Saturday, November 30, 2019

Sigmund Freud Essays - Freudian Psychology, Id, Ego And Super-ego

Sigmund Freud Many believe Freud to be the father of modern psychiatry and psychology and the only psychiatrist of any worth. He is certainly the most well known figure, perhaps because sex played such a prominent role in his system. There are other psychologists, however, whose theories demand respectful consideration. Erik Erickson, born Eric Homburger, whose theories while not as titillating as Freud's, are just as sound. This paper will compare the two great men and their systems. In addition, this paper will argue that Freud offers the more useful foundation for understanding the Jenny Masterson's confused psyche. Sigmund Freud showed signs of independence and brilliance well before entering the University of Vienna in 1873. He had a prodigious memory and loved reading to the point of running himself into debt at various bookstores. Among his favorite authors were Goethe, Shakespeare, Kant, Hegel and Nietzsche. To avoid disruption of his studies, he often ate in his room. After medical school, Freud began a private practice, specializing in nervous disorders. He was soon faced with patients whose disorders made no neurological sense. For example, a patient might have lost feeling in his foot with no evidence to any sensory nerve damage. Freud wondered if the problem could be psychological rather than physiological. Dr. Freud evolved as he treated patients and analyzed himself. He recorded his assessment and expounded his theories in 24 volumes published between 1888 and 1939. Although his first book, The Interpretation of Dreams, sold only 600 copies in its first eight years of publication, his ideas gradually began to attract faithful followers and students - along with a great number of critics. While exploring the possible psychological roots of nervous disorders, Freud spent several months in Paris, studying with Jean Charcot, a French neurologist from whom he learned hypnosis. On return to Vienna, Freud began to hypnotize patients and encouraging them while under hypnosis to speak openly about themselves and the onset of their symptoms. Often the patients responded freely, and upon reviewing their past, became quite upset and agitated. By this process, some saw their symptoms lessened or banished entirely. It was in this way that Freud discovered what he termed the "unconscious." Piecing together his patients' accounts of their lives, he decided that the loss of feeling in one's hand might be caused by, say, the fear of touching one's genitals; blindness or deafness might be caused by the fear of hearing or seeing something that might arouse grief or distress. Over time, Freud saw hundreds of patients. He soon recognized that hypnosis was not as helpful as he had first hoped. He thus pioneered a new technique termed "free association." Patients were told to relax and say whatever came to mind, no matter how mortifying or irrelevant. Freud believed that free association produced a chain of thought that was linked to the unconscious, and often painful, memories of childhood. Freud called this process psychoanalysis. Underlying Freud's psychoanalytic perception of personality was his belief that the mind was akin to an iceberg - most of it was hidden from view. The conscious awareness is the part of the iceberg that is above the surface but below the surface is a much larger unconscious region that contains feelings, wishes and memories of which persons are largely unaware. Some thoughts are stored temporarily in a preconscious area, from where they can be retrieved at will. However, Freud was more interested in the mass of thought and feeling that are repressed - forcibly blocked from conscious thought because it would be too painful to acknowledge. Freud believed that these repressed materials unconsciously exert a powerful influence on behavior and choices. Freud believed that dreams and slips of tongue and pen were windows to his patient's unconscious. Intrusive thoughts or seemingly trivial errors while reading, writing and speaking suggested to Freud that what is said and done reflects the working of the unconscious. Jokes especially were an outlet for expressing repressed sexual and aggressive tendencies. For Freud, nothing was accidental. Freud believed that human personality, expressed emotions, strivings, and beliefs arise from a conflict between the aggressive, pleasure-seeking, biological impulses and the social restraints against their expression. This conflict between expression and repression, in ways that

