Tuesday, December 24, 2019

Why Risk It With The High Possibilities Of Life...

You lived a middle-class life for a good portion of your time, but now there’s no such thing. There is upper and lower-class, and you won’t allow your family to suffer in the latter part of the spectrum. This is you paying your family back after all they’ve done for you. It took much convincing to get them to allow you to take part in this. You’re a fifteen year old girl, after all. You have so much life ahead of you and so many more opportunities to pay off your debt. Why risk it with the high possibilities of life threatening results? Because. That’s all you have to say. You could go deeper, but you’re too close to the room to be worrying. You don’t want to turn back. The name tag around your neck reads â€Å"LAB RAT 005†. Fifth of many more to come. And they actually call you all lab rats. That’s a first as far as you’ve seen within the facility. As the youngest one yet - because no parent is willing to suffer the risk of death - you are at a higher risk of death. You will trust the previous four who took part in the experiment, who woke up with temporary amnesia, which is inevitable, given no-one can leave knowing what happened in the alternate universe, whether it be fictional or otherwise. â€Å"You can turn back now,† Doctor Davis says. He’s the one who figured out how to send others to different timelines. He’ll be the one to connect your heart and brain to someone else s, so you won’t perish when he injects the drug. You hate needles, but it’s necessary. You shakeShow MoreRelatedChildhood Vaccinations Essay1450 Words   |  6 Pagesshould not be any reason to risk the health of any child. Vaccinating our children not only ensures their safety but also that of their future to come. The first major concern parents have when it comes to childhood vaccinations is that of the health and safety of their children. Some parents believe that vaccines were developed to help the spread against dangerous transmittable diseases. Other parents are under the impression that vaccines themselves present high risk factors for their childrenRead MoreThe Psychological Cost Of Children During The American Civil War Essay719 Words   |  3 Pagesconsistence in failing to fire their weapons; but why is this important?   The weapons had the proficiency to kill, but the soldier holding the weapon did not. All the documentation of soldier’s inability to fire their weapon indicates that there is a psychological power greater than military training (Gorssman et. al., 1995). This force acts as a blockade, preventing man from standing before man, and engaging in the conscious act of taking the life of a person. Even when faced with the decision toRead MoreThe Risks of Vaccin ating Children853 Words   |  4 Pagesvaccinations, and deciding that it isnt worth the risk. The public is becoming increasingly aware of the potential for vaccination to cause reactions that range from swelling and pain at the injection site to life threatening anaphylactic shock, to brain and immune system injuries resulting in lifelong disabilities. Since the illnesses that vaccines combat are no longer major killers in the United States, far greater attention is paid instead to the risks that immunizations present. (Calandrillo, 2004Read MoreUsing Ivf ( Vitro Fertilisation )1503 Words   |  7 Pagesinheriting the disease are considered to carry out this process. IVF is a procedure where the egg is fertilised by sperm outside the body. In-Vitro translates to â€Å"In Glass† hence why the babies are called test tube babies. In order to be eligible for IVF all contenders must attempt to conceive a child for a year before making an appointment. They are then transferred onto a waiting list which can take as long as 1 and a half yearsRead MoreDr. Archbishop Desmond Tutu Essay1635 Words   |  7 Pagesâ€Å"Despite all the ghastliness in the world, human beings are made for goodness, the ones that held in high regard are not militarily powerful nor economically prosperous. They have a commitment to try and make the world a better place† (Desmond Tutu,15)- Archbishop Desmond Tutu. Strong words of hope and faith in humanity come from a man who is regarded in the same heights as Ghandi. Archbishop Desmond Tutu is a survivor of the deadly disease known as, Tuberculosis. According to the CDC, â€Å"One thirdRead MoreThe Disease Of Alzh eimer s Disease1421 Words   |  6 Pagesmemory, reasoning, and other cognitive functions as a result of disease, injury, or substance abuse.). AC accounts for 60 to 80 percent of dementia cases.(alz.org) Throughout my sources I have seen that the common age for AC to set in is between 60-75. However, up to 5 percent of people with the disease have early onset Alzheimer s (also known as younger-onset), which often appears when someone is in their 40s or 50s.(alz.org) One of the greatest risk factors is something we can’t stop, increase of ageRead More Diabetes Essay997 Words   |  4 Pagesinsulin dependent diabetes mellitus, usually occurs in people less than thirty years of age, but it also may appear at any age. Diabetes is a very serious disease with many life threatening consequences, but if it is taken care of properly, diabetics can live a normal life. Diabetes is a disease that causes an abnormally high level of sugar, or glucose, to build up in the blood. Glucose comes from food we consume and also from our liver and muscles. Blood delivers glucose to all the cells inRead MoreMoore’s law dictates that approximately every two years, hardware computer processing power and1300 Words   |  6 Pagescapacity doubles. Through the ordinary lens, this exponential trend might be viewed as a blessing, endlessly increasing the capabilities of technology and science. However, perhaps when examined in a social context, such a trend unveils perverse possibilities. Every two years, the potential for government surveillance increases by an order of magnitude. And although the Bankston-Soltani principle described in Snowden’s TED talk, â€Å"Here’s How We Take Back the Internet†, asserts that every time thisRead MoreThe Is A Possible Future Effect Or Result? Essay1694 Words   |  7 Pagesis a possible future effect or result. It may have a positive or negative outcome and is something that is suggested without being said directly. A biological implication is one that relates to biological processes (a recognized series of events or molecular functions ) The goal of PGD is to produce a viable and healthy child free of any severe hereditary diseases. â€Å"the issue here is whether this goal should include accepting embryos with a ‘carrier’ test result.† This means the embryos may beRead MoreThe Roe V. Wade1684 Words   |  7 PagesTo begin, in the years before the early 1970s woman all over the country struggled with the inability to get an abortion. During these years abortion was criminalized with the exception of the preservation of a woman’s health in a potentially life threatening situation or fetal anomaly. Other exceptions to the outlaw of abortion rights include the instances of incest or rape. Based on these rules, women felt inclined to lie about the circumstances of their pregnancies in order to be given the right

Monday, December 16, 2019

Marital Rape Free Essays

