Thursday, October 31, 2019

Strategic Management Research Paper Example | Topics and Well Written Essays - 750 words

Strategic Management - Research Paper Example The mission of the company needs to be different and very clear. The important areas of mission statement include who we are, what is our business, what products do we offer, and why we chose the particular business. The important issues that will be addressed by the company in the global business environment include equal employment opportunities, child labor, and environmental factors. INTRODUCTION Tolapp Corporation is a successful US manufacturing company located in Tennessee that builds power tools, lawn mowers, lawn furniture, microwaves, and ranges. All products are manufactured locally and sold through large retailers like Sears, Best Buy, and Wal-Mart. They have sale papers inserted in every Wednesday and Sunday paper. Although they have a thriving business in the US and Canada, Tolapp is trying to break into the global marketplace. DISCUSSION Part 1 A). How would you go about defining the identity of Tolapp Corporation and creating its mission statement? The identity of Tol app Corporation can be defined by understanding the industry in which it operates i.e. power tools and lawn equipment industry. An important factor in defining the identity of Tolapp Corporation is competitors’ profile. In order to establish an identity, it is critical to focus on specific market segments and products. For instance, the company can focus on appliances or power lawn equipment. There are different ways through which the mission statement of the company can be developed. The most important factor that should be considered when creating a mission statement is the overall objective or scope of the industry. After this, it is important to identify and evaluate mission statements of other companies operating in the industry (Abrahams, 2004). The mission of the company needs to be different and very clear. The important areas of mission statement include who we are, what is our business, what products do we offer, and why we chose the particular business. The mission statement of Tolapp will be communicated to all employees in order to ensure that they share common goals. The purpose of communicating mission statement to all employees and stakeholders is to ensure that it remains real. B). Where would you look for the information? The places that would be accessed for information include websites of companies operating in the power tool industry, industry reports, industry publications, and scholarly journals. In addition, industry reports of lawn equipment and appliance industry will also be accessed. C). What do you already know about Able that can help? Following are the things that we already know about Tolapp Corporation: The first thing about Tolapp Corporation that we know is its origin. Tolapp Corporation is a company that is located in the United States. The company is present in Tennessee, a U.S. state. The second point about Tolapp Corporation is its business. The main business of the company is manufacturing. The products of the com pany include lawn furniture, lawn mowers, microwaves, and other products. The third point about the corporation is its production and distribution. The company manufactures its products locally. The products are distributed and sold with distributors such as Sears, Wal-Mart, and Best Buy. All these are famous retailers. The company is operating successfully in the United States and Canada. The company is also striving to expand its operations to other parts of the world. The company launches sales

Monday, October 28, 2019

Reproductive Health Law; Is It Good or Bad (Philippines) Essay Example for Free

Reproductive Health Law; Is It Good or Bad (Philippines) Essay Among the biggest and most controversial issues faced by the Philippines’ history is the great debate over the Reproductive Health Bill now known as â€Å"The Responsible Parenthood and Reproductive Health Act of 2012†, different opinions arise from different people, many are against and many are supporting RH Law, but the question is, â€Å"What are the benefits of Reproductive Health Law?† , â€Å"Why is the Catholic Church are against in this law?† and the last things is â€Å"How it will affect our citizen, is Reproductive Health Law a burden or not?† What are the benefits of Reproductive Health Law? Reproductive Health Law allows us to have the access to a full range of methods, facilities, services and supplies that contribute to reproductive health and well-being by addressing reproductive health-related problems. It also includes sexual health, the purpose of which is the enhancement of life and personal relationship. Why the Catholic Church is against in this law? The Catholic Church is not in favor of the Reproductive Health Bill because artificial contraceptives could possibly lead to promiscuity and the failure of implantation of a newly conceived baby if fertilization would happen to take place despite their use.On the other hand, the Catholic Church is not in favor of natalism at all costs, as if the number of children, in itself, were the unmistakable sign of authentic Christian life. Instead the Church is for responsible parenthood, meaning openness to life within marriage, and spacing of birth, only when needed for reasons of serious medical condition or grave poverty, using natural family planning methods. How it will affect our citizen, is Reproductive Health Law a burden or not? For me, RH bill is not a burden, there is no such law that will end up destroying its citizen. It will depend on how you will implicate it, it depends on how people will understand it, it is not immorality but as whatI am witnessing, many people are against it, Catholic church are opposing it, but right now, let’s accept the fact that we need changes, that our life must go on, there is nothing to be feared with, and it is just a matter of understanding, appreciation and acceptance.