Monday, November 25, 2019

Disabled by Wilfred Owen and Whos for the game by Jessie Pope Essays

Disabled by Wilfred Owen and Whos for the game by Jessie Pope Essays Disabled by Wilfred Owen and Whos for the game by Jessie Pope Essay Disabled by Wilfred Owen and Whos for the game by Jessie Pope Essay Essay Topic: Literature The two poems I have chosen are Disabled by Wilfred Owen and Whos for the game by Jessie Pope. Both Poems are set around the war but they show very different perspectives. In Disabled, Owen tells the story of a young man from the Scottish Regiment who was a fellow patient in the hospital Owen was sent to after suffering from shell shock. Owen was very disillusioned with the idea of war and wrote to show people the truth and obliterate the image of war created by propaganda. Pope was a member of the White Feather Brigade, as they were known. Women who felt it was their duty to their country to send their men to war. Any woman who was seen out with a man not in uniform was labelled a traitor; men who did not join up were presented with white feathers as a symbol of their cowardice. Popes work was much a piece of the propaganda Owen was standing up against. She was calling the men of Britain to arms. The first thing to strike the reader would be the difference in mood between the two pieces; Owens work is melancholy the tale of one man contemplating his wasted life. In the second line he talks of his ghastly suit of grey, this could refer to his demob suit or more likely the mood of the subject. Whereas Popes poem is very light almost like a song, the language is simple in order to reach a wider audience. The boy in Disabled is looking back at his vanity with regret. He appears to spend his time waiting for each day to end as if he was just waiting to die. He hears children at play they only serve as a reminder of what he has lost; he was little more than a child when he joined the war. As evening draws in he remembers the way the town came to life at night, again this is painful he will never again come to life and dance and be happy. Pope refers to the war as a game and a fight, this could be interpreted as a call to children, which indeed happened, the character in disabled admits that he was underage when he enlisted, no-one seemed to care. They just smiled and wrote his lie. The two poems also refer to sport although in different ways. Pope asks who wants a turn in the show and mentions those who do not join in as being left in the stands possibly the football stands for spectators. In the fourth and sixth stanza Owen refers to his subjects love of football. How he was carried off the field victorious with a wound to the leg. The fact that he was also carried off the battlefield with leg injuries, but this time he lost his limbs suggests that Pope is wrong to belittle war and its horrors war is not a game and it certainly is not childs play. Pope is asking her audience to see the war as glamorous which indeed is what Owens character did he admits to enlisting to impress, he wanted to attract the girls. He was told he would look good in uniform, he speaks of his good looks, of his vanity. At this point he had no fear, he had no cares he was not afraid of anything. He wanted the fame and the glamour that people like Pope were offering. He didnt think about the people he would be fighting against. He had nothing personal against them they were just enemy. Pope uses personification to refer to Britain as a woman. Indeed she is asking the men to join up and protect her as a man should protect his woman. An act of chivalry! Pope is taunting the men, if they do not enlist and fight for their country they are not men, they are cowards. At the end of the poem when she asks if they will stand and bite their thumbs, it may be suggested that she is likening them to babies sucking their thumbs. Pope mentions a crutch as if it may be a souvenir, one could be forgiven for wondering how the boy in disabled might feel hearing this, he has his souvenir of war. A suit without legs which has the sleeves sewn short at the elbow. He threw his limbs and his life away for his country, as did so many others. He did as he was asked what has he got to show for it? Pope uses repetition in the second stanza to emphasise the fact that their country needed help she needed men in the ranks, Pope questions the men and boys repeatedly as if waiting for an answer. Pope mentions the celebrations as the boys are sent off. Owens boy knew all about that but the return was very different. He went away a young boy and returned an old man, he will never be whole, or have his independence. All he will have is a few more years spent in institutions while he waited to die, with women looking at him in pity. He will never have the pleasure of a woman, he will not be the one taking women to his bed, he will be relying on the women to put him to bed. In her work Pope is shouting out to the people to come join in with the fun, she is calling out for patriotism asking the men to lay down their lives for their country and asking the women to send their husbands and sons. She is speaking to them colloquially, using their language and challenging them. The poem is written very simplistically using phrases and terms that attract all, in particular the younger generation. The phrase up to her neck is a slang term, which as well as using personification is a more graphic description than to give exact details of where the war is up to at that moment. It may be suggested that Pope was a very persuasive woman who did a great deal to help the war effort and send men cheerfully to their death, which is possibly why men like Owen felt the need to stand up and have their story heard. Owen does not attempt to spare the feelings of the reader his intention is to shock. He wants the people to know the truth; it may be argued that he felt a responsibility to the youth of his country to let them know what they were in for. War was not all cheering and shouting as Pope suggested. War was horrific, it took lives and the lives that were spared would never be the same again.