Marital Rape When she says NO, it’s rape†¦ even when she’s married to him Every woman has the right to control her own body and to make decisions about having sex, using birth control, becoming pregnant and having children. She does not lose these rights if she marries. These quotes were taken from Stopping Sexual Assault in Marriage published by the Center for Constitutional Rights Much of the attention that has been given to marital rape has emerged from the legal community. We will write a custom essay sample on Marital Rape or any similar topic only for you Order Now This has occurred because throughout the history of most societies, it has been acceptable for men to force their wives to have sex against their will. The traditional definition of rape in the United States most commonly was, sexual intercourse with a female not his wife without her consent Many have argued, this provided husbands with an exemption from prosecution for raping their wives-a license to rape. The foundation of this exemption can be traced back to statements made by Sir Matthew Hale, Chief Justice in 17th century England. Hale wrote, The husband cannot be guilty of a rape committed by himself upon his lawful wife, for by their mutual matrimonial consent and contract, the wife hath given herself in kind unto the husband which she cannot retract. This established the notion that once married, a woman does not have the right to refuse sex with her husband. This rationale remained largely unchallenged until the 1970’s when some members of the women’s movement argued for the elimination of the spousal exemption because it failed to provide equal protection from rape to all women Approximately 10-14% of married women are raped by their husbands in the United States. In the city of Charlotte, the statistics are rising every year. The following statistics reflect ONLY those spousal rapes that were reported. Keep in mind that most married women do not know about the spousal rape laws. In 1997 the statistics were 1%, 1998, 1. 1% and in 1999 1. 8%. Historically, most rape statutes red that rape was forced sexual intercourse with a woman not your wife, thus granting husbands a license to rape. On July 5, 1993, marital rape became a crime in all 50 states, under at least one section of the sexual offense codes. The definition of sexual assault of a spouse as defined in the North Carolina Code is as follows: A person is guilty of sexual assault of a spouse when that person engages in sexual intercourse or sexual intrusion with his or her spouse without the consent of the spouse and: 1. The lack of consent results from forcible compulsion; or 2. The offender afflicts serious bodily injury upon his or her spouse; or 3. The offender uses a deadly weapon in the commission of the offense. Any person who violates the above provisions shall be guilty of a felony, and, upon conviction, shall be: 1.  Imprisoned in the penitentiary between 2 and 10 years; or 2. Imprisoned in the penitentiary between 2 and 10 years and fined no more than $5,000 In 17 states and the District of Columbia, there are no exemptions from rape prosecution granted to husbands. However, in 33 states, there are still some exemptions given to husbands from rape prosecution. When his wife is most vulnerable (such as, she is mentally or physically impaired, unconscious, asleep, etc. ) and is unable to consent, a husband is exempt from prosecution in many of these 33 states. Women who are raped by their husbands are likely to be raped many times. They experience not only vaginal rape, but also oral and anal rape. Researchers generally categorize marital rape into three types: Force-only rape: This is when husbands uses only the amount of force necessary to coerce their wives. Battering rape: Husbands rape and batter their wives. The battering may happen concurrently or before or after the sexual assault. Sadistic /obsessive rape: Husbands use torture or perverse sexual acts. Pornography is often involved. Women are at particularly high risk for being raped by their partners under the following circumstances: Women married to domineering men who view them as property Women who are in physically violent relationships Women who are pregnant Women who are ill or recovering from surgery Women who are separated or divorced It is a myth that marital rape is less serious than other forms of sexual violence. There are many physical and emotional consequences that may accompany marital rape. Physical effects include injuries to the vaginal and anal areas, lasserations, soreness, bruising, torn muscles, fatigue, and vomiting. Women who are battered and raped frequently suffer from broken bones, black eyes, bloody noses and knife wounds. Gy ne co logical effects include vaginal stretching, miscarriages, stillbirths, bladder infections, sexually transmitted diseases, and infertility. Short-term psychological effects include Post Traumatic Shock Syndrome, anxiety, shock, intense fear, depression and thoughts of suicide. Long-term psychological effects include disordered sleeping, disordered eating, depression, intimacy problems, negative self-images, and sexual dysfunction. Research indicates a lack of responsiveness to marital rape survivors on behalf of service providers – particularly police officers, religious leaders, rape crisis counselors, and battered women’s advocates. There is a need for those who come into contact with marital rape survivors to comprehensively address this problem and provide resources, information and support to survivors. In conclusion, despite the fact that marital rape has not been criminalized for long in the United States, it is clearly a serious form of violence against women and worthy of public attention. Marital rape may be even more traumatic than rape by a stranger because a wife lives with her assailant and she may live in constant terror of another assault whether she is awake or asleep. Given the serious effects, there is clearly a need for those who come into contact with marital rape survivors to provide assistance and challenge the prevailing myth that rape by one’s spouse is inconsequential. Rape crisis counselors and advocates for battered women are in particularly important leadership positions to address the problem of marital rape in society and to assist survivors of this form of violence. More research on the effects of marital rape, particularly for pregnant women and the children who witness the sexual violence is necessary. Additionally, researchers should investigate the motivations for why men rape their wives and address prevention and treatment strategies. Women who need assistance should contact their local rape crisis center or battered women’s shelter. Be forewarned that many rape crisis center and shelters may not have services specifically designed for survivors of wife rape. How to cite Marital Rape, Essay examples

Sunday, December 8, 2019

Strategic Information System Business Advantage Model

Question: Describe about the Strategic Information System for Business Advantage Model. Answer: Conceptual framework A strategic information system model that could be useful for any organization is Porters competitive advantage model. It is important for any organization endeavoring to employ a strategic information system as a development strategy to ensure that it understands the different models in existence. Having this knowledge will be instrumental when it comes to making a choice of a model (Edney and Symons, 2014). Michael Porter is the developer of this model where he seeks to answer two questions. Firstly, what is the level of structure attractiveness of the organization and secondly, what market share does an organization control? To answer this question, it is best to undertake analysis where the best analytical tool is Michael Porters industry analysis which endeavors to discover where the power of the industry lies. The purpose of seeking to understand where this power lies is to open up the possibilities for the roles that the information systems will play in the model. There are five basic functions of the industrial analysis of the competitive advantage of an organization. The threat of new entrants involves the assessment of the amount of difficulty that new entrants will face when trying to join the industry. The threat of substitute services or products regards the ease with which the consumers can substitute an organizations products or services for cheaper alternatives. The bargaining power of suppliers is also one of these functions which endeavor to analyze the power of the supplying companies within the industry to increase their product prices thereby increasing the final price of the product. The bargaining power of buyers entails the ability of the clientele of an organization to drive down the product and service price of the organization (Firn, Preston and Walshe, 2016). The final function is the intensity of rivalry among the competitors. The basic idea here is that the competitive advantage of an organization develops out of the ability of the firm to conduct its operations either in a unique way or in a way that is less expensive than its competitors. A strategic information system seeks to