Saturday, October 26, 2019

Psychological Aspects of Cybersecurity

Psychological Aspects of Cybersecurity Human Factors, Threats, Culture and Liability: Psychological Aspects of Cybersecurity Introduction In today’s society, cyber intrusion and attacks is becoming more prevalent. No one really knows the motivation behind such attacks. In some cases, it may be psychological and in others it could be a way to attain an adrenaline rush by invading a high-level security system. While cyber attacks has increased, our nation is putting execution actions in place to safeguard our critical infrastructure. With all of that being said, Congress has a responsibility to the people/nation to protect and secure their freedom. Cyber attacks are malicious acts that target information systems, infrastructures, and computer networks. Normally, the sources of the attack are unknown and the reasons of the attack are unclear. In many cases, the attacks are labeled as cyber warfare or cyber terrorism. In the same fashion, the people who commit these crimes are described as communist, cyber terrorist, and black hat etc. However, when Congress is the focus of the attack normally the target of attack is our infrastructure. Descriptive Labels Applied to Cybercrime The descriptive label that would be applied to cybercrime is data security breach or cyber terrorism. Further explanation of â€Å"Data Security Breach Notification Act 2012, mandates that companies have reasonable security measures to protect personal information and establish a uniform breach notification law (S. 3333 (112th): Data Security and Breach Notification Act of 2012, 2012).† Cyber terrorism is when a computer is used as the weapon for attack. In some cases you will find that cyber terrorism is the way to seek revenge or used as a method to intimidate or coerce one. An example of a cyber-terrorism perhaps could be hacking into aircrafts system and changing the coordinates of the flight. In 1996, President Bill Clinton created a Commission of Critical Infrastructure Protection. Congress new that the nation was at risk of cyber attacks. Therefore, to heighten awareness and maintain economic stability the board felt it was necessary to protect critical infrastructure. This was a mixture of electricity, computer networks, communication etc.; because all of these elements were vulnerable of cyber-warfare. With this in mind, the government was also thinking of protecting the public and private industries from such attacks. They were completely oblivious of the dangers how much or daily lives rely on computers. Notwithstanding the dangers and vulnerabilities they subjects themselves to when using the computer. Another issue is finding out who are the perpetrators and how the attack were initiated. The board felt it would be most helpful if they adequately protected critical system from intrusion. That meant ensuring the proper firewalls were enabled and the system was bein g monitored (http://csciwww.etsu.edu/gotterbarn/stdntppr/). Threat Factors In reality, if the United States Infrastructure comes under attack the enemy could cripple our defenses depending on how sophisticated the attacker is. The possible intent behind attacking our infrastructure, would be to target our water supply, transportation, telecommunication, energy, and last but not least finance. Our way of living depends on critical infrastructure; if we were to lose these vital roles we would be vulnerable to the enemy. These operations are important and we have become dependent on these networks. The lost of electricity, telecommunications, transportation, energy, and water would render us helpless. Such an attack would disrupt our day-to-day life and cause mass panic and fear. Therefore, in order to prevent such an act from occurring, Congress has created a new executive branch to merge 22 government agencies that were already in existence. The goal was to secure the nation and preserve freedom. In addition, have the ability to fence off attacks and be prep ared for unexpected disasters. To accomplish this task, the Department of Homeland Security had to unify the department in order to strengthen the components. Policy tells us