Friday, November 22, 2019

Blockchain for Bitcoin Technology

The block chains are the distributed databases maintaining continuous growth of records ordered in lists called â€Å"blocks†.   It is the public ledger of every Bitcoin transactions which have been executed. The pleted† blocks are incorporated to it leading to constant increase in size of the â€Å"block chains†. These blocks have been imposed over the blockchain in chronological order and linear manner. The research would be conducted around â€Å"Bitcoins†. The â€Å"bitcoins† has been developed as rewards in petitions where users offer power of puting to authenticate and record transfer of data into block-chains. The study would not reveal any other cases supported by the block-chains like smart contracts and the licensing. The study would describe the research. Then the evaluation of the contribution of block-chains with â€Å"bitcoins† has been discussed.   A model to stimulate has been developed with its limitations and justifications. Lastly conclusion has been drawn on the key findings fitting to the research. At first the topic â€Å"blockchain technology† in â€Å"Bitcoin† is defined. Then the area of â€Å"blockchain technology† in â€Å"Bitcoin† is unfolded. The areas that are not to be included in this research are mentioned. Lastly the general findings from â€Å"blockchain technology† in â€Å"Bitcoin† are revealed. In the next section, the fiend of the review has been described. After describing the research, evaluation is done on the contribution of the research that has been done to the area. Next the limitations of â€Å"blockchain technology† in â€Å"Bitcoin† are shown. Lastly the section ends by mentioning the values of the limitations in the project. Then the best solution for the present situation is given. It important features are discussed. Its quality and contribution to the given research field is analyzed. A model is drawn stimulating it. Lastly conclusion is drawn upon the key findings from the review of â€Å" blockchain technology† in â€Å"Bitcoin†. Boyd &Carr, (2016) researched that â€Å"Blockchain† is the decentralized method for data transaction in â€Å"data management†. It was first designed for the â€Å"Bitcoin cryptocurrency†. The interest in this field originated since the idea has been coined in the year of 2008. The reason behind this was its core attributes providing data integrity, anonymity and security. This has been done in the absence of a third party organization that could manage its transactions. Thus it created attractive areas of research. This has been especially from the view point of limitations and technical challenges. A systematic mapping of the study with the aim of gathering every relevant research on the technology of lock-chain is set. The main aim has been the understanding of the present challenges, future directions and topics of the research. Various online journals are studies. That show focus on the â€Å"Bitcoin† systems. Most of the studies has been dealing wit h reveal and improve of the â€Å"Blockchains† from the security and privacy view-points. Several of the proposed solutions have been lacking concrete discussion on the effectiveness.   Many scalability of Block-chain involving the latency and throughput has been kept unstudied. Evaluation of the contribution of the research:The contribution of the research has been interesting to watch where it has been heading. Bitcoin has got many attentions in cryptocurrency. According to Gà ¶bel et al. (2016) more people has been buying and trading Bitcoins per day. Hence it has been crucial as a research topic. The research would attract the academia and industries to carry on further researches from both the technical and business perspectives. The Bitcoin has been the only solution to utilize the â€Å"Blockchain† technology. There has been various other cryptocurrencies currently who have been giving petition to Bitcoin. The future researches from this study might also involve other cryptocurrencies. The review would not only help in focusing on Bitcoin and the other cryptocurrencies but also highlight applications possible utilizing the solution of blockchain. Utilizing of decentralized scenario like the share of virtual properties could be a contribution o f the research. This would revolutionize the approach in which the organizations would sell the products. Gipp, Kosti&Breitinger (2016) states that as the solutions of blockchain are used for more users, it would appreciate the reviews like this done on the technical challenges and limitations. The increase in sizes and bases of users has triggered to conduct this type of researches relating to the scalability. Moreover, the research will leave its impact on the privacy and security concerns. This would give birth to inventions of new areas to prevent the disturbance on blockchains. Limitations of the research:The systematic mapping of the research would enable the understanding of the present gaps in the research. Crosby et al., (2016) state thatone of the fundamental limitations on the study is relating to the publication bias. It refers that the problem that the positive ou es are to be published more than that of the negative ones. This is because that the negative take much time to get published. Moreover, they have been less cited in the publications. Other limitation has been the â€Å"selection bias†. It refers to the distortion of the statistical analysis. This has been owing to the used criteria for selecting the publications. Lastly the there has been limitation regarding inaccuracy the extraction of data and the misclassification. This indicates the possibility of extraction of data differently by various reviewers. Importance of the research gaps in the project:As researched by Zheng et al., (2016) this identification of systematic mapping of the research would help the practitioners and the researchers to concentrate on research areas that need more researches. The seeking of the gaps of research would reply the unanswered queries in the present technology of blockchain. The addressing of the publication issue has brought the usage of various scientific databases. This is done within the â€Å"search protocols† to seek maximum number of papers. This has raised the quantity of papers found for this study along with raising the possibility to seek the papers with negative ou es. Nonetheless, the Blockchain innovation has been considered as another subject in the software engineering industry. It has been further distributed as white papers inside the panies. Thus, all exploration led on the specialized perspectives on Blockchain could not been incorporated in this mapping study. In any ca se, by using just logical databases as hotspots for finding significant research, papers are gathered of higher quality. The issue of selection bias has been addressed by the developing o careful search protocols. Pilot searches could be done on various keywords ensuring what has been concluded from the study. Rigorous criteria for inclusion and the exclusion could be defined form this. This would ensure that every paper elected has been the section of the research topic (Bracamonte, Yamasaki & Okada, 2016). Most of the researches relating to the block-chain have been relevant to the regulation, legal and economic factors of Bitcoin with the possibility of its cryptocurrency. The solution is the â€Å"data extraction† and â€Å"mapping process†. Matzuttet al., (2016) claimed is designed to gather data required to address the queries of research in this review. The data items collected are the basic information regarding the study. It includes the objectives and major findings from the study. It helps to organize and assess the data. The selection and search ou es are found from the process. There has been the â€Å"Prisma-Flow† model provided with the process. Many journals have been retrieved initially as the search protocol designed has been registered to the scientific databases selected. The initial round on the inclusion and the exclusion has been lying on the basis of the titles of the papers retrieved. Various papers excluded have been discussed from the business view-point of Bitcoin. They have not been included in the study. Retrieval of numerous papers relevant to other scientific fields where the Blockchain has another defi nition than technology in puter science is done. The most important features have been the identification of security, wasted resources, usability and privacy. These have been good due to the identification of exchanging property of Bitcoin. This has caused economic harm for the clients. This fit into the research was said by Karame (2016). This is because there is a scope of introducing the â€Å"audit software† to increase the usability in the Bitcoin exchanges. The aim of this software has been to deduce the solvency of exchange participants. This could be done without the publication of crucial data. There has been connection between the buyer and the seller with limited layer for anonymity. This prevents the buyers to find and validate data in Bitcoin. Different models could be presented through which the rating or reputation could be imposed conjoining the transactions of Bitcon. This considers every pros and cons. These aspects could be improved. This could be done on the network of Bitcoin. Thus the usability is improved delivering extra data for users who have been making transactions. Limitations:Colombo (2016) argues that the technology of block-chain has certain challenges that are identified through the review. Several technical limitations identified in adapting the technology of block-chain in future are throughput, latency, bandwidth and size, security, wasted resources, usability and versioning with hard forks and multiple chains. They have been the limitations for certain reasons. The potential issues throughput in the network of Bitcoin presently gets maximized to transactions per second. In order to develop enough protection for the transaction block of Bitcoin, it takes 10 minutes to finish a transaction roughly. In order to gain security efficiency, more time has to be spent in the blocks. This is because it has been outweighing the expense of couple of attacks. Currently the block-chain’s size in the network of Bitcoin has been over five hundred thousand megabytes. The munity of Bitcoin assumes that the quantity of each block has been one mega bytes. The block has been created for every ten minutes. Dwyer (2016) discusses that this causes limitations in the quantity of transactions to be handled. In the security section the present block-chain at Bitcoin can have 51% attack. The mining at Bitcoin has been wasting large quantity of energy about fifteen million dollars per day. This has been the reason of effort of â€Å"proof-of-work†. The API of Bitcoin to develop services has been hard to use. There has been the requirement to design an API for blockchain that is more developer-friendly. This resembles the REST APIs many times. Small chains that prises of lower quantity of nodes possess high chances of fifty-one percent attack. Another problem arises as the chains have been split for versioning and administrative purposes (Krug & Peterson, 2015). These limitations fit to the review as the blockchain posses the ability to alter the method of transactions. Moreover, the block-chain’s applications have not been limited to the crypto currencies. The data integrity attributes of security and the anonymity has been suffering from various restrictions and obstacles. They are assesses and resolved in this research. Scalability has been another problem which has been also mentioned in this study. This research would help in identifying the present status done by blockchain. The research has continued to seek several problems and solutions to ove e the limitations of the technology of Block-chain. Most of the study has concentrated on addressing the challenges. Every block prises of a timestamp. It prises of links to previous blocks. As recorded once, the block-chains have been resistant inherently to any kind of modification of data. Maximum researches on block-chain of present day have been concerned about the security and privacy issues.   It has conducted scalability problems on the Blockchain. The review has evaluated the ability of the solutions suggested in an aim of the evaluation criteria. The limitations are searched and the way it has been valuable to the project is found out. A suitable model is drawn justifying the best solution selected. Though various solutions to the limitations and solutions are presented but few of them has been just small proposals and lack strong assessment on the effectiveness. Boyd, C., &Carr, C. (2016, July). Fair Client Puzzles from the Bitcoin Blockchain. In  Australasian Conference on Information Security and Privacy  (pp. 161-177). Springer International Publishing. Bracamonte, V., Yamasaki, S., & Okada, H. (2016). A Discussion of Issues related to Electronic Voting Systems based on Blockchain Technology. Colombo, R. J. (2016). Bitcoin: Hype or Harbinger.  J. Int'l Bus. & L.,  16, 1. Crosby, M., Pattanayak, P., Verma, S., &Kalyanaraman, V. (2016). Blockchain technology: Beyond bitcoin.  Applied Innovation,  2, 6-10. Dwyer, G. P. (2016). Blockchain: A Primer. English, S. M., &Nezhadian, E. (2017). Conditions of Full Disclosure: The Blockchain Remuneration Model.  arXiv preprint arXiv:1703.04196. Ferrin, D. (2015). A Preliminary Field Guide for Bitcoin Transaction Patterns. In  Proc. Texas Bitcoin Conf. Gipp, B., Kosti, J., &Breitinger, C. (2016). Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain. Gà ¶bel, J., Keeler, H. P., Krzesinski, A. E., & Taylor, P. G. (2016). Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay.  Performance Evaluation,  104, 23-41. Hari, A., & Lakshman, T. V. (2016, November). The Internet Blockchain: A Distributed, Tamper-Resistant Transaction Framework for the Internet. In  Proceedings of the 15th ACM Workshop on Hot Topics in Networks  (pp. 204-210). ACM. Karame, G. (2016, October). On the Security and Scalability of Bitcoin's Blockchain. In  Proceedings of the 2016 ACM SIGSAC Conference on puter and munications Security  (pp. 1861-1862). ACM. Krug, J., & Peterson, J. (2015). Sidecoin: a snapshot mechanism for bootstrapping a blockchain.  arXiv preprint arXiv:1501.01039. Matzutt, R., Hohlfeld, O., Henze, M., Rawiel, R., Ziegeldorf, J. H., &Wehrle, K. (2016, October). POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store. In  Proceedings of the 2016 ACM SIGSAC Conference on puter and munications Security  (pp. 1769-1771). ACM. Miscione, G., & Kavanagh, D. (2015). Bitcoin and the Blockchain: A Coup D'État through Digital Heterotopia?. Nugent, T., Upton, D., &Cimpoesu, M. (2016). Improving data transparency in clinical trials using blockchain smart contracts [version 1; referees: awaiting peer review]. Zheng, Z., Xie, S., Dai, H. N., & Wang, H. (2016). Blockchain Challenges and Opportunities: A Survey.

