (Huey, 2010). The period between 1991 and 1999 saw the successful privatisation of water and sanitary services in Argentina t o covering 60% of the population in 28% of the countries municipals. Previously, water services had been under the management of public enterprises at the provincial level and as such, the government had no jurisdiction with regard to privatisation (Galiani et al, 2005).Under these circumstances, the country relied on a single company, ObrasSanitarias de la Nacion (OSN), to deliver water and sanitary services. The company held the largest operation in its mandate with regard to infrastructure and clientele. Seeing the need for change in the status quo, the World Bank exerted pressure on the Argentine government to decentralise the services (Olleta, 2007).The privatisation of OSN came about three years later after the initial appointment following restructuring changes that were required. A French company through its subsidiary, sought to purchase the government-run water company and establish a new company by the Aguas Argentinas. This move was aided by the World Bank who has stakes in the consortium as it funded the company in support of the comprehensive privatisation program. The company was charged with task of supplying clean water to the citizens as well as transporting and treating sewage. The company made returns on their investment and was regarded as a success owing to their enormous profits (Public Citizen, 2003). The concession contract was, however revoked in 2006 after 13 years of services to the citizens; with the main reason believed to contribute to the cancellation of the concession was the economic crisis in the years following 2000. The government argued that the company failed to achieve its targets as cited in the contract with regard

Friday, October 18, 2019

LANGUAGE TESTING Essay Example | Topics and Well Written Essays - 2250 words

LANGUAGE TESTING - Essay Example This form of direct oral testing is known variously as "oral interview", "oral test", or "oral examination". I will refer to it here as "oral examination", as I am dealing mainly with examinations in a university context. The literature on language testing has identified a number of unsolved problems with oral examinations. Much of the discussion has centred on the issues of validity and reliability, but problems in the practical administration of oral examinations have also received comment. The fundamental problems with oral examinations are those of reliability (i.e. the consistency with which different examiners mark the same test, or with which the same examiner marks a test on different occasions) and validity (i.e. whether or not an oral test assesses what it sets out to assess). The reliability of oral examinations has been seen as a serious problem right from the start of research on this topic. Spelberg et al. (2002) report very low correlations, averaging only .41, between the marks of different examiners, although Taguchi (2005) points out that "the nine examiners who marked sixteen candiates [ . . . ] in this study did not have marking schemes, were given no training, were unstandardized and were given no criteria for judging candidates ability", so the discrepancies in their judgements are perhaps not such a surprise. Spelberg (2000) describes the usual ways of testing oral ability as "impressions from memory or haphazard interviews" and writes that "the vast majority of cases [ . . . ] are not reliably separated into levels of speaking ability by this approach, because of the complexity of the language and non-language factors involved". Michael (2001) states that for tests based on free conversation "the problems of sampling, and reliable scoring ar e almost insoluble, unless a great deal of time and many

(industry FIVE FORCES analysis chapter) in my dissertation Essay

(industry FIVE FORCES analysis chapter) in my dissertation - Essay Example Bargaining Power of Suppliers Major suppliers of chemical manufacturers include: oil and gas companies (Data Monitor, 2011, p. 13, 16). Even though oil and gas products are homogenous or undifferentiated by nature, we should keep in mind these materials are non-renewable items. As a common knowledge, there is no other product substitute for oil and gas products. Considering the fact that there are only a few numbers of large-scale companies that could supply oil and gas to chemical manufacturers, the bargaining power of suppliers is considered high. Therefore, chemical manufacturers do not have the power to control the market prices of oil and gas products. Due to the fact the number of oil and gas suppliers is relatively few as compared to the number of chemical manufacturers around the world; the cost of switching from one supplier to another and suppliers’ dispensability is moderate (Data Monitor, 2011, p. 16). Bargaining Power of Buyers Large multinational companies that u sually purchase chemicals on a daily basis include manufacturing companies that manufacture the following items: plastic, perfume, pharmaceutical products, soap and detergents, shampoo, and people who are involved in agricultural businesses among others (Data Monitor, 2011, p. 13, 15). ... By nature, chemicals are undifferentiated products. For this reason, the buyers’ cost of switching from one chemical manufacturer to another and product dispensability is low (Data Monitor, 2011, p. 15). Even though establishing a strong business relationship with chemical manufacturers increase customer loyalty, the fact that the cost of switching is low makes the buyers’ tendency to switch from one chemical manufacturer to another moderate. In most cases, potential buyers are sensitive to price. Therefore, the only way for chemical manufacturers to persuade potential buyers to purchase their products is for them to be able to manufacture their products at a lower price. Rivalry among Existing Firms Competitors within the chemical manufacturing industry includes chemical manufacturers of basic chemicals (i.e. petrochemicals and plastic resins), specialty or fine chemicals (i.e. additives, paints, coating, fragrances, soaps, and detergents), pharmaceutical products (i.e . medicinal active ingredients and formulations), fertilizer and agrochemicals (i.e. chemical fertilizers and herbicides, insecticides) (Data Monitor, 2011, p. 7). Because of the continuously increasing number of chemical manufacturers in the global markets, the market competition within the chemical manufacturing industry is intensely competitive. In fact, there are quite a lot of local and international companies that are continuously competing for the same group of customers. Upon analyzing the chemical manufacturing industry, it is clear that the rivalry among the manufacturers of chemicals is very intense due to the fact that these companies are