that through partnership with other departments and operators of critical infrastructure would improve cyber security sharing information, which is ideal for the nation. Water Supply Attacking the water supply would be the most critical attack on the infrastructure. The water supply is controlled by computer systems, which is why it poses the most security risk. If the enemy was able to bypass the security features, they could release large amounts of water in any particular area. Destruction of large dams could unleash large amounts of water resulting in catastrophic flooding, loss of life and damage to property. Another vulnerability would be the sewer system. The sewage system protects public health and the environment; while providing a series of treatment that clean the water supply. Raw sewage has harmful bacteria and viruses that could be life threatening to human or animas if exposed to it. â€Å"Bioterrorism or chemical attacks could deliver widespread contamination with small amounts of microbiological agents or toxic chemicals could endanger public health (Terrorism and Security Issues Facing the Water Infrastructure Sector, 2006 ).† (http://fpc.state.gov/documents/organization/68790.pdf).† Energy The second most important infrastructure that could be attacked is energy. Energy is described in two separate classifications one being electricity and the other being natural gas. Electricity is used in everywhere i.e. houses, cities and regions. It is needed for day-to-day living such usage of machines and life saving mechanisms. For example, cyber terrorist has the ability to gain access to daily power report data. The report shows the flow of electricity in different regions. As a result, a cyber terrorist would have the ability to know what the busiest sections of the grid were. It is important to realize with this information they could shut down the power gird at the busiest time of the day and cause hysteria, backflow, and confusion. Without power the United States, defenses are down. â€Å"There have been incidents or credible intelligence to indicate that a potentially well organized, disruptive cyber attack is imminent against the electrical utility industry in general or BPA specifically, or Terrorist activity, either physical or cyber, has been perpetrated against civilian or government sites within the boundaries of the United States†¦ (Threat Conditions, n.d.).† http://info.bpa.gov/Emergency/ThreatConditions.aspx Not only is electricity important to infrastructure but natural gas is too. Cyber terrorist can halt the use or redirect gas flows. Keeping the energy a float is important for maintaining the safety and economic success in the United States. The White House Initiative has an Executive order, which is led by the Department of Energy and the Department of Homeland Security. Their job is to ensure electric companies and grid operators have working knowledge of cyber security potentials and prioritize their actions and investments to improve cyber security. In addition their â€Å"industry stakeholders in the energy sector, are also contributing to the development of the Cyber security Framework, which was announced as part of Executive Order 13636 on â€Å"Improving Critical Infrastructure Cybersecurity. (http://energy.gov/articles/energy-department-announces-new-investments-over-30-million-better-protect-nation-s).† Transportation A disturbance in the transportation system would cause a chain of economic disruption. By interfering with transportation it hinder citizens and would progressively degrade the economy over time span. It would impede on scheduling as well as accessibility. In like manner, these methods would have a negative impact on cargo being transported from place to place. Moreover, cyber terrorist can target railroad operations by taking controls of the switches, additional they could take over flight software to divert aircraft. Sapphire or Slammer worm spread quickly through the Internet attacking millions of computers and overwhelming them with data due to a flaw in a Microsoft program. (CONSUMER PRIVACY DEVELOPMENTS, n.d.).