Wednesday, November 20, 2019

Bullying in Nursing Research Paper Example | Topics and Well Written Essays - 1750 words

Bullying in Nursing - Research Paper Example Bullying in nursing manifests in different ways including false accusations aimed tainting someone’s reputation and competency, personal attacks, allocation of roles beyond one’s skills and lack of assistance from the seniors, and lastly intimidation among other ways. The bullying behavior translates into psychological and physiological effects on the victims, poor bedside patient outcomes as well as compromise in the organizational effectiveness and efficiency. The menace can be controlled through cognitive rehearsal training programs, implementation of code of conduct, creation of awareness and zero tolerance on bullying in all health care organizations. Keywords (Bullying, interpersonal relationships, intimidation, reputation, competency, code of conduct, cognitive rehearsal) Review of the Literature of a Researchable Problem Workplace bullying has emerged as global issue in healthcare organization, particularly affecting the nursing practitioners. Owing to the serio usness of this problem and its effects on the performance of nurses, several studies have been conducted with the aim of understanding and establishing strategies to avert or control its occurrence. Despite the existence of aggression and harassment behaviors in almost health care organization, bullying is viewed as form of repeated behaviors resulting in creation of a hostile working environment (Hutchinson, Wilkes, Vickers & Jackson, 2008). Researchers have proposed numerous strategies of dealing with bullying in nursing including training programs, establishment of stringent measure to protect nurses, and counseling programs. This paper entails review of literature from different scholarly articles on bullying in nursing. Simons, S. (2010). Bullying in the workplace-a qualitative study of new licensed registered nurses. American Association of Occupational Health Nurses, 58 (7), 305-311. This article entails a qualitative study of bullying among nurses to establish the different ways in which bullying manifests in the field of nursing. Simons (2010) examined the individual experiences of nurses as well as incidences of bullying witnessed during their practice. The study applied a descriptive qualitative research design to examine bullying behavior among newly licensed nurse. A survey study was conducted in the State of Massachusetts targeting nurses registered between 2001 and 2003 and about 511 responses were obtained through the email survey (Simons, 2010). The results of study revealed that about 139 nurses had been bullied and 14 others witnessed bullying incidences. Several themes describing the bullying behavior were identified including feeling out of the group, structural bullying, senior or old nurses exploiting newly registered nurses and the feeling of quitting the occupation (Simons, 2010). The phrase ‘nurses eat their young’ was particularly used to describe the hostility subjected to new nurses by their seniors. Senior nurses prop agated bullying in the working area through subjecting the newly registered nurses to ridicule, lack of information sharing and lack of assistance from the experienced nurses. Bullying in nursing accounted for a significant percentage of the employee turnover in the nursing field. Some of the respondents reported having left their jobs due to unbearable bullying in their working environments. Most of the bullying beha

