Thursday, October 31, 2019

Source evaluation Essay Example | Topics and Well Written Essays - 750 words - 3

Source evaluation - Essay Example This source is reliable, considering that it has drawn its content and conclusions from other scientific studies. This being the case, the source presents a well-balanced argument from both sides, backed by the relevant scientific data collected by the scientific studies. The conclusions and arguments of the source have been drawn from a data set comprising of responses from questionnaires sent to over 7,000 doctors, which was compared to responses obtained from 3500 professionals working in different fields (Chen, n.p.). Thus, while there is the element of the doctors being prone to long working hours, the major influential factor in the doctor’s burnout, was their immediate involvement in front-line access to care (Chen, n.p.). The source therefore does not present any form of bias. The source presents a well-balanced argument, considering that it draws its argument from scientifically conducted studies, as opposed to mere observation regarding the lack of competency of the doctors. The balanced argument in the source is presented through the presentation of the problem on the one hand, and the explanation of the causes of the problem, on the other hand. Therefore, while the source argues for the existence of doctor’s burnout problem, it gives the relevant explanation, that the causes of such burnout could range from the limited time that the doctors are allowed to be with the patients, to the prescription restrictions offered by the health insurance companies (Chen, n.p.). Further causes could be the lack of sufficient empathy from the doctors, to increased rate of errors, which may be caused by involvement in other administrative tasks. Further, to balance the argument that doctors are increasingly demonstrating signs of classic burnout; the source draws backing from a real life situation, where there is an increase in the number of the Americans who are seeking medical services without being insured.

Tuesday, October 29, 2019

WRITTEN CRITIQUE OF SCHOLARLY ARTICLE Research Paper

WRITTEN CRITIQUE OF SCHOLARLY ARTICLE - Research Paper Example This section provides sufficient summary of various aspects included within the study. The methodology, results and conclusions have been effectively summarized within the abstract. These summaries remain fundamental in enabling other individuals making reference to the article to understand its relevance even before perusing through the details contained inside. The abstract also contains a summary of the keywords that have been included within the research. These words are essential in seeking to enable individuals to understand the contents. The research was conducted by eleven researchers most of whom have been involved in numerous academic institutional departments. As individuals who are actively involved in the educational sector, they have the right qualifications to be able to undertake a probe of such nature. The author affiliations have been provided, and this is essential in increasing reader confidence in the results of the research. The article containing these research findings was published in the Annals of Behavioral Medicine, which is a peer-reviewed medical journal with an impact factor of 3.169 as of 2012. The credibility of the authors and the impact factors of the journal, in which the article was published become basic elements that enhance the confidence of the findings established by the investigators. The theoretical framework has not been clearly described. Despite the importance of this framework in research studies, the lack of the conceptual framework within this research does not change the significance of the study. The study focuses on seeking to establish the effectiveness of tobacco tactics intervention, and background information has been provided regarding the topics being reviewed. The background information plays a significant role in informing other researchers on various aspects, which have been included. Though not clearly outlined, the various aspects of the framework are

