Thursday, October 31, 2019

Older People Care (Social Care) Essay Example | Topics and Well Written Essays - 1750 words

Older People Care (Social Care) - Essay Example According to a survey â€Å"between 1971 and 2009 the proportion of the UK population aged under 16 years decreased from 25.5 percent to 18.7 percent, while the proportion aged 75 and over increased from 4.7 percent to 7.8 percent† (Beaumont 2011). It is expected that in UK, by 2018, citizens above 65 will be more than those in the age group of 16. â€Å" It is estimated that the number of residents aged 90 and over increased by 12 percent between 2002 and 2009, that is from 388,200 to 436,500† (Beaumont 2011). (Measuring National Well-being – Population 2012). The percentage of older women is more in UK than that of men. Due to less number of deaths there is some improvement in the statistics. As women live longer compared to men, the percentage of elderly women is more.† In 2010 there were 2.56 women over the age of 90 for every man of that age† (Population Ageing: Statistics para 2). The chances of elderly women to stay alone are more than that of men. This proportion grows with increasing age. â€Å"Among women aged 75 and over who live in private households in Great Britain, 60 percent live alone compared to 36 percent of men of the same age† (Population Ageing: Statistics 2012). ... Ageism could often have an effect on the options individuals are provided with, this also affect the decisions they take about these options. â€Å"Traditionally, aging has been viewed as a continual process of decline. Unfortunately, this stereotyping results in systematic discrimination that devalues senior citizens and frequently denies them equality. In his review of the attitudes toward aging shown by humor, Pal more (1986) found that elderly people were often portrayed negatively. The humor tended to focus on physical and mental losses, as well as on decreases in sexual attractiveness and drive. Jokes about older women tended to be more negative than those about older men† (Grant para 1996). Confronting the concept of ageism is effectively carried out by the enhancement of positive thinking on the process of aging. A person’s self image depends much on age, the person’s actual age and, the age which the society thinks he or she is and the age which they thi nk they are. But this concept changes when the person reaches the retirement age. When one reaches 65, the society considers the person â€Å"useless† while the person still considers himself or herself an active and responsible member of the society. They tend to behave in a different manner.† These impressions often develop into socially acquired attitudes that affect how we deal with individuals on the basis of their age and in turn affect the stereotyped individual’s self-concept and self –esteem. What changes is not older people’s capacity to be vigorous, productive and creative. Rather, society is unwilling to see seniors as vital and active contributors far beyond traditional retirement age, and many older individuals absorb this concept into own mind sets† (The Effects of

Tuesday, October 29, 2019

Application of Business Vocabulary in Financial Articles Literature review

Application of Business Vocabulary in Financial Articles - Literature review Example In the article, the writer uses the keywords Baby Boomers, Generation X, and Generation Y. Baby Boomers are the children that were born in the post World War II economic boom. In the article, Keller uses the term as the oldest of the definable generational segments and further describes their propensity for being health and fashion conscious. Generation X and Generation Y are market segments that are differentiated by age, with Generation X being the older set. Keller uses the generational set as market segments and points out that the overlap between 18-34 is the fastest growing segment. The author makes no social or cultural comments on these segments. In the article titled "Six Tips for Buying or Expanding a Business" the author offers sound advice on how to enhance a business's chance for success. The author, Jeff Stone, takes the reader from building a solid foundation through the important aspect of making a profit. Stone also includes the intermediary steps of planning and seeking help when advantageous. The article advises the small business community on seeking investments and financing and the requirements that the financial institutions may require for success. These common sense issues include things such as creating a good brand image and keeping accurate company records. In the article Stone uses the keywords Small Business, Small Business Administration, and Business Plan. While the legal definition of a small business may vary from state to state or be dependant upon the institution involved, it is generally defined as a business that employs a small number of people. In Stone's article, he defines it and uses it in the context as those businesses that are of such small size they are especially vulnerable to changing conditions or lack of planning. The Small Business Administration (SBA) is a government agency designed to provide a wide variety of programs for small businesses. These can include everything from planning to financing. Stone uses the term in context with the planning help that is available at the SBA. A business plan is a well thought out and long term approach for planning and running a company. The author elaborates on this definition and includes many of the aspects of a business plan such as the necessity to obtain financing and benchmarks for measuring success. In an article published in 2002, author Jacqueline J. Kennelly argues that free trade and the associated movements towards globalization may have a negative effect on women's health care and feminism in general. Published in Canadian Woman Studies and titled "Making Connections: Women's Health and the Anti-Globalization Movement", the author argues the pros and cons of free trade and free trade associations and the impact of anti-globalization efforts. The author contends that the anti-globalization movement is often perceived as a white male-dominated institution and as such tends to overlook women's issues. Much of the argument centers on the movement towards privatization of health care systems and how they diminish the health care available to women.  

Sunday, October 27, 2019

Auditory processing in Speech Production

Auditory processing in Speech Production The integration of auditory feedback from self generated speech sounds into upcoming motor commands is important for the stability and control of speech production. For example, children with profound hearing impairment experience greater difficulty acquiring and maintaining speech than their normal hearing peers (Campisi, Low, Papsin, Mount, Harrison, 2006; Kishon-Rabin, Taitelbaum-Swead, Ezrati-Vinacour, Hildesheimer, 2005; Moeller, Hoover, Putman, Arbataitis, Bohnenkamp, Peterson, Lewis et al., 2007; Moeller, Hoover, Putman, Arbataitis, Bohnenkamp, Peterson, Wood et al., 2007). Also, adults with acquired hearing loss show a gradual degradation of their previously proficient articulatory ability that is partially restored after cochlear implantation (Kishon-Rabin, Taitelbaum, Tobin, Hildesheimer, 1999). The importance of auditory feedback for speech motor control in normal speakers has been demonstrated via perturbation studies. Various studies have shown the compensatory impact perturbing the volume (Bauer, Mittal, Larson, Hain, 2006), pitch (Burnett, Senner, Larson, 1997), phonetic accuracy (Houde Jordan, 1998) and timing (Jones Striemer, 2007) of auditory feedback has on the kinematic and acoustic outcomes of speech production in normal speakers. Computational neural network models of speech production have also been used to demonstrate the importance of auditory feedback for articulatory control (Guenther, Husain, Cohen, Shinn-Cunningham, 1999; Perkell et al., 2000). Perturbing the timing of auditory feedback in people who are fluent is known to induce a variety of articulation disturbances. Specifically, delayed auditory feedback varied between 200 ms and 400 ms during reading aloud results in a reduced number of correct words, increased total reading time, monosyllabic sound substitutions, omissions, insertions and additions including repetitions (Fairbanks, 1955; Fairbanks Guttman, 1958; B. S. Lee, 1950; B. S. Lee, 1951; Stuart, Kalinowski, Rastatter, Lynch, 2002; Yates, 1963). Conversely, delayed auditory feedback has been shown to positively influence speech fluency in people who stutter (Adamczyk, 1959; Kalinowski, Stuart, Sark, Armson, 1996; Ryan Van Kirk, 1974; Soderberg, 1968; Stuart, Kalinowski, Armson, Stenstrom, Jones, 1996; Stuart, Kalinowski, Rastatter, 1997). The degree of fluency enhancement varies depending on a number of variables (e.g. delay duration, feedback intensity), the context and the individual (Armson, Kiefte, Ma son, DeCroos, 2006; Wingate, 1970). As a result of the variable responses reported in the literature, the clinical effectiveness of altered auditory feedback as a treatment tool remains controversial (Antipova, Purdy, Blakeley, Williams, 2008; Lincoln, Packman, Onslow, 2006; ODonnell, Armson, Kiefte, 2008; Pollard, Ellis, Finan, Ramig, 2009; Stuart, Kalinowski, Rastatter, Saltuklaroglu, Dayalu, 2004; Stuart, Kalinowski, Saltuklaroglu, Guntupalli, 2006; Wingate, 1970). The basis for the variable response of adults who stutter to delayed auditory feedback is not known. Various theories have been put forward to describe how delayed auditory feedback induces fluent speech in some individuals who stutter. It has been proposed that delayed auditory feedback results in speech improvement by forcing the person who stutters to assume a new pattern of speech movement (Goldiamond, 1965). The new pattern is claimed to be established and maintained via operant learning principles with the delayed auditory feedback functioning as aversive negative reinforcement. As pointed out by Wingate (1970), the conceptualization of this process is unclear and incomplete. However, there is some evidence to support the claim that a new speech pattern is learned (Ryan Van Kirk, 1974). It has also been proposed that the delayed auditory feedback is corrective in nature thereby improving fluency. However, the contrary that delayed auditory feedback is distorted feedback seems to be obvious (Wingate, 1970). Some authors have posited that the key to delayed auditory feedback’s effectiveness is the reduction of meaningful feedback (Wingate, 1970) denying the person who stutters the ability to rely on this potentially inefficient control system. This assertion is somewhat supported by the observation that masking of auditory feedback also induces fluent speech in some individuals who stutter (Sutton Chase, 1961; Wingate, 1970). Lastly, it has been proposed that delayed auditory feedback is effective because of the tendency of individuals to slow their speech rate, prolong vowel duration and increase vocal intensity and fundamental frequency (Wingate, 1970). However, changes to speech characteristics such as a slower rate cannot be the only reason that delayed auditory feedback is effective, as it has been demonstrated to have similar fluency enhancing effects even at fast rates of speech (Kalinowski et al., 1996; Stuart et al., 2002). The effects of altered auditory feedback on speech fluency in people who stutter demonstrate the importance of auditory processing in the disorder. Advancing our understanding of the role auditory processing plays in the speech production of people who stutter may begin to elucidate the mechanisms behind fluency inducing altered auditory feedback. 1.5.2 Auditory processing in normal and stuttered speech production: Behavioural studies of auditory processing in adults and children who stutter have yielded evidence of central auditory processing differences in these populations relative to fluent age-matched peers. Rousey, Goetzinger and Dirks (1959) reported that 20 stuttering children showed below normal performance on sound localization. Lack of sound localization skills may be indicative of temporal lobe disorders (Jerger, Wekers, Sharbrough, Jerger, 1969). Various studies have employed batteries of audiometric tests to behaviourally evaluate central auditory processing in adults children who stutter. Rousey, Goetzinger and Dirks (1959) reported that 20 stuttering children showed below normal performance on sound localization. Hall and Jerger (1978) reported that adults who stutter performed poorly relative to fluent adults on a subset of such tests. They concluded that the results suggested the presence of a subtle central auditory processing deficit in adults who stutter. Anderson, Hood an d Sellers (1988) conducted a similar study and found that adolescents who stuttered performed poorly on only one subtest as compared to a group of age-matched control participants. They similarly concluded that if a deficit exists it is subtle. Evidence of a subtle central auditory processing deficit has also been demonstrated in children who stutter. For example, children who stutter have been found to have higher thresholds on backward masking tasks than children who do not stutter (Howell, Rosen, Hannigan, Rustin, 2000). Howell et al. also found a positive correlation between backward masking thresholds and stuttering severity in children who stutter. In a follow-up study Howell and Williams (2004) investigated children who stutter on a battery of audiometric tests including backward masking tasks. Based on the profile of performance on the audiometric battery of tests, Howell et al. (2004) reached the conclusion that children who stutter had a different developmental pattern of central auditory processing abilities relative to their fluently speaking age-matched peers but they did not specify the nature of that difference. More recently, central auditory functioning was evaluated behaviourally and with electroencephalography in adults who stutter (Hampton Weber-Fox, 2008). Behaviourally, adults who stutter performed less accurately and demonstrated longer reaction times in response to the prompt tone in a standard oddball paradigm. However, a small subgroup of adults who stutter was found to be driving the results. The same subgroup of poor performing adults who stutter also demonstrated abnormal evoked auditory waveforms. Hampton and Weber-Fox (2008) concluded that this subgroup demonstrated deficient non-linguistic auditory processing. Objective tests like AEPs are valid and useful measures to study auditory processing in persons with stuttering as they reflect changes in auditory system as stimuli is processed.