ensure that there are effective communication channels in an organization (Gaden et al., 2008). Thus, if it is of Porters model, the strategic information system will seek to achieve this in a way that is either unique or in a way that is less expensive. The ultimate goal that a strategic information system seeks to fulfill is to increase and maintain the profit margin of an organization. If a strategic information system can become unique and more efficient in that it has lower operation costs, then it gives the organization a competitive advantage over its competitors thereby reinforcing its position in the industry. Feasibility assessment The essence of a feasibility assessment is to understand if a certain tool or equipment can be effective in a specified operating environment. In this case, Michael Porters competitive advantage Strategic information system model is the subject of analysis. The subject under scrutiny is whether this model can be effective in ensuring that an information system can meet its strategic objectives (Garcia and Santos, 2009). Primarily, Porters model provides a thorough analysis of a companys business environment in a bid to understand where the competitive advantage of the organization lies. By so doing, it provides a keener understanding of the business environment. The result of this is that the information system will collect data from every inch of the business environment ensuring that the system deals with updated information. That will ensure that the organizations management makes informed decisions instead of making decisions on assumptions. Another basis of the feasibility assessment is the fact that this model can be integrated with technology. Technology has become part of the business world in the twenty-first century. Numerous advantages come with utilizing technology as part of the information system. Using technological elements in the strategic IS means that there will be a fast transfer of information from the point of origin to the destination points (Hallinger and Bryant, 2013). For instance, using the internet as a communication channel enables one to reach more than one person at a time. That increases the speed with which information is shared in an organization. Communication technology will also ensure the security of information shared through it. A good example can be the use of firewall software to protect information shared through a network. Technicality feasibility A strategic information system should be one that meets the technical requirements of the organization. For instance, before an organization implements an information system, it will have to take into account technical issues such as change acceptance in the organization. The organization needs to find out if its staff is having an easier time with the new system or not. Change acceptance determines how development is received in an organization (Rainsford et al., 2016). Where change is not accepted, it could cost an organization more to try to increase the acceptance levels by implementing change management techniques. An organization should have change management policies which will manage the installation of the new system in ways that the members of the organization find comfortable. That will ensure that the new system does not bring more harm than good to the organization. Legal feasibility The legal feasibility of a strategic information system is an important consideration when it comes to choosing a model. Legal conformity is a must because failure to adhere to the laws and regulations of a country may bring dire consequences upon an organization. A strategic IS needs to ensure that it follows the requirements of the law. For instance, a strategic IS will have to ensure information security in a bid to meet the confidentiality agreements that a company enters with its clients (Legg et al., 2016). If these standards are not met, the organization stands to face legal charges. For instance, if an organization does not secure its information channels, it is risking exposure of confidential and sensitive information of their clients which means that they are liable for legal consequences. Therefore, there is a need for a constant review of the laws to ensure that the information system meets the legal requirements. Compliance is a strategy for the strategic information systems. It is important for effective information systems to have in place a governance, compliance and a risk management strategy whose goal is to keep pace with new legislations that come up regarding management of information systems (Sallnow et al., 2016). The essence of this strategy is to shield the organizations information system from the effects of changing law. An effective strategic information system also uses the legal environment as a source of information. The legal environment affects the operations of an organization which means that having an information system that provides the organization with updated information regarding the legal environment of the organization can be instrumental towards ensuring organizational compliance. The information that the information system provides regarding the legal environment can be used as an input in the decision-making process. Functionality The primary role of the strategic information system in any organization is to ensure effective and efficient communication within an organization. The significance of communication to an organization cannot be understated. Effective communication in an organization is that which is two-way, that is from the management to the employees and employee feedback (Brown and Dyson, 2007). When information flow is only downwards from the managers to the employees, then the managers will not be able to make sound decisions regarding the employees. It is through employee feedback that the managers can know the issues affecting the workforce. That ensures that the managers can solve these issues and improve the working environment for the workers. Employee feedback also acts as motivation in an organization since it makes the employees feel that their welfare is being watched thus increasing their loyalty to the organization. The strategic information system also considers the clients of the organization as inputs to the system. The information system endeavors to create a direct link between the clients and their organization. A culture where the clients of an organization maintain a one-on-one linkage with its clients will increase customer feedback (Waring and Skoumpopoulou, 2012). The essence of customer feedback is that it provides the organization with information regarding customer expectations. That is an important input to the quality management processes of an organization which ensures that the services and products of a company are tailored to meet customer expectations. Therefore, a strategic information system increases the loyalty of the customers to an organization by ensuring that the company manufactures goods and provide services that ate in line with the expectations of the clients. That ultimately results in increased profit margins. SWOT analysis This is an analytical tool that seeks to identify the strengths, weaknesses, opportunities and strengths of an entity (Biondo et al., 2016). A strength of having an effective strategic information system is that the decision-making processes are sound since the processes receive up to date information. Sound decision-making processes will ensure that the operations of the company run smoothly. A weakness that may result from having a strategic information system is that it is difficult and expensive to have an entire system overhaul just to introduce the new information system. By so doing, the operations of the company will slow down reducing the profit margins. An opportunity that presents itself from the use of a strategic information system is the fact that the system provides information that can be studied, and manipulated to form trends which can be used to forecast the future (Tsourtis et al., 2015). Thus, it will ensure that the organization can plan for the future and meet it with certainty. The threat that presents itself from adopting a strategic information system is the resistance to