† Transportation is important to critical infrastructure. In order to maintain a since of balance, proactive measures must be in place to strengthen and secure critical infrastructure. It is important to have the necessary assets including but not limited to networks and public confidence. Needless to say, the infrastructure must be secure in order to withstand and promptly recoup from an attack. Finance Telecommunication Company Liabilities Reducing vulnerabilities through effective internal cybersecurity policy controls Conclusion The threat of cyber crime has risen in the United States. Congress is having more debates on the nations ‘s cyber security, terrorism, and breaches within our national systems. It was said by the â€Å"******* that we were in trouble because cyber attacks have resulted in the greatest transfer of wealth in history. (*****).† Although, Legislation have been proposed to govern the laws the bills have not been enacted. This is mainly due to the fact; the government and private industries have issues with the federal data security bills. Currently, the United States has a cyber security Executive Order in place. The purpose for this order, is to protect their United States from cyber contusion and the attacks against the nations critical infrastructure. A threat to the infrastructure is major to national security. Our nation relies on the infrastructure to keep the mainframe secure and efficient against intrusion. As stated earlier, cyber attacks are becoming more vigilant therefore, the government had to make changes to the executive branch. In 2002, a new executive department was put into place called the Homeland Security Act. Homeland Security Act 2002, was created to â€Å" prevent terrorist attacks within the United States; reduce the vulnerability of the United States to terrorism; and minimize the damage, and assist in the recovery, from terrorist attacks that do occur within the United States. (Homeland Security Act of 2002) References Anonymous. (2011). Data breach and electronic crime: the Sonys case. Retrieved from gcsec.org: http://www.gcsec.org/blog/data-breach-and-electronic-crime-sonys-case Anonymous. (2013). Managing CyberSecurity Risk. Retrieved from Protiviti: http://www.protiviti.com/en-US/Documents/Newsletters/Board-Perspectives/Board-Perspectives-Risk-Oversight-Issue44-Managing-Cybersecurity-Risk-Protiviti.pdf Anonymous. (n.d). About Sony Electronics Life at Sony. Retrieved from http://discover.store.sony.com/: http://discover.store.sony.com/sonyjobs/pages/about/life.html Anonymous. (n.d). Corporate Mission. Retrieved from neimanmarcus: http://www.neimanmarcuscareers.com/story/mission.shtml Anonymous. (n.d). Mission Values. Retrieved from About Target: https://corporate.target.com/about/mission-values Anonymous. (n.d). Throught the Years. Retrieved from Target.com : https://corporate.target.com/about/history Aspan, M. (2011). Citi says 360,000 accounts hacked in May cyber attack. Retrieved November 23, 2011, from http://www.reuters.com/article/2011/06/16/us-citigroup-hacking-idUSTRE75F17620110616 Bavisi, S. (2009). Penetration Testing. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers. Bodhani, A. (2013). Bad†¦In a Good Way. Engineering Technology, 7(12), p64-68. Campbell, Q., Kennedy, D.M. (2009). The psychology of computer criminals. In Bosworth, et al., (Eds.), Computer security handbook. New York, NY: John Wiley Sons. Chen, C.; Shaw, R.; Yang, S. (2006). Mitigating information security risks by increasing user security awareness: A case study of an information security awareness system. Information Technology, Learning Performance Journal, 24(1), p1-14. Chen, T.; Walsh, P. (2009). Guarding Against Network Intrusions. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers. DATALOSSdb Open Security Foundation (2014). Data Loss Statistics. Retrieved from http://datalossdb.org/statistics Dittrich, D., Himma, K.E. (2006). Hackers, crackers and computer criminals. In H. Bidgoli (Ed.), Handbook of information security (Vol 2). New York, NY: John Wiley Sons. Elgin, B., Lawrence, D., Riley , M. (2014, February 21). Neiman Marcus Hackers Set Off 60,000 Alerts While Bagging Credit Card Data. Retrieved from businessweek.com: http://www.businessweek.com/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data Ethical Issues. (2013). Retrieved from http://cps182cyber-crime.wordpress.com/ethical-issues/ Finklea, K.M., Theohary, C.A. (2012). Cyber-crime: Conceptual issues for congress and U.S. law enforcement. Journal of Current Issues in Crime, Law and Law Enforcement. 