Friday, October 25, 2019

Paranoid Schizophrenia: They’re Out To Get Me Essay example -- Mental

Introduction Paranoid Schizophrenia is a serious psychotic disorder that impairs a person’s perception of reality, causing the mind to lose contact with the real world. This disorder greatly affects one’s ability to negotiate the activities of everyday life, such as school, work, or social situations. In 1898, Emil Kraepelin was to the first to provide information regarding schizophrenia naming it â€Å"dementia praecox†, and defining it as a psychosis with an early onset of intellectual deterioration (Schiffman & Walker, 1998). Ten years later, a Swiss psychiatrist, Eugen Bluler renamed the disorder using a combination of the Greek words â€Å"skhizein† and â€Å"phren† meaning split mind (Barlow & Durand, 2011). He believed the unusual behaviors were a split from the basic functions of personality and reality. Today, there are misconceptions about the term schizophrenia in which society confuses a split mind with a split personality, or multiple persona lities. The broad definition of schizophrenia continues to be researched and narrowed into subtypes with specific presenting characteristics. Paranoid schizophrenia is one of the five major sub-types listed in the Fourth Edition of the Diagnostic Statistical Manual of Mental Disorders; Text-Revised (DSM-IV-TR) with the list continuing to expand as the criteria identifies specific related symptoms or behaviors (American Psychiatric Association, 2000). Although this disorder only afflicts 1% of the total population of the United States, this amounts to over three million people living with the disorder. Diagnosis Diagnosis of this syndrome typically occurs in late adolescence through early adulthood with the onset of behaviors marking deterioration in the ability to perform normal... ...000). Diagnostic and statistical manual of mental disorders- fourth edition-text revision. Washington, D.C.: Author. Barlow, D. H., & Durand, V. M. (2011). Abnormal psychology: An integrative approach (6th ed.). Belmont, CA: Wadsworth, Cengage Learning. Foerschner, A. M. (2010). The history of mental illness: From "skull drills" to "happy pills". Student Pulse, 02(09), 1-4. Maguire, G. A. (2002). Comprehensive understanding of schizophrenia and its treatment. American Journal of Health-System Pharmacists, 59(5), 4-11. doi: 1079-2082/02/0901 National Institute of Health. National Institute of Health, National Institute of Mental Health. (2009). Schizophrenia (09-3517). Schiffman, J. & Walker, E. F. (1998). Schizophrenia. In H. Friedman (Ed.) The Disorders: Specialty Articles from the Encyclopedia of Mental Health. Academic Press: New York.