change which can be found in any organization. When an organization decides to change its information system, it has to prepare for this resistance by ensuring that there are change management mechanisms in place. Methodology Before the implementation of a strategic information system, there is a need for information system planning. It is the process through which the information requirements are identified and analyzed while at the same time they are being integrated with the overall objectives of the organization in question (Taylor et al., 2008). The reason why an organization ought to conduct information system planning is to ensure that it keeps up with the changes in information and communication technology. There are three levels that the organization will plan on regarding the information system planning, namely: the strategic planning, management control, and operational control (Best et al., 2016). The strategic planning entails the setting of strategic objectives that the strategic information system should achieve. Moreover, it entails the formulation of the strategies that will be used on the system in a bid to increase its effectiveness. The management control level endeavors to plan for th e overall management of the information system. That includes the management policies that will be in place to ensure that the information system is more effective. The operational control planning plans for how the system will run. For instance, will the system utilize information technology? Theory There are three theories in existence which endeavor to explain the use of strategic information systems. The first theory is Porters competitive advantage theory which presents a framework that organizations can use in the creation and sustenance of a competitive advantage over their competitors. The theory prioritizes the establishment of the source of the power of the organization which is done through Michael Porter Industry analysis process (Baker, 2008). As discussed earlier, the industry analysis is dome by measuring the above-mentioned criteria which will tell whether the companys source of power is in fewer numbers of competitors or a low threat of substitution. The second theory is the differentiation advantage which is Porters second type of competitive advantage. As discussed earlier, a company can develop a competitive advantage by conducting its operations in a manner that is cheaper than their competitors or by doing them uniquely. The differentiation advantage dwells on developing one or more characteristic of a product or service which is valued most by the clients (Swanberg et al., 2016). Thus, by focusing on these characteristics, the product or service becomes more attractive to the customers increasing customer loyalty. That gives the company a competitive advantage. The third theory is the Wisemans strategic perspective where Wiseman posits that companies are using information systems strategically in a bid to earn a significant competitive advantage (Waring and Skoumpopoulou, 2013). However, according to this theorist, the use of information systems may not always provide a competitive advantage. However, it can be instrumental towards the achievement of an organizations strategic plan. Value chain The primary activities of a strategic information system include the inbound logistics which involve the receipt as well as the storage of the raw material. That is inclusive of the general management of a companys supplies. The second primary activities of the information system are the provision of knowledge on the operations of the company which focuses on the manufacturing or service steps. Outbound logistics is the third activity which entails the collecting, storing as well as the physical distribution of the products to the consumers. There are also sales and marketing activities which deal with the price management, order entry, and customer relations. Finally, the after-sale service activities are primary activities that cover the provision of support for the product in the field, customer training, and product installation. The support activities, in this case, are not directed towards the clients. Instead, they allow the organization to perform their primary activities. Th e first activity is procurement which involves the purchasing of the raw materials that an organization uses in the production process. Technology development is another support activity where an organization can employ technological devices in the strategic information system to increase its efficiency and efficacy. Human resource management activities involve recruiting, training and developing the right people for the right job (Arnesen et al., 2007). That ensures that the systems and processes running the information system are effective and smoothly running. Recommendation An information technology company that can provide an example of a strategic information system is Florida Power and Light company which has in place a computerized total quality management system. The system is a part of the information system which provides communication between an organization and its clientele. The system is dependent on the feedback from the clients. The advantage of having this system is that it allows the organization to meet the expectations of the customers which is instrumental in developing and maintaining customer loyalty (Arias-Arianda, 2007). Thus, for this company, having a computerized TQM is strategic as it fastens the communication between the organization and the clients. Thus, with a strong customer base, the organization can retain its strategic position in the market. Cost benefit analysis The advantages of having a strategic information system far outweigh the disadvantages. For instance, the strategic IS ensures the flow of communication throughout the organization to the extent that every member of the organization is well aware of what is required of him or her. That ensures that the work flow in the organization is smooth (Agasisti et al., 2008). The system also results in the maintenance of customer loyalty. A disadvantage that can be seen with the strategic IS is that using a complicated system might be costly and harder to adapt to in the organization. Following the numerous advantage, this system promises maximum profit for the organization. Conclusion The strategic information system is a viable strategy for an organization to increase its profit margins and reestablish a higher position in the market. It promotes the flow of information throughout the organization which assists in the efficient utilization of resources. It also promotes employee loyalty to the organization since in the strategic IS, information flows in two ways, from management to the employees and back upwards. That ensures that there is a good relationship between the employees and their managers. A good relationship reduces conflict and assists in focusing the efforts of the organization towards accomplishing organizational goals. The Strategic IS also ensures that the organization establishes a good rapport with the customers since the organization can meet the expectations of the clients. References Agasisti, T., Arnaboldi, M., Azzone, G. (2008). Strategic management accounting in universities: the Italian experience. Higher Education, 55(1), 1-15. doi:10.1007/s10734-006-9032-6 Arias-Aranda, D. (2007). Simulating reality for teaching strategic management. Innovations In Education Teaching International, 44(3), 273-286. doi:10.1080/14703290701486662 Arnesen, S. J., Cid, V. H., Scott, J. C., Perez, R., Zervaas, D. (2007). The Central American Network for Disaster and Health Information. Journal Of The Medical Library Association, 95(3), 316-322. Baker, D. (2008). From Needles and Haystacks to Elephants and Fleas: Strategic Information Management in the Information Age. New Review Of Academic Librarianship, 14(1/2), 1-16. doi:10.1080/13614530802518800 Best, M., Butow, P., Olver, I. (2016). Doctors discussing religion and spirituality: A systematic literature review. Palliative Medicine, 30(4), 327-337. doi:10.1177/0269216315600912 Biondo, P. D., Lee, L. D., Davison, S. N., Simon, J. E. (2016). How healthcare systems evaluate their advance care planning