5 (1/2), 1-27. Retrieved from http://web.a.ebscohost.com.ezproxy.umuc.edu/ehost/detail?vid=3sid=79df209d-d6a2-4fd7-9761-f40b899a23e1%40sessionmgr4002hid=4209bdata=JnNpdGU9ZWhvc3QtbGl2ZSZzY29wZT1zaXRl#db=i3hAN=88850916 Frizell, S. (2014, January 29). Holder: Feds Investigating Target Breach. Retrieved from Time.com: http://business.time.com/2014/01/29/feds-investigation-target-security/ Germano, S. (2013, December 27). Target’s Data-Breach Timeline. Retrieved from Wall Street Journal: http://blogs.wsj.com/corporate-intelligence/2013/12/27/targets-data-breach-timeline/ Goldman, G. (2011). Mass e-mail breach: Just how bad is it? Retrieved November 23, 2011, from http://money.cnn.com/2011/04/06/technology/epsilon_breach/index.htm Harris, E. A., Perlroth, N., Popper, N. (2014, January 23). Neiman Marcus Data Breach Worse Than First Said. Retrieved from New YOrk Times: http://www.nytimes.com/2014/01/24/business/neiman-marcus-breach-affected-1-1-million-cards.html Hassan, A.B., Lass, F.D., Makinde, J. (2012). Cyber-crime in Nigeria: Causes, effects and the way out. ARPN Journal of Science and Technology. 2(7), 626-631. Retrieved from http://www.ejournalofscience.org/archive/vol2no7/vol2no7_11.pdf Heavey, S., Finkle, J. (2014, March 13). Target says it declined to act on early alert of cyber breach. Retrieved from Reuters. Com: http://www.reuters.com/article/2014/03/13/us-target-breach-idUSBREA2C14F20140313 ITU. (2012). Understanding cyber-crime: Phenomena, challenges and legal response. Retrieved from www.itu.int/ITU-D//cybersecurity//Cyber-crime%20legislation%20EV6. pdf Kaiser, D. (2007). Insurance options vary as much as cyber attacks. Business Insurance, 41(21), 24. Katz, K. (2014, February 21). Security info. Retrieved from www.neimanmarcus.com: http://www.neimanmarcus.com/NM/Security-Info/cat49570732/c.cat?icid=topPromo_hmpg_ticker_SecurityInfo_0114 Krebs, B. (2014, 02 14). Target Hackers Broke in Via HVAC Company. Retrieved from krebsonsecurity.com: http://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvac-company/ Lewis, J. (2013). Raising the Bar for Cybersecurity. Center for Strategic International Studies. Retrieved from http://csis.org/files/publication/130212_Lewis_RaisingBarCybersecurity.pdf Mansoor, B. (2009). Intranet Security. In Vacca, J. R. (Ed.), Computer and information security handbook. Boston, MA: Morgan Kaufmann Publishers. McAfee (2014). McAfee Labs Threats Report: Fourth Quarter 2013. McAfee Labs. Retrieved from http://www.mcafee.com/us/resources/reports/rp-quarterly-threat-q4-2013.pdf Metz, C. (2005). identity theft is out of control. (cover story). PC Magazine, 24(14), 87 Sales, N. (2013). REGULATING CYBER-SECURITY. Northwestern University Law Review, 107(4), 1503-1568. Shackleford, D. (2013). New Pathways to Network Security. Information Security, 15(6), p10-15. Sherr, I., Wingfield, N. (2012, May 7). Play by Play: Sonys Struggles on Breach. Retrieved from Wall Street Journal : http://online.wsj.com/news/articles/SB10001424052748704810504576307322759299038 Warner, J. (2011). Understanding cyber-crime in Ghana: A view from below. International Journal of Cyber Criminology. 5(1), 736-749. Retrieved from http://www.cyber-crimejournal.com/warner2011ijcc.pdf Waugh, D. (2001). Computer crime and ethics. Retrieved from http://homepage.ntlworld.com/woofy/ethics/ethics.pdf Williams, M. (2011, May 01). PlayStation Network Hack Timeline. Retrieved from pcworld.com: http://www.pcworld.com/article/226802/playstation_network_hack_timeline.html Wolf, J., Maclean, W. (2011). IMF cyber attack aimed to steal insider information: Expert. Retrieved November 23, 2011, from http://www.reuters.com/article/2011/06/12/us-imf-cyberattack-idUSTRE75A20720110612 Youderian, A. (2013, August 08). LulzSec Hacker Gets Year in Prison for Sony Attack. Retrieved from courthousenews.com: http://www.courthousenews.com/2013/08/08/60130.htm