Thursday, October 24, 2019

Life Sciences Paper 1

NATIONAL SENIOR CERTIFICATE GRADE 12 LIFE SCIENCES P1 FEBRUARY/MARCH 2011 MARKS: 150 TIME: 2? hours This question paper consists of 14 pages. Copyright reserved Please turn over Life Sciences/P1 2 NSC DBE/Feb. – Mar. 2011 INSTRUCTIONS AND INFORMATION Read the following instructions carefully before answering the questions. 1. Answer ALL the questions. 2. Write ALL the answers in your ANSWER BOOK. 3. Start the answers to EACH question at the top of a NEW page. 4. Number the answers correctly according to the numbering system used in this question paper. 5. Present your answers according to the instructions of each question. . Do ALL drawings in pencil and label them in blue or black ink. 7. Draw diagrams or flow charts only when asked to do so. 8. The diagrams in this question paper are NOT necessarily drawn to scale. 9. Do NOT use graph paper. 10. You may use a non-programmable calculator, protractor and a compass. 11. Write neatly and legibly. Copyright reserved Please turn o ver Life Sciences/P1 3 NSC DBE/Feb. – Mar. 2011 SECTION A QUESTION 1 1. 1 Various options are provided as possible answers to the following questions. Choose the correct answer and write only the letter (A – D) next to the question number (1. 1. 1 – 1. . 6) in the ANSWER BOOK, for example 1. 1. 7 D. 1. 1. 1 The process in which male gametes are formed in humans is called †¦ A B C D 1. 1. 2 When the first child of two parents, without any visible genetic disorder, was born, the child was found to have a serious genetic disorder. The parents were told that a recessive gene had caused the disorder, and that only one pair of genes was involved. If they had a second child this child †¦ A B C D 1. 1. 3 was certain to have the disorder. had a 1 in 2 chance of having the disorder. had a 1 in 4 chance of having the disorder. no chance of having the disorder.Below is a set of steps following fertilisation in humans. Which is the CORRECT order of events? 1. 2. 3. 4. A B C D Copyright reserved vasectomy. spermatogenesis. oogenesis. mitosis. The embryo is embedded in the uterine wall in humans. A zygote is formed in the Fallopian tube. Cell division occurs to form a ball of several hundred cells. The blastocyst remains free for several days in the uterus. 2, 3, 4, 1 2, 1, 3, 4 3, 2, 4, 1 1, 3, 2, 4 Please turn over Life Sciences/P1 4 NSC DBE/Feb. – Mar. 2011 QUESTIONS 1. 1. 4 and 1. 1. 5 refer to the graph below which shows the growth of the follicle and the ovarian hormone levels.Hormonal regulation of the menstrual cycle Growth of follicle B A Ovarian hormone levels 0 1. 1. 4 21 28 Progesterone and LH FSH and LH Oestrogen and progesterone Oestrogen and FSH What is the follicle called after day 14? A B C D 1. 1. 6 14 Which hormones are represented by A and B? A B C D 1. 1. 5 7 Primary follicle Graafian follicle Secondary follicle Corpus luteum A ring of DNA (plasmid) is taken from a bacterial cell to produce insulin. The steps which f ollow are NOT in the correct order below. 1. The gene for insulin is removed from a cell of a human pancreas. 2. The bacteria make clones of themselves and produce nsulin. 3. The insulin gene is put into the plasmid and into a new bacterial cell. 4. The bacterial plasmid is cut using enzymes. The CORRECT order of the steps is †¦ A B C D Copyright reserved 3, 2, 4, 3. 3, 2, 4, 3. 4, 1, 3, 2. 4, 2, 1, 3. (6 x 2) Please turn over (12) Life Sciences/P1 1. 2 5 NSC DBE/Feb. – Mar. 2011 Give the correct biological term for each of the following descriptions. Write only the term next to the question number (1. 2. 1 – 1. 2. 7) in the ANSWER BOOK. 1. 2. 1 1. 2. 2 An arrangement of black bars representing DNA fragments that can be used to determine whether people are related 1. . 3 Structure in the sperm cell containing enzymes that break down the membrane of the ovum 1. 2. 4 The release of an ovum from a follicle 1. 2. 5 The period from fertilisation to birth 1. 2. 6 The tu be that transports the sperm from the testis to the urethra 1. 2. 7 1. 3 All the genes in all the chromosomes of a particular species A hormone produced in females to stimulate milk production (7) Indicate whether each of the statements in COLUMN I applies to A only, B only, both A and B or none of the items in COLUMN II. Write A only, B only, both A and B, or none next to the question number (1. 3. 1 – 1. 3. ) in the ANSWER BOOK. COLUMN I 1. 3. 1 Possible ways of improving of fertility 1. 3. 2 Forms the placenta 1. 3. 3 Having a single set of chromosomes 1. 3. 4 Sexually-transmitted disease(s) caused by bacteria 1. 3. 5 Technique used to determine abnormalities of the foetus COLUMN II A: Artificial insemination B: In vitro fertilisation A: Amnion B: Chorion A: Diploid B: Haploid A: Syphilis B: HIV A: Ultrasound B: Amniocentesis (5 x 2) Copyright reserved Please turn over (10) Life Sciences/P1 1. 4 6 NSC DBE/Feb. – Mar. 2011 When a stigma is ripe, it secretes a fluid w hich stimulates pollen grains to grow tubes.The fluid contains sugar. Zama wanted to investigate the following question: How does the concentration of sugar affect the number of pollen grains that germinate/form pollen tubes in flowers? She designed the following investigation. †¢ She took 5 cavity slides. cover slip cavity slide solution with pollen grains †¢ †¢ †¢ †¢ The first slide she filled with distilled water. The second slide she filled with a 5% sugar solution. The third slide she filled with a 10% sugar solution. The fourth slide she filled with a 15% sugar solution. The fifth slide she filled with a 20% sugar solution.She transferred the same number of pollen grains from the anthers of a flower into each cavity of the five slides. A cover slip was gently lowered onto the slide. All five slides were placed in a warm incubator and left for one hour. Each slide was then examined under a microscope and the number of pollen tubes in each slide was coun ted and recorded in the table below. Concentration of sugar solution (%) 0 5 10 15 20 Number of pollen tubes 0 7 11 15 21 1. 4. 1 Explain why Zama used distilled water in the first cavity slide. (2) 1. 4. 2 State THREE ways in which this investigation would be improved to get more reliable results. 3) 1. 4. 3 Copyright reserved Describe a conclusion for the above investigation. (2) (7) Please turn over Life Sciences/P1 1. 5 7 NSC DBE/Feb. – Mar. 2011 The diagram below represents a karyotype of a human cell. 1 6 2 3 7 13 14 19 20 4 8 9 10 15 11 16 21 5 12 17 22 18 23 1. 5. 1 How many chromosomes are present in this karyotype? (1) 1. 5. 2 Is this karyotype that of a man or a woman? (1) 1. 5. 3 Give a reason for your answer to QUESTION 1. 5. 2. (2) 1. 5. 4 Describe how the karyotype of a person with Down's syndrome will be different from the karyotype shown in the diagram above. Copyright reservedPlease turn over (2) (6) Life Sciences/P1 1. 6 8 NSC DBE/Feb. – Mar. 2011 St udy the pedigree diagram of a family where some individuals have haemophilia. Haemophilia is a sex-linked disorder. Use H for normal blood clotting and h for the haemophiliac trait. Peter Andrew Millicent Henry Enid David Priscilla Goliath Key Normal female Anele Male haemophiliac Clarence Normal male 1. 6. 1 1. 6. 2 From the pedigree diagram above, state the relationship between gender and haemophilia. (2) Write down all the possible genotypes of individuals: (a) Peter (b) Enid (c) Clarence (6) (8) TOTAL SECTION A: Copyright reservedPlease turn over 50 Life Sciences/P1 9 NSC DBE/Feb. – Mar. 2011 SECTION B QUESTION 2 2. 1 Study the following diagrams representing different phases of meiosis. A C B Diagram 1 Diagram 2 2. 1. 1 Diagram 4 (3) Label structures A, B and C. 2. 1. 2 Diagram 3 Which phase is represented by: (a) 2. 1. 4 2. 1. 5 Copyright reserved (1) (b) 2. 1. 3 Diagram 1 Diagram 2 (1) Write down the numbers of the diagrams to show the correct sequence in which the pha ses occur. (2) Tabulate THREE differences between the first and second stages of meiosis. (7) Name and explain TWO processes/mechanisms that ensure that he gametes produced at the end of meiosis are genetically different from each other. Please turn over (4) (18) Life Sciences/P1 2. 2 10 NSC DBE/Feb. – Mar. 2011 The diagrams below represent the process of protein synthesis. M O N UC A G G C A C A P Z UGU Q UC AGGCACA R X 2. 2. 1 Identify compound M and organelle R. (2) 2. 2. 2 Write down the sequence of the FIRST THREE nitrogenous bases on the DNA strand that led to the formation of Z. (2) 2. 2. 3 Name the part/stage of protein synthesis that is illustrated in O. (1) 2. 2. 4 The table below shows the base triplets of DNA and the amino acid each codes for.Base triplet of DNA AGT CCG TGT GTA CAA TCC ACA Copyright reserved Amino acid coded for Serine Glycine Threonine Histidine Valine Arginine Cysteine Please turn over Life Sciences/P1 11 NSC DBE/Feb. – Mar. 2011 With ref erence to the diagram in QUESTION 2. 2 and the table above: (a) Name the amino acid labelled P. (2) (b) State the base sequence of the molecule labelled Q. (2) (c) What name is given to the triplet of tRNA bases that codes for each amino acid? (1) (d) Describe how the composition of the protein molecule changes if the base sequence at X is UGU instead of UCA. (2) (12) 30] QUESTION 3 3. 1 The diagram below represents the female reproductive system. X A Y B D C 3. 1. 1 Label structures A, B and C. (3) 3. 1. 2 State THREE functions of D. (3) 3. 1. 3 Fertilisation usually takes place at Y. Why will a blockage at X: (a) Prevent fertilisation at Y (b) Not necessarily lead to infertility Copyright reserved (1) (2) (9) Please turn over Life Sciences/P1 3. 2 12 NSC DBE/Feb. – Mar. 2011 Read the paragraph below and answer the questions that follow. MALE CONTRACEPTIVE CHEMICAL Gossypol is a chemical which is extracted from the seeds of cotton plants.When gossypol was given to rats, mice , dogs and monkeys, it caused a reduction in the fertility of the male animals by reducing their sperm count. Scientists wanted to investigate the idea that gossypol could be used as a human male contraceptive. [Adapted from: Liffen and Liffen, 1987] 3. 2. 1 State a hypothesis for the investigation that scientists wanted to do. (3) 3. 2. 2 State FOUR planning steps that must be followed by researchers before the investigation above is undertaken on humans. (4) 3. 2. 3 In the investigation above, name the following: (a) (1) (b) 3. 2. 4 Dependent variable Independent variable (1)Explain ONE reason why some people might: (a) (2) (b) Copyright reserved Support research on male contraception Object to research on male contraception (2) (13) Please turn over Life Sciences/P1 3. 3 13 NSC DBE/Feb. – Mar. 2011 Study the diagram of a flower below and answer the questions that follow. D A B E C 3. 3. 1 Label parts A, B and D. (3) 3. 3. 2 Describe how the male gamete reaches the ovum aft er pollination. (3) 3. 3. 3 What do the following structures develop into after fertilisation: (a) Structure C (1) (b) Structure E (1) (8) [30] TOTAL SECTION B: Copyright reserved Please turn over 60 Life Sciences/P1 14 NSC DBE/Feb. Mar. 2011 SECTION C QUESTION 4 4. 1 Explain THREE advantages of using genetically modified organisms as food. 4. 2 The table below shows the percentage frequency of human blood groups in the populations of two different cities in South Africa. (6) Human blood groups % frequency in population City 1 City 2 A 25 45 B 20 10 AB 10 5 O 45 40 4. 2. 1 Which blood group has: (a) 4. 3 (1) (b) 4. 2. 2 The highest frequency in City 1 The lowest frequency in City 2 (1) Plot the data in the table as bar graphs on the same system of axes. (10) (12) The diagram below shows a crossing between a homozygous black mouse and a homozygous white mouse.The F1-generation was all black. Male Female P1 X F1 1 2 3 4 Use the symbols B and b for the alleles of fur colour and show di agrammatically a genetic cross between mouse 1 and mouse 3 to show the possible genotypes and phenotypes of the next generation (F2). 4. 4 Clones are a group of genetically identical organisms. Explain THREE advantages and THREE disadvantages with reasons of cloning. Synthesis: NOTE: (12) (3) (15) NO marks will be awarded for answers in the form of flow charts or diagrams. TOTAL SECTION C: GRAND TOTAL: Copyright reserved (7) 40 150

Wednesday, October 23, 2019

Cash Flow Essay

Cash Flow A statement of cash flows is required by generally accepted accounting principles to be included in a complete set of financial statement. www.wiley.com Companies are required to prepare a statement of cash flow because it contains information for lenders and investors (external users). When a company uses the statement of cash flow it contains their annual reports that help to make decisions about the companies. The basis for cash flow analysis is presented in the statement of cash flow. It contains the actual cash a company generated and it shows how the company is able to operate and perform in the future. There are three ways a company shows the way they consume and produce cash. The cash flow statement has three sections. The three ways are cash flows from operations, investing and financing. How the company gets its cash is the operations and financing. The investing section shows the way the company spends its cash. Ratios would be used in the decision making process. One of the examples of the ratios is the operating cash flow ratio. This measures how current liabilities are covered by the cash flow generated by a company operation. A ratio that falls below 1.00 shows the company is not generating enough cash to meet current commitments. When a company falls below 1.00, it will have to find ways to fund its operations or slow their rate of spending in its cash. If the company has an existing cash balance that can meet the needs, they would have to consider if the company will be able to continue to operate without additional funds, because the existing cash may not last. The cash current debt coverage ratio is another important ratio. This ratio measures the ability of a company to repay its current debts. Ratios less than 1.00 in the cash current debt coverage, means the company is not  generating cash to repay its current debt obligations. On a company balance sheet it is better to have a higher multiple calculated by this ratio. With the trend analysis, which is also called the horizontal analysis, typically over years, financial ratios are compared. Doing a year to year comparison will highlight trends, which will be useful in showing improvement in the organization financial performance or it will show deterioration. The most important information from analyzing statement cash flow is the relationship of two or more variables. This is the cash flow from operation activities to total cash flows. RUNNING HEAD: CASH FLOW The major difference between indirect and direct method is the information that it shows. The indirect method focuses on net income and cash flow of operations. It adds depreciation back and calculates changes in items in balance sheet. The most important line of the statement is the net cash from financing activities to show if a company continually needs to borrow or add other investors to survive. The direct method reports the classes of operating receipts of cash and payment. www.inc.com This would be money received and spent to calculate net cash. There is no depreciation included because it is not money received or spent.

Tuesday, October 22, 2019

Homer Wells Moral Progression essays

Homer Well's Moral Progression essays Homer Wells, the main character of the movie Cider House Rules, faces many moral dilemmas as his life progresses. Homer, who was an orphan at St. Claude's as a child, was taken under the wing by the head doctor at the orphanage, Dr. Wilbur Larch. Dr. Larch teaches Homer, instructing him to be a doctor, just like himself. As Homer becomes a full fledged physician at St. Claude's, he decides to not perform abortions. He thinks that each life is precious, just like his own, and is thankful that his mother decided to put him up for adoption instead of aborting him. As Homer leaves the orphanage and comes out into the world, he is needs to decide if his position on abortion is what is for the best. In the beginning, Homer is against abortion, but in the end, he will challenge his moral beliefs and perform what is asked of him. Homer is taught by Dr. Larch the method to perform abortions, but Homer decides that he will never perform it. Afterwards, a young lady, Candy Kendall, accompanied by her air force officer boyfriend, Wally Worthington, arrive at the orphanage, requesting for an abortion. Homer will not perform the abortion, because he believes that it is unethical, and is against his moral thinking. Homer declines the job, compelling Dr. Larch to perform it. During the abortion, Homer talks to Wally, convincing him that Candy will be in good hands, and in good health. After the procedure, Homer decides to leave the orphanage to experience life outside St. Claude's. He asks Wally for a lift in his automobile, and he obliges. Homer, having almost no money, is offered a job at an apple orchard owned by the Worthington family, and he graciously accepts it. He gets acquaint ed with the other orchard workers, especially Mr. Rose, and his daughter, Rose Rose. After a few months of working alongside with them, Homer discovers that Rose Rose is pregnant. After a confrontation with her, they learn that the father of the unborn baby is he...