initiatives: Results from a systematic review. Palliative Medicine, 30(8), 720-729. doi:10.1177/0269216316630883 Brown, G., Dyson, A. (2007). Higher education IT strategic decision-making beyond information services. Perspectives: Policy Practice In Higher Education, 11(1), 1-2. doi:10.1080/13603100601127857 Edney, K., Symons, J. (2014). China and the blunt temptations of geo-engineering: the role of solar radiation management in China's strategic response to climate change. Pacific Review, 27(3), 307-332. doi:10.1080/09512748.2013.807865 Firn, J., Preston, N., Walshe, C. (2016). What are the views of hospital-based generalist palliative care professionals on what facilitates or hinders collaboration with in-patient specialist palliative care teams? A systematically constructed narrative synthesis. Palliative Medicine, 30(3), 240-256. doi:10.1177/0269216315615483 Gaden, M., Krueger, C., Goddard, C., Barnhart, G. (2008). A Joint Strategic Plan for Management of Great Lakes fisheries: A cooperative regime in a multi-jurisdictional setting. Aquatic Ecosystem Health Management, 11(1), 50-60. doi:10.1080/14634980701877043 GARCIA-MERINO, T., SANTOS-ALVAREZ, V. (2009). Characterizing the Top Journals in Strategic Management: Orientation, Style, Originality, and Readability. Journal Of Scholarly Publishing, 40(4), 420-439. Hallinger, P., Bryant, D. A. (2013). Accelerating knowledge production on educational leadership and management in East Asia: a strategic analysis. School Leadership Management, 33(3), 202-223. doi:10.1080/13632434.2013.773884 Legg, L., Gladman, J., Drummond, A., Davidson, A. (2016). A systematic review of the evidence on home care reablement services. Clinical Rehabilitation, 30(8), 741-749. doi:10.1177/0269215515603220 Rainsford, S., MacLeod, R. D., Glasgow, N. J. (2016). Place of death in rural palliative care: A systematic review. Palliative Medicine, 30(8), 745-763. doi:10.1177/0269216316628779 Sallnow, L., Richardson, H., Murray, S. A., Kellehear, A. (2016). The impact of a new public health approach to end-of-life care: A systematic review. Palliative Medicine, 30(3), 200-211. doi:10.1177/0269216315599869 Swanberg, S. M., Dennison, C. C., Farrell, A., Machel, V., Marton, C., O'Brien, K. K., ... Holyoke, A. N. (2016). Instructional methods used by health sciences librarians to teach evidence-based practice (EBP): a systematic review. Journal Of The Medical Library Association, 104(3), 197-208. doi:10.3163/1536-5050.104.3.004 TAYLOR, J. S., DE LOURDES MACHADO, M., PETERSON, M. W. (2008). Leadership and Strategic Management: keys to institutional priorities and planning. European Journal Of Education, 43(3), 369-386. doi:10.1111/j.1465-3435.2008.00363.x Tsourtis, A., Pantazis, Y., Katsoulakis, M. A., Harmandaris, V. (2015). Parametric sensitivity analysis for stochastic molecular systems using information theoretic metrics. Journal Of Chemical Physics, 143(1), 1-17. doi:10.1063/1.4922924 Waring, T., Skoumpopoulou, D. (2012). An enterprise resource planning system innovation and its influence on organisational culture: a case study in higher education. Prometheus, 30(4), 427-447. doi:10.1080/08109028.2012.754572 Waring, T., Skoumpopoulou, D. (2013). Emergent cultural change: unintended consequences of a Strategic Information Technology Services implementation in a United Kingdom university. Studies In Higher Education, 38(9), 1365-1381. doi:10.1080/03075079.2011.625495

Saturday, November 30, 2019

Molecular stability (rheology) of a plastic carrier bag through stress strain tests Essay Example

Molecular stability (rheology) of a plastic carrier bag through stress strain tests Essay I am going to study the molecular stability (rheology) of a plastic carrier bag through stress strain tests. I will do this through a simple viscoelastic experiment of where I will be able to calculate the Young Modulus and assess Hookes Law. Plastic carrier bags are made from polyethylene or polyethene, which is a homopolymer. Polyethylene comes from ethylene. Ethylene is an alkane made up of a series of saturated hydrocarbons. The alkane series are known as homologous series as they share the properties and general formula: (CnH2n+2) 1.1 Origin of plastic Essentially plastics are materials that can be heated and moulded and maintains this moulded shape once it cools. We will write a custom essay sample on Molecular stability (rheology) of a plastic carrier bag through stress strain tests specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Molecular stability (rheology) of a plastic carrier bag through stress strain tests specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Molecular stability (rheology) of a plastic carrier bag through stress strain tests specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Plastics have existed since the beginning of time. Plastic contains natural elements such as carbon(C), hydrogen (H), nitrogen (N), chlorine (Cl) and sulphur (S). These elements can be originated from naturally grown organic materials such as wood, horn and rosin. Animal horn and amber are examples of natural plastics. Already renown for his work in the rubber industry, Alexander Parkes invented a material that was based on cellulose nitrate at the Great Exposition of 1862 in London. He called this material Parkesine, which was the first synthetic polymer. His invention was due to a new scientific movement to utilise by-products of natural gas production. We are now in the Age of plastics where plastic dominates our industrial world. Plastic is a force that will shape the twenty-first century, bringing to fruition new wonders in tomorrows world. Carin Glaser 1.2 Polymer Polymer comes from the Greek word, poly meaning many and mer meaning part. Polymerisation is the chemical process of forming polymers from their components of monomers. Polymerisation is often an intricate process that may be initiated or sustained by pressure, heat or with catalysts. Monomers generally contain carbon and hydrogen including, sometimes, chlorine, nitrogen, oxygen or fluorine. A polymer is a chemical compound with a high molecular mass constructed of chains of monomers linked together through bonds. Polymers can be categorised into two forms of polymers, addition polymers and condensation polymers. Condensation polymers consist of repeats of units that are bonded, which contain fewer atoms than the original monomer/s because of the loss of substances such as water. Addition polymers consist of the same monomer units that attach one at a time i.e. they have the same structural unit. A resultant of additional polymerisation, of monomer to polymer, with polyethylene is shown below. Ethylene; Polyethylene; 1.3 Cracking in the plastics industry Cracking is a process in industry where large chains of aliphatic hydrocarbons that make up crude oil/petrochemicals are broken down into smaller, more useful fractions. Factors such as high temperature, high pressure and catalysts are needed to break these long chains into shorter chains. Petrochemical such as oil or natural gas contain hydrocarbons. These hydrocarbons are processed through a reactor into a procedure known as cracking. In the plastic industry a natural gas derivative known as resin is produced. Resin pellets are then moulded or formed to produce several different kinds of plastic products with application in many major markets. The fickleness of the resin pellets proves a complex resin to be specifically designed for the consumers requirements. The different resins produced in the industry is the reason why certain plastics are better for different applications while others are best suited for entirely different applications. The production of a plastic bag is done through a process known as blown film extrusion. This process involves the resin being blown up and extruded to produce tubes of film. 1.4 Polymerisation of ethylene Branched polyethylene is produced through a free radical addition reaction. As shown above polyethylene are ethylene molecules bonded together. There are three stages to this process, these are: 1.4.1 Initiation Oxygen is the initiator of this process. The oxygen reacts with the ethylene to produce organic peroxide. Oxygen peroxide consists of double oxygen single bonds that are extremely reactive and break easily to give free radicals. This process can be avoided by adding other organic peroxides directly to the ethylene. The free radicals vary depending on the source, the basic formula for these free radicals is Ra*. These free radicals then react with the monomer to find its pair. This then pushes the monomers molecule leading the reaction back to the free radical stage. 