Toxicology Research Paper Example | Topics and Well Written Essays - 250 words

Toxicology - Research Paper Example Methyl mercury can coordinate (bond) to more than one cysteine amino acid. Unlike ingested inorganic mercury, ingested methyl mercury is easily absorb by the gastrointestinal tract and found its way into the blood, where its forms bonds with the thio groups in cysteine of amino acids, peptides, and proteins. The methyl mercuric-cysteinyl compound or complex mimic another essential amino acid, known as methionine, and it is, unfortunately, recognized by amino acid transporting proteins in the body as methionine (Kerper, Ballatori, & Clarkson, 1992). Thus it is freely transported throughout the body to various parts including the brain and across the placenta, where it is absorbed by the developing fetus. It causes several health disorders in the body. Hence, methylation turns metal mercury into a toxic compound. Bibliography Kerper, L. E., Ballatori, N., & Clarkson, T. W. (1992). Methylmercury transport across the blood-brain barrier by an amino acid carrier. Am. J. Physiol. , 262 .

Thursday, October 17, 2019

How to run a good business Essay Example | Topics and Well Written Essays - 250 words

How to run a good business - Essay Example After all this is done, we'll have to find a suitable place to set up the firm (where the demand of the business is more), the suitable people to run the business, proper equipment and assets and full fledge advertising to promote the business in order to attract the customers. As far as the Samah caf' is concerned, the owner would have to arrange for a large amount of capital to start off with the business as the assets and equipments used in the business will have to be state-of-the-art, up-to-date. Secondly, Samah caf' will have to opt for a suitable place to set itself up where mostly the upper class citizens or the tourists live, as the main market of the business will be sheikhs, the upper class citizens of the city and the tourists. Once the location of the business is decided, it will then have to move its attention towards the qualified staff that would be required to run and maintain the business, as they play a vital role in satisfying the customer needs as they have specialized in that field.

Wednesday, October 16, 2019

On Religious liberty Essay Example | Topics and Well Written Essays - 750 words

On Religious liberty - Essay Example The author argues that the demand for human freedom regards proper human spirit values. It also regards free exercise when it comes to society religion. Murray takes a careful note on these desires that met have put in their minds. He declares them to be in accord with justice and truth. To this point, the article seeks into the church doctrine and sacred traditionof which the current church keeps on bringing forth new aspects that are in accord and harmony with the old ones. There are two key points that the author has chosen to emphasize on. First, the author asserts that all human beings have the right of exercising free religion in their societies in accord with the dictates of their personal conscience. He claims that this is according to the right of nature. Essentially, this right belongs to the human being’s dignity as such. In the second point, the author asserts on the consequences that the judiciary has on this right. He asserts that obligations fall on other people in the society in order to acknowledge these personal rights, promote, and respect its free exercise. Generally, this is the center of all matters in this article. About the structure of the document, the author of the article presents two texts. The first text is Decree on Ecumenism (Chapter Five) â€Å"On Religious Freedom†. The second one is Bishop Emile De Smedt’s relation, of Bruges. This is the most important latter document, because it brings out a length decree rationale. The author therefore undertakes to state a briery the tenor and scope of the decree in relatio’slight. These two texts represent the entire issue and lengthy development concerning theological thought about the issue. The author uses theological concept and terms to support his opinion. For instance, he points out that the quest of man to God and his adhesion to God’s truth, must be free. He further asserts that, this is a divine law itself

How to run a good business Essay Example | Topics and Well Written Essays - 250 words

How to run a good business - Essay Example After all this is done, we'll have to find a suitable place to set up the firm (where the demand of the business is more), the suitable people to run the business, proper equipment and assets and full fledge advertising to promote the business in order to attract the customers. As far as the Samah caf' is concerned, the owner would have to arrange for a large amount of capital to start off with the business as the assets and equipments used in the business will have to be state-of-the-art, up-to-date. Secondly, Samah caf' will have to opt for a suitable place to set itself up where mostly the upper class citizens or the tourists live, as the main market of the business will be sheikhs, the upper class citizens of the city and the tourists. Once the location of the business is decided, it will then have to move its attention towards the qualified staff that would be required to run and maintain the business, as they play a vital role in satisfying the customer needs as they have specialized in that field.