Thursday, October 24, 2019

Elizabeth George :: essays research papers fc

A Brief Biography of Elizabeth George (with a smidgeon of literary criticism-- and a short bibliography) Susan Elizabeth George was born on February 26, 1949, in Warren, Ohio, to Robert Edwin and Anne (Rivelle) George. She married Ira Toibin, an education administrator, on May 28, 1971; they divorced in November, 1995. She received an A.A. from Foothill Community College (Los Altos, CA) in 1969, a B.A. in 1970 from the University of California at Riverside, and an M.S. from California State University in 1979. She lists her political affiliation as Democratic and her religion as "recovering from Catholicism." Marjorie Rosen writes of her: "Growing up the only daughter of Robert George, an estimator for a conveyor company, and his wife, Anne, a nurse, George was influenced early by her parents' enthusiasm for literature. 'When my older brother, Rob, was 6, he was struck in the eye by an arrow and had his eyes bandaged. My parents spent hours reading to him, and I listened,' she Ms. George and Titch--photo credit Patty Smiley says. 'We weren't a family that had a lot of money. We turned to the world of imagination.' At 7, George knew she wanted to write. She began turning out short stories in elementary school after her mother gave her an old '30s typewriter, and she wrote her first unpublished novel by the time she graduated from Holy Cross High School in Mountain View." She taught English at several California high schools and has conducted creative writing courses at Coastline College (Costa Mesa, CA), Irvine Valley College (Irvine, CA), and the University of California, Irvine. She was selected Teacher of the Year by the Orange County Department of Education in 1981. Contemporary Authors quotes Ms. George, "I'm often asked why I write about England. The answer lies in my philosophy: 'Write about what interests you; write about what you love; write about what gives you joy.' Writing is such a lovely torture, it seems silly to engage in it if it's not directed towards something you love." Ms. George states that her love of things British dates from a 1966 Shakespeare study trip to England when she was 16. However, she told Valerie Takahama, "There's a part of writing these novels that I really can't explain. ... When the plane comes down in England, I feel as if I'm coming home." (She recently purchased a flat near Hyde Park in South Kensington, London.

Wednesday, October 23, 2019

Organizational Change and Development

In the past, people have been treated the organization as a closed system, that is to say, organizational behavior and performance are the results from unilateral decision by managers, ignoring the existence of the environment. However, as an open system, the organization and its external environment are interaction and mutual penetration. Environment should be seen as the organizational material, energy, the ultimate resource of information and the key to organization renewal. This paper will discuss the contribution of environmental determinist theories by interpreting Institutional Theory, Population Ecology, Resource Dependence Theory and Business Ecosystem Theory. 2. Institutional theory Starting from the sociological system theory, institutional theory focuses on the isomorphism and similar between organizations, and put it down to the requirements of the institutional environment outside the organization. (Tidd, 2001) In institutional theory, the organization faces with two different environments: technical environment and institutional environment. Technological environment requires the organization must be efficient and organized by the principle of maximum production, while the institutional environment requires organizations must be legitimacy. Meyer and Rowen pointed out that many organizations even had to have the internal operations separated from organizational structure in order to reduce the negative impact from the institutional environment requests on the efficient operation. DiMaggio and Powell further put forward three mechanisms lead to convergence of the organizational type and organizational behavior. Camarinha-Matos, & Afsarmanesh, 2007)The first one is forcing mechanisms, such as government regulations and cultural expectations. The second one is imitation mechanism. When faces with uncertainty problem, organizations tend to adopt the solution used by other organizations in the same organizational field. The last one is regulatory mechanisms, which comes from development and complication of professional networ ks in professional training, and organizational field. Sequential studies take a large number of empirical analyses on the mechanism above. Take Galaskiewicz and Wasserman for example, they confirmed the importance of networking to the mechanism of imitation. They noted that, although the successful organization may be easy to become the object of imitation, the organization managers tend to imitate the organization they trust, such as those that have the interpersonal association with their own organization.