Sunday, October 27, 2019

Automatic Fire Alarm System (A-FAS) Design

Automatic Fire Alarm System (A-FAS) Design ABSTRACT The safety of the environment and individuals is monitored and maintained by the important role fire alarm systems play. Although, the usability of many of the existing fire alarm systems is known by the users, however, they are produced with high cost thus not reasonable for the low-income users. The main objective of this project is to design a prototype of an automatic fire alarm system (A-FAS) with low cost. The A-FAS designed in this project contains two systems, the detection system and the alarm system. The detection system operates as the fire detector and consists of a smoke detector, heat detector and an emergency switch as a manual call point. This paper discusses the design and implementation of a microcontroller based fire alarm system. The detectors are placed in different zones and any signal from any detector at any zone will activate the alarm system. The alarm system consists of LEDs, LCD notification, buzzer and text message notifications. Furthermore, the system i s fitted with sensors at different zones to identify the presence of individuals, this feature aids the monitoring process of the system. The entire system is controlled by a microcontroller which is programmed using Arduino compiler. Upon completion of the prototype, the A-FAS detects smoke or any rise in temperature sensed by the detectors. Finally, when any of the sensors are triggered, the buzzer operates and the system sends a text message to the saved number. With the development of A-FAS, the safety of individuals and surroundings will be increased as the low cost of the system will promote users of all income levels to have one at their place or home. INTRODUCTION An overheated electrical appliance, a burning splinter or a burning cigarette or just about any of these can trigger a fire. Moreover, the presence of nylon settings and a sofa set which emanate poisonous gases if on fire, will render people helpless in a couple of minutes, before even realizing what is happening. ADT Security Service and the Chubb Alarm are the well-recognized companies that deal with security systems and have been the innovative leaders in security systems. The products offered by these companies vary from intruder alarms to highly sophisticated fire alarm systems. Furthermore, the systems built by these companies are high in cost and require a scheduled maintenance to be carried out by the companys specified authorities. Based upon the current existing high cost fire alarm systems that are available in the market, an automatic fire alarm system with low cost has been developed. The A-FAS consists of two subsystems; detection system and alarm system. The A-FAS detection system has smoke detecting capabilities as it incorporates an optical smoke detector. Moreover, it is interfaced with heat detector and an emergency switch. The system features counting capabilities based on infrared sensors to ease the determination of individuals in case of emergency. The A-FAS alarm system is associated with the detection system to ease the process of alarming individuals in the event of fire. The alarm system consists of LED and LCD notifications displaying the location of the fire. A buzzer is also incorporated in the system. The system sends text message alerts as it incorporates a GSM module. Finally, the main part of the A-FAS that controls the entire operation is the microcontroller. This thesis describes the design and operation of a microcontroller based fire alarm system that could contribute to saving lives and reduce property losses with low cost. Aim The main purpose of this project is to design and prototype an automatic fire alarm system (A-FAS) with effective and competitive usage and can be produced at a low cost. This system is designed to be easy to operate by any user and is user friendly. The A-FAS is also been designed using minimum hardware at the lower level of processing. The system is not restricted to the mentioned inputs and outputs, however, can be altered per customer needs without having to design a new system. Problem Identification The complexity of the existing fire alarm system in the market nowadays is too high in terms of design and structure. Due to the complexity of the system, regular preventive maintenance is required to be carried out to make sure that the system is operating well. Moreover, the scheduled maintenance adds to the cost of the using the system. Therefore, the proposed fire alarm system is designed with a low cost and can be used by any user for safety purposes. Project Objectives There are several objectives that are required to be accomplished in developing the A-FAS to determine the purpose and the direction of this project. This project aims to achieve the following objectives: To design a low-cost microcontroller based fire alarm system. To develop a prototype of the fire alarm system using smoke detector, heat detector, emergency switch and infrared sensors as inputs to the system. Moreover, using LEDs, LCD display, buzzer and text messages as outputs to the system. To develop a prototype with the capability of customizing the system to meet with the customer requirements with regards to the inputs and outputs, without having to redesign a new system. To develop an automatic fire alarm system to safeguard the user and their surroundings, while being user friendly to accommodate the need of the masses. Project Scope To achieve the above objectives, the project needs to be implemented as below: The heart of the fire alarm system is to be a microcontroller to control the entire operations involved. The fire alarm system is to count the number of individuals present in the locations where the infrared modules are installed. Capable of displaying the source of the alarm on the LCD display. Capable of sending SMS notifications via GSM module interfaced in the system. Project limitation Since the project is interfaced with a GSM module that needs a SIM card to send SMS notifications and thus the system is limited to the amount of credit available on the SIM. Moreover, the system includes infrared sensors that are used to count the number of people entering and exiting the zone and thus to make the system more sensitive and receive only the infrared radiation from the correct source, the infrared modules need to be placed with a minimum distance of 2 meters. Furthermore, to receive live data from the sensors to produce visual output to the user in terms of if any sensor is disconnected from the system, the system is required to have personalized sensors. System Overview Figure 1.1 defines the inputs and outputs interfaced to the microcontroller device. The A-FAS has the features of interfacing additional inputs and outputs based on customer needs. Color Type of sensor Infrared sensors Smoke detector Hear detector Emergency switch The A-FAS works in a loop checking all the input sources and acting accordingly. The smoke detector, hear detector and the emergency switch transmit a signal to the microcontroller once triggered, this notifies the microcontroller to hazard the surroundings via the output devices. A keypad is added in the system to allow the user to interface and monitor the system. The Atmega2560 microcontroller acts as the heart of the Fire Alarm System which controls the entire system. The signals being received from the sensors are being compared by the Atmega2560 to either hazard the surroundings for the existence of fire or to hazard the surroundings for the presence of a fault in the system. Moreover, the system can alert the surroundings via a buzzer and LED notifications as well as SMS notifications once the Atmega2560 microcontroller receives signals that there is fire present in one of the zones. Thesis structure This thesis is divided into six chapters. The first chapter explains the problem statement, objectives, scopes and limitations of the project. The second chapter in this thesis is the projects literature review, which is based on the detection components of the A-FAS, the ATmega2560 and a comparison between microcontrollers and microprocessors. Moreover, this chapter contains summary of several available inventories software available in todays market and previous projects developed by engineers. Furthermore, chapter three describes the phases involved in the development of the A-FAS. There are four phases involved in the production of the fire alarm system which include the research phase, the designing phase, development phase and the analysis phase. Chapter four of this thesis discusses the system design process involved and the hardware and software development. Moreover, chapter five explains the results of the system development of the A-FAS and its analysis based on the system operation and functions. Finally, chapter six concludes the project and the recommendation suggestions for the continuity of the project and future work. The sixth chapter aids to the continuity of the project by other individuals interested as they can refer to it to develop the system. CHAPTER II LITERATURE REVIEW As mentioned earlier in the previous chapter, cost factor plays a very important role in this project. Subsequently, to design a system with the objectives mentioned above requires research and studies that are described in this chapter. This chapter will include three subtopics, previous case study on fire alarm systems, hardware and software studies. Fire Alarm System: Related Work According to Bao Minzhong, Jianmei, Niihau Xiao and Wang [1], the function of the fire alarm system is to detect fire at an early stage providing sufficient time to produce high reliable judgment results. If the fire alarm system nosedives to notify the user in the presence of fire for the user to take appropriate measures, the system fails as alarm systems should cause the operator to respond. Moreover, Brown Campbell [2] suggested that for a system not to fail, it must require positive feedback from the operator. Nur Abd Aziz [3] proposed a fire alarm system consisting of three sensors, thermistor hear sensor, infrared sensors and infrared smoke sensors. The thermistor heat sensor was used to detect the rate at which temperature rises and high temperatures. The infrared sensors were used for intruder alarms to detect the presence or any motion, acting as a burglar alarm system. The infrared smoke sensors were used to identify fire in its early stages or smoldering. In the presence of fire, the water sprinklers are automatically switched on and the burglary alarm is activated. The known catalysts for fire is smoke, flame and heat but only smoke and smoke sensors have been applied and emphasized. Furthermore, when a fire occurs, the highly sensitive motion sensors will respond to normal environmental vibration which could be caused by moving cars or planes overhead. Furthermore, Chew and Ing Ming [4] proposed a similar system consisting of smoke detector, heat detector and a burglar alarm. In the event of smoke or a rise in the temperature, the system sends a signal to the microcontroller which in return operates a buzzer. Moreover, the microcontroller operates an auto redialing telephone programmed with specific number. This system. Moreover, the system is implemented with photo-electric sensor and inductive proximity switches. The photo-electric sensor is activated when transmitter cannot send light to the receiver. The inductive proximity switch is normally used for metal detection and activates when a metal is detected in the system. Once any of the sensors is activated, the microcontroller will sound the buzzer and flash LEDs. Chew and Ing Ming categorized the system proposed for industrial purposed. The complexity of this system contributes to the inability of installing such system at homes or offices. Detection components of the Fire alarm system Sensors are types of transducers that responds to a type of energy by producing another type of energy signal, usually electric [5]. Some of the sensors available include acoustic, biological, chemical and electromagnetic. These are used in many applications and are heavily used in the medicine industry and robotics as a source of detection components. The detection components of the A-FAS consist of smoke sensors, heat sensors and infrared sensors. Smoke Sensors Smoke detectors are devices designed to detect a fire while it is in its early stages or smoldering, duplicating the sense of smell. These devices have gained a wide usage in the residential and life safety applications. There is no debate that smoke detectors is the single most effective method of reducing fire damages and death. 90% to 95% of fire deaths occur in residential buildings (NZFS, 1993), targeting this will help accomplish the most cost-effective results. Studies of various types of smoke detectors, in particular photoelectric and ionization smoke detectors, illustrates that, one type of detector will be expected to perform better than the other, depending on the source of the smoke. Natarianni (1993) concludes that in flaming wood crib fires, the ionization smoke detectors activate before the photoelectric detectors. This conclusion is from simulated fires in hospital patient rooms. However, most importantly, both detectors activated before threatening the patients life. Moreover, a series of full-scale tests of smoke detectors installed in corridors and bedrooms of residential areas was conducted by Kennedy et al (1978). They concluded that inadequate warning in smoldering fires were often produced by ionization detectors. Subsequently, reducing the time available for escape once activated and the escape routes may be smoked-logged. Photoelectric smoke detectors contain a light emitting device, most commonly a light-emitting diode(LED), a smoke chamber and a photosensitive device that produced a monitored current from receiving light directly from the light source. The intensity of tech light reaching the photosensitive device is reduced by the smoke that enters the chamber. A drop in the intensity below a certain level causes a drop in the current produced by the photosensitive device, which is detected by the sensor control circuitry. Dropping the current below a preset threshold results in triggering the smoke alarm. Table 2.1 summarizes the advantages and disadvantages of photoelectric smoke detectors. The complete specification of the smoke detector used in the A-FAS can be obtained in Appendix A. Table 2.1: Advantages disadvantages of photoelectric smoke detector [6]. Advantages Disadvantages Sensitive to visual particles of smoke. Provide early warning. Detects smoldering low heat fires. Detects presence of smoke, not toxicity. Can be installed in any of the following typical locations: Office areas Clean rooms Atriums and corridors Sleeping rooms Storage closets Early contamination by dust causing reduced sensitivity. Must be cleaned on a regular basis. Has a potential for high false alarm rate, however, lower than the ionization smoke detectors. Heat Sensors A heat sensor detects abnormal rate of temperature rise or high temperatures. There are numbers of various heat detectors available in the market, which include: Thermistor. Thermocouple. Resistance temperature device. Diode based temperature sensor. There are certain features to consider while choosing the best heat sensor for any use. These features are summarized in table 2.2. Table 2.2 Features of various heat sensors [7]. Thermocouple RTD THERMISTOR SEMICONDUCTOR High accuracy and repeatability. Fair linearity Poor linearity Linearity: 1oC Accuracy: 1oC Needs cold junction compensation Requires excitation Requires excitation Requires excitation Widest Range: -148oC to +2300 oC Widest Range: -200oC to +850 oC Widest Range: 0 oC to +100 oC Widest Range: -55oC to +150 oC Low voltage output Low cost High sensitivity 10mV/K,20mV/K Typical output The LM35 temperature sensor are precision integrated circuit temperature sensors, which will be used to develop the A-FAS. This sensor is fully rated from -55 Â °C to +150 Â °C and with the linear scale factor of 10mV/Â °C. It operates from 4 to 30 V, has less than 60 ÂÂ µA drain current and has low self-heating (0.08 Â °C in still air). The control circuitry or the interfacing of LM35 is easy due to the low output impedance, linear output and precise inherent calibration. The LM35 series is available in hermetic TO transistor packages, while the LM35C, LM35CA and LM35D are available in TO-92 transistor package. The LM35D is also available in an 8-lead surface-mount small outline package and a plastic TO-220 package. [8] (Reprinted from datasheet of LM35 [8].) The LM35 can function as a basic centigrade temperature sensor sense temperature between +2 oC and +150 oC and can function as a full -range centigrade temperature sensor sensing temperature between -55 oC to +150 oC. Figure 2.1 illustrates the circuitry for using the sensor for both functions, where +Vs is the voltage supplied to the sensor. Adjusting the output voltage of the sensor enables the temperature to be obtained in degree centigrade. Infrared Sensors: There are many sensors available for obstacle detection such as infrared sensors, ultrasonic sensors, camera and laser based sensor system (LIDAR). In this thesis, infrared sensors are used to accomplish the task of counting the numbers of individuals in the placed installed. Low cost with accuracy is one of the main objectives of this project, hence infrared sensors were selected for the design. These sensors are widely used for measuring distances and obstacle detection and have faster response time than ultrasonic sensors [10]. Moreover, power consumption of the infrared sensors is lower than that of ultrasonic sensors [11]. Infrared sensors are categorized as diffuse reflection sensors and retro-reflective sensors. The latter is mainly used in harsh environment conditions and has a larger detection range than the diffuse reflective sensors [12]. Infrared sensors utilize a light sensor to detect a selective light wavelength in the spectrum. When an object obstructs the sensor, the light from the LED is broken by the object and the signal is not received by the receiver. ATmega2560 Microcontroller As defined by James L. Atonakos [13], microcontrollers are souped-up microprocessors with built-in features such as RAM, ROM, A/D, Interval timers and parallel input and output ports. Atmega2560 (figure 2.2), is a powerful flash microcontroller that contains many features in a 100-pin package. The datasheet of the ATmega2560 is attached in Appendix B. The definition of a flash microcontroller is that it can be programmed and erased instantly without the usage of ultra-violet light. The Atmega2560 is an 8-bit microcontroller with a powerful execution of instructions in a single clock cycle leading to the achievement of 1 MIPS per MHz, allowing the designer to optimize power consumption vs processing speed [14]. The internal architecture of the microcontroller is shown in figure 2.3. The central processing unit (CPU) is the brain of the microcontroller that controls the execution of the program, therefore able to access memories, handle interrupts and perform calculations. The microcontroller unit (MCU) consists of 256K bytes of in-system flash, 4K bytes EEPROM and 8K bytes of SRAM, which are used for memory. Other features include [14]: 86 programmable input and output ports. Ultra-low power consumption in active and power down mode. flexible timer/counters with compare modes and internal and external interrupts. Code protection facility, which is one of the best in the industry. Comparison between microcontroller and microprocessor The fact that microcontrollers may have one or two operational codes for moving data from external memory to the CPU, whereas, microprocessors have many operational codes, is the best way to exemplify the contrast between microcontrollers and microprocessors. Microcontrollers have many types of bit handling instructions, however, microprocessors have one or two. In conclusion, the microcontroller is concerned with rapid movement of bits within the chip, whereas, microprocessors are concerned with rapid movement of codes and data from external addresses to the chip. Microcontrollers can function as a computer with the addition of no external digital parts, however, microprocessors must have many digital parts to be operational [15]. OrCAD Figure 2.4 shows the OrCAD software used for circuit designing, testing and circuit analyzing. Generally, OrCAD is a software used to produce printed circuit board (PCB) layouts. The circuit was drawn onto the PCB board using OrCAD Capture, where footprints for each component was researched. The design rule check ensures that there are no errors present in the circuit. Arduino IDE The Arduino IDE (Integrated development environment) is a platform application from ATmega microcontrollers. Figure 2.5 shows the Arduino version used to compiling the program. Arduino IDE is used for writing, debugging, and optimizing ATmega microcontroller applications for firmware product design. Arduino programs are written in C or C++ and the software comes with a library called wiring which makes may common outputs and inputs operations much easier. Fire alarm systems available in the market There are several types of fire alarm system available in the market today. The various fire alarm systems from different developers vary in terms of implementation and functionality. Research has been carried out to investigate the technology and features used to develop each of the systems and compared them with the proposed A-FAS system. Table 2.3 concludes the results on the research, [16] [17]. Table 2.3 Manufacturers products Specifications SECURE 6000 INTELLIGUARD 2900 Developer Chubb Alarm ADT Fire and Security Fire monitoring Available Available Security monitoring system Available Available Service and maintenance Provided Provided Main features Sounding the alarm at first sign of smoke Combination of interior motion, door and window. Controlled via a remote control Plugs into telephone line to provide back to back monitoring system. Connected to signal fire condition to ADT customer monitoring center. Computer assisted reporting. Expandable used microprocessor to offer extensive flexibility. Reduce false alarm since the system can locate the origin of the alarm. Cost $2,055 $1,800 CHAPTER III Methodology This methodology chapter describes the planning and research involved in the development of the entire A-FAS system. The progress of this project was due to the division of the work in four phases; research phase, designing phase, development phase and the analysis phase. Introduction The fire alarm system described in this thesis is divided in to two sections, which are the hardware and the software sections. These sections play a vital role in the effectivity and the functionalities of the system. In order to start developing the project, there are few procedures that must be considered. Thus, earlier planning is important in designing and developing the A-FAS. The related phases have been illustrated in figure 3.1. Research phase The first phase of this methodology deals with the systems literature studies, research and analysis. Problem identification is included in the research phase. Moreover, the system objectives are determined by observations and theoretical information obtained from internet sources, journals, books and magazines. During this phase, the system requirements are determined, which include the hardware and software interfacing. Furthermore, the research and analysis conducted on the existing systems available in todays market is included in the research phase, as well as reviews on previous projects developed by organizations or individuals. A few problems have been identified based on the current research that has been done, which include: Burglar alarms are combined with the fire alarms in the same system, leading to confusion and inability to identify the source of the alarm by the user. The systems available are designed for specific purposes, providing the user with no options of customization of the fire alarm inputs and outputs. The cost of the systems is too high for low income individuals to secure their lives and properties by purchasing one. Websites and documentations were the source of reviews on analysis activities conducted in this phase. The system planning and development scheduling were then determined in this phase which suited the chosen development methodology. Upon completion of this phase, the system scopes, specifications and Gantt chart were produced. Designing Phase The second phase of the system development is the designing phase. The main objective of this phase is to translate or transform the requirements and analysis obtained from the research phase into design specifications for system implementation and construction. This phase involves a vital task for the success of the automatic fire alarm system, which is the hardware design of the system. Designing of the A-FAS hardware system The A-FAS hardware design involves detection components and the microcontroller. The detections components which are the smoke detector, heat detector, infrared sensors and an emergency switch are connected to the microcontroller. The latter is the control unit identifying the source and location of the fire if any of the input detection devices is triggered. A text message will be sent and a buzzer will be activated for individuals to evacuate the premises. Smoke sensors The system has been implanted using a Mercure photoelectric smoke detector. The system has the capability of being interfaced with most of the market available smoke detectors. However, to interface the smoke detector to the microcontroller, the smoke detector circuit is required to be altered. The smoke detector then sends a signal to the microcontroller in the event of emergency. The photoelectric smoke detector used in this project is very effective and highly recommended by users, with a low cost. These devices offer high power dissipation capability and are ideally suited for hostile environments. Heat sensors The LM35 temperature sensor has an output voltage which is linearly proportional to temperature in centigrade, thus the sensor is suitable for the project. The sensor draws very small amount of current which makes it very low self-heating. Figure 3.2 describes th