Monday, October 21, 2019

Teaching Children with ADHD †Education Term Paper

Teaching Children with ADHD – Education Term Paper Free Online Research Papers Teaching Children with ADHD Education Term Paper ADHD has become a â€Å"buzz† term in the educational environment. Since ADHD is so commonly encountered by educators in both special education and general education, it is crucial for a teacher to understand it, know the science behind it, and be able to provide the best educational environment for students with it. ADHD stands for attention-deficit/hyperactivity disorder. Originally, the disorder was labeled ADD (attention deficit disorder). But due to the research by Russell Barkley, a Harvard psychologist, whose results showed that 85% of all children who suffer from attention deficit disorder also suffer from the hyperactivity component (Loechler, 1999). Therefore, the two disorders have been combined to form the single disorder of ADHD. The cause of the disorder is not well understood. Unfortunately, parents often blame themselves when a child is diagnosed with ADHD, but scientists now believe that there is a genetic and neurobiological explanation for the disorder (Attention-deficit/hyperactivity disorder, at http://mayoclinic.com). ADHD was once thought to be exclusively caused by a chemical imbalance because children and adults diagnosed with ADHD appeared to have low levels of dopamine, which is a chemical that sends messages to the part of the brain involved in attention, movement and motivation. But more recently, brain scans of children with ADHD also show changes in the neural pathways that carry these messages (Attention-deficit/hyperactivity disorder, at http://mayoclinic.com). Therefore, researchers believe that it is possible that the dysfunction of these pathways could be interfering with communication between the parts of the brain that regulate attention, planning, impulsive behavior and motor control, which are all areas of difficulty for people with ADHD. Heredity may be the most common cause of ADHD. Research shows that one in four children with ADHD have at least one relative with the disorder, and when one identical twin has ADHS, the other twin almost always has it as well (Causes of ADHD, at http://myadhd.com/causesofadhd.html). Other possible causes of ADHD are childhood exposure to environmental toxins and maternal smoking, drug use and exposure to toxins during pregnancy. There is evidence that preschool children exposed to lead and industrial chemicals such as Polychlorinated Biphenyls (PCBs) have an increased risk of developmental and behavioral problems. Children whose mother smoked, took drugs, or had exposure to environmental toxins during pregnancy may also show signs of developmental and behavioral, however, it is unlikely that such exposure accounts for differences in brain development in the vast majority of children and adolescents with ADHD (Causes of ADHD, at http://myadhd.com/causesofadhd.html). It is important for teachers to know about the myths surrounding ADHD so that they can accurately answer questions that parents ask. It is commonly believed that diet can be a causative factor to a child’s ADHD. But according to the research, there has been no found correlation between allergies or food sensitivities and ADHD. Despite the lack of evidence, the popular media continues to discuss the role of food in ADHD, particularly that sugar may cause children to become hyperactive and impulsive (Wolraich, 1985). Other theories or myths regarding the cause of ADHD are hormone dysfunction and vestibular system dysfunction. There has been no significant research that has found connections between either of these two dysfunctions and ADHD. Probably the most important myth for teachers to be able to dispel is that poor parenting or problems in the family can cause ADHD. Although some studies show that parents use more negative commands with children with ADHD and less positive reinforcement, this is most likely a result of the child’s non-compliant behavior versus a cause of the child’s ADHD. It is important for teachers and parents to realize that although parenting and family dynamics may not be the cause of ADHD, symptoms of ADHD and the degree to which such symptoms can impact the child’s functioning, can be reduced by parents who provide appropriate accommodations and interventions (Causes of ADHD, at http://myadhd.com/causesofadhd.html). So, what exactly is ADHD and why is it so commonly referred to in today’s educational environments? ADHD is the most commonly diagnosed behavioral disorder of childhood, estimated to affect 3 to 5 percent of school-age children. The main symptoms of ADHD include developmentally inappropriate levels of attention, concentration, activity, distractibility, and impulsivity. Children with ADHD usually have functional impairments across multiple settings including home, school, and peer relationships. ADHD has also been shown to have long-term adverse effects on academic performance, vocational success, and social-emotional development (Diagnosis and Treatment of Attention Deficit Hyperactivity Disorder, at http://consensus.nih.gov/cons). It is very likely that a teacher in today’s educational environment will encounter a student with ADHD. As a teacher, it is important to be able to provide a learning environment appropriate for all students, including those with disabilities such as ADHD. It is important to consider the classroom environment. Since only about half of the students diagnosed with ADHD qualify for special education (Loechler, 1999), and the philosophy of the inclusive classroom has become so popular, it is crucial that teachers are able adapt and modify their classroom and lesson plans to fit a student with ADHD. According to the Council for Exceptional Children, CEC, 1992, There are three strategies for dealing with students with hyper activity: 1) Incorporate movement into the classroom, 2) Allow for positive peer attention, and 3) Provide frequent teacher monitoring (Carbone, 2001). A major challenge for a teacher is to design an inclusive classroom that supports the educational development of a student with ADHD. One major challenge comes with the newer trend of the â€Å"open classroom† which is a loosely-structured arrangement which offers students multiple sites of stimulation such as learning centers, libraries, reading areas, etc. (Carbone, 2001). Although this open classroom set-up may be a wonderful learning environment for the general education students, it may provide too much sound and visual stimulation for a student with ADHD to stay focused on the educational task at hand. This may lead the teacher to make accommodations for a student with ADHD. First, a teacher must put considerable thought into the child’s location in the classroom and must plan supportive classroom features. Carbone, 2001, provides a list of helpful suggestions a teacher can consider when designing a classroom seating arrangement for a child with ADHD: First, the classroom should be arranged in the traditional â€Å"row† seating design. This is the most structured and predictable seating pattern. Second, the student with ADHD should be placed at a desk in the front row next to the teacher’s desk so that he/she will be less distracted by the other students and more likely to focus on the teacher. This will also allow for immediate feedback and close monitoring and will also enable to student to ask for assistance in a more conspicuous manner. Next, make sure that student is not placed near potentially distracting areas such as a window, pencil sharpener, or aquarium. It may be helpful to surround the student with well-behaved, a ttentive, friendly students. Hopefully these students will automatically interact with the student with ADHD and provide a model of proper classroom behavior as well as positive peer interaction. For a student that is over-stimulated, provide a â€Å"work station† in the room where a student can go to do work. This work station can be in a corner of the room, enclosed with book shelves, and could have comfortable chairs and pillows to provide a student with a safe, isolated environment in which to focus on the task at hand. If this work station is considered to be just another of the learning stations in the classroom, the student with ADHD may feel less apprehensive about using it and the other students may be less likely to make fun of the student for using it. Since many students with ADHD have difficulty completing tasks involving fine motor skills, the teacher can provide learning centers and stations that require fine motor skills such as an art center or a compute r center. These centers will benefit all the students, not only the student with ADHD. Lastly, since students with ADHD often feel embarrassed about having to take medication, the teacher can provide a secure, private place for the student to keep and take his medication. Although the most common characteristics of ADHD are the hyperactivity, inattention, and distractibility (Wambold, 1998), another possible difficulty that a teacher may have to deal with is impulsivity. This is when a student blurts out answers before getting called on. Children with ADHD often have difficulty waiting their turn and will interrupt and intrude on other students (Carbone, 2001). Some strategies that Carbone recommends for dealing with impulsivity are cognitive behavior therapy, timeouts, and positive reinforcement. Another characteristic of ADHD is disorganization (Carbone, 2001). In a case study written by Wambold, 1998, the author suggests several strategies for a teacher to help a student with ADHD stay organized. First, designate a specific space for the student to keep his/her materials and school supplies. Organizations skills should be modeled in a routine manner. Next, help the student plan ahead and schedule blocks of time to complete tasks. It may be helpful to provide different colored notebooks for folder for each class to keep the student organized. Also, students should learn to keep a day planner and record all of the things that he/she should accomplish in this planner. The parents should check this planner regularly and help the student keep on track. Throughout the literature research there are a lot of suggestions for teachers on how to best teach a child with ADHD. There are three important topics regarding working with a child with ADHD that have not yet been mentioned. First, it is very important to reward a student when he/she has accomplished the task that has been asked of him/her. It is not enough to just reward the student when he completes his/her school work. It is important to reward for other accomplishments such as listening and following directions, sitting quietly, and positive interaction with other students. The second important idea is parental involvement. Parents play a huge role in the education of children with ADHD. Parents should know there legal rights under the Individuals with Disabilities Education Act (IDEA) which requires public schools to provide appropriate services and make reasonable modifications for students with disabilities (Loecher, 1999). Also, parents should be involved in the edu cation of their children so that there can be a continuum of learning from the classroom to the home. Parents should take the time to learn about their child’s disorder and talk with the teacher about the child’s educational goals. Parents can provide a home environment to help the child succeed. The third topic that was not presented in this paper is the use of medication to treat ADHD. The medical treatment of ADHD, although very important, goes beyond the scope of this paper. But it is important to realize that you can not consider the treatment of ADHD without at least considering the medical treatment component. â€Å"Treating ADHD requires a multimodal approach. For many children, medication, primarily psychostimulants, is an important part of treatment. Behavior management is also crucial. Without specialized interventions by teachers and parents, most children with ADHD find it very difficult to meet academic and behavior concerns.†(Loecher, 1999). Looking at the above quote, there is a great amount of responsibility placed on teachers to provide students with ADHD an appropriate learning environment. To do this, a teacher must be aware of the causes of ADHD, know the symptoms of ADHD, and be able to modify and design the classroom to allow a child with ADHD to have a chance to succeed in education and society. This is a challenge that all educators should look forward to and be ready to take head on. REFERENCES Carbone, E. (2001). Arranging the Classroom with an Eye (and Ear) to Students with ADHD. Teaching Exceptional Children, 34(2), 72-81. Loechler, K. (1999). Frequently Asked Questions About ADHD and the Answers from From the Internet. Teaching Exceptional Children, 31(6), 28-31. Wambold, Y.C. (1998). An ADHD Success Story: Strategies for Teachers and Students. Teaching Exceptional Children, 30(6), 8-13. Electronic References Causes of ADHD, at http://myadhd.com/causesofadhd.html Mayo Clinic Staff. (2005). Attention-deficit/hyperactivity disorder, at http://mayoclinic.com National Institutes of Health Consensus Development Conference Statement. (1998). Diagnosis and Treatment of Attention Deficit Hyperactivity Disorder, at http://consensus.nih.gov/cons Research Papers on Teaching Children with ADHD - Education Term PaperEffects of Television Violence on ChildrenPersonal Experience with Teen PregnancyRelationship between Media Coverage and Social andThe Relationship Between Delinquency and Drug UseStandardized TestingInfluences of Socio-Economic Status of Married MalesGenetic EngineeringResearch Process Part OnePETSTEL analysis of IndiaHip-Hop is Art