Tuesday, October 15, 2019

Biography of Emmanuel Kant Essay Example for Free

Biography of Emmanuel Kant Essay Known by many in the field as the father of modern philosophy, Immanuel Kant questioned many of the assumptions held in his day. He focused much of his work on the realm of human thought, understanding, and potential. His ideas about observation, learning, and experientialism set the precedent for all philosophers who followed him. Born in the early 1720s, Kant lived in what was known as East Prussia (now a part of Kaliningrad, Russia). There, he was able to secure a teaching position for nearly ten years when he began working at Konigsberg University. He would remain a part of their staff for nearly five decades contributing to the rise and popularity of philosophy of the day. Not much more is known about Kant’s earlier life. He did go on to having several of his pieces published, although none were an exact autobiography. In his Critique of Pure Reason, he discussed and raised interesting points about human knowledge. Instrumental on Kant’s own ideas was the work of philosopher David Hume, who agreed that human experience could be used for understanding, but that it should not be used to explain every phenomena we encounter in nature or in the real world. Kant built upon this idea. He stated that new experiences could be formulated based on past experiences because it our past that helps us learn about our future. He believed that the human mind organized events and ideas into categories that could be accessed later to determine how we might react in a certain experience. He came up with the word to describe the paradox of understanding: noumena. Kant’s own arguments about the existence of God were also not well accepted at his time. He believed that man could not rationalize God because it was not something that we had experienced before. In other words, we might be able to attribute certain characteristics to Him, but it is ultimately limited by our own human understanding of the universe. In essence, we could never come close to truly understanding who God is and predict what He is going to do. |[pic] |[pic] |[pic] |[pic] |[pic] |.