Tuesday, November 19, 2019

Essay Example | Topics and Well Written Essays - 500 words - 183

Essay Example I was a bit upset for there was nothing interesting about them; they were just common people everyone can see in a cafà © in the morning. Despite this, I enjoyed being there because of the sun that shone just right through the window, the cafà © smelled of coffee and freshly baked muffins, and I felt peaceful and contended with my life. At that very moment, a man came in and caught my attention immediately. He seemed to be very excited, even nervous. He looked around as if he was looking for someone or something, sat down at a table and ordered tea. The man was dressed very neatly, and at first I thought that he came on a date; it was too early for that though, and I put that thought to rest. Also, it was quite an early morning for a business meeting. Curiosity was eating me up as the man checked his watch almost every two minutes and looked out the window. He was definitely waiting for someone. About fifteen minutes of waiting passed, and a boy bounced into the cafà ©. He was about thirteen or fourteen years old, not too tall, and he reminded me of someone I had already seen before. When he came up to the man, I understood who the boy reminded me of. It became obvious they were a father and a son. When the man saw the boy, he glowed with happiness and finally calmed down. The boy was also very glad to see his father for he ran up and hugged him. It was such a nice and moving scene! I think that the fact that they met at the cafà © suggests that they did not live together; perhaps, the boy’s parents were divorced, and his mother had a sole custody of her child. In any case, it was clear that they had not seen each other for a long time. As I looked around, I noticed that everybody who was at the cafà © at the moment also was watching the man and his son. Just like me, they also seemed to be moved by the scene. At that very instance, I felt that the entire cafà © was filled with peace, happiness and even

Saturday, November 16, 2019

Concept of time Essay Example for Free

Concept of time Essay Time seemed to be an important aspect that influences the well-being of the elderly in the study. Time consciousness cannot be ignored when one considers the subjective experience of well-being among the institutionalized aged. The finding showed that many of them had a keen awareness of time or awareness of the present. According to their administrators, a few of them felt the urgency to make the best use of the remaining time in their life: to get closer to God and to prepare for a ‘good death. ’ The studies done by Butler Lewis (1972); Butler et 292 al. (1998); Sue Sue (1999); and Knight (1996) found that there is an obvious concern with time when it is clear that the remaining days are running short among the aged. The development of a sense of immediacy, of the here-and-now, of present-ness -all these aid in the evolution of a sense of enjoyment and tranquility which ultimately are decisive elements of well-being. The findings of the study exemplified this awareness of time/time consciousness among the institutionalized aged and that it has endowed them with a sense of urgency and purpose in the ‘evening’ of their lives. It could also be presumed that these two aspects of well-being, the concept time and attitude toward death are closely related. Attitude towards Death The elderly in Gladys Spellman viewed the existential problem of death and dying in different spirit. While some of them had a positive attitude toward death and looked at death as a natural transition from this life to a better life and have reconciled with this inevitable reality. Trust in God’s compassion and mercy and the expectation of heavenly reward, growing closer to God in prayer seemed to help those elderly who said they were at ease with the thought of death. Faith and spirituality change death from an ending to a new beginning of a new existence for Christians (Moberg, 2001). Accepting old age and death meaningfully makes life happier. Fear or acceptance of death is closely related to general satisfaction or well-being. When life is lived to the full, death becomes a fulfillment, a completion (Moberg, 2001). The following words of the elderly were shared with one of the administrators. â€Å"I’ve done my job. My mission is over. I have no worries about the future†¦He will take care†¦and I’m ready for final surrender/exit. † There were others who tried to put on a brave front to show that they were not afraid to die. A third category avoided talking about death, reasoning that it was not yet time for them to think about death as they felt there was plenty time left for such things. Those who avoided thinking about death and those who did not fear death but only feared ‘pain of death’ must be coping with the unrecognized fear of death. As Atchley (1997) puts it, although death is generally accepted with little fear among older people, it is only reasonable to assume that there are some who really fear death. Their trust in God’s mercy and hope in eternal reward probably help them cope with this fear.

Thursday, November 14, 2019

Depression in 1920s Essays -- essays research papers

How was Australia affected by depression in 1920’s? Australia was one of the countries deeply affected by the Depression. This was due to the fact that Australia heavily depended on the imports, trade and investment intake from overseas. The economy was already unstable and was in trouble during the 1920's. The wealth of the economy was only based on the high prices of Australia's exports and primary products, a growing volume of exports and a continued stream of investments into Australia. Any serious reduction to the price and volume of exports and reduction of overseas loans would cause problems. An indication of danger was Australia's large and rapidly increasing overseas interest bill. By the late 1920's, the prices of Australian's exports were also falling. With the continuation of the declining price, Australia would have a difficult struggle to pay for its imports and repayment of loans. Australia was affected so severely as its primary source of income was taken away. Employees in public works, building and construction lost their jobs, as loans were no longer being funded for these projects. This also reduced the demand for goods produced in other industries. Australia's workmen had a severe lost of jobs and wages. How was the government responding and assisting the population? â€Å"Susso† Those who were unemployed were entitled to the application of the 'susso', a sustenance or dole payment. A person seeking this assistance had to register and demonstrate that th...