Sunday, October 20, 2019

Compound Tenses in English Grammar

Compound Tenses in English Grammar In English grammar, compound tense is a traditional term for a verb construction that uses more than one word to express a meaning related to time. A verb construction that uses only one word is called a simple tense.Compound tenses are made up of auxiliary verbs  (or helping verbs) combined with other verb forms. The perfect, past perfect (also known as pluperfect), progressive, and (in some cases) future are forms traditionally regarded as compound tenses in English. Examples and Observations Simple Tenses vs. Compound TensesThe distinction between simple and compound tenses corresponds to the distinction between affixes and words. A simple tense form of a verb is a single word, usually augmented by a suffix (less often a prefix). A compound tense form consists of several words, at least one of them an auxiliary. The work done by the affix in a simple tense form and the auxiliary in a compound tense form is broadly the same; it expresses some distinction in the general area of time. . . .What is potentially confusing here is the fact that English, like many European languages, uses the past participle (e.g. taken) both for the perfect (a compound tense) and for the passive voice. Note that the English passive is formed in a way quite parallel to the formation of compound tenses, i.e. with an auxiliary and a participle. But, of course, passive is not a tense.(James R. Hurford,  Grammar: A Students Guide. Cambridge University Press, 1994)[W]hen the father comes in from wo rk, he eats, and finally the mother herself eats alone or with the smaller children, who probably have already eaten what they wanted with the others.(Jack E. Weller,  Yesterdays People: Life in Contemporary Appalachia. University Press of Kentucky, 1995) I wash my face, dress and go downstairs where my wife  is feeding the  baby.(Julius Lester,  Lovesong: Becoming a Jew. Arcade, 2013)Anyone who  has read the  judgments of Lord Denning or Lord Atkin will know the importance of the way the facts are presented.(Alan Paterson,  Final Judgment: The Last Law Lords and the Supreme Court. Hart, 2013)Dana  had left the office  to tend to the children, and Keith puttered around the church, unable to do anything productive. He finally left.(John Grisham, The Confession. Doubleday, 2010). Perfect Aspect and Compound Tenses The perfect is a past tense that is marked by means of an auxiliary verb rather than by inflection, like the preterite. The auxiliary is have, which is followed by a past participle. Examples are given in [40] along with their non-perfect counterparts:[40i] a. She has been ill. [perfect]   b. She is ill [non-perfect][40ii] a. She had left town. [perfect]   b. She left town. [non-perfect][40iii] a. She is said to have spoken fluent Greek. [perfect] (b) She is said to speak fluent Greek. [non-perfect]In [ia] and [iia] the auxiliary have is itself inflected for primary tense, has being a present tense form, had a peterite. These constructions thus have compound tense: [ia] is a present perfect, [iia] is a preterite perfect. In [iiia] have is in the plain form, so this time there is no primary tense, no compound tense.(Rodney Huddleston and Geoffrey K. Pullum,  A Students Introduction to English Grammar. Cambridge University Press, 2005) Expressing the Future With Compound Tenses Past and present are the only English simple tenses, using one-word forms of the verb. Future is expressed in English as a compound tense, with two words, using the modal auxiliary will, e.g. will come; the corresponding past tense came is just one word.(James R. Hurford,  Grammar: A Students Guide. Cambridge University Press, 1994)  Bessie was baffled. How do these birds live? Where do they sleep at night? And how can they survive the rains, the cold, the snow? I will go home, Bessie decided. People will not leave me in the streets.(Isaac Bashevis Singer, The Key. The New Yorker, 1970)

Saturday, October 19, 2019

The obligations of the carrier under a Bill of Lading are to properly Essay

The obligations of the carrier under a Bill of Lading are to properly and carefully, load, handle, stow, carry, keep, care for and discharge the goods car - Essay Example has a number of purposes among which is the evidence of the contract of carriage, statement of condition of goods received and whether the goods received match the contract description, document of transfer without transfer of ownership rights (N unes, T. 2004). Obligations of the carrier under the Bill of Lading include proper and careful loading, keeping and stowing of the goods received alongside with proper discharge of the goods on the board. While, undoubtedly, consideration should be given to human input, the present technological development and long industry experience significantly lower the possibility of human mistake during the transportation process. Crude oil is widely used as a source of energy alongside with production of plastics and manufacturing. As an item of strategic importance, crude oil has for a long time been an object of various political confrontations. The issue is rooted in supply and prices on the commodity: transportation infrastructure emerged in an attempt to satisfy the rising demand for crude oil and products made out of it. Crude oil is transported from production sites to refineries by water and by land. About 62% of all crude oil is shipped by means of maritime transportation: barges and tankers, the remaining part is moved mainly by pipelines, trucks, or trains. Thus, consideration should be given to the two major means used in the industry: oil tankers and pipelines (Hopkins, T. D. 1992). Safety of the commodity during transportation process largely depends on technological aspects of the cargoes used. Oil tankers are classified in accordance with their size: while coastal tankers can carry only about 50,000 tons of dead weight, ULCC are Ultra Large Crude Carriers and can transport over 300,000 of deadweight tons. Increase in size of tankers and, consequently, increase in the amount of chemicals transferred requires special security systems to be installed inside the tank to guarantee protection from oil spill. The

Friday, October 18, 2019

Leaf Litter Decomposition Assignment Example | Topics and Well Written Essays - 750 words

Leaf Litter Decomposition - Assignment Example Moreover, the experiment expected the tree species not to harbour the different soil animals. The maple and European Buckthorn are initially wet. Eventually they become very wet implying that the tree species harbour the soil animals. On the other hand, the maple and the European Buckthorn are greener and in regular sizes but eventually they decompose. This implies that the tree species decomposed. 2. Discuss what factors, that you observed, that may contribute leaf decomposition. What factors may contribute but were not measured? What was the average (&standard deviation) mass lost for each species? Where did the mass loss go? The observed factors that contribute to decomposition are the soil moisture and the plant composition. Temperature is also a factor which contributes to decomposition but it was not considered in this experiment. The wood decay is associated with the decay of the roots. The roots are the sole suppliers of moisture and nutrients to the entire plant hence they impact on the development of roots. Thus, the decay rates of woods will be similar to that of the leaves since the leaves obtain moisture and nutrients from the woods; whenever the woods are affected, the leaves are equally affected. Logging of trees results to the release of significant amounts of carbon dioxide into the atmosphere. Thus, the rate of decomposition of the floor area is relatively lower than normal since the presence of lignin in the leaves lowers the decomposition rate. The concepts of this experiment fully relates with the concepts of a composting program such as the one found in the City of Toronto since everything revolves around composting. Thus, composting can be defined us the natural process or procedures which are meant to decompose the organic substances into a one rich soil which can be named as the compost. This experiment describes the concept such as

Should Overweight Employee Be Penalized Coursework

Should Overweight Employee Be Penalized - Coursework Example We live in a modern society that provides us with more than ample means of living a healthy lifestyle through the proper nutrition intake, diet, and exercise. However, most people fail to take advantage of these basic opportunities presented to them. The result is a weakened state of health for the individual. As such, the individual ends up requiring much more healthcare than his insurance program can provide. Added to this problem is the fact that the new health care laws of the United States has made it more difficult and expensive for the employers to keep their employees covered with ample medical insurance benefits. The continued rising cost of healthcare coverage has thus forced some employers to take the health matters of their employees in their own hands by forcing them to participate in a company mandated healthcare program or face severe penalties for non-participation. Their intention is clear, to keep their health care costs down, but at the expense of sticking their no ses in where it does not belong, in the private lives of their employees. Their participate or pay fines choice disrespects the freedom of an individual to choose how he lives his life and how he participates in various activities. It would appear that an increasing number of companies are opting for such health care rider coverage for their employees. As many as; â€Å"almost half (47%) of companies already use or plan to use financial penalties over the next three to five years on workers who don’t take part in health-improvement programs.†

Thursday, October 17, 2019

Privacy and Internet Policy Essay Example | Topics and Well Written Essays - 1000 words

Privacy and Internet Policy - Essay Example Identity theft is not a new happening. It has been around for ages now and have transformed from using the names of deceased people for voting or turning to crime that is against the social welfare. The surge of pre-approved credit cards, pre-approved loans and unsolicited credit card checks along with the ease of accessibility and reach of the Internet has made identity theft a crime that can fool anyone and lead to overwhelming financial costs for the victims (Stanley, 2008). James Moor (2009) observes that a policy vacuum exists regarding the usage of computer technology. The increased range of opportunities that computers provide also necessitates the development of more comprehensive policies to guide actions. Advancement in technology has given rise to greater vulnerabilities in the security of systems; this has been the case for websites too. Due to the chances of access by unauthorized agents, websites often develop web privacy policies. Internet policies can be used by a num ber of bodies ranging from companies and schools to web based sellers and vendors. Regardless of how dedicated or vaguely controlled the web servers, the level of risk that these bodies are exposed to and their adherence to an Internet privacy policy is not the same. If companies do not observe a concrete security system for the protection of information, then the gap between the intended level of security and identity theft protection system is widened and manifests itself when a security breach occurs. It needs to be emphasized that the range of attacks and risks to the system from outside sources is very diverse and complicated. Web-based attacks such as identity theft, common gateway interface code etc lead to drastic consequences internal intrusion, receipt or dissemination of a malicious code, decrease in the security fortressed by network security procedures and misrepresentation and authentication problems. Moreover if a system is exposed to high levels of internet identity theft, people would not trust the system anymore (Vacca, 2003). There are various measures that are employed to protect the web sources from intrusions and identity theft. According to Vacca (2003) one of this is the development and effective enforcement of an Internet policy which is meant to cover and develop management, usage and processes associated with configuration in the context of identity theft protection. Internet service providers should take into account the privacy legislation policy and should be able to not only understand it but also comply with it. Vacca argues that one of the best practices for online identity theft protection is openness, for which companies need to make identity theft policies and practices mandating the management of personal information in an open yet responsible manner. The website of the company should encompass an accurate and comprehensive identity theft policy. In particular, the privacy policy should coherently divest the responsibilitie s of organization as well as the information practices. The government places great emphasis on the protection of financial businesses, workplaces etc against identity theft. A privacy policy serves three main purposes. It tells the user about the information and security policies of the company. It gives the consumer information about the range of options that he has