Monday, October 14, 2019

Roles and Functions of Social Workers in England and Wales

Roles and Functions of Social Workers in England and Wales Introduction The definition of social work is very complex and controversial. There is no generally accepted definition of what social work is. Social work sits within the broader range of the social care sphere. (Horner, 2003, p.2) There are three views of social work. The first is the reflexive-therapeutic views. This view sees social work as seeking the best possible well being for individuals, groups and communities in society. (Payne, 1997, p.4) The other view is the socialist-collectivist views; this view sees social work as seeking cooperation and mutual support in society so that oppressed and disadvantaged people can gain power over their own lives. (Payne, 1997, p.4) The last view is the individualist-reformist views. This view sees social work as an aspect of welfare services to individuals in society. (Payne, 1997, p.4) There is a general consensus amongst writers that the three different views are present within the social work discourse. (Payne, 1997, p.6) The International Association of Schools of Social Work and the International Federation of Social Workers defined social work as a profession that, ‘’promotes social change, problem solving in human relationships and the empowerment and liberation of people to enhance well beingsocial work intervenes at the points where people interact with their environment. Principles of human rights and social justice are fundamental to social work ’’. (Citied in Horner, 2003, p.2) Another definition of social work that was propounded by the former minister for health, Jacqui Smith is as follows, ‘’social work is a very practical job. It is about protecting people and changing their lives, not about being able to give a fluent and theoretical explanation of why they got in to difficulties in the first place .New degree courses must ensure that theory and research directly informs and supports practice. The requirements for social training work set out the minimum standards for entry to social work degree courses and for the teaching and assessment that social work students must receive ’’. (Horner, 2003, p.2) The major difference between these two definitions is that the first definition fails to emphasise the control element of social work practice, which involves the use of legislation by the state to intervene and protect vulnerable children and young people who are at risk, to enforce mental health treatment and services and to pr otect vulnerable older people. (Horner, 2003, p.3) The second definition focuses on social work as a ‘rational technical activity and its inherent anti-intellectualism’. (Horner, 2003, p.3) This essay will examine the current roles and functions of social workers in England and Wales. Key roles and skills of social workers A lot is expected from social workers. Society expects social workers to protect and care for citizens deemed in need of protection and care and at the same time to care and protect the community as a whole. (Horner, 2003, p.5) A social worker is employed by the local authority, on behalf of the state and has to work within the confines and constraints of the law. (Horner, 2003, p.4) A social worker must at all times been conversant with relevant legislation and procedure and must abide to them. The social worker is always faced with balancing the rights of vulnerable individuals to fulfil their wishes, whilst at the same time carrying out the state’s need to protect all vulnerable people, sometimes by restricting rights and liberty of others. (Horner, 2003, p.4) Generally, a social worker is there to give help and support to people who are going through a difficult patch in their lives. A social worker has to ensure that the rights of service users are identified and promoted. (Lymbery and Postle, 2007, p.23) A social worker is a paid professional, ‘’who aims to assist people in overcoming serious difficulties in their lives by providing care, protection or counselling or through social support, advocacy and community work’’. (Collins, 2006, p.516) The role of a social worker is to assist people who are socially excluded from society and are experiencing difficulties in their lives, to get back on their feet. The process of social exclusion revolves around five components: poverty and low income; lack of access to the job market; lack of social support and networks; the overall condition of the local neighbourhood; and exclusion from services. (Collins, 2006, p.505) The role of the social worker is to tackle social exclusion and promote social inclusion. The social worker needs to address approach to practice that will effectively strengthen social networks, maximise options for income and ensure that services are more accessible. (Collins, 2006, p.505) Social workers have specific legal duties that distinguish them from other groups. A social worker investigates allegations of child abuse. A social worker can apply where necessary and appropriate for a person to be detained in hospital, when his or her mental state presents a risk of harm to self or to other members of the public. A social worker also supervises children in care of the local authority. (Thompson, 2000, p.2) A social worker requires skills in making assessments personally or jointly with service users and their families in order to discover the strengths, needs and preferred need for each particular service user. The social worker needs to treat each service user as a unique individual and accord the service user the respect he or she deserves. A social worker should be skilled and knowledgeable on how to handle hostile and aggressive situations, without putting her safety or the service user at risk. Most importantly, knowledge of the law, policies and regulations affecting social work practice must be mastered by the social worker. A social worker is charged with caring for the entire community by protecting and promoting the welfare of the community as well as that of the individual. This might mean enforcing some elements of control over an individual. This at times leads to conflicts and tensions as the social worker is caught in between the community and the individual. (Thompson, 2000, p.3) Social workers work with young people and their families as well as the elderly. Social work is divided in to adult services and Children services. Adult services includes, working with people with mental health problems or learning disability. Adult services can also include working with people in residential care, working with offenders in the community or working with the elderly. Children and family social work, is a branch of social work, where the social worker provides assistance and advice to keep families together. It can also involve work in children’s home or providing support to younger people leaving care. I will focus on children and families social work. Social work with children and families spans a wide range of activities primarily directed at protecting the child. (Cree and Davis, 2007, p.15) It is often a very controversial and volatile area because of the state interference with family life. The government has introduced a lot of policy and organisational changes in children and family services in recent years that have greatly changed the terrain of children and family social work. The 1989 and 2004 Children Acts as well as key policy document such as Department for Education and Skills 2003, Department of Health and Department for Education and Skills 2004 and Secretary of State for Health 2003, have all combined to create a role for social workers which combines contributing to the assessment of the needs of children and young people, protecting them from harm and consulting with other relevant agencies to deliver services that promotes the children’s well being and s afety in partnership with the social workers and their families. (Cree and Davis, 2007, p.15) Social work within the social policy frame work Collins defined social policy as, ‘’government policy in the area of welfare, and the academic study of its development, implementation and impact’’ (Collins, 2006, p.507) Modern social work is no longer based on the poor law parish structure, but is governed by legislation and delivered through local government structures, however, some voluntary sector organisations, many of which have their origins in the established and non-conformist churches still provide some services for those that are socially excluded. (Horner, 2003, p.17) Contemporary social work can be seen to play a crucial role in relation to current social problems, concerns about wide spread substance abuse and problems of social disintegration among others. (Horner, 2003, p.26) Social work deteriorated in the 1980s and 1990s in Britain under the Conservative government. There was little direct political concern with social services during the Conservative, Thatcher administration. (Payne, 2005, p.97)The reasons for the deterioration were: ‘’service failures, particularly in the area of child protection; a professional attack, both from the right wing and the left wing on its social policing role and a political attack on its role in the welfare state’’. (Payne, 2005, p.94) The Labour government under Tony Blair came in to power in 1997. According to Payne, ‘while social care was not a major plank of policy, it was affected by general government policies and priorities, which focused on education and health’’. (Payne, 2005, p.103) The government initiated a modernization agenda which focused on effective delivery of services; including cooperation amongst the multi-agencies and involving service users’ ow n priorities. The government laid a lot of emphasis on improved care for children and the mentally ill. However, most of the labour government’s policy were slowing building on past policies and did not take a new direction. (Payne, 2005, p.103) The labour government introduced the quality improvement projects. The labour government also brought about increased legislation in to the realm of social work. The General Social Care Council was also set up to take over responsibility for regulating social work education. Mental health social work has seen a lot of changes in recent years. The 1980s and 1990s saw the closure of the many long stay Victorian asylums and the development of community based alternatives. (Cree and Davis, 2007, p.60) The Mental Health Act 1983 was a land mark legislation in many respects. Section 114 of the Act requires local authorities to provide an approved social worker for mental health service users. The NHS and Community Care Act 1990 provided a frame work for the organisation and delivery of services under existing legislation. The Act tried to alter the balance of care in four fundamental directions: ‘’ from institutional care to community based care; from public sector to independent sector provision; from NHS to local government responsibilities and from supply led services to needs led services’’. (Horner, 2003, p.76) The social worker had a key role to play in identifying the range and location of services. (Horner, 2003, p.77) The Children’s Act 1989 reformed the law relating to children. Contemporary social work practice with children, young people and their families is largely governed by the Children’s Act of 1989. (Horner, 2003, p.46) The Children’s Act 2004 provides the legal basis on how social workers, collaborate with other agencies to ensure that the best interest of the child is protected and achieved at all times. The Human Rights Act 1988, incorporated in to English laws, the European Convention on Human Rights. It gives individuals the power to challenge gross abuses of civil liberties and it also requires legal an administrative action to take account of human rights in the course of any action they under take. (Payne, 2005, p.104) The future of social work in England and Wales appear to lie in a range of roles in diverse services, heavily regulated by the government and the development of multi professional work, where the social worker interacts with other professions roles. (Payne, 2005, p.105) Professional principles and values of social work Social work is a highly regulated profession these days. It is a very difficult and complex profession and any one coming in to the profession will need to exhibit the right temperament. You will need to be in control of your emotions at all times and also avoid being judgemental or stereotyping people. There are professional principles and values social workers must exhibit. A social worker at all times must maintain the dignity and worth of service users. The social worker should always bear in mind, that she is there to help the service user get back on his feet and not to control him or run his life. A social worker ought to be aware and value the rights and duties of individuals, their families, groups and the entire community at all times. A social worker must believe in the principle of social justice. This includes ‘’fair access to public services and benefits to achieve human potentials; social development and environmental management in the interests of present and future human welfare’’. (Horner, 2003, p.135) A social worker will need to treat all service users with respect and without any bias based on their sex, colour, or creed. For example, a social worker should have an open mind when working with a paedophile or some one that is mentally unwell. A social worker’s primary objective is the promotion of social justice. The social worker has as one of his fundamental goals, to meet the personal and social needs of service users in order to help them meet and develop their potentials. One core value of the social worker is confidentiality. A social worker must maintain absolute confidentiality when dealing with a service user. The social worker should not divulge any information without first obtaining the consent of the service user. This also goes to show that the case worker respects the service user. A social worker must possess integrity. This comprises all the elements of honesty, reliability, openness, equity, and fairness. A social worker needs to be competent in the discharge of her duties. This entails keeping abreast with new laws and legislations in the field of social work. A social worker needs to address at all times, injustice in the system and explore ways of eliminating them. The social worker should also expose any bad policies that contribute to hardship and social exclusion in society. The social worker should also at all time up hold the civil and political rights of service users as well as their economic and social rights. Conclusion Social work has a long way. The profession of social worker is highly regulated today in England and Wales. The work of the social worker is to help vulnerable people in the society, within the constraints of legislations, so that they can get back on to their feet and get on with their lives. A lot of professional principles and values are expected to be imbibed by the modern social worker. Despite the very complex nature of social work and countless policies and legislation, the value of the social worker in our society today can not be overemphasised. Social workers today are highly trained professionals who despite their challenging and demanding jobs continue to ensure that vulnerable people and those that are socially excluded are given all the protection and support they need in order for them to take back control of their lives. Bibliography Collins (2002) Internet based dictionary of social work, Harper Collins, Glasgow Cree, V.E and Davis, A (2002) Social work, voice from the inside, Routledge, Oxon Horner, N (2003) What is Social work? Context and Perspectives, Learning Matters, Exeter Koprowska, J (2008) Communications and interpersonal skills in social work, 2nd Edition, Learning Matters, Exeter Lymbery, M and Postle, K (2007) Social work: A companion to learning, SAGE, London Payne, M (1997) Modern social work theory, Palgrave Macmillan, Basingstoke Payne, M (2005) The origins of social work, Palgrave Macmillan, Basingstoke Shardlow, S and Payne, M (1998) Contemporary issues in social work: Western Europe, Arena, Aldershot Thompson, N (2000) Understanding social work, Palgrave Macmillan, Basingstoke