1.4.2 Propagation The adding of more and more monomers to the growing chains is called propagation. The conductor of the experiment can add extra ethylene molecules to construct a long chain of them. Self-perpetuating reactions like this one are called chain reactions. The ethylene molecule consists of a double bond. One pair is held loosely on an orbital, this is known as a pi bond. The other pair is called a sigma bond and is held sturdily onto the nuclei. The free radical breaks the pi bond to form with another monomer. This is efficient because the previously weak pi bond is broken and the new carbon bond is stronger. This concluding that the more energy that is produced results in an additional stability to the system. This propagation results in the radical becoming larger and lengthened. Therefore each longer, larger radical can react with its other radicals to produce a polymer that extends further. 1.4.3 Termination This chain reaction must eventually end. The instability of the radicals means that eventually they will collide and form a pair without making a new radical. This then becomes one of the final molecules of the polyethylene chain. This termination process is called coupling. 1.5 Metal and plastic As we move closer to the future we can see that plastics are slowly taking over the function of metals on our society. The reasons for this are pretty simple, plastics are cheaper to make in industry than metals. Forms of iron are renown for its strength in the field of life but iron oxidises and slowly degrades. Plastics are non-biodegradable, meaning that they are suitable for long term uses unlike metals that are prone to disintegrate. Plastics do not need a great deal of heat to be moulded into shapes but metals tend to have a high melting point, this is cheaper for industries because less energy is used to make their products. The strengths of plastics are shown in industry through fire resistant material, bulletproof vests and puncture resistant tyres, buildings etc. Plastics are also known now to be able to conduct electricity (although not to a degree of a metal like copper) by modifying polyacetylene by blasting the material with iodine vapour. Thus, eradicate an electron giving the material a positive charge, allowing the material to conduct electricity. This may eventually resulting in plastics replacing metals in the electricity components, making modern technological equipment, such as DVD players, computers, TVs etc., cheaper to produce. Plastics are currently manufactures from crude oil through the cracking process but now scientists have discovered producing biodegradable plastics using waste food. The process is considerably cheap and could revolutionise issues such as protecting our ozone (as waste food release methane gas) and also keeping landfills clear of pollution. 1.6 The forces between the molecules The physical properties of polyethylene are judged by its intermolecular forces. The intermolecular force is the force attracting one molecule to another, Van der Waals attractions or hydrogen bonds. The melting and boiling point of any molecule would depend on the potency of the intermolecular forces. Van der Waals attractions are more likely to occur with larger molecules and these attractions need more energy to split. Presence of hydrogen bonds will lift the melting and boiling points. When covalent molecular substances are heated, they usually melt at low temperatures. The molecules do not decompose but remain as separate groups of atoms. This implies that the forces within the molecules are strong but the forces between molecules are not very strong. The forces holding the molecules together are not the strong forces of attraction resulting from the sharing of electrons. Source http://www.nelson.com.au/chemistry/guide/unit1chemistry/s1b.htm Polymers are normally long chains of hydrocarbons, the longer the chain of molecules, the higher the melting and boiling points are. This is due to the increase in dispersion forces as the size of the molecule increases. Hydrogen and carbon are non-metals and in general covalent bonds are associated with two (or more) non-metals bonding. In this bond the electrons are shared between the atoms. Electronegativity is the power of an atom in a molecule to attract electrons to itself. Carbon has an electronegativity of 2.5 and hydrogen 2.2. Therefore the higher electronegativity of the carbon atom signifies that the bonding electrons are attracted to the carbon atom rather than the hydrogen atoms. As the carbon atom contains more electrons it becomes vaguely negative and the hydrogen becomes slightly positive. This negative and positive bond is known as polarised and each molecule is a polar molecule or dipole. The hydrocarbons can organise themselves to result in the negative end of one molecule to be supported with the positive end of the next molecule. This type of intermolecular bonding is called dipole-dipole attraction. Molecules that are not polar have the weakest forces of intermolecular bonding between them. These types of substances are observed to have the lowest melting and boiling points. These molecules are held together by dispersion forces, which result from instantaneous dipoles caused by the constant movement of electrons within the molecules. The strength of the dispersion forces increases as the number of electrons in the molecule increases. Source http://www.nelson.com.au/chemistry/guide/unit1chemistry/s1b.htm 1.7 HDPE ; LDPE High and low density polyethylene are created in conditions under that ethylene is polymerised, the molecules become attracted towards each other in the solids by Van Der Waals dispersion forces. 1.7.1 High-density polyethylene (HDPE) A linear polymer is the most basic form of polymer structures (HDPE) HDPE has generally no branched chains. This allows molecules to attach nearer to the molecule in a normal way, which is almost crystalline. This signifies that the dispersion forces are more effectual therefore the material is moderately stronger and has a higher melting and boiling point compared to LDPE. 1.7.2 Low Density polyethylene (LDPE) LDPE has many short branches besides the chain. The extra chains stop the other chains from lying closely together in a neat arrangement, dispersion forces are therefore lower compared to HDPE and the material is fragile and has a lower boiling and melting point. The density of the material is lower since the wasted space within the irregularly packed formation. 1.8 Thermosets Thermoplasts There are two distinguished features of plastic. These two are thermosetting and thermoplastic: * Thermoplastic (thermoplast) is a polymer that is cross-linked. When heated the cross links are softened and then the polymer has the ability to be moulded into different shapes. Once cooled the polymer returns to its original stability. This process can be repeated many times. Its is of great use in the plastics industry because materials that do not need great strength but personalised structure such as plastic bags can be made with ease. * Thermosetting polymers are significant for their strength and durability. They are vastly stronger but brittle compared to thermoplasts. They are, in general, linearly structured such as HDPE. When heated a thermoset is made substantially infusible or insoluble, therefore the polymer cannot return to its original shape, or the polymer experiences plastic deformation. 1.9 Youngs Modulus The Youngs Modulus is stress/strain at the elastic limit. It is basically a measurement of the strength of a material or how much the material yields for each pound of force. Deformation relates to the stress strain behaviour of a material. Stress can be seen as the pressure exerted onto a material. To calculate stress the formula stress = load/area of cross section is used. Strain is the deformation of a material in relation with stress, or the deflection of a material due to force. For this experiment I need to calculate these three. 