Friday, October 25, 2019

The Happiness of Others :: Happiness Essays

Written by Dr. Sam Vaknin Is there any necessary connection between our actions and the happiness of others? Disregarding for a moment the murkiness of the definitions of "actions" in philosophical literature - two types of answers were hitherto provided. Sentient Beings (referred to, in this essay, as "Humans" or "persons") seem either to limit each other - or to enhance each other's actions. Mutual limitation is, for instance, evident in game theory. It deals with decision outcomes when all the rational "players" are fully aware of both the outcomes of their actions and of what they prefer these outcomes to be. They are also fully informed about the other players: they know that they are rational, too, for instance. This, of course, is a very farfetched idealization. A state of unbounded information is nowhere and never to be found. Still, in most cases, the players settle down to one of the Nash equilibria solutions. Their actions are constrained by the existence of the others. The "Hidden Hand" of Adam Smith (which, among other things, benignly and optimally regulates the market and the price mechanisms) - is also a "mutually limiting" model. Numerous single participants strive to maximize their (economic and financial) outcomes - and end up merely optimizing them. The reason lies in the existence of others within the "market". Again, they are constrained by other people’s motivations, priorities ands, above all, actions. All the consequentialist theories of ethics deal with mutual enhancement. This is especially true of the Utilitarian variety. Acts (whether judged individually or in conformity to a set of rules) are moral, if their outcome increases utility (also known as happiness or pleasure). They are morally obligatory if they maximize utility and no alternative course of action can do so. Other versions talk about an "increase" in utility rather than its maximization. Still, the principle is simple: for an act to be judged "moral, ethical, virtuous, or good" - it must influence others in a way which will "enhance" and increase their happiness. The flaws in all the above answers are evident and have been explored at length in the literature. The assumptions are dubious (fully informed participants, rationality in decision making and in prioritizing the outcomes, etc.). All the answers are instrumental and quantitative: they strive to offer a moral measuring rod. An "increase" entails the measurement of two states: before and after the act. Moreover, it demands full knowledge of the world and a type of knowledge so intimate, so private - that it is not even sure that the players themselves have conscious access to it.

Thursday, October 24, 2019

My Professional Career Goals

I am determined to work In a Career field that will offer me the opportunity to do something that I enjoy doing as a job. My objective career goal is to work as a medical officer in the United States Army, specifically a Licensed Clinical Social Worker (LESS). I have thoroughly considered the skills that I presently have and the abilities that I need to either change or perfect. I been embarking on more educational avenues since I have being in the army to get close to this career goal. The ultimate goal I set out for myself was to get accepted In the United State Army Masters of Social WorkProgram. The program is one that helps determined individuals work on acquiring their Masters Degree in Social Work Services and become officers in the United Army. As I am already In the field of psychology I though a special Interest In the Social Work Services and have come to enjoy working in this department. My professional career goal is to get the schooling through the Army because it is al l paid for. Finish my obligation and try to retire from the Army after 20 years of service. I know once I complete my service, I can always work for the federal employee for the Army.Also nee may ask the question, but why social work services? I have always been Interested In working In the medical field because I am good understanding people and can be a good listener and also because it is a respected profession. I have spent time in many different types of Jobs in my short time in the Army but one of the fields I enjoyed the most The Department of Social Work Services. It has become a commonly acceptable practice that we use different methods of learning to obtain information. Information technology allows us to easily identify with the various aspects and methods of social learning.The Web has also made It so easy to collaborate with other student in the process of learning and training. In pursuit of my short term goal which is to attain a Bachelor's degree in Clinical Psycholo gy, I have taken a few online courses to Include this class and It Is amazing how much information and insight I have been able to obtain from other students from the online environment. I was also able to obtain an undergraduate certificate in Terrorism and Homeland Security by online education. I am getting closer and closer to finishing my Bachelor's Degree in Psychology.Online Education has made my ream meeting all the requirements of the Masters Program possible. The ability to share information with others In a participatory manner has allowed me to see and learn from my peers. The online method of learning brings synergy to the table and can also be very effective within the professional arena. I can't emphasis enough how I'm able to learn from others In the comfort of my own living room or office. In the world of web learning, I'm able to keep up with current information concerning my career options as well as keep up with advancing technologies within my career.According to the Bureau of Labor Statistics the Employment of healthcare social workers is expected to grow by 34 percent, much faster than the average for all occupations In the United States. As baby boomers age, they and their families will require help from social workers to find care, which will increase demand for healthcare social workers. The average full-time medical social worker earned $50,500 per year as of 2011, according to the U. S. Bureau of Labor Statistics, but any subject averaged approximately $12,000 more in annual income.Career regression in this field is very rapid because of the constant need and demand for Licensed Clinical Social Workers. I do know that I will have to improve on any skills that could help in making me more sought after; for example a manager could be one that has knowledge, skills and interests in many areas but has no real specialty. Then there is the professional manager who will conform to the skills, competence and/or character which is expected of a properly qualified/experienced person. I also know I have work to do and things to learn as well as ideas to offer.

Wednesday, October 23, 2019

Outline and Evaluate theories and research explaning institutional aggression Essay

Institutional aggression is a form of aggression which is present in institutions such as the police, armed forces and security services, as well as criminal and terrorist groups (i.e. those who are bound together by a common purpose to be aggressive). There have been a number of theories developed to try and explain the cause of institutional aggression. The theories fall into two categories which are situational factors (referring to factors present in social situations), and dispositional factors (referring to characteristics of the individual e.g. personality). The first theory trying to explain intuitional aggression is based on situational factors was Zimbardo’s Stanford prison experiment. In this experiment a sample of 24 male participants (pps) was used and each pps was given a full physical and mental evaluation to ensure full health. Pps were randomly allocated into roles as guards or prisoners. As the pps started to get into their roles the guards became more and more controlling. Guard Hellman was found to be one of the most aggressive officers. Before Hellman had entered the experiment he had described himself as someone who loves all people. Zimbardo concluded that it was the ‘situation’ that had made Hellman behave the way he did. See more: outline format for essay This research supports the situational explanation of aggression because it emphasises how people will act aggressively when they are in a certain situation. A strength of this study is that cause and effect can be established. This is because Zimbardo’s had control and by removing extraneous variables such as pps being at the same levels of aggression as each other and being given a psychological and mental evaluation before they started the study. This would suggest that the being in the prison environment made the pps to behave more aggressively as they were simply trying to fulfill their roles as prison guards. However the guards were consistently aware that they were in a prison study. If they were aware that they were in a study they may have believed that their behavior was punishable. If their behavior had become extreme they would have been stopped but as Zimbardo was the one undertaking the study, the guards may have thought that he would be responsible if anything went wrong, (agentic shift). This suggests that the guards were not responsible for their actions as they were acting as directed. So therefore this study does not support the situational explanation of aggression as the pps were aware that this was a study and may have only been acting in the way they thought they were expected to act. The study of Abu Ghraib prison in Iraq was not a study and it was a real life scenario so this would be a better example to I=use for explaining situational factors to aggression. Abu Ghraib was a prison in Iraq where US troops kept Iraqi prisoners of war (POWs). The prison came after fire after US soldiers took pictures showing how them dehumanizing and degrading the POWs. Zimbardo was a key witness at the trial of these soldiers and argued that their behavior was merely the product of situational factors associated with being a soldier and being a guard in such a unique environment. He continued to argue that a lot of US soldiers were being murdered in Iraq and the situation within the prison was enough to turn a good soldier bad. Zimbardo stated some key factors that may have resulted in the behavior at Abu Ghraib. He noted that the status and power of those involved was a factor that may have contributed to the behavior of the soldiers. Those who were involved were usually low ranking officers, by doing this they may have thought that would move up in status. Also deindividuation may have caused the soldiers to act in the way the did as they may have been deindividuated because they were wearing a uniform and also because they were in a large group. This may have caused them not to feel as though they had a personal identity. This scenario is hard to retest or generalise because of the unique nature of the situation. Can these findings even be applied to other soldiers behavior in other wars? The soldiers may have felt that since they were in a seemingly lawless country that there would be no repercussions. So therefore it may have been this unique situation only where this kind of behavior would be seen also as it can not be replicated it is not reliable. Dispositional factors can not be ruled out. To become a soldier you have to be a certain kind of person and have certain traits within that would relate to the job so the soldiers could have certain qualities within them that may have caused them to act in the way they did.

Tuesday, October 22, 2019

Censorship No More essays

Censorship No More essays Music censorship has brought fourth lots of controversy in America in the last few decades. There have been many out of hand debates on the subject, but the question is still; should music be censored or not. Music has always been an easy target for censorship because it is very easy to condemn that which we dont understand. Generation after generation, the controversy surrounding popular music continues. Its an age-old tradition of music finding its home in the anger and rebellion of young people. There is also nothing new with older people expressing their fears about the music. (Music for Teens) Many people and organizations such as the P.M.R.C, Parental Music Resource Center, are outraged by the lyrics of artists today, but on the other hand, music and lyrics are ways in which artists express themselves; many believe censoring music is a violation of Constitutional and Human Rights. A musicians lyrics should also, not be deemed responsible for the actions of unstable individuals. Tipper Gore founded the Parental Music Resource Center. The P.M.R.C is a group dedicated to clean up the sexually explicit lyrics and suggestive album covers in he music industry. The P.M.R.C has brought fourth many actions on labeling musicians albums. The music industry acknowledged that not all music is untended for young audiences. In 1985, the Recording Industry Association of America reached an agreement with the Parental Music Resource Center.(Music for Teens) The Parental Advisory labels found on tapes and compact discs were put there by the P.M.R.C to warn parents of the language and content on the album. It was a fair compromise, respecting the freedom of expression our recording artists deserve and the First Amendment. It also respected the needs of parents and guardians for a cautionary notice about explicit content. (Music for Teens) There are many people that won&apo...