Liberalists View of International Relations Term Paper

Liberalists View of International Relations - Term Paper Example Formal explanation and learning of international relations (IR) started in the 20th century. According to James Roservat (2007), â€Å"The idealistic view of human nature and the possibility of human progress propounded by liberalism are rooted in the writings of such Enlightenment philosophers as Immanuel Kant, John Locke, and Jean-Jacques Rousseau†.  These were the founders of democracy in America. There are many theories about international relations. James Roservat further states that â€Å"The Liberal perspective was dominant in many intellectual circles in the aftermath of World War I†. However, many changes occurred especially at the end of the cold war due to new hypothetical discoveries and the materialization of new challenges. These challenges included; the formation of politically aligned multi-states, strong nongovernmental organizations influencing decision making in foreign policy, the materialization of international terrorism, the emergence of global markets as well as the possibility of individuals to control global behavior. In the liberalism perspective on international relations, the state is seen as an entity of analysis which encompasses international laws, nongovernmental and international organizations which are considered to be important elements in global politics. Gilpin Robert (2001) states that â€Å"the liberalist theory is a political theory founded on the natural goodness of humans and the autonomy of the individual†. The theory favors public and opinionated autonomy, administrative by law with the approval of the people, and fortification from illogical power. Gilpin Robert further argues that â€Å"in international relations, liberalism covers a broad perspective ranging from Wilsonian Idealism through to contemporary neo-liberal theories and the democratic peace thesis†.

Wednesday, October 16, 2019

Reflection - 21st century skills Essay Example | Topics and Well Written Essays - 250 words

Reflection - 21st century skills - Essay Example Students are encouraged to learn by doing, which increases their global skills highly needed in the 21st century. The portal also focuses on leadership, and collaboration between teachers and students. However, teachers seem to be focusing more on the digital recording of the grades rather than on the core content of the subjects. The portal system is not appropriate for early year students, since they cannot use the digital technology properly. The teachers of early year students still need to come face-to-face with the parents to communicate effectively. Also, the system seems to be discouraging the traditional way of teaching subjects. Students will slowly forget the conventional classroom environment. Hence, besides promoting global skills, the core content also needs to be focused upon. Students must also learn how to communicate in person while being good at

Liberalists View of International Relations Term Paper

Liberalists View of International Relations - Term Paper Example Formal explanation and learning of international relations (IR) started in the 20th century. According to James Roservat (2007), â€Å"The idealistic view of human nature and the possibility of human progress propounded by liberalism are rooted in the writings of such Enlightenment philosophers as Immanuel Kant, John Locke, and Jean-Jacques Rousseau†.  These were the founders of democracy in America. There are many theories about international relations. James Roservat further states that â€Å"The Liberal perspective was dominant in many intellectual circles in the aftermath of World War I†. However, many changes occurred especially at the end of the cold war due to new hypothetical discoveries and the materialization of new challenges. These challenges included; the formation of politically aligned multi-states, strong nongovernmental organizations influencing decision making in foreign policy, the materialization of international terrorism, the emergence of global markets as well as the possibility of individuals to control global behavior. In the liberalism perspective on international relations, the state is seen as an entity of analysis which encompasses international laws, nongovernmental and international organizations which are considered to be important elements in global politics. Gilpin Robert (2001) states that â€Å"the liberalist theory is a political theory founded on the natural goodness of humans and the autonomy of the individual†. The theory favors public and opinionated autonomy, administrative by law with the approval of the people, and fortification from illogical power. Gilpin Robert further argues that â€Å"in international relations, liberalism covers a broad perspective ranging from Wilsonian Idealism through to contemporary neo-liberal theories and the democratic peace thesis†.

Tuesday, October 15, 2019

Image of the Native American Essay Example for Free

Image of the Native American Essay In this brief introduction, the image of Native Americans can perhaps be overly simplified that all Europeans treated them bad. That is not the case because many native people were friendly and wanted to share with their newfound friends. Somehow, the circumstances began to go wrong for some Europeans and natives. This essay will discuss three main points about the depiction of the natives and their relationship with the Europeans. A. Christopher Columbus story of dealings with the Native people in Hispaniola. B. Even Bradford discusses his first contact and the Indian’s aloofness. C. Additionally, the difference in the illustration of Native Americans compared to Columbus and Bradford. Unsurprisingly, Columbus made friends with some of the native tribes in Hispaniola, although many of his comrades resented his relationship with the native people. Those tribes did not show any antagonism or aggression towards the new arrivals in the beginning. Yet, the situation between the natives and the Europeans took a turn for the worst; the Europeans ordered them to relinquish all gold metal and to supply women from their tribes (Baym, 2008, p.24). As time passes, Columbus resurfaced in 1494 scrutinizing the untenable state of affairs of the natives forcefully submitting to an unruly and disagreeable group of settlers. This on-going problem with the Europeans brought no hope for the natives to establish a friendly and equal long lasting relationship. However, Columbus discussion of the problems in Hispaniola, were alike in various ways compared to Bradford’s account of the natives. Similarly, Bradford discussed their encounter with the Native American as fleeting in the beginning. Their search for other people like themselves proved unsuccessful because no other Europeans were in the surrounding area other than nearby Natives. Some Native people kept hiding or running away from Bradford and his party most likely having to do with earlier problems with infectious diseases (Baym2008, p. 64). As things began to progress for the Separates, some of their tools were stolen by the natives and was unable to retrieve them back until they met with a native that spoke a little English (baym, 2008, p. 68). This native was known as Samoset, who came directly into their place of dwelling and spoke have hearted English to communicate with the Pilgrims. Thereby, establishing an open relationship with the Natives, which brought a new beginning for â€Å"Thanksgiving† between the Pilgrims and native people through sharing and thanking God (Baym, 2008, p. 71). Nonetheless, the contrast was quite different in the â€Å"Contact and Conflict section† compared to Bradford and Columbus. Moreover, many Native Americans communicated and formed friendships with prominent leaders in the military. Military leaders such as Sir Jeffery Amherst and Henry Gladwin did not honor the same alliance the Natives had with the French because of their personal hatred (Baym, 2008, p. 207). However, this interpretation of the â€Å"Native American Contact and Conflict† (baym, 2008, p. 206) does differ from Columbus first contact and Bradford’s friendship with the natives. Despite the conflict with some of the high officials among the British military, the natives continued to remain friendly and neutral. Yet, the natives began conforming to the ways of the Europeans by reading and writing through Samson Aukom. As a result, he believed this would help his people to communicate effectively and have a closer relationship with God (Baym, 2008, p. 210). However, Pontiac dreamed his people had left their old ways and their French brothering for the new way of the British people. In Conclusion, the deceit and deception against the natives were not among all Europeans. A select few did not want the Native American people to live on the land the British wanted for the crown. Even the mutinous Spaniards tried forcing natives to submit, as slaves did not hold well with Columbus. Additionally, Bradford’s account reveal many times the native people could have been attacked, but later they were openly embraced to form long lasting friendships. Based on Nina baym’s account of the natives, not all native people were mistreated, but other Spaniards did mistreat some of the people. It was a time of curiosity and new territory for both sides, although they worked very hard to maintain their bond. Nonetheless, the relationship between the Native Americans has been rectified, although many died during a time of exploring and creating new foundations on both sides.