Monday, November 11, 2019

Case: Settlement

Discussion1 Is Fast Eddie required to accrue a liability as of March 31, 2011, financial statements related to the ongoing government investigation? If so, how much? Yes. Fast Eddie is required to accrue a liability of $3. 7 million. Subsequent Events are Events or transactions that occur after the balance sheet date but before financial statements are issued or are available to be issued. There are two types of subsequent events: a.The first type consists of events or transactions that provide additional evidence about conditions that existed at the date of the balance sheet, including the estimates inherent in the process of preparing financial statements (that is, recognized subsequent events). b. The second type consists of events that provide evidence about conditions that did not exist at the date of the balance sheet but arose subsequent to that date (that is, nonrecognized subsequent events).According to ASC 855-10-25-1, an entity shall recognize in the financial statements t he effects of all subsequent events that provide additional evidence about conditions that existed at the date of the balance sheet, including the estimates inherent in the process of preparing financial statements.An example of recognized subsequent events is that if the events that gave rise to litigation had taken place before the balance sheet date and that litigation is settled after the balance sheet date but before the financial statements are issued or are available to be issued, for an amount different from the liability recorded in the accounts, then the settlement amount should be considered in estimating the amount of liability recognized in the financial statements at the balance sheet date. The investigation was held in 2010 before the end of fiscal year on Mar 31, 2011.The $3. 7 million of settlement was offered in April 2011, before CPAs-R-Us completed its procedures and issued the audit report for the year ended March 31, 2011. The government did not accept offers t o settle before finalizing its investigation, as a result, Fast Eddie should accrue a liability as of Mar 31, 2011. According to ASC 450-20-25-2, the required accrual liability would be $3. 7 million. An estimated loss from a loss contingency shall be accrued by a charge to income if both of the following conditions are met: a.Information available before the financial statements are issued or are available to be issued (as discussed in Section 855-10-25) indicates that it is probable that an asset had been impaired or a liability had been incurred at the date of the financial statements. Date of the financial statements means the end of the most recent accounting period for which financial statements are being presented. It is implicit in this condition that it must be probable that one or more future events will occur confirming the fact of the loss. b. The amount of loss can be reasonably estimated. 50-20-50-10 talks about Litigation, Claims, and Assessments. As a result, the set tlement is a recognized subsequent event. According to EITF Topic No. D-77, â€Å"Accounting for Legal Costs Expected to Be Incurred in Connection With a Loss Contingency† (ASC 450-20-S99), The SEC Observer noted that the SEC staff would expect a registrant's accounting policy to be applied consistently and that APB Opinion No. 22, Disclosure of Accounting Policies, requires disclosure of material accounting policies and the methods of applying those policies. Discussion2If Fast Eddie withdraws the settlement offer before it is accepted by the government and before the issuance of Fast Eddie’s financial statements, would that change your answer to the above question? According to 450-20-55-36, Fast Eddie should provide an illustrative disclosure in accordance with ASC 450-20-50. In this case, accrual would be inappropriate, but disclosure would be required if an unfavorable outcome is determined to be reasonably possible but not probable (450-20-55-13). Since Fat Eddie believes the company is not obligated.

Saturday, November 9, 2019

Financial Analysis And Statement Analysis Essay

Financial statement analysis (or financial analysis) is the process of reviewing and analyzing a company’s financial statements to make better economic decisions. These statements include the income statement, balance sheet, statement of cash flows, and a statement of retained earnings. Horizontal analysis (also known as trend analysis) is a financial statement analysis technique that shows changes in the amounts of corresponding financial statement items over a period of time. It is a useful tool to evaluate the trend situations. The statements for two or more periods are used in horizontal analysis. The earliest period is usually used as the base period and the items on the statements for all later periods are compared with items on the statements of the base period. The changes are generally shown both in dollars and percentage. Vertical analysis is the proportional analysis of a financial statement, where each line item on a financial statement is listed as a percentage of another item. Typically, this means that every line item on an income statement is stated as a percentage of gross sales, while every line item on a balance sheet is stated as a percentage of total assets. The most common use of vertical analysis is within a financial statement for a single time period, so that you can see the relative proportions of account balances. Vertical analysis is also useful for timeline analysis, where you can see relative changes in accounts over time, such as on a comparative basis over a five-year period. For example, if the cost of goods sold has a history of being 40% of sales in each of the past four years, then a new percentage of 48% would be a cause for alarm. Solvency Ratio is a key metric used to measure an enterprise’s ability to meet its debt and other obligations. The solvency ratio indicates whether a company’s cash flow is sufficient to meet its short-term and long-term liabilities. The lower a company’s solvency ratio, the greater the probability that it will default on its debt obligations. Solvency and liquidity are both terms that refer to an enterprise’s state of financial health, but with some notable differences. Solvency refers to an enterprise’s capacity to meet its long-term financial commitments. Liquidity refers to an enterprise’s ability to pay short-term obligations; the term also refers to its capability to sell assets quickly to raise cash. A solvent company is one that owns more than it owes; in other words, it has a positive net worth and a manageable debt load. On the other hand, a company with adequate liquidity may have enough cash available to pay its bills, but it may be heading for financial disaster down the road. Solvency and liquidity are equally important, and healthy companies are both solvent and possess adequate liquidity. A number of financial ratios are used to measure a company’s liquidity and solvency, the most common of which are discussed below. Liquidity Ratios Current ratio = Current assets / Current liabilities The current ratio measures a company’s ability to pay off its current liabilities (payable within one year) with its current assets such as cash, accounts receivable and inventories. The higher the ratio, the better the company’s liquidity position. Quick ratio = (Current assets – Inventories) / Current liabilities = (Cash and equivalents + Marketable securities + Accounts receivable) / Current liabilities The quick ratio measures a company’s ability to meet its short-term obligations with its most liquid assets, and therefore excludes inventories from its current assets. It is also known as the â€Å"acid-test ratio.† Days sales outstanding = (Accounts receivable / Total credit sales) x Number of days in sales DSO refers to the average number of days it takes a company to collect payment after it makes a sale. A higher DSO means that a company is taking unduly long to collect payment and is tying up capital in receivables. DSOs are generally calculated quarterly or annually. Solvency Ratios Debt to equity = Total debt / Total equity This ratio indicates the degree of financial leverage being used by the business and includes both short-term and long-term debt. A rising debt-to-equity ratio implies higher interest expenses, and beyond a certain point it may affect a company’s credit rating, making it more expensive to raise more debt. Debt to assets = Total debt / Total assets Another leverage measure, this ratio measures the percentage of a company’s assets that have been financed with debt (short-term and long-term). A higher ratio indicates a greater degree of leverage, and consequently, financial risk. Interest coverage ratio = Operating income (or EBIT) / Interest expense This ratio measures the company’s ability to meet the interest expense on its debt with its operating income, which is equivalent to its earnings before interest and taxes (EBIT). The higher the ratio, the better the company’s ability to cover its interest expense.