Tuesday, October 22, 2019

Star Fruit - Averrhoa Carambola essays

Star Fruit - Averrhoa Carambola essays The plant I have chosen is commonly called star fruit and its scientific name Averrhoa carambola L. The star fruit is in the oxalidaceae family, and it originated in Southeast Asia. Although star fruit is now grown throughout many tropical and warm subtropical areas of the world. In the United States, they are grown commercially in southern Florida and Hawaii (Crane). Of all the many locations that star fruit are grown Taiwan claims to grow the very best star fruit. The carambola or star fruit is a slow-growing, short trunk evergreen tree with its many branches forming a bushy canopy that is rounded. Mature trees seldom exceed 25 to 30 feet in height and 20 to 25 feet in width. The leaves are soft, medium green, and smooth on the top and faintly hairy on the bottom. They are sensitive to light and will fold together at night or when the tree is shocked (Fruit Gardner). The flowers are small pink to lavender colored and have five petals and sepals. The actual fruit is a fleshy berry w ith a wary surface. They are two to six inches long with five prominent longitudinal ribs. Slices cut in cross-sections are star shaped. The skin is thin, yellow, and smooth with a waxy cuticle. The flesh is yellow, translucent, crisp and very juicy. Star fruit is sweet and even sweeter when allowed to ripen on the tree. They are low in calories and a good source of potassium and vitamin C (Crane). The seeds are edible, but usually, a fruit contains less than twelve. They are long, thin, light brown, and enclosed by a gelatinous aril. Star fruit grows best in tropical climates although they also do well in warm subtropical climates that may experience occasional freezing. They are not too particular about soil types, but they will grow faster and bear more fruit in rich loam. Star fruit need moisture for best production; this means regular watering or irrigation. Young carambola trees should receive light applications of fertilizers every 60 to 90 days ...