Monday, October 21, 2019

Biography of Genghis Khan, Founder of the Mongol Empire

Biography of Genghis Khan, Founder of the Mongol Empire Genghis Khan (c. 1162–August 18, 1227) was the legendary founder and leader of the Mongol Empire. In a span of just 25 years, his horsemen conquered a larger area and greater population than the Romans did in four centuries. To the millions of people conquered by his hordes, Genghis Khan was evil incarnate; in Mongolia and Central Asia, however, he was widely revered. Fast Facts: Genghis Khan Known For: Khan was the founder and leader of the Mongol Empire.Also Known As: TemujinBorn: c. 1162 in Delun-Boldog, MongoliaDied: August 18, 1227, in Yinchuan,  Western XiaSpouse(s): Borje, Khulan, Yesugen, Yesulun (plus others)Children: Jochi, Chagatai, Ogedei, Tolui (plus others) Early Life Records of the Great Khans early life are sparse and contradictory. He was likely born in 1162, though some sources say 1155 or 1165. We know that the boy was given the name Temujin. His father Yesukhei was the chief of the minor Borijin clan of nomadic Mongols, who lived by hunting rather than herding or farming. Yesukhei had kidnapped Temujins young mother, Hoelun, as she and her first husband were riding home from their wedding. She became Yesukheis second wife; Temujin was his second son by just a few months. Mongol legend claims that the baby was born with a blood clot in his fist, a sign that he would be a great warrior. Hardship and Captivity When Temujin was nine, his father took him to a neighboring tribe to work for several years and earn a bride. His intended wife was a slightly older girl named Borje. On the way home, Yesukhei was poisoned by rivals and died. Temujin returned to his mother, but the clan expelled Yesukheis two widows and seven children, leaving them to die. The family survived by eating roots, rodents, and fish. Young Temujin and his full brother Khasar grew to resent their eldest half-brother Begter. They killed him and as punishment for the crime, Temujin was seized as a slave. His captivity may have lasted for more than five years. Youth Set free at age 16, Temujin went to find Borje again. She was still waiting for him and they soon married. The couple used her dowry, a fine sable-fur coat, to make an alliance with Ong Khan of the powerful Kereyid clan. Ong Khan accepted Temujin as a foster son. This alliance proved key, as Hoeluns Merkid clan decided to avenge her long-ago kidnapping by stealing Borje. With the Kereyid army, Temujin raided the Merkids, looting their camp and reclaiming Borje.  Temujin also had help in the raid from his childhood blood-brother Jamuka, who would later become a rival. Borjes first son Jochi was born nine months later. Consolidation of Power After rescuing Borje, Temujins small band stayed with Jamukas group for several years. Jamuka soon asserted his authority, rather than treating Temujin as a brother, which started a two-decade feud between the 19-year-olds. Temujin left the camp, along with many of Jamukas followers and livestock. At the age of 27, Temujin held a kurultai (tribal council) among the Mongols, who elected him khan. The Mongols were only a Kereyid sub-clan, however, and Ong Khan played Jamuka and Temujin off one another. As Khan, Temujin awarded high office not just to his relatives, but to those followers who were most loyal to him. Unification of the Mongols In 1190, Jamuka raided Temujins camp, cruelly horse-dragging and even boiling alive his captives, which turned many of his followers against him.  The united Mongols soon defeated the neighboring Tatars and Jurchens, and Temujin Khan assimilated their people rather than follow the steppe custom of looting them and leaving. Jamuka attacked Ong Khan and Temujin in 1201. Despite suffering an arrow shot to the neck, Temujin defeated and assimilated Jamukas remaining warriors. Ong Khan then treacherously tried to ambush Temujin at a wedding ceremony for Ongs daughter and Jochi, but the Mongols escaped and returned to conquer the Kereyids. Early Conquests The unification of Mongolia ended in 1204 when Temujin defeated the powerful Naiman clan. Two years later, another kurultai confirmed him as Genghis Khan or universal leader of all Mongolia.  Within five years, the Mongols had annexed much of Siberia and what is today the modern Chinese Xinjiang province. The Jurched Dynasty, ruling northern China from Zhongdu (Beijing), noticed the upstart Mongol khan and demanded that he kowtow to its Golden Khan. In reply, Genghis Khan spat on the ground.  He then defeated their tributaries, the Tangut, and in 1214 he conquered the Jurchens and their 50 million citizens. The Mongol army numbered just 100,000. Conquests of Central Asia, the Middle East, and the Caucasus Tribes as far away as Kazakhstan and Kyrgyzstan heard about the Great Khan and overthrew their Buddhist rulers in order to join his growing empire. By 1219, Genghis Khan ruled from northern China to the Afghan border  and from Siberia to the border of Tibet. He sought a trade alliance with the powerful Khwarizm Empire, which controlled Central Asia from Afghanistan to the Black Sea. Sultan Muhammad II agreed, but then murdered the first Mongol trade convoy of 450 merchants, stealing their goods. Before the end of that year, the wrathful Khan had captured every Khwarizm city, adding lands from Turkey to Russia to his realm. Death In 1222, the 61-year-old Khan called a family kurultai to discuss the matter of succession. His four sons disagreed over which should become the Great Khan. Jochi, the eldest, was born soon after Borjes kidnapping and might not have been Genghis Khans son, so the second son Chagatai challenged his right to the title. As a compromise, the third son Ogodei became the successor. Jochi died in February 1227, six months before his father, who passed away on August 18, 1227. Ogodei took East Asia, which would become Yuan China. Chagatai claimed Central Asia. Tolui, the youngest, took Mongolia proper. Jochis sons controlled Russia and Eastern Europe. Legacy After Genghis Khans secret burial on the steppes of Mongolia, his sons and grandsons continued to expand the Mongol Empire. Ogodeis son Kublai Khan defeated the Song rulers of China in 1279 and established the Mongol Yuan Dynasty. The Yuan would rule all of China until 1368. Meanwhile, Chagatai pushed south from his Central Asian holdings, conquering Persia. Within Mongolia, Genghis Khan revolutionized the social structure and reformed traditional law. His was an egalitarian society, in which the humblest slave could rise to be an army commander if he showed skill or bravery. War booty was divided evenly among all warriors, regardless of social status. Unlike most rulers of the time, Genghis Khan trusted loyal followers above his own family members- which contributed to the difficult succession as he aged. The Great Khan forbade the kidnapping of women, probably due in part to his wifes experience, but also because it led to warfare among different Mongol groups. He outlawed livestock rustling for the same reason and established a winter-only hunting season to preserve game for the hardest of times. Contrary to his ruthless and barbaric reputation in the west, Genghis Khan promulgated several enlightened policies that would not become common practice in Europe until centuries later. He guaranteed freedom of religion, protecting the rights of Buddhists, Muslims, Christians, and Hindus alike. Genghis Khan himself worshiped the sky, but he forbade the killing of priests, monks, nuns, mullahs, and other holy people. A 2003 DNA study revealed that about 16 million men in the former Mongol Empire, about 8% of the male population, carry a genetic marker that developed in one family in Mongolia about 1,000 years ago. The most likely explanation is that they are descended from Genghis Khan or his brothers. Sources Craughwell, Thomas. The Rise and Fall of the Second Largest Empire in History: How Genghis Khans Mongols Almost Conquered the World. Fair Winds Press, 2010.Djang, Sam. Genghis Khan: World Conqueror, Vols. I and II. New Horizon Books, 2011.Weatherford, Jack. Genghis Khan and the Making of the Modern World. Three Rivers Press, 2004.

Sunday, October 20, 2019

German Phrasebook on Classroom Vocabulary

German Phrasebook on Classroom Vocabulary This phrasebook, a collection of English-German phrases and expressions for the German-language classroom, is intended as an aid for students who will use the target language (die Zielsprache: Deutsch) in a classroom setting. For beginners, use of a phonetic  German Alphabet  can help with pronunciation, as this guidance is not included here. Showing Respect Forms of Address: Mrs./Ms. Schmidt, Mr. Schmidt Anredeformen: Frau Schmidt, Herr Schmidt Note: Always address your teacher, professor, or other school personnel as Sie! Your fellow students should be addressed as du (one) or ihr (more than one). Common Classroom Phrases Hi there! Hi everyone!Hallo allerseits! Hallo alle zusammen! Sorry Im late.Tut mir Leid, dass ich zu spt komme. What does ___ mean?Was bedeutet/heißt ___? Whats the German for ___?Was heißt ___ auf Deutsch? I dont understand.Ich verstehe nicht. More slowly, please.Lamgsamer bitte. Pardon? What was that? (I didnt understand)Wie bitte? (Avoid Was?, the German equivalent of Huh?) Could you please repeat that? (to teacher)Bitte wiederholen Sie das! Could you please repeat that? (to student)Noch einmal bitte! May I go to the restroom?Darf ich auf die Toilette?/aufs Klo? Could I go out/leave for a minute?Darf ich kurz mal hinausgehen? How do you spell that?Wie schreibt man das? Ive already done that.Ich hab das schon gemacht. Do we have homework?Haben wir Hausaufgaben? Which page/exercise?Welche Seite/ÃÅ"bung? I dont know.Ich weiß nicht. I have no idea.Ich habe keine Ahnung. yes - no - OKja - nein - Schon gut. Whats the difference between ___ and ___?Was ist der Unterschied zwischen ___ und ___?

Saturday, October 19, 2019

Recent Changes In Organisational Form And Personnel Strategies Essay

Recent Changes In Organisational Form And Personnel Strategies - Essay Example Differences between the connotations of the words "labor" and "work† suggest the reorienting effect that Braverman's formulation had on views regarding work, workers, and the workplace (Rowlinson, 2000, p.13-14). Labor is an economic commodity exchanged in the market. Braverman held that work had been degraded by capitalism thus turned into mere labor. Taylorism separated the hand from the brain and vested the brains in management and the hands in labor. Work became deskilled as technological and bureaucratic controls supplanted the self-direction of skilled workers. This process of deskilling standardized work activities robbed work of meaning, leveling skill distinctions among workers. It enlarged and homogenized the proletariat, which came to include clerical and semi-professional occupations. Braverman's focus on skills had the effect of conceptualizing the outcomes of the industrial transformation as technological, psychological, and economic rather than social. Harry Brav erman does not make clear the definition of skill but sees the degradation process as involving the separation of mental and physical activities. One might be concluded that Harry Braverman has identified skills as cognitive abilities of workers, then generalized beyond that point to make skills technical characteristics of jobs. Sociological conceptions of work based on workers' relations to each other, group control over activities, and normative definitions of technical relations are missing.