Thursday, November 7, 2019

Argumentative Essay Sample on Global Warming 3 Policies to Implement

Argumentative Essay Sample on Global Warming 3 Policies to Implement Global warming is one of the most challenging environmental problems in existence today. It threatens the health of the earth’s inhabitants and the world’s economies every day. With global warming comes longer and more intense heat waves and storms. Along with those climate changes, come more pests which in turn can carry devastating diseases. Forestry and farming are feeling the negative impact of global warming and we’re also seeing traces of a devastated ecosystem. To prevent further damage and begin repairing the damaging effects of global warming, policies must be implemented and diligently enforced. Energy conservation is the only policy that I would put into effect. This policy would be very broad; encompassing as many aspects of energy use as possible. The first item on the table would be to force automobile manufacturers to only produce vehicles with high MPG ratings and eventually to develop new models that are not run on gasoline alone. Such vehicles are known as hybrids and are run on a combination of electricity and gasoline. Currently, the technology is available to manufacture cars with 40+ mpg ratings, however, the concern lies with the increasing number of trucks and SUVs that are known worldwide as â€Å"gas-guzzlers†. These larger vehicles are becoming more and more prevalent and currently do not meet any efficiency standards. Requiring that all new SUVs and trucks from this point forward be as fuel efficient as their smaller counterparts, would be a large step in the way of vehicle efficiency and pave the way for less gasoline reliance. This in turn will allow for fewer emissions of carbon dioxide from the vehicles that we have all come to rely on for our sole source of transportation. The next policy to implement would be that technology be developed to make all appliances run efficiently; from refrigerators and stoves on down to video game equipment and lamps. Every piece of machinery or device that we own uses energy in some way, shape, or form. Large pieces of industrial equipment and even residential equipment require a lot of energy to run thereby contributing to the world’s air pollution. If we would require that manufacturers of such items follow strict guidelines of energy efficiency, not only would users save money, but energy use would be at a minimum and thus, less air pollution would be created. Some headway is being made in this area, but not enough and not nearly fast enough. We see most progress being made in the residential areas: examples are Energy Star appliances and compact, fluorescent light bulbs. However, everything coming onto the market needs to be required to be energy efficient according to pre-determined standards and we can’t continue to bypass the industrial aspect of this. The last policy that I would implement revolves around recycling. I would require that all packaging be recyclable and that it be made from recycled materials. Recycling helps the environment by conserving our natural resources, saving energy, reducing air and water pollution, and reducing the need for landfill space. Currently, many recycling programs are in place worldwide, but there are no policies that enforce its unequivocal use, yet this is one of the easiest ways of protecting our environment. In order for my policy to be successful, all businesses and consumers need to actively participate. Following the reduce, reuse, and recycle methodology will help to reduce the amount of energy that is used during the elimination of waste products.

Monday, November 4, 2019

Sociology Essay Example | Topics and Well Written Essays - 750 words - 3

Sociology - Essay Example Humans themselves are emotional creatures; biologically each reaction is a chemical response to additional visual, chemical or other form of stimuli. At the very base of what makes a human’s emotional framework run is the chemical responses or neural framework that exists. This cannot of course discount the effect of ones surroundings, their culture and society on their reactions. In many ways we respond based on taught responses. While we are growing up we are adapting to the society that we are directly involved in, and the cultural variances that may accompany that society. We react to some forms of stimuli based solely on our understanding of those stimuli which was trained into us from birth. An example of this could be seen by using a simple observation of a set of parents and their progeny, by observing the individual and separate reactions to different forms of stimuli it becomes readily apparent that the child will likely mimic the adults in many areas. A group is a n umber of people continuously interacting with each other in a structured way according to shared morals or social outlooks. A primary group would represent a family unit, such as parents and children and possibly grandparents as well. In my life it would be my parents and my significant other. Because our contact is based on a large amount of contact and an understanding of each other in more than a few hours a week at work or in meetings with various social gatherings this would be a primary group. An example of a secondary group would be fellow students with whom I share several hours a week in a similar manner though we are unlikely to have much actual face to face time and the time we spend together will likely be more cohesive and rule based. Max Webber’s six-traits of bureaucracy according to Professor Alazzawi are a formal hierarchical structure, management by rules, organization by functional specialty, a focused mission, purposely impersonal and employment based on t echnical qualifications. This organizational form works well within a secondary group however, would likely cause problems within a primary group. Humans thrive on being able to â€Å"personalize† everything around them, and while this has its obvious drawbacks within society as a whole it does make it difficult to promote long lasting, self-sustaining relationships within any group. There is a level of inflexibility that would likely cause frustration and in fact in many organizations that are secondary groups frustration with the role being played by the individual is often voiced. The sexual revolution was the extremely liberal approach to human sexuality as embraced in the 1960’s it accompanied for the most part a large amount of experimentation in drugs, political approaches and lifestyle changes as well. There have been many various views applied to the â€Å"why† of this revolution, one that I tend to embrace is that this revolution is the result of the c ontinued stifling of free thought along with the sexist and racist approaches embraced and taught leading up to this point. It was a complete rebellion against the status quo as it were. As for the various issues discussed I believe that sexual violence in the form of rape, child sexual abuse and other related