Monday, October 21, 2019

buy custom The History of Respiratory essay

buy custom The History of Respiratory essay The management of medical condition through respiratory care/therapy has a very short but rich history. Respiratory care gives/therapists with other physicians and health professionals diagnose and treat patients with disorders in their respiratory and cardiovascular systems. Today, respiratory care has grown and become a dynamic and exciting profession in health care giving. Most top medical institutions offer respiratory care trainings. The demand for respiratory care givers has in the years been growing due to the efficacy of respiratory therapy in the management of myriad medical conditions and also the rise in the prevalence of respiratory medical conditions such as pneumonia and other respiratory diseases associated with diseases of the heart and other ailments that occur as a result of aging. The use of respiratory care/therapy in the management of medical conditions has had commendable results. This explains its growth and adoptions in the medical profession despite its short history. According to Egan, Wilkins, Stoller, Kacmarek (2009) respiratory care was adopted in US in the early 1950s. During this period, medical professionals offering this care were called inhalation therapists. These individuals were charged with administering oxygen to patients in hospitals. However there are other indications that suggest that the history of respiratory care began much earlier than 1950s in the United States. Wyka Mathews Clark (2001) provide that respiratory care giving began in the United States much earlier than 1940s as proved by the existence of oxygen administration equipments in hospitals before this period such as the oxygen tent argued to have been in use as early as 1926 and Nasal catheter said to have been in use by 1928. During this period, the main job of respirato ry therapists included provision of oxygen to critically ill patients especially those in Intensive Care units (ICU). Oxygen masks argued to have been developed in the early 1938 were mainly used by army pilots to aid in breathing. It should be noted, there also very early indications that suggest that the use of respiratory care has been in use much earlier that has been indicated in the history of medicine. A very good example is the case Thomas Beddoes who is argued to be the first to use oxygen for therapeutic functions. He is also credited with the establishment of Pneumatic Institute of Bristol in England which is also known to be the first medical institution to have used oxygen for therapeutic reasons. According to Wyka Mathews Clark (2001), Beddoes and his colleagues used primitive oxygen masks (made of oiled silk rags) to treat medical conditions such as heath diseases, asthma, leposy, venereal diseases and opium addiction. Beddoes is referred to as the father of respiratory care despite the fact that oxygen did not have any therapeutic effect in any of the medical conditions that he was trying to cure. Today, the field has expanded and to include use of other gases in the management of medical conditions and operations. It also includes the monitoring and management of mechanical and computerized ventilators that have been designed to provide life support for patients undergoing operations through monitoring their respiratory systems and the heart and its hemodynamics. The use of respiratory care in the management of medical conditions gained more recognition in the 1940s after a group of oxygen tank technicians in Illinois started meeting with doctors who were involved in the treatment of diseases related to the lungs. They formed a group in 1946 and named it Inhalation Therapy Association (ITA). This group focused on providing training for people involved in the administration of medical gases to patients. The first graduates for the trainings were awarded certificates in 1950 (Wyka Mathews Clark 2001). These individuals however had little formal education but they had desire for practicing medicine. Egan, Wilkins, Stoller, Kacmarek, (2009) provide that these were the primary group of people to receive formal certification in Inhalation therapy. After the impact of the trainings provided by the ITA was witnessed, American College of Chest Physicians offered to provide sponsorship to ITA in 1953 which by now was holding annual conventions. By now they had attendants from 14 states and Canada. In 1954, the group elected a board of directors and changed its name from ITA to American Association of Inhalation Therapists (AAIT) with Sister Borromea as the president and Jimmy Young as the executive director. During this time, AAIT had started putting out monthly bulletin and also started forming state chapters (Wyka Mathews Clark 2001). In 1957, American Society of Anaestologists (ASA) started to offer official sponsorship of AAIT which continued grow t a membership of around 600 members by 1958. With advancement in technology, more technical and better equipment were introduced as well as other therapeutic techniques. By this time individuals practicing this type of medicine had the title inhalation therapists. Their main duty was to ensure that oxygen was properly used. They also administered intermittent positive pressure breathing (IPPB) treatments, performed CPR (cardiopulmonary resuscitation) and also operated negative pressure (iron lung) ventilators. >The growth of membership to AAIT was major revenue to Hospitals. This meant that the requirements for joining the group had to be raised. By 1961, it was no longer a on the job trainee field. AAIT established standards for schools. In 1963, representatives from American Medical Association, Council of Medical Education, American College of Chest Physicians (ACCP), American Registry of Inhalation Therapists (ARIT) and ASA together came to Chicago headquarters of AMA to form Board of Schools for the new field which was to function under AMA council on medical education. The Board of schools was later renamed Joined Review Committee for Inhalation Therapy Education (JRCITE) in 1964. JRCITE visited and evaluated inhalation therapy education programs. This step marked a very important step in the establishment of serious education and training programs in respiratory care as it weeded out the training programs which were ineffective and those which were exploitative. Each inhalation trai ning program had to be approved by the JRCITE after meeting the requirements and tests and the minimum standards that had been put in place. The evaluation programs evolved and now moved from hospitals to academic institutions. The essentials for approving a program were based on the facilities that were available for training such as books, the medical support and the number of classes. In 1980s this method of evaluation was realized to be inadequate and inaccurate. It changed its methods of evaluation from progress oriented to target oriented were the trainees were measured based on the given targets of a training programs. While there was development of AMA approved schools for inhalation therapy, there was also establishment for system for accrediting individuals who passed the accreditation requirements. The 1959 autumn Bulletin AAIT called for the creation for a nonprofit organization that would create registration for individual practitioners and ARIT was developed. By late 1960s, the credential and title of Certified Inhalation Therapy Technician was developed. By 1972, AAIT changed its name to American Association of Respiratory Therapists (AART). Other changes that also had been witnessed in this profession are the certification and accreditation titles. Registered Inhalation Therapist changed to Registered respiratory Therapist and Certified Inhalation Therapy Technician changed to Certified Respiratory Therapy Technician. Other major events in history respiratory care include the formation of National Board of Respiratory Care (NBRC) in 1974 to develop and testing procedures according to the set national standards. In 1995 there was the formation of Respiratory Care Education Programs. Buy custom The History of Respiratory essay