Monday, October 14, 2019

Dark Tourism And Ethical Issues Tourism Essay

Dark Tourism And Ethical Issues Tourism Essay Abstract The research project aimed to do a critical analysis of the ethical issues of dark tourism. Six research objectives were set out to help achieve this aim. In the process of gathering relevant information on this topic, an analysis of dark tourism throughout the years will be done, followed by the commitment of different authors. Furthermore, by examine in depth both the consumers and providers point of views to further understand the ethical dilemma of dark tourism, the research project will highlight the main problems that occur within this sector of tourism. Secondary research has been chosen as a main research method. A wide variety of literature was gathered on the concept of culture and tourism by using a snowball sampling of secondary literature. This type of sampling was carried out by using the authors list of references to highlight other articles that might be of relevance. The findings indicated that, it may be possible to state that ethical issues will always continue to exist around dark tourism, as long dark tourism itself exists too. Recommendation has been given on the importance of the consideration of the ethicalities of dark tourism. As conclusion indicated, ethical issues cannot be understated, and both consumers and providers may want to work together, if in the future, we still would like to know about our history through the form of tourism instead through textbooks and education. Introduction Hall (1998) states that tourism is the worlds largest industry, and it is expected to continue to grow, develop and maintain. The tourist industry is a major economic, environmental and socio-cultural force, and it becomes a lifestyle for millions of people on our planet. Its beneficial effect on the development of political, social, cultural relations and international relations on a global scale has become an obvious fact to all countries around the world. (Meethan, 2001) Over the last half century it is seeing that tourists have long been attracted to places or events associated in one way or another with death, disaster and suffering. (Stone, 2009a) All these sites and many more which are similar, are what are called sites for dark tourism according to main theorists John Lennon and Malcolm Foley, also known as Thanatourism (Seaton, 1996 cited in Ryan et al, 2005) and Black Spots (Rojek, 1997). This form of tourism is what Seaton (1999) defines is about travelling to sites associated with death, suffering and other tragic events that have become significant tourist destinations. In fact, the act of touristic travel to places of death, war, genocide, assassination and disasters is becoming the most developing branch of tourism during the past years and cultural activity within contemporary society. At the same time, there is evidence of a greater willingness or desire on the part of tourists to visit dark attractions and the sites of dark events. (Stone, 2009a) For example, thousands of tourists come to Pont de lAlma Road Tunnel in Paris, to lay flowers and light candles in unofficial memorial of Princess Diana of Wales, where she died in car accident. With the growing popularity of this kind of tourism within the dark tourism market (Tunbridge and Ashworth, 1996), the ethical issues surrounding it will need to be enquired. Ethics plays a role in nearly every business related decision. (Hartman, 1998) With the consumers and providers participating in this growth of phenomenon of dark tourism, as they potentially contrasting ethical perspectives towards dark tourism may be different. Whereas a providers means of preserving history is to charge people to maintain its upkeep, the consumers may see it as money making scheme in the expense of the deceased lives of the site. Whereas the providers means of letting people know its history is through interpretation of vulgar images, may seem unethically unpleasant for consumers. The dissertation will focus on the question of ethics in dark tourism, thereby advancing knowledge and understanding of dark tourism itself. Aim The aim of the project is a critical analysis of the ethical issue of dark tourism. Whether the death could be sold and consumed throw dark attractions and national tragedies. Objectives To define Dark Tourism To define the concept of ethics To examine in depth both the consumers and providers point of views to further understand the ethical dilemma of dark tourism. To use Stone (2006)s shades of darkness spectrum as a tool for measuring different levels of dark tourism sites To establish a conceptual ethical framework for the study of selling provocative narratives of national tragedy in heritage situations To suggest recommendations on the ethical issues Rationale Despite the long history of dark tourism and evidence of travel to sites associated with death, the academic attention on this phenomenon has recently appeared. As a result, a number of fundamental questions with respect to dark tourism remain unanswered. (Stone, 2009a) This topic has been chosen due to a lack of research carried out on ethical and moral issues of dark tourism. The project can be useful to gain more knowledge into the topic of dark tourism. The study of dark tourism is important for a number of reasons. It can be used for educational purposes of wider social interest or for means of enjoyment. In relation to this Stone.R (2009, p.7) states: à ¢Ã¢â€š ¬Ã‚ ¦ Dark tourism provides the opportunity for tourists to experience playful houses of horror, discover places of pilgrimage such as the graves or death sites of famous people or visit sites of major disasters or atrocities Nevertheless, all these attractions require a deep understanding within cultural, social, historical and political context, effective interpretation and development. Otherwise the nature of dark tourism, in particular, the debates and conflicts it represent, will point to a number of issues that demand examination and understanding, such as ethics and morality. Whether people visit these sites for remembrance, education or entertainment purposes, there will be one dilemma relating to many dark attractions: if it is ethical and moral to sell, promote or offer death for touristic consumption. For example, millions of tourists stop alongside with those, who mourning the loss of loved ones, to see where the World Trade Center once stood in New York. In order to research the dilemma of the ethics and morality of dark tourism, it is necessary to realise that dark tourism is fascinating, emotive and provocative and it is important to explore many features of dark tourism, which may be perceived unethical by some people. Stone (2009a) states: à ¢Ã¢â€š ¬Ã‚ ¦Consequently, the ethics of dark tourism  are perhaps part of the broader research agenda. Ultimately, from this research a fuller understanding of dark tourism  shall be made, and thus knowledge of the phenomenon advanced. Naturally, anyone researching dark tourism should consider the ethics of their research, in particular how data is both gathered and presented Furthermore a case study will be conducted in order to have a closer look at the situation and the major problems occurring regarding ethical issues of dark tourism. In addition, the researcher is originally interested in dark tourism phenomenon. For the past 2 years the researcher has visited the numerous places of death and disaster such as Chernobyl, and has noticed that it is becoming increasingly popular. The researcher also found out that, for 2 years there are numerous quantity of debates on particular dilemma, which will be analysed in the dissertation. It is hoped that this study will have an impact on understanding dark tourism. In addition, it is also hoped that this project will draw more attention to ethical issues and provide a new point of view for those, who does not accept truth and reality of dark sites or attractions. Literature Review Roberts (2004, p.73) defines a literature review as, à ¢Ã¢â€š ¬Ã‚ ¦locating, analysing, synthesising and interpreting previous researchà ¢Ã¢â€š ¬Ã‚ ¦ This section will be used to establish theoretical framework, identify models and studies and define key terminology in relation to dark tourism and ethics. All research that has been conducted will be presented within this section. An in-depth review of the literature has been done in order to gather relevant information on dark tourism itself and ethical issues throughout the years. The literature matrix illustrates the main areas which are perceived to be the most important in relation to the topic of dark tourism ethical issues. By creating a literature review matrix, it would help the researcher contrast and compare the authors work easily. As a result by carrying out a detailed review of the literature it could possibly identify important questions, key issues and noticeable gaps within the current knowledge on the topic. Dark Tourism: Definitions Only in recent years that it has been together referred to as dark tourism, travel to places associated with death, disaster and destruction has occurred as long as people have been able to travel. In many cases there is no clear definition of this tourism niche. Although, the term dark tourism was firstly created by Foley and Lennon (1996a,b). For Foley and Lennon, the term dark tourism relates primarily to the presentation and consumption (by visitors) of real and commodi ¬Ã‚ ed death and disaster sites (1996a:198); a broad de ¬Ã‚ nition later re ¬Ã‚ ned by their assertion that dark tourism is an intimation of post-modernity (Lennon and Foley 2000:11). At the same time, another terminology has been applied to the phenomenon. Seaton (1996) refers to death-related tourist activity as thanatourism, while other labels include morbid tourism (Blom, 2000), Rojek (1993) offered a Black Spot tourism definition, grief tourism and milking the macabre (Dann, 1994:61). Nevertheless, there is a factor, which is common to all these terms of tourism. It is all about association, in one form or another, between a tourism site, attraction or experience and death, disaster of suffering. As a result, definitions of dark tourism focus on connection between tourism and death. Tarlow (2005:48), for example, gives identification for dark tourism as visitations to places where tragedies or historically noteworthy death has occurred and that continue to impact our lives, a definition that aligns dark tourism somewhat barely to certain sites and hints at particular motives. Miles (2002) states that, however it excludes many dark sited and attractions related to, while not necessarily the site of, death and disaster. Therefore, for the purposes of this research project, the author will define dark tourism, according to Stone (2006, a) simply and generally as the act of travel to sites associated with death, suffering and the seemingly macabre. Ethics Stone (2006,a) states that ethics and the morality of selling provocative and sensitive narrative through heritage to the touring and visiting community is more established and documented problem of dark tourism. Ethics have been conceptualised as a set of rules and principles, concerning rightful conduct based on our most deeply held values, the things we most cherish and the things we most despise.(Lieberman, 2000). The term can also refer to the systematic study of way of thinking about how we ought to behave and finding a rational way of how we ought to live. Ethics and morality suggest a set of duties that require subordination of natural desires in order to obey the moral law (Singer, 1994). The 20th century saw philosophers approaching the problem of the origin of ethics as something unreachable. Among the most publicised conceptual thinkers in the field of ethics have been (Singer, 1994:18): Thrasymachus ( 4th century) and the thesis that ethics are imposed on the weak by the strong; Socrates (4th century) and the thesis that the ruler is not concerned with his own interests, but with that of the subject; Hobbes (17th century) and his statement that ethics give the ruler a right to to command and to be complied; Nietzsche (19th century) who proposed morality is the creation of the herd'(led more fear than hope) Ethics and Moralisation in Tourism There are numerous schools of thoughts and opinions, and literature on the board subject of ethics is prevalent. What is more significant in the situation of the dark tourism is suggesting a conceptual ethical framework for the analysis of providing and selling provocative narratives of nationwide tragedy in heritage settings. This study is concerned with two main and obvious parts of ethics and morality as follows: Business ethics and the extent to which businesses within the heritage industry which communicate a dark narrative to the visiting public consider their practices to be ethical( Stone, 2006,a) Personal morality and the extent to which these often provocative narratives are received and are passable according to the moral principles of visitors from widely varying cultural backgrounds. ( Stone, 2006,a) According to Stone (2006,a) the term business ethics has been described at the extreme as an oxymoron in the corporate world since some argue that morality, as Butcher ( 2003) states, is intrinsically absent in capitalist entrepreneurial ventures. At the moment the issue of business ethics is a conspicuous subject attracting attention from a number of communities of interest, such as consumers, pressure groups and the media (Strange and Kempa, 2003). According to Crane Matten (2007), corporate social responsibility is a dominant strand of the converse of business ethics and has been contrived to refer to the implicit process of communicating a legal and institutional corporate framework within which a duty of care (to people, the environment and employees among others) is implied. For dark tourism, it has not been fully elaborated upon in this context since there present different problems in communicating the social responsibility of these types of heritage sites, such as: The esotericism in the scope of what is morally acceptable to various communities of interest: is there a hierarchical order of care or responsibility that must be demonstrated? Stone (2006, a) provides example of Auschwitz as the most responsible way to admit visitors in compliance with the moral and ethical codes of the relatives of prisoners and victims, but also with the moral principles of other visitor types such as Polish visitors, young visitors. Conflicts of interest, according to Ryan et al (2005), are common in heritage but more morally charged where the narrative is provocative and contested Is it ethical to adopt another national tragedy and inculcate it with new national discourse? Cole (1999a) provides this in a context of the United States Holocaust memorial Museum which he disputes Americanises European Jewish tragedy, repacking Holocaust for American mass consumption in theatre, tourism and heritage. In general, these discourses of corporate social responsibility are present in language of many operations thus far defined as being in the dark tourism business Stone (2006a) states, that traditionally, tourism ethics are discussed in the context of tourism as a major economic engine that can wreak havoc on the environment and can negatively temper the influence host communities in destinations imagined as culturally sensitive Cheong and Miller (2000) discuss tourism ethics in terms of normalising what is acceptable or not acceptable, and an inspecting gaze influenced by