2.0 Prelimary work Preliminary work is done to pre determine the needs for the final experiment to be a success. I shall cover issues such as safety and dimensions. 2.1 Dimensions of plastic strip To calculate the length and width of the plastic strip of bag that I would use for the experiment I had to test the maximum strength of different lengths and widths of bags. From pre-knowledge of structures of molecules, the wider strip should be able to withhold more weight and the longer bag should extend further. I will choose various lengths of the plastic strips and summarise the maximum load limit of the strips. To measure this limit I shall use the method chosen for the experiment. N.B: Throughout the experiments I shall be taking Gravity (g) as 10ms-1 2.1.1 Results Prelimary Experiment Max Load (N) Length (mm) Width (mm) 1 2 3 Average 100 10 8 8 9 8.3 150 10 10 9 9 9.3 200 15 12 14 12 12.7 200 20 16 15 16 15.7 250 20 17 17 17 17 2.1.2 Summary I conclude that the wider the strip of plastic, in general, the heavier it holds before breaking. The weight holders carry around 15 Newtons each therefore I shall use 200mm by 20mm for my experiment. I noticed that when I added more weights the width of the bag shortened as the extension became greater, this may affect the eventual outcome of the result. To indicate this later in the experiment I shall identify any anomalies. I also need to calculate the impact that I did when I added the weights on directly, later in the experiment I need to add the weights on Newton by Newton simultaneously. Calculating stress To calculate the stress I need to use the formula: Stress = Load Area of cross section First I need to calculate the area of the cross section. To do this I shall use the formula: Area = width ? thickness The cross section of the paper strip is: The thickness of the bag varied in each strip so I took the average of the thickness of the plastic strips from 6 samples using a micrometer. Average (mean) = ?x ?f Samples thickness: 1. 0.019mm 2. 0.022mm 3. 0.02mm 4. 0.018mm 5. 0.019mm 6. 0.02mm These results are fairly close together therefore I shall use these results, as they seem accurate. ? Mean = 0.019 + 0.022 + 0.02 + 0.018 + 0.019 + 0.02 6 Thickness = 0.0197mm If area = width x thickness Thickness = 0.0197mm Width = 20mm ? Area = 20 ? 10-3 (m) ? 0.0197 ? 10-3 (m) Area = 3.94 ? 10-7 m2 From these results I can calculate the stress. I shall go to the force of 17N because from previous knowledge I can say that the strip will be likely to break at this point or below. Load Applied (N) Stress = load/area of cross section (Pa) 0 0 1 2.5 x 106 2 5.1 x 106 3 7.6 x 106 4 1.0 x 107 5 1.3 ? 107 6 1.5 ? 107 7 1.8 ? 107 8 2.0 ? 107 9 2.3 ? 107 10 2.5 ? 107 11 2.8 ? 107 12 3.0 ? 107 13 3.3 ? 107 14 3.6 ? 107 15 3.8 ? 107 16 4.1 ? 107 17 (max) 4.3 ? 107 2.3 Prediction I predict that to the elastic limit the force will be proportional to length. Beyond the elastic limit the extension of the plastic strip will increase excessively. 2.3.1 Deformation This is because of deformation. Deformation is the modification of a material in response to force. The two types of deformation are elastic and inelastic (plastic). Elastic deformation is when a material returns to its original shape after the force has been applied. Inelastic deformation is the change of the original shape after a force has been removed. The reason of deformation is related to the bonds in the material. In deformation the bonds are being re-arranged. For example, when stretching a polymer the connecting covalent bonds are given energy and the bonds are stretched. The reason of inelastic deformation is that when the energy is applied to the bonds the cross links are moved then the object therefore changes its original shape. With a large enough force the bonds will break and the polymer breaks. 2.4 Reasons for testing The reasons for testing are: 1. Safety measurements. 2. Provide a basis for reliability. 3. Quality control. 4. Establish design ideas. 5. Meet the standards and specifications set by producers and standard agencies. 6. Verify manufacturing process. 7. Evaluate and compare against competitors products. 8. Establish history for new materials. 2.4.1 Costs of testing I need to research the cost of testing polymers to understand the importance of testing in the plastic industry. From Dr. Shastri I have found that the costs of testing polymers in industry are: Property (Single-point data) Cost Range Per Grade Average Cost Mechanical properties $780 $3120 $1500 Thermal properties $1030 $3270 $2000 Rheological properties $ 370 $ 650 $ 500 Electrical properties $1020 $1860 $1500 Other properties $ 170 $ 540 $300 $5800 Property (Multi-point data) [viz, creep, stress-strain] Average Cost $14,484 $93,140 This concluded that the testing of polymers at an industry level is out of my budget and time range. Therefore I must keep the experiment at, to a degree, a simplistic level. The large cost of the testing of polymers in the industry justifies the importance of the material to society. This relates with why that safety is needed when testing the material, I shall later resolve safety procedures. 2.5 Possible solutions to conduct this experiment in a laboratory are: 1. This method of conducting the stress relaxation test is needed with a pc to measure the length and force applied; the computer can then create a diagram of force/extension. I cannot execute this method because I have not got the right equipment and this experiment does not allow me to calculate the effects manually, which is what I wish to accomplish. 2. This experiment is capable of doing but I think that the material stretched along the table at such a length would mean I would have to use a long plastic bag which are hard to get hold of; apart from that this method would be acceptable for wire dimensions materials. 3. The ruler held into a fixed position means that there are less human errors in the measurements. The fixed position with the clamps and retort stand shows the stability and rigid structure of this method. This experiment allows me to manually draw up diagrams to calculate the Youngs Modulus. I am going to use experiment 3 to perform my experiment. Method to perform experiment 3 2.5 Apparatus Apparatus that I will need to conduct this experiment from the method I have chosen are: * Ballpoint pen. * Paper. * Metal wire. * Meter rule. * Micrometer. * Plastic carrier bag. * Retort stand. * Scalpel. * Safety (metal) ruler. * Scissors. * Sticky tape. * Wire clippers. * Cushion. * Weights. * Stop watch. A strip of plastic bag needs to be measured using a ruler accurately onto the bag with a pen. The marked out strip then needs to be cut using a sharp tool such as a scalpel and a safety ruler is needed for precision cutting and safety. The device I have chosen to hold the material to the weights and clamp is a metal wire that has been twisted. The wire will be 100mm long and then twisted into a circle like shape as shown in the diagram (left). The wire will be firstly looped into a ring of plastic from the bag; each side of the bag will be a fixed length for the wire to loop into. 2.6 Method 1. Set up the experiment as shown in the diagram. 2. Measure the length of the plastic bag between the two marked points using the ruler that is attached to the retort stand. 3. Add one Newton to the plastic bag. 4. Begin the stopwatch. 5. Once 5 seconds have passed measure the new length using the ruler. 6. Continue steps 3-5 adding one extra Newton each time until the plastic bag snaps. 7. Repeat the experiment 5 times for a fair test. The most important factor is always making accurate measurements. By checking the results of measurements more than once using a ruler and then obtaining an average will provide me with suitable evidence of recurring measurements therefore showing that they have been accurate. 