Friday, October 18, 2019

Security of Big Data Research Paper Example | Topics and Well Written Essays - 1500 words

Security of Big Data - Research Paper Example Big Data are pivotal in many organizations because it allows respective stakeholders to view and analyze data. Before the advent of Big Data, information about customers and business were overwhelming. With Big Data, stakeholders can truly take this raw information and convert into data that can assist them in making real-time decisions. The challenge in many organizations is the fact that majority of decisions are made based on estimated guesses. One of the best elements of Big Data is the fact that it reduces any ‘guesswork’. Moreover, it allows the organization to understand customer behavior in a much meaningful way. Another huge aspect of Big Data is the collaboration aspect as it allows users to interact and use this data. Imagine an organization in which the marketing department requires key reports from the technology department. Clearly, the issue of latency can be a factor that can delay essential decision making. Hence, it is only evident that securing Big Dat a is essential because it holds true information because securing data is not only regulated by compliance, but can potentially fall into wrong hands. Securing data saves organization from financial implications that can have detrimental effects for everyone. One of the worst vulnerabilities for user domains are insider attacks. Insider attacks occur. For instance, denial of service and spoofing are one the most common themes that occur. The problem is the fact that intercepting authentication or other sensitive information can be executed with the current WAN technology in Big Data. Moreover, spoofing can also be conducted since an intruder can deceive the network that it recognizes a possible unauthorized access. The problem with installing firewalls in a user domain is the fact that they are fully feasible. Insider attacks occur when one user domain gains more privilege than the other user and

Antibiotics Research Paper Example | Topics and Well Written Essays - 750 words

Antibiotics - Research Paper Example About eighty percent of all antibiotics available are used in agriculture, for the purpose of fighting infections and for promoting unhealthy but profitable weight gain. According to the Ontario Ministry of Agriculture, Food, and Rural affairs, on-going low-dose administration of antibiotics can increase the efficiency and rate of weight gain in healthy livestock. Further, it is likely that the presence of antibiotics may change the composition of the gut flora in favor of healthy growth. However, there is a debate concerning the way in which gut flora are changed. It may be merely a change in species composition, reduction in numbers, or a combination of both. Some antibiotics given to healthy livestock may also improve feed consumption and healthy growing by stimulating an animal’s metabolic process. Jill U. Adams of the Los Angeles Times argues that many ranchers and farmers give tetracycline, penicillin and other antibiotics to healthy animals to avoid them from being sick . They also grow big after they use the antibiotics (Adams, 2012) Raising healthier animals can be unhealthful for humans. Experts recently reviewed most of the scientific writings on the subject of the use of antibiotics in animals and the health hazards in humans. They concluded that, the extent to which antibiotics in livestock use contributes to antibiotic resistance in bacteria that cause food borne diseases in humans is unclear. The experts asserted that wide scientific studies affirm that individuals are most probable to get resistant illnesses due to their own use of antibiotics. Concerning food borne infections, luckily, for most healthy persons, majority of food borne infections including those brought by resistant bacteria, are not extremely severe to require antibiotic treatment (Chiras, 2005). Nonetheless, to help limit potential risks, the Food and Drug Administration policies include a procedure to establish if using a certain antibiotic can increase resistance risk. FDA also enforces that if deemed suitable, conditions for the prescription of the antibiotic would hinder resistance development. However, meat consumers should always adhere to recommendations to avert the occurrence of food borne illnesses, such as thorough cleaning of food preparation regions, frequent hand washing, and cooking foods, especially meat to recommended temperatures. Overuse and misuse of antibiotics may create selective evolutionary pressure that favors antimicrobial resistant types of bacteria to increase quickly than antimicrobial vulnerable bacteria. This increases the chance for people to be infected by resistant bacteria. Since antibacterial drug use contributes to the growth of drug resistant organisms, these vital drugs should be utilized judiciously in both human and animal medicine to slow down the emergence of resistance. Meat from animals treated with antibiotics is the main source of pathogens in humans that are resistant to antibiotics. This is evidenced when the author writes that for about 40 years, FDA has been concerned that the use of antibiotics in livestock may be accelerating the increase of pathogens in humans that are not susceptible to doctor’s medication. In addition, he mentions that people infected with antibiotic resistant bacteria or pathogens seem to be more seriously ill and are not easy to treat (Adams, 2012). Pathogens that are resistant to antibiotic accounts for approximately $20 or more billion healthcare expenses in the United States yearly, inclusive of longer

Thursday, October 17, 2019

The Utilization of Wellness Programs Essay Example | Topics and Well Written Essays - 1250 words

The Utilization of Wellness Programs - Essay Example The other issue relates to how HR leaders find themselves performing dual roles in the HR systems and as members of the top management team (TMT). Utilization of Wellness Programs The term Human Resources has different meanings which depend with the context of usage. In economics, it means the human labor or capital at a firm’s disposal. However, in business it refers to individuals who make up the workforce of an organization. In most organizations, a human resources department headed by the HR manager is created so as to manage the organization’s workforce and to harness its efforts. The department has various responsibilities which ensure that the workforce is geared towards the achievement of the organizational strategies. Some of the HR roles involve utilization of wellness programs. Wellness in this regard encompasses more than just absence of ailments. An employee’s lifestyle should resonate with their mental and body health as well as their spirituality. These aspects hugely determine an employee’s wellbeing thereby crucial towards productivity (McCalla, Kumar and Lybeck, 2009). Therefore, it is essential for HR departments to encompass wellness programs in order to ensure a healthy and productive workforce. HR managers and support staff have the best opportunity of understanding individual employees better through the wellness programs. ... A poor or disorganized lifestyle indicates a disorganized mind while the opposite is true. It is also important to note that wellness programs also include financial wellness. There is considerable comfort enjoyed by individuals when they dwell in financial health. An organization should therefore strife towards attaining wellness for the employees as a motivator. When employees are motivated in a positive manner, research has shown that they significantly increase their productivity (Ingham and Norris, 2007). Some of the popular wellness programs encompass health risk assessment, smoking and drinking and free or subsidized membership to fitness centers among others. Every organization ensures that there are clearly laid out policies or guidelines followed during operations to attain set goals. This means that everything that goes on in a firm must be in line with the set strategies. The various departments in the organization must also make sure that as they undertaking their respon sibilities they comply with the organization’s key policy. As a result, operations in the organization are harmonized through teamwork and chain of command within the HR functions (McCalla, Kumar and Lybeck, 2009). It is not possible to have a workforce that is willing to work together if most of the workers lead unhealthy and poor lifestyles. Some will drag the others in a team as a result of illnesses or even mental stress. Employees should be exposed to education coupled with activities inclined towards healthy living in order to improve the general welfare of the employees. Employee wellness results in reduced cost of insurance due to many lifestyle related conditions and diseases for organizations. Absenteeism is another big issue plaguing

Supply Chain Management and Outsourcing Essay Example | Topics and Well Written Essays - 2250 words

Supply Chain Management and Outsourcing - Essay Example The aspect of globalization therefore, highly influences various companies, especially the international companies. Apart from globalization, the cost factor and competition in the market are other pressures, which shape the operations of various companies. These among other factors have forced most companies to develop new strategies, which might help them gain competitive value in the market, in order to compete favorably, despite all the pressures in the market (Wisma, 2008). Nonetheless, most of the strategies, which companies have adopted mainly include those that will help to differentiate the companies. These include research and development, demand and customer management, and regulatory compliance, among others (Sople, 2009). In addition, in order to compete healthily in the market, companies today have invested in their supply chain management and functions, such as manufacturing, distribution, and logistics. One of the most important strategy, which companies adopt today w ith regard to supply chain management is outsourcing in the business supply chain. This is instrumental in the business, since it helps enables for goods, information, and services in the company to be distributed in an effective manner, including all processes from raw materials, manufacture, all the way to customer delivery (Sople, 2009). This paper will therefore, focus on supply chain management and outsourcing in business supply chain as a function in the overall supply chain management, and why it is important for companies. Outsourcing in business supply chain is an aspect and a function of supply chain management in a company. However, supply chain cannot be regarded as a function of a company, since this is a network, which is made up of different companies. Therefore, supply chain management mainly involves how each company implements the different cross-functional relationships between its major customers and suppliers, within that network. Nonetheless, for supply chain m anagement to be effective in a company, the company must involve each of its function in supply chain management. It is important to note that supply chain management is still a new business model, which companies started to adopt because of various pressure factors in the market (The Times of India, 2011). Today, it is demanded that companies should uphold both social and environmental responsibility. In addition, companies must adequately respond to the ever dynamic needs and demands of its customers in the market in order to remain competitive. Companies too are faced with the pressure of ensuring sufficient access to resources in order to sustain their business operations. It is also crucial for a company to maintain its profitability and grow its revenue and market share. All these factors influence and determine the success of any company in the market. Nonetheless, for a company to be successful in all these factors, it must be able to manage the different relationships, whic h emerge because of these functions. Therefore, a company should integrate these various business networks and relationships in a manner that will be ensure positive outcomes for the company. This management of the relationships between these different networks in a company, is what is entails the process of supply chain management (Sople, 2009). Different companies today practice supply chain management. However, not all of them are successful in this process. Those companies, whose management does not recognize the importance of integrating business’ network of business relationships in a

Wednesday, October 16, 2019

International Finance Management Essay Example | Topics and Well Written Essays - 750 words

International Finance Management - Essay Example Some of the factors that cause political instability include government interference, violence, and terrorism and guerilla groups. According to Schmidt (1986) he defines political risk as applications by the host country's government that constrains the operation of an investment. He subdivided political risks into three different risks: Investors therefore always consider these factors before investing in a foreign country, a country with a history of persistent political instability will be avoided or if they feel that there is a possibility of occurrence of political instability. An investor will consider the risk of business exposure in a foreign country; the investor may fear that there will be the risk of exposing the operations of a business in a foreign country which will lead to competition from other firms in the host country. When skilled labor is available in a foreign country then the investor will invest in that country. The investor may be forced to train workers in the host country who may expose the operations of the firm leading to competition in that country. In some other countries there will be the availability of cheap labor which will encourage investors to invest in that country, in some countries labor may be very expensive and the investor is not allowed to import laborers, this may be because the government of the host country has sets these conditions. Another factor to be considered before deciding on where to invest is the stability of a currency of a country, if a currency fluctuates against the major currency by a large range then it wouldn't be a good to invest in that country. For a firm to invest in foreign country it has to convert their capital currency into the currency of the host country, incase that countries currency devalues against their own currency then they will loose a lot of money. B. Infrastructure: Good support infrastructure such as good transport network and communication will be an advantage to an investor such that if such support infrastructure exist the higher the possibility that there will be foreign direct investment in a country. Foreign investors also fear that they may invest in foreign countries and loose a lot of money if they decide to close down their operations, an example is where a firm may invest much on infrastructure such as land and buildings and heavy machinery that may be difficult to liquidate once they want to close down their investment in the foreign country. Due to the fact that these assets cannot be moved from one country to another the investor looses. In conclusion we can say that political instability will cause a firm to not to invest in country, the firm will also consider the risk associated with exposure of the operations of the firm in the foreign country, the firm will not invest in country where it is required to hire laborers from the host country and train them for the operations of the firm. Most foreign investors prefer to employ laborers from their own country but this faced with conditions set by host countries

Supply Chain Management and Outsourcing Essay Example | Topics and Well Written Essays - 2250 words