the manipulation of imagery in tourism marketing. Tourism activity offers a rare, observable form of ethical behaviour. Tourists vote with their feet and demonstrate in visiting dark heritage sites that these are morally acceptable spaces to occupy. Ethical discourses linked to the production and consumption of contested heritage sites are shaped and maintained by many voices Stone (2006a). The issue of remembering tragedy and oppression in heritage sites and to whom memory is entrusted, is at the centre of academic debate surrounding truth and appropriate narratives broadcast by dark tourism sites. Summary of the literature review Issues in literature review has been addressed which stress the importance of the different definitions to cultural tourism suggested by different authors. The results of this literature review have enabled the author to complete the first objective of the study by demonstrating an understanding of the ethical issues of dark tourism, what dark tourism itself is and what ethical framework is. Using a wide range of modern academic perspectives has helped to illustrate meaning of dark tourism ethics academic perspective, which can be used in the following chapters in reviewing the main findings of the study undertaken. The matrix figure provides a summary of the main points generated by each academic paper and compares and contrasts the various authors views. The matrix figure illustrates the context of cultural tourism referred to in academic papers and books utilized in the literature review. It demonstrates that the opinions of the different authors are both different and similar. Methodology This section of dissertation is going to study the different research methods used within this project. In order to make this research project successful, it is important that appropriate research methods or techniques have to be chosen. The purpose of a methodology is to demonstrate, explain and justify the research methods used in this dissertation. According to Krippendorff (2004) the purpose of a methodology is to help the researcher effectively plan and examine the logic, composition and protocols of the research methods that have been used in research project. The researcher will present a summary of the sources of information gathered; a description of the procedure used to obtain information and the various research methods will be discussed. Furthermore, by completing the methodology it will demonstrate how a systematic investigation was applied into the topic of dark tourism. Choice of Research Design Secondary Data Sharp et al. (2002, p139) define two categories of data which are: primary data that the researcher collects through observations, interviews, questionnaires and etc.; and secondary data that have been collected by other previous researchers. As the author of this dissertation has already mentioned before, in order to perform this research project in successful way, two categories of data and different research methods should be investigated. This research project will be primarily based on secondary research because the primary research is not needed as all the information is already available through secondary research sources, such as books, journals and newspapers. What is more, in order to achieve the aim that has to be investigated, the best method of research would be secondary research. To enhance the existing but very little evidence of the posed topic, secondary research was gathered. Ghosh and Chopra (2003, p.33) define the term secondary research as: data which are already in existence and collected by others, not by the investigator and are available in published and unpublished forms Secondary research was chosen as the quickest and the easiest way to access and is the most cost effective approach to this research project as well. Veal (2006) confirms this by stating that secondary data often provides researchers with rapid answers to some questions at less cost than it would to undergo primary research. Furthermore, if there is enough secondary research to base the study on then it would be a waste of resources to collect new information for the same purposes (Veal, 2006).What is more, secondary research seemed more relevant than primary research. This was because there was wide variety of literature on the subject of dark tourism and ethical issues, sourced from University College Birmingham library, with many books containing relevant information, which will be discussed later. Primary Data The Oxford English Dictionary (2002) defines primary research which is collected for a specific and immediate research need There are many different ways in which to carry out primary research. In order of this research topic, the author found that many of the theories couldnt be backed up with primary data and with a suitable sample. For the purpose of this research project, primary research could be used to gather relevant data and access a large population of students at University College Birmingham and other universities situated in Birmingham. One of the core methods of carrying out primary research is through questionnaires. Mainly, there are two forms of questionnaires: open ended and closed ended. Open ended questionnaires are likely to have unlimited answers to a set of alternatives and likely to receive long answers. However, the difficulty is that they are difficult to analyse and as they seem to hand the baton of control over to the other person. Closed ended questions impose a direct risk to the validity of findings and can be answered with either a single word or a short phrase. Another form of primary research, which was considered were interviews. The Oxford English Dictionary (2002) defines interview as formal discussion between two parties in which information is exchanged. It is possible to say, that it is all about asking questions and receiving the answers. Therefore in this research project, due to difficulties in collecting the required data and access a large population for testing along the facilities required to carry out, a primary research would not be useful in gathering relevant data and the researcher will benefit further from analysing secondary data from literature. Obtaining Research The majority of secondary research for this dissertation was gathered from books, academically reviewed journals, on-line factual reports, newspapers and the internet. All this sources can justify the point of view of an author and provide relevant information about the research project. The most easily accessible secondary research method that the author of dissertation found was the usage text books. Text books were primarily used to gain background knowledge and obtain a wider understanding of specific topics. The advantage of using books is because it gives a clear understanding and academic information. As it was already mentioned before, this method was the easiest, because the researcher could get them not just from the University College Birmingham library, but also to the online library supplied by the University and other on-line organisations such as Amazon, EBay and Google. Key words had to be entered to find appropriate books from the on-line organisations and the library catalogue, the following key words were entered, dark tourism, dark tourism ethics, dark tourism and morality. There were some books which contained many different theories from the past to the present day. The researched decided that the most relevant authors for this research project were John Lennon and Malcolm Foley (2000) and Richard Sharpley and Phillip R.Stone (2009,a). Books for the methodology were found by entering the key words; research methods and methodology. The journals are preferred because they are accurate and provide up to date data, they are also more relevant to the topic as the dissertation is concentrated on the topic of consumers and providers point of views of dark tourism. The journals were accessed through academic search engines like Athens for example and journal databases such as ScienceDirect, Emerald Management Xtra. But unfortunately, these databases were not useful as they did not give any information on particular question, except ScienceDirect. Journals relating to the research topic were accessed with comfort as the researcher can type in key words and the database will present pages of journals that are associated with the key words. The key words the researcher typed in to each journal database were Dark tourism, ethical issues of dark tourism, ethics and morality, Dark tourism forum. To get more information, the researcher travelled to universities to view their journals however access to relevant information, w ere not as successful as it was to find them via the internet. On-line factual reports were used to obtain raw facts and figures; some of these reports include Mintel. Similarly to accessing the journals, key words were entered in order to retrieve the data, the key words that were entered were Dark tourism ethics, Dark tourism. Moreover, on-line articles were read in order to gain a wider perspective of the posed subject area. The usage of newspaper and internet will also be included in order to provide a variety of information and because they are easy of access. Newspapers are useful because they are up to date, however the information can be too subjective, and as for this particular topic of dark tourism, the researcher found newspapers not really useful, because of the lack of information on dark tourism. Internet was useful source of information; however the reader need to check if the source is reliable and information is updated. Websites are easy to access and easy to research information on and are also updated regularly. This variety of sources gives a better understanding of the subject. Construction of Design Out of all the research that has been taken, text books and academic journals were the most reliable and valid to use to back up any point. This is due to the fact that dark tourism is comparatively new phenomenon in tourism industry, books and academic journals are often published frequently throughout the year so the information that is provided is up to date. Furthermore, academic journals and text books are intensely reviewed by academic professionals before publication to ensure its validity. The author of dissertation aimed to gather resources that were only published after the year 1999 as this is relatively recent; however certain books have been used from a much earlier date due to their relevance to the research question. However, journals or books dated in the 80s or 90s will not consider as outdated. The selection of secondary data gathered has been published in a variety of places; it was thought that as the topic in question is ethical issue of dark tourism, then perhaps research published in a variety of countries would be useful to get a wide range of views from across the globe. Advantages and Disadvantages of Research Methods Although secondary research was the ideal research method to use for this research project, it does hold some disadvantages. There is always the risk that the author could include their own opinions, so they can strongly sway towards one point and books can be not updated on a regular basis. Also, with academic journals, there are many accurate topics and findings, however a fee is charged for many of them, some of which are only available to a certain group of people making them hard or even impossible to access, this could put a strain on the researchers findings. As for Mintel, some of reports were helpful, but not published yet for audience. Furthermore, Ghosh and Chopra (2003) mention that although it is more cost effective and less time consuming, the secondary research may not be as accurate as the researcher had hoped. Besides this, secondary research still remained ideal for the dissertation as the quality of data obtained can be better than the quality of primary research, as information gained through secondary sources could have been obtained using better and more advanced resources. Moreover, because of the lack of time and financial situation, secondary research was primarily used as being cost effective and less time consuming, it is also easy to access as it does not require any additional resources. Primary research was considered due to the fact that it is useful to gather relevant data and access a large population of students tailored to the researchers needs. However, it was rejected due to the lack of experience, funds and resources which could give a limit to the quality of the data gathered and as a result, being unsuccessful (Kumar, 2005). The researcher does not have any experience in carrying out primary research so in order to make the research project successful, it would be inappropriate for primary research to be undergone for this dissertation, and it would make more sense for the researcher to analyse findings from previous and more experienced researchers and academic professionals. Plan for Data Analysis As there is a variety of secondary information gathered, it is necessary for the researcher to analyse them carefully. This variety of sources gives a better understanding of the subject. Once it has all been collected, it will be thoroughly analysed to determine its validity and reliability, and those that are not pertinent will be rejected from being used for the dissertation. It is important that validity is measured carefully as Kirk and Miller (1986, p.71) mentions that perfect validity entails perfect reliability. In order to evaluate the collected research, the researcher will read over it and make their own judgments based on a number of factors surrounding it for example, the sources in which the information was collected from and the method in which the sources were collected. When applying the frame work, the researcher will use it to assess different aspects of the dark tourism ethics to conclude by providing final results to the aim. Summary This methodology has evaluated and justified the choice of research design for this dissertation. As secondary research is being used, the researcher has analysed this type of research by describing the advantages and disadvantages of it. After the collected research has been evaluated, the findings will be analysed and discussed in the following section. Analysis and Evaluation This section is essential as the researcher will be analysing and evaluating the findings of the research project. The main aspects of the results which were found in the data discussed in the literature review will be approached carefully in order to weigh up the arguments effectively. Dark tourism and ethical issues Among the more established dilemmas of dark tourism is ethics and morality. Dark tourism has often raised ethical debates and discussions about the ways in which leisure time and pleasure are mixed with tragedy (Kempa and Strange, 2003), as many people think some sites of dark tourism are too sensitive to present it for the world to see. In addition, management of dark tourism attraction is a sensitive issue which is difficult to undertake, and Tunbridge and Ashworth (1996) observed the misuse and abuse of sacred values for market benefit and entertainment purposes are more likely to occur at atrocity site than at other heritage sites. Moreover, as Stone (2009,a) states, the rights of those whose death is commoditised or commercialised through dark tourism represent an important ethical and moral dimension, which deserves depth consideration. However, although this may be the case, it actually varies depending on the sh