Saturday, November 2, 2019

The structural frame paper Essay Example | Topics and Well Written Essays - 1000 words

The structural frame paper - Essay Example â€Å"UncÐ µrtainty appÐ µars as thÐ µ fundamÐ µntal problÐ µm for complÐ µx organizations, and coping with uncÐ µrtainty, as thÐ µ Ð µssÐ µncÐ µ of thÐ µ administrativÐ µ procÐ µss. Just as complÐ µtÐ µ uncÐ µrtainty or randomnÐ µss is thÐ µ antithÐ µsis of purposÐ µ and of organization, complÐ µtÐ µ cÐ µrtainty is a figmÐ µnt of thÐ µ imagination, but thÐ µ tightÐ µr thÐ µ norms of rationality, thÐ µ morÐ µ Ð µnÐ µrgy thÐ µ organization will dÐ µvotÐ µ to moving toward cÐ µrtainty† (Thompson, 2003, p. 159). That is, thÐ µ organization is dÐ µvoting a lot of Ð µnÐ µrgy towards cÐ µrtainty, from this pÐ µrspÐ µctivÐ µ, through maintaining a codifiÐ µd training program and a hiÐ µrarchical powÐ µr structurÐ µ. ThÐ µ organization usÐ µd for this rÐ µport is, as mÐ µntionÐ µd, thÐ µ forÐ µign languagÐ µ school. In this organization, of thÐ µ tÐ µaching staff of thÐ µ branch officÐ µ and thÐ µ officÐ µ staff, thÐ µ of ficÐ µ staff is thÐ µ dominant informal powÐ µr coalition. This is bÐ µcausÐ µ thÐ µy havÐ µ much morÐ µ contact with thÐ µ rÐ µgional salÐ µs managÐ µr. ThÐ µ tÐ µachÐ µrs do not havÐ µ any powÐ µr or contact with this sidÐ µ of thÐ µ organization at all rÐ µally, and arÐ µ motivatÐ µd by prizÐ µ incÐ µntivÐ µs, travÐ µl timÐ µ, and othÐ µr mÐ µthods. ThÐ µ sizÐ µ and composition of thÐ µ group is not proportionatÐ µ to thÐ µ numbÐ µr of tÐ µachÐ µrs rÐ µtainÐ µd by thÐ µ branch officÐ µ. ... ThÐ µ most important stakÐ µholdÐ µrs of thÐ µ organization arÐ µ its studÐ µnts. IntÐ µrnally, thosÐ µ non-dominant powÐ µr coalition positions in thÐ µsÐ µ sÐ µctors could also includÐ µ, in thÐ µ Ð µxamplÐ µ of thÐ µ forÐ µign languagÐ µ school, thosÐ µ tÐ µachÐ µrs who arÐ µ sÐ µnt to work at othÐ µr organizations as outsourcing labor, and thosÐ µ who arÐ µ kÐ µpt as thÐ µ corÐ µ tÐ µachÐ µrs of thÐ µ branch, into sÐ µparatÐ µ coalitions of tÐ µachÐ µrs. This is not rÐ µally Ð µffÐ µctivÐ µ, though, bÐ µcausÐ µ most of thÐ µ tÐ µachÐ µrs want to movÐ µ up in thÐ µ organization’s formal powÐ µr structurÐ µ by joining thÐ µ officÐ µ staff as a tÐ µachÐ µr trainÐ µr, thÐ µ lowÐ µst rung on thÐ µ officÐ µ staff laddÐ µr. Thompson (2003) for Ð µxamplÐ µs statÐ µs, â€Å"ThÐ µ Ð µmployÐ µÃ µ who scorÐ µs wÐ µll on a small boundary can Ð µxpÐ µct to bÐ µ visiblÐ µ, intÐ µrnally or Ð µxtÐ µrnally or both, and thus havÐ µ thÐ µ possibility of bargaining for a job at a largÐ µr or morÐ µ critical sÐ µctor of thÐ µ organization or of anothÐ µr organization†¦ such jobs can frÐ µquÐ µntly bÐ µ Ð µntÐ µrÐ µd with common skills† (p. 111). This shows how thÐ µ tÐ µachÐ µr trainÐ µrs and othÐ µr officÐ µ staff mÐ µmbÐ µrs arÐ µ thÐ µ dominant formal powÐ µr coalition in thÐ µ organization’s structurÐ µ, bÐ µcausÐ µ Ð µvÐ µn though thÐ µy arÐ µ outnumbÐ µrÐ µd by thÐ µ tÐ µachÐ µrs, thÐ µy arÐ µ morÐ µ of a stablÐ µ labor pool for thÐ µ organization, bÐ µcausÐ µ it tÐ µnds to havÐ µ high tÐ µachÐ µr turnovÐ µr. TÐ µachÐ µrs arÐ µ paid thÐ µ lÐ µast, of all thÐ µ positions. PÐ µriphÐ µral powÐ µr rÐ µlationships nÐ µÃ µd to bÐ µ mÐ µntionÐ µd in tÐ µrms of thÐ µ tÐ µachÐ µrs of thÐ µ forÐ µign languagÐ µ school. This also involvÐ µs paying attÐ µntion to thÐ µ dominant sÐ µctors which makÐ µ