Supply Chain Management and Outsourcing - Essay Example The aspect of globalization therefore, highly influences various companies, especially the international companies. Apart from globalization, the cost factor and competition in the market are other pressures, which shape the operations of various companies. These among other factors have forced most companies to develop new strategies, which might help them gain competitive value in the market, in order to compete favorably, despite all the pressures in the market (Wisma, 2008). Nonetheless, most of the strategies, which companies have adopted mainly include those that will help to differentiate the companies. These include research and development, demand and customer management, and regulatory compliance, among others (Sople, 2009). In addition, in order to compete healthily in the market, companies today have invested in their supply chain management and functions, such as manufacturing, distribution, and logistics. One of the most important strategy, which companies adopt today w ith regard to supply chain management is outsourcing in the business supply chain. This is instrumental in the business, since it helps enables for goods, information, and services in the company to be distributed in an effective manner, including all processes from raw materials, manufacture, all the way to customer delivery (Sople, 2009). This paper will therefore, focus on supply chain management and outsourcing in business supply chain as a function in the overall supply chain management, and why it is important for companies. Outsourcing in business supply chain is an aspect and a function of supply chain management in a company. However, supply chain cannot be regarded as a function of a company, since this is a network, which is made up of different companies. Therefore, supply chain management mainly involves how each company implements the different cross-functional relationships between its major customers and suppliers, within that network. Nonetheless, for supply chain m anagement to be effective in a company, the company must involve each of its function in supply chain management. It is important to note that supply chain management is still a new business model, which companies started to adopt because of various pressure factors in the market (The Times of India, 2011). Today, it is demanded that companies should uphold both social and environmental responsibility. In addition, companies must adequately respond to the ever dynamic needs and demands of its customers in the market in order to remain competitive. Companies too are faced with the pressure of ensuring sufficient access to resources in order to sustain their business operations. It is also crucial for a company to maintain its profitability and grow its revenue and market share. All these factors influence and determine the success of any company in the market. Nonetheless, for a company to be successful in all these factors, it must be able to manage the different relationships, whic h emerge because of these functions. Therefore, a company should integrate these various business networks and relationships in a manner that will be ensure positive outcomes for the company. This management of the relationships between these different networks in a company, is what is entails the process of supply chain management (Sople, 2009). Different companies today practice supply chain management. However, not all of them are successful in this process. Those companies, whose management does not recognize the importance of integrating business’ network of business relationships in a

Tuesday, October 15, 2019

Law for Non Lawyer Essay Example for Free

Law for Non Lawyer Essay As for one action, no matter it is legal or not is not only matches the law clauses, but also complies with the legal principle. Legal principle plays a vital role in the society. In the situation that the existing law would not have the ability to solve the new problems happened in the society, the legal principle can play a part in solving the problem. As for these situations that there are no explicit legal rules to solve the issue, the legal principle would take it. As for the relationship of the agent, the agent can represent the principal to do some things. Even if the contract is formed by the agent and the third party, the principal should take the responsibility finally. Body The Lawï ¼Å' unlike other rules, it is a symbol of authority and power. It relies on the compelling force of the state by different means of punishment. The law can be taking into many different forms, such as public law and private law, civil law and criminal law, common law and statute law, and so on. Public Law regulates the relations between citizens, companies and private associations on the one hand and the state on the other. Generally speaking, public law consists of Constitutional Law, Administrative Law, and Criminal Law. Private law regulates the relations between citizens, companies and private associations, such as tort law, contract law, land law, commercial law, and so on. Therefore, the law would play a role of guidance to people. For example, according to the criminal law, we can know what we can do and what we can not do. Under the press of the law, based on the fear of the punishment, we can prevent ourselves from committing a crime. Taking contract law for another example, the parties of the contract should bear the responsibility ruled in the contract. The unconstrained agreement is the basic element to a contract. Every party of the contract should comply with the quest ruled by the contract law. As for the application of common law, the judges should follow the previous decisions made in the process of the development of the law through doctrine of precedent. On the contrary, statute law is the laws made by the parliament. As for the use of the law in daily life, legal principle is one of the most important parts. At some situations, the application of the legal principle is more important than the legal clauses themselves. Due to the rapid development of the society and the economy, the evolution of the law can not keep up with the pace of the society and economy. In a result, in some cases, the existing law would not have the ability to solve the new problems happened in the society. So, as for these situations that there are no explicit legal rules to solve the issue, the legal principle is playing a vital role. According to the opinion of Leslie Green, another reason for the use of the legal principle is that law may be beneficial, but only in some contexts and always at a price, at the risk of grave injustice.[1] In general, the legal principle is formed in the process of the development of the law, experiencing a long history. It is always absorb the beneficial historical sources and develop into a useful material to match the need of the modern society for the law. It also develops to apply from an area to another area.[2] There are many legal principles can be used in our daily life. Such as the principle that everyone is equal before the law, signing a contract freely, protecting the public order and good morals, and so on. In the case of the background, although the action asking the friends to attend the party is match the rule of the law of the Prohibition of Unsolicited Parties (Fictitious) Act 2010, Derek violates the legal principle of protecting the public order and good morals. As a result, Derek should take some responsibility in the civil law. In the case, Ray, the Manager of a builder’s merchants, asks Derek, a Sales Assistant at the same workplace, to keep an eye on his 5-acre smallholding while he is on holiday in Spain. Derek emails a few of his friends to attend his 21st birthday party in a disused barn on Ray’s farm land. Due to a technical error, the email was sent to his entire email address book. Over 600 people arrive at the party and a neighbor farmer calls the police complaining about the noise. Derek is arrested for breach of the Prohibition of Unsolicited Parties Act 2010. For the Act, it applies to a gathering of more than a hundred people on land for a social purpose in which it is likely that alcohol will be consumed. It is a criminal offence to organize such a gathering without the permission of a local magistrate unless the organizer is an exempt person. (James B. Crippin, Jerry Ahern. Peter Squires. 2011) For the birthday party, it gathers over 600 people, it is up to the mustard of rally, that is, (1) particular majority participate; (2) participants have a more consistent motivation and purpose; (3) in the course, it has the serious violations, damage to public order, harm public safety or others. So, it needs to receive the permission of a local magistrate, otherwise, it will violate the Prohibition of Unsolicited Parties Act 2010. From the case of the background, we can see Derek and Ray form an oral contract and an agent relationship. In general, a contract is formed at the basic of the mutual assent between the parties.[3] According to the view of Miguel Pickard, the relationship formed among the people is aim at the interests of the parties.[4] The agent relationship formed between Derek and Ray is a typical example. In the stage of the leave of Ray, Derek, as the agent of Ray, would gain some rights as well as some responsibilities. Agent is formed by two parties: the agent, the principal. In the sense of the law, the relationship of agent has three parties: agent, principal and the third party. An agent is the one who is empowered to represent the principal to do some things, either implied or expressly. In the real life, although the contract is signed by the agent and the third party, in fact, the legal relation is created between the principal and the third party. An agency is formed either by express agreement or by implied agreement. In general, the relationship of agent formed by implied agreement is shaped in some necessary or emergent situations or shaped by custom. Such as a person entrusts with others’ property, need to preserve immediately, impossible or extraordinarily difficult to communicate with the principal. Once two people create the agent relationship and publish to public by words or other forms, this means that the third party has the evidence t believe their agent relationship. The agent and the principal can not deny the relationship casually. If the third party believes one person who is actually no authority to represent the principal is the agent of the principal and do some trade or sign an agreement with this person, the principal can ratify the authority afterwards. But there are some limiting conditions for the ratification: the principal who should have the contractual capacity must be informed of all the fac ts of the agency and ratify the authority during a reasonable time; the ratification must be of the entire contract and can be inferred. As long as the authority is ratified, the relation formed between the agent and the third party is binding to the principal.[5]As for the agent relationship, all of the parties should take their own responsibility and enjoy the right. The agent should follow the principal’s instructions. The agent can not make profits in the name of the principal for himself secretly. In general, the right of the agent to represent the principal is limited. If the agent makes profits secretly making use of the benefit of the principal, it is illegal.[6] In order to serve for the principal, the agent would ask for remuneration from the principal. The agent has right to ask for indemnity and reimbursement from the principal as long as injured or hurt during the stage of agency. Once the principal tries to avoid the liability, the agent enjoys the right of lien. The principal should make explicit authority to the agent and give relevant reward to the agent. If the agent does not represent the principal as the follow of the principal, the principal can use some remedies, such as refuse to pay the agent, sue for damage, ask the agent to recover the thing as before. The most important legal effect of the agent relationship is that the principal should take the responsibility of the acts of the agent. In the case of the background, the action of the agent of purchasing the apartment is binding to the principal. The principal should take the responsibility for the agent action. The trade made by the agent and the third party is binding to the principal.[7] In general, the principal is not always disclosing. As for the disclosed principal, the principal is bound by any contract unless the following situations: the agent exceeds their authority, the agent agrees to be liable and the principal is non existent. With respect to the undisclosed principal, the third party can choose one or more to take the liability, while the principal can sue unless the identity of the party is essential to the contract. The agent relationship can be terminated for many reasons. The agent and the principal can make an agreement to end the relationship. The relationship also can be ended by other legal reasons, such as the death of one of the agent or the principal, time is expiring, and so on. In the case of the background, Derek, as the agent of Ray, gets some rights authorized by Ray. Derek can use the smallholding in reasonable means. Although Derek does not need to take the Criminal responsibility, he should bear the civil liability for his action which affects the normal life of the neighborhood around the smallholding. But, according the law about the agent, the principal Ray would be the first defendant. After Ray bears the responsibility for the action of Derek, Ray can ask for Derek to undertake the liability for his action. According to the Prohibition of Unsolicited Parties (Fictitious) Act 2010, this Act applies to a gathering of more than a hundred people on land for a social purpose. But it is a criminal offence to organize a gathering if there is without the permission of a local magistrate unless the organizer is an exempt person. In the act, the exempt person means the occupier, any member of his family or his employee or agent of his. In the case of the background, Ray asks Derek to keep an eye on his 5-acre smallholding while he is on holiday in Spain. According to the Prohibition of Unsolicited Parties (Fictitious) Act 2010, as the agent of Ray during his holiday in Spain, Derek in entitled to use the smallholding for some purpose. In order to celebrate the twenty-first birthday, Derek asks his friend to attend the party is match the provisions of the Prohibition of Unsolicited Parties (Fictitious) Act 2010. Even if Derek does not gain the permission of a local magistrate, he also has the right to hold the party at the reason that he is an exempt person. The reason why Derek is an exempt person is that Derek becomes the agent of Ray in the period of Ray’s leave due to the agreement of both parties. However, even if the action of Derek to ask his friends to attend the party is comply with the quest of the Prohibition of Unsolicited Parties (Fictitious) Act 2010, Conclusion In general, on action can infringe several laws. At the same time, one action is punished either it does not comply with the provision of the law or it does not match the legal principle. At some situations, legal principle plays a vital role in the society. In the situation that the existing law would not have the ability to solve the new problems happened in the society, the legal principle can play a part in solving the problem. As for these situations that there are no explicit legal rules to solve the issue, the legal principle would take it. As for the relationship of the agent, the agent can represent the principal to do some things. Even if the contract is formed by the agent and the third party, the principal should take the responsibility finally. Just as the case in the background, Derek should take the responsibility for his action. Reference ï ¼â€  Bibliography [1] Bolton Partners v Lambert (1889) 41 Ch D 295 [2] Christina Maria Vogerl, â€Å"Unfair Terms in Standard Form Contracts†, European Master Program in Law Economics. [3] Leslie Green, â€Å"the concept of law revisited†, Michigan Law Review, vol.94; 1687 [4] Lloyd Grace, Smith Co [1912] AC 716 [5] Lunghi v Sinclair [1966] WAR 172 [6] Miguel, P 2007,‘reflections on relationships: the nature of partnership according to five NGOs in southern Mexico’, Development in Practice, volume 17, numbers 4-5 [7] P. J. du Plessis, â€Å"The Creation of Legal Principle†, Roman Legal Tradition, 4 (2008), 46–69, ISSN 1943-6483 [8] James B. Crippin, Jerry Ahern. Peter Squires. (2011). â€Å"First Response to Bombing Incidents and Weapons of Mass Destruction†. Chemical Rubber Company Press. [9] Aled Griffiths, â€Å"How are statutes interpreted?†, page617, Law for Non-Lawyers, Second Edition, ISBN 978-0-85776-696-0 [1] Leslie Green, â€Å"the concept of law revisited†, Michigan Law Review, vol.94;1687 [2] P. J. du Plessis, â€Å"The Creation of Legal Principle†, Roman Legal Tradition, 4 (2008), 46–69, ISSN 1943-6483 [3] Christina Maria Vogerl,â€Å"-$%01234;@EFLRWX_hiwxyÃ… ½Ãƒ µÃƒ ¬Ãƒ  Ãƒ ¬Ãƒ µÃƒ ¬Ãƒ µÃƒâ€Ãƒ ¬Ã‚ ¾Ãƒ ¬Ã‚ ³Ã‚ §Ã…“? ³Ã¢â‚¬ ¡Ã‚ ³{ ³m ³aTD ³h–à ¬hà a «5?CJ aJ mHh ´Chà a «5?CJ aJ h–à ¬hà a «5?CJ aJ o([pic]hßshà a «5?CJ aJ hà a «5?CJ aJ Unfair Terms in Standard Form Contracts†, European Master Program in Law Economics. [4] Miguel, P 2007,â€Å"reflections on relationships: the nature of partnership according to five NGOs in southern Mexico†, Development in Practice, volume 17, numbers 4-5 [5] Bolton Partners v Lambert (1889) 41 Ch D 295 [6] Lunghi v Sinclair [1966] WAR 172 [7] Lloyd Grace, Smith Co [1912] AC 716

Monday, October 14, 2019

Ideas of feminism and free love

Ideas of feminism and free love Since time immemorial women have been viewed as the weaker sex, and so, over the centuries they have had to fight for each and every right they deserved as humans to lead a happy and content life. Men have always viewed themselves as superior to women and claim that even nature intended it to be that way as they are naturally physically more powerful. But they forget that it is a woman who gives birth to a man and that is how nature intended it to be for eternity. Men have tried and have been able to not only make women but also their desires slaves over the centuries. Woman was seen as a commodity and to the horror of the civil society still is in many parts of the world. She still has no complete right over her body, mind or soul. This paper intends to talk about the right of a woman over both her body and mind through the Free Love Movement. Sexuality has been a taboo topic in most of the societies around the world and it is viewed as shameful to even bring up the thought that women can have their own desires related to sexuality. In many orthodox societies, women even today are synonymous with the word honor and the talk of rights for them is seen as foolery. But over the centuries women all around the world and many men also, have realized that this patriarchal world would never hand over rights to women and so these feminists have to take up the fight for their rights whether social, economic or political. In this debate over rights comes the right of a woman over her body and how and what she wants to do with it which finally gets attached to the bigger subject of feminism. This fight of the feminists is very much entwined with the Free Love Movement and has played a huge role in giving momentum to the mo vement over the years and around the world. INTRODUCTION: Charles Fourier in this famous essay originally published in the 1800s talks about women and their degraded status: Is there a shadow of justice to be seen in the fate that has befallen women? Is not a young woman a mere piece of merchandise displayed for sale to the highest bidder as exclusive property? Is not the consent she gives to the conjugal bond derisory and forced on her by the tyranny of the prejudices that obsess her from childhood on? People try to persuade her that her chains are woven only of flowers; but can she really have any doubt about her degradation, even in those regions that are bloated by philosophy such as England, where a man has the right to take his wife to market with a rope around her neck, and sell her like a beast of burden to anyone who will pay his asking price?  [1]   He further goes on to talk about the double standards of different nations towards women though these nations are seen as highly moralistic but in reality even they have treated their women as slaves according to him. He states that even the English legislation which is highly respected and is seen as highly moralistic is also prejudiced against women. It had given rights to men but had degraded the women. Even the French are no less different from their British counterparts and treat their women in the same biased way. Eventually, the slavery is the same for the women, no matter which country she belongs to. Hence, there is no justice for women anywhere. Likewise, he points out that there was not much difference regarding the status and rights of women in both the civilized and the savage (as the oriental and African countries were referred to by this term) countries. He elaborates by mentioning the different countries like Japan and china. He was of the view that all the nations which give their women the highest level of freedom are the best in the world. Japanese according to him were the most industrious and bravest but in contrast to other nations were also highly indulgent towards their women. Their women enjoyed a respectful place and even the Chinese went to Japan to enjoy the love that was forbidden in their own country due to their hypocritical customs. He further elaborates by giving examples of nations both civilized and savage which supported the fact that a nation can only develop if it respects its women. He argues that both the Tahitians and the French are placed really well off and are also highly developed due to the respect attached to women. Likewise, he also believed that the nations which subjugated their women turned out to be the most corrupt. Maybe, they faced a deficiency in their moralistic standards as a nation which cannot respect its women is never able to gain any respect anywhere. Ultimately, he reached the conclusion which came out as a general thesis: Social progress and historic changes occur by virtue of the progress of women toward liberty, and decadence of the social order occurs as the result of a decrease in the liberty of women. Other events influence these political changes, but there is no cause that produces social progress or decline as rapidly as change in the condition of women.  [2]   FEMINISM: The concept of feminism is an amalgamation of movements with the primary aim of defining, establishing and defending equal political, economic and social rights to women and ultimately resulting in equal opportunities for women. Though the main focus of feminism is on women but many feminists are of the view that as it aims at gender equality so, even men are a party to it, as many times due to sexism and due to fixed gender roles they also suffer. Feminism aims to free both the genders away and out of the cast of their traditional roles. Persons who practice feminism are known as feminists and can belong to either sex. Feminists over the centuries have fought around the world and campaigned for womens rights such as in contract, property and voting while also promoting a womans right to bodily integrity, autonomy and reproductive rights. They have taken a very strong stand against sexual harassment, domestic violence and sexual assault. For example, feminists groups in India have been for long raising their voice for change in the laws related to rape under the Indian Penal Code. Feminists have also advocated for equal rights for women in the economic sphere also as they demand equal pay and opportunities for careers and to start businesses which some constitutions like the Indian constitution have made a part of their fundamental rights. Feminism over the time period has been divided into three waves by the feminists and scholars: First Wave: It primarily refers to the movements fought all around the world for the right of suffrage in the 19th and early 20th centuries which were basically concerned with womens right to vote. Second Wave: This phase started in the 1960s and lasted upto the 1980s. It was basically concerned with the movement for legal and social equality for women as campaigned by the feminists in the women liberation movement. Third Wave: It is a continuation of and a reaction to the so called perceived failures of the second wave feminism and began in the 1990s. THE FREE LOVE MOVEMENT: Wendy McElroy in her article on free love very clearly has defined the aim of the movement. According to her the free love movement of the 19th century basically aimed at separating the state from matters related to sexuality like marriage, birth control and adultery. The individuals involved were the ones who should have a say on these matters and not the state as it concerns their personal lives and the state has no right as to dictate to people how to live. Many of the free love advocates were of the view that sexual laws were basically meant to discriminate against women and their freedom specially the marriage and birth control laws. They viewed sexual freedom specially the supporters of Josiah Warren and experimental communities as a clear, direct expression of an individuals self ownership.  [3]   On the other hand Taylor Stohr and other revolutionary writers talk about the movement in respect to America: What was free love? The nineteenth century free love movement was a distinct reform tradition, running from the utopian socialist thinkers of the 1820s and 1830s through the center of American anarchism to the anti Comstock sex radicals of the 1890s and 1900s and from there into the birth control movement of the twentieth century.  [4]  The times of the emergence of this movement were full of upheaval and change in the centuries old sexual conventions. The sexual relations between men and women were undergoing huge changes. The number of women living away from their families and having their own individual lives had increased dramatically. Things were changing for women within marriage as well  [5]  and they were now exerting their will to have their own individual lives as well. The changing scenario regarding the change in attitude of women towards their sexuality in America and to top it all there was observed an assertion of sexual freedom by women. The change in the pattern of sexual activity told the story very clearly during those times. Women in America had started having fewer pregnancies and child birth and that showed a control over their sexual activities. The free love movement was there to support these changes and bring about a reform and modernize these ages old emotional and sexual conventions which had made stiff rules of behaviour for both the sexes. Free love was more of an individualistic based movement. It emphasized on the happiness of the individual and not on social welfare. It viewed marriage as a union of love and appreciation between two individuals and not as an institution for reproduction. It was a reform which was bringing about self consciousness and it was both related to and still different from women right movements. Over the centuries, this movement has been only viewed by many as an anti-marriage movement. But on further study one realizes that the movement covered a much wider aspect. It was basically in opposition to marriage as a legal institute which made the advocates of this movement see the legalization of marriage as an attempt by the state to regulate the private affairs of individuals. The nature of the movement can also be defined as that of civil libertarian as it aimed to defend individuals rights in matters of sex and love. The movement aimed at encouraging healthy democratic public debates about sexuality, love and reproduction. It protested against any type of control over any of these matters by the state through experts. That is the reason why all the supporters of the free love movement stood together against the Constock laws which restricted the individuals from learning and talking about sexual matters to some select experts only. Our perceptions regarding the advocates of the free love movement may view them as pro sex but in reality it was not the case. The advocates of this movement totally denied that they were encouraging or supporting any kind of sexual promiscuity or a license to indulge. Indeed free lovers often claimed that they were working for a relaxation of external controls in order to produce a greater sense of sexual responsibility and personal control, a utopia of permanent, harmonious, monogamous true love.  [6]   Still sex according to the proponents of this movement did not fall in the same category as sexual intercourse and it is neither on the same plane as sexual orgasm. Appreciation and encouragement of sexual expression not only for the men but also for the women was the basic aim of the free love movement to the surprise of many people. The movement supporters were of the view that sex not only had an important role in procreation but it could be viewed differently also. The possession of strong sexual powers is not to be deprecated, Victoria Woodhull insisted, in the face of cultural norms to the contrary. If superiority of any kind is desirable at all, let it be in the animal, since with this right, all others may be cultivated to its standard.  [7]   There has been a huge debate regarding the movement being dominated by men or women. The movement seems to be a culmination of both. It was simultaneously male as well as feminist dominated. Many of the male leaders of the movement were unsuccessful in understanding the sexual needs and wants of the women though the free lovers claimed that womens stand regarding sexuality and their freedom was essential to bring about a sexual revolution in the society. The most notorious example of male arrogance in respect of sexual matters in the free love tradition was the utopian free love community in Oneida, New York, where an extremely radical, revolutionary and a promiscuous sexual practice had originated monogamy was absolutely prohibited and couples were broken up by the community itself- and all control was vested with the founder, John Humphrey Noyes. The male domination carries on in the history of this movement too as well cause most of the histories of the movement were written by m en and the irony is that these histories have not treated the women writers with equal respect and seriousness as the men writers such as Victoria Woodhull, and they made male concerns central to their writings and female sexual concerns such as contraception were put at the periphery. Instead of marriage based on external moral systems like organized religion and social convention, free lovers preached fidelity to ones self, or individual sovereignty.  [8]  Individual sovereignty, literally self ownership, was the central doctrine of early nineteenth century American anarchism. The extreme ideology of individual rights which this represented was used as an economic theory and a political doctrine, but for free lovers, it also functioned as a theory of individual psychology, which had implications for sexual conduct. As an alternative to social codes and moral systems, free lovers argued for the importance of each individuals coming to understand his or her own personal laws, and recognized that these might vary from person to person. No two spears of grass, no two leaves are exactly similar, Mary Nichols wrote. I have wants of taste, of appetite, of being that are not yours. If I am true to the spirit, the informing life, I shall live very differently from you and your idea, your right.  [9]   Since centuries women had been considered mens property and so the ideas of sexual self ownership and self definition were revolutionary in nature. Mary Nichols used the concept of individual sovereignty in an explicitly sexual way, to mean womens right to be sexually self determining, but she used it primarily in the negative the right to reject the sexual demands of men, including their husbands, unless the women themselves wanted to have sex. Nichols linked her free love ideas to the emerging womens rights movement of the 1850s; she was particularly impressed with Elizabeth Cady Stanton.  [10]  Yet she grasped that her emphasis on sex distinguished her from them. The idea of self ownership has come to few women in different ages, to more in this than in any previous age, she wrote, still the number is very limited at present who recognize no authority but their own.  [11]   FEMINISM AND FREE LOVE: After going through what does feminism and free love stand for one comes to acknowledge that both these movements are intermingled and to talk of one without mentioning the other would amount to blasphemy. Both the terms women liberation and sexual freedom carry with themselves huge connotations but it has been felt that though both project the way to a highly desirable way of life for women there has been much confusion regarding the interconnection between the two. Certainly any simple equation between the two womens liberation and sexual freedom ceased being possible some years ago, when modern feminists exposed the sexual revolution of the 1960s for what it was, a new set of imperatives on womens behavior, a compulsion to say yes that was as inhibiting as the injunction to say no. Since then, modern feminism has contributed its own premises to the politics of sexuality. The two most important of these are first, recognizing the degree to which sexuality and violence have conver ged in the heterosexual culture of our society; and second, asserting the possibility of sex between women and identifying  [12]  and criticizing what Adrienne Rich calls compulsory heterosexuality.  [13]   The debates regarding sexual freedom and sexual happiness though have asked the questions and tried to find answers as to what sexual happiness is and how it can be achieved but always from a male point of view. It is high time that these questions were looked into from the point of view of women. As Linda Gordon has written Sex hating women were not simply misinformed, or priggish or neurotic. They were often rationally responding to their material reality. Denied even the knowledge of sexual possibilities other than those dictated by the rhythms of male orgasm, they had only two choices; passive and usually pleasure less submission, with high risk of undesirable consequences; or rebellious refusal.  [14]  With the passage of time women realized that it is very much normal to have different desires from their male partners and their desires should also be respected in the same manner. On the level of political history, this feminist sexual revisionism has meant rediscovering the social purity and moral reform movements and reinterpreting them as womens collective efforts at sexual self defense.  [15]  There is a need for searching for other aspects of the history of feminist sexual politics, in particular to discover if there is another tradition, running alongside moral reform and social purity, in which women tried to assert the possibilities of a different kind of sexual life for women, one that didnt involve their systematic subordination.  [16]  The free love movement presents itself as the right movement to be studied in order to understand these aspects. Feminism itself was a collection of many things as pointed out by Ann Corthoys. She says that Twentieth-century feminism was many things: a set of ideas, a political and social movement, a cultural renaissance. It was a force for change and a guide for living. Feminism was the site of the reinvention of the category woman in the 1970s, and then of its deconstruction in the 1980s and 1990s. Now, at the turn of the century, after many years of involvement in feminism in all these aspects, one ponders at the meaning and future of the feminism that has helped shape our lives. In feminisms much-noticed episodic history, giving rise to the metaphor of waves, we seem to be at an ebb-tide. Something, the feminism of the last thirty years, has ended, and something else seems about to take its place. We live in an obscurely apocalyptic moment.  [17]   There has been a notion in the olden times and specially when the church played a very important part in the lives of the common man that womans primary responsibility was not to her husband or to her children, but to God, as all souls were ultimately equal before God, though for their own benefit men have altered this notion totally. While it was true that St. Paul had said that wives should be subject to their husbands in this life, he had also said that there is neither male nor female in the Lord. And so, a new kind of woman emerges from the restless anonymity of the crowds, aloof from the sullen aimless excitement of the thousands that drift along the pavements and surge through the squares, a figure whose mystery and danger is that she is alone.  [18]   Feminist theory emphasizes its critique insofar as it focuses on the subordination, weakness, and invisibility of women as part of a gender-based society. Feminism argues that a critique of gender socialization must begin from the perspective of women because general analyses of the human condition have tended to overlook womens conditions.  [19]   The free love movement had a huge impact in America and though it was very much present in Europe also the American movement was much more aggressive and highly supported Marriage assumed a central place in the social vision of this new middle class. Writers and lecturers like William Alcott and Sylvester Graham offered a comprehensive view of sexuality and marriage, stressing personal purity and the quality of relations both during courtship and in matrimony. By the 1840s an ideal of true marriage had been formed that viewed the voluntary decision to enter marriage as the most basic of all social relations. The guarantee that a marriage was sound, and therefore a sure foundation for society, was both the character of those entering it and their love for one another. True love never varied, but bound two people together exclusively and for life. Spiritualists, who appeared at the end even gave love credit for binding people together eternally.  [20]   As middle- class men and women came to view marriage as the root of all social relations, they also began to fear that its subversion potentially destroyed all of society. If something was wrong with marriage, as many Jacksonians believed, then all of society was at risk. By tracing the shift in perception during the late 1840s that led some members of the middle class to repudiate marriage we can gain a clearer insight into the social vision of early middle-class reformers and radicals. Those who doubted the legitimacy of marriage shared many of the assumptions of middle-class reformers of the period. Assumptions that derived from widely held middle-class ideals. These men and women looked upon individuality as an irreducible condition and feared institutions that limited individual autonomy, whether churches or governments. As we reconstruct the free love network that was formed to promote these beliefs we will see the connections between free love and other ante-bellum reforms, as well as free loves dependence on middle-class assumptions and values.  [21]   The Free love movement had a positive influence and brought about reforms related to other aspects of life too. Many feminists and free lovers compared African slavery to slavery by marriage and raised their voice for abolition of both. They were of the view point that a woman can only gain equal status to a man after she is treated as an equal partner in marriage. Free lovers also supported vegetarianism and teetotalism. Free lovers believed that sexual intercourse would be less frequent within a free relationship because both partners would be free of the lusts engendered by the artificiality of marriage.  [22]   The American movement ultimately did agree to the thoughts of Woodhull and other free lovers before her. Thus, her thought did turn victorious. From the mid-1870s on, the womens movement began to unite in opposition to the sexual ownership of women by men in marriage, and in defense of the principle of individual sovereignty, womens right to say no to sexual intercourse that they didnt want.  [23]   By 1894, the conservative Christian moralist Elizabeth Blackwell, took the same stand as that of Mary Nichols forty years before, said, In healthy, loving women, uninjured by the too frequent lesions which result from childbirth, increasing physical satisfaction attaches to the ultimate physical expression of love. The prevalent fallacy that sexual passion is the almost exclusive attribute of men, and attached exclusively to the act of coition arises from ignorance of the distinctive character of human sex, viz. its powerful mental element.  [24]   Though Victoria Woodhull was one of the biggest supporters of the free love movement but most of the respectable feminists were dead against her stand regarding the uselessness of marriage. The feminists also were unable to understand the willingness of the free lovers in viewing sex and reproduction separately pertaining to women. Though they agreed to and thought it necessary for women to have a say in choice and consent to intercourse, but they were equally committed to the confinement of sex within marriage.  [25]  Closely-related to this was a reverence for motherhood and the power it could bestow on women, a belief which we have seen even Nichols and Woodhull shared. Many more conservative feminists hoped that once men ceased to destroy marriage with their excessive sexual demands, women should once again welcome intercourse with them, not for the sheer sexual pleasure of it, but as the fulfillment of their higher maternal duties. Few, even among feminists, could see that t he equation between female sexuality and reproduction was a historically specific achievement, and that the liberation of womens sexuality was a process that would not be reversed.  [26]   Hence, we can see that the histories of both free love and feminism are entwined. From the late 18th century, leading feminists such as Mary Wollstonecraft have challenged the so called sacred institute of marriage and some of them have even gone further by demanding its abolition. The proponents of free love never viewed sex as a means of reproduction and so access to birth control was considered as a means to womens independence. The free love movement was even embraced by leading birth control activist like Margaret Sanger. Many of the leaders of first-wave feminism attacked free love. To them, womens suffering could be traced to the moral degradation of men, and by contrast, women were portrayed as virtuous and in control of their passions, and they should serve as a model for mens behavior.  [27]  The free love ethics of the 1960s and 1970s can today maybe seen as a manipulative strategy against a womans right to say no to sex. Issues regarding contraception, marital emotional and physical sexual abuse and sexual education are the areas very much emphasized upon by the sex radicals and the right of the women to control her body. The radicals were of the viewpoint that talking about female sexuality would ultimately help in empowering women around the world. FEMINISM, FREE LOVE AND THE GLOBAL SCENARIO: Ultimately, one has to agree to the fact that even as women all around the world are fighting for their rights in order to live a dignified and happy life one cannot disagree to the fact that there is huge cultural differentiation around the world. What may seem degrading to an American for a woman may be totally normal for a woman of that part of the world. Though these movements fight for a just cause but lack of global homogeneity is one of the important factors because of which women have not been able to gain as much out of these movements as they could have. But one cannot disagree to the fact that these movements have brought about opportunities for women all around the world which were unseen and unheard in the past. Women over the past have been seen as depositories of cultural homogeneity and it is high time that this notion was done away with. It is sad in the very first place that women have to fight for their rights though I am sure god intended both men and women to be equal and live a peaceful life together but in reality the picture is far away from this utopian idea. But though this movement has brought about changes in the thinking of the individuals around the world, the concentration is more in the United States of America and the United Kingdom. Other nations of the world have lacked behind and even today the matters related to female sexuality and freedom are taboo in conservative societies like that of India. Though the educated class has still benefited from these revolutions and are quite free in matters related to head, heart or body but most of the other women still suffer from inequality in most of the spheres of their lives. It is ultimately the combination of feminism with free love that has brought about a positive change in both men as to respecting the wishes of women and in women as to voicing their needs and finally having the guts and confidence to walk out of the shackles and say no as and when they want to. But still, a lot of work needs to be done globally and it should be seen that knowledge about such movements should be made available around the world through the revolutionary writings of the supporters of free love. So women around the world can bring about a change in their own societies in order for a women to live a dignified life and the men to respect her as they respect themselves. CONCLUSION: After 1875, a lot of research still remains to be done on the participation and role of women in the free love movement. A large number of women had come forward and supported the movement during and after 1875. But as the number of women supporters increased so did the differences among them. Nichols and Woodhull were two of the biggest names of the movement. There were many more women who were equally passionate and supporters of the movement