2.7 Safety procedures Safety is one of the major factors of doing any experiment, or anything. The safety factors that I will take into hand in this experiment is: * Work in a large open area that will be sufficient to be a good distance away from people. * Keeping my body away from the weights and putting a cushion underneath the weights to soften the blow when the plastic strip breaks. * Take care when handling scalpels. * Use a safety metal ruler when cutting with the scalpel. * Using wire clippers to cut wire. * Use retort stand so weights are sturdily held. * Use weight holders so weights are held tightly together in an order. * Always be aware. 2.8 Fair test For the result of the experiments to be valid and contain fewer errors I need to suggest factors that will affect the result and then resolve them with solutions. The fair test factors that I have taken into practice in this experiment are: * Use the same plastic bag because of specimen variations. * The molecule variation in the bag, the bags handles might be made stronger than the bag, although this may not be true. * Do the experiment in room temperature, as the heat affects the atom bonds. * Keep the rate of loading the weights simultaneously because of impact strength. * Keep the ruler attached to the same place on the retort stand. * Repetitive. * Conduct the experiment five times to devise anomalies. * Use the same dimensions of plastic strips and wires. * Accurately measure with a ruler and avoid parallax errors. * Accurately cut the plastic strips with a sturdy ruler. Other factors that I have taken into place are the weight of the metal wire, but this was under a gram so it would not have affected my result by a lot and if I used the same wire consistently I could justify with the errors. 2.9 Creep Creep is a major factor when using heavier weights because the strip will gradually deform to relieve stress. This is why I need a fixed time to measure the extension when doing the experiment. 3.2 Conclusion My prediction was: I predict that to the elastic limit the force will be proportional to length. Beyond the elastic limit the extension of the plastic strip will increase excessively. My prediction in accordance to my results states clearly that this statement is true. Therefore my results are a success. The strips broke at different forces. This means that some of the strips may have been stronger than the other ones. This may have affected my results before the material reached its elastic limit because the bonds might have been stronger, also maybe because of human errors. The bonds in the different parts of the bags may have been engineered differently to suit its purposes i.e. the handle of the bag may have been made stronger than the body because of the force applied to it. I found that after the material reached its elastic limit the results became a little random. This may have been due to creep and the difficulty to measure the extension when the material is constantly going through deformation and the bonds are weakening making the material extend at a faster and easier rate. I have not included results after the elastic limit in my calculations because of this. The bag may also have contained additives such as colorants to produce colours on the bag; this may affect the bonds in the bag slightly and therefore affecting my results. I found the strip went through plastic deformation at around 10 N, which is equal to 1 kg. Bags are made to carry around 7 kg and the strip I cut was 1/10th of the bag, meaning that the strip cannot be justified as the strength of the bag as the shape of the bag differs from the strip and is stronger than the strip because of the way it is built. To summarise the results fairly I have created an averages of my results. I shall use the average results to do my calculations of the Youngs Modulus and strain energy. 3.3 Evaluating Graphs 3.3.1 Calculating Strain Energy When the strip is stretched we can say that energy has been applied to it, i.e. it extends (goes through deformation). The force extension graph can calculate the work done on the strip. Energy is measured in joules and is the area below the elastic limit on the graph. This energy is called work done and is the elastic potential energy, or the strain energy in the strip. Strain energy is the area underneath the force extension graph up to the elastic limit. ?This area must be a triangular shape because the line up to the elastic limit is straight. The area of a triangle = 1/2 base x height ? Strain energy = 1/2 f.x Where f is the force to produce the extension, x. Strain energy = 1/2 x 9 x 8 x 10-3 = 0.036 J 3.3.2 Calculating Youngs Modulus (E) Youngs Modulus is a measurement of the stiffness material. It is similar to calculating the gradient of the line up to the elastic limit. Youngs Modulus = Stress Strain = 2.5 x 107 0.096 = 2.604166667 x 108 Pa = 2.60 x 108 Pa (to 3 s.f) 3.4 Calculating the % errors for Strain Energy and E All experimental measurements have some degree of error associated with them. Physics Dept. New College Durham. There are systematic and random errors. A systematic error is when the method of measuring is always to large or to small. Such as a non-parallax error or when instruments such as the micrometer are not zeroed correctly. Random errors are when repeated results have different outcomes. To avoid this the experiment can be repeated and then take an average from the results. The formula used to calculate error = ? Smallest division Height gained Error in 100g masses = ? 0.1g ? ? 1.0 x 10-4kg Error in metre rule reading = ? half the smallest division of the rule. = ? 0.5mm Since a measurement is the difference between 2 readings error = ? 1mm ? ? 1.0 x 10-3m Error in vernier reading = ? half the smallest division = ? 0.0005mm Therefore the measurement error (2 readings) = ? 0.0001mm ? ? 1.0 x 10-6m 3.4.1 Strain Energy Strain Energy = 1/2 x load x extension Elastic Limit = 0.9 kg and 8 x 10-3 m % Error in mass (9 x 100g) = 9 x 1.0 x 10-4 kg x 100 9 = ? 0.1% % Error in extension (metre rule) = 1.0 x 10-3m x 100 8 x 10-3 m = ? 12.5% To obtain the total error for strain energy, add the % errors = ? (0.1% + 12.5%) = ? 12.6% Strain energy = 1/2 f.x = 1/2 x 9 x 8 x 10-3 = 0.036 J ?Strain energy = 0.036 J ? 12.6% = 0.036 J ? 0.00454 J 3.4.2 Youngs Modulus Youngs Modulus = Stress Strain = (Force/area of cross section) (Extension/original length) = Force/area of cross section x original length/extension = (Mass x gravity/thickness x width) x (original length/extension) Mass % error = ? 0.1% Material thickness = 0.0197mm ? 0.0197 x 10-3m Material width = 20mm ? 20 x 10-3m Original length (between lines) = 100mm ? 100 x 10-3m Extension = 8mm ? 8 x 10-3 m at elastic limit Material thickness % error = 1.0 x 10-6m x 100 (Vernier) 0.0197 x 10-3m = ? 5.076142132 ? ? 5.08 (to 3 s.f) Width % error = 1.0 x 10-3m x 100 (Rule) 20 x 10-3m = ? 5% Original length % error = 1.0 x 10-3m x 100 20 x 10-3m = ? 0.5% Extension % error = 1.0 x 10-3m x 100 8 x 10-3m = ? 12.5% For the total error, add the % errors = (mass + thick + width + ori length + extension) = ? (0.1 + 5.08 + 5 + 0.5 + 12.5) = ? 23.18% ?Youngs Modulus = 2.60 x 108 Pa ? 23.18% = 2.60 x 108 Pa ? 60268000 Pa = 2.60 x 108 Pa ? 6.03 x 107 Pa (to 3 s.f) 3.5 Evaluation The experiment conducted allowed me to calculate the Youngs Modulus using a carrier bag, the method I used was suitable to the objective of measuring force against extension (the investigation). From my results and graphs I can see that there were no spurious readings in the investigation. Therefore my experiment was a success. The problems of this experiment was the cutting of the plastic bag as due to the lack of friction the plastic bag was not held properly onto the work surface. I tried to resolve this by embracing the carrier bag onto the work surface whilst I cut it but this was still difficult as the bag still moved. When the strip had a force applied its width reduced and the strip became compact into a wire dimensional shape. I would have preferred f I was able to hold the original shape intact when adding the weights. I did try other methods, such as replace the wire with a pencil and hold the weights on each side but this meant that the weight addition was going up by 2N instead of 1N simultaneously. Also putting on the 2 weights at the same time was difficult because of balancing the pencil, this meant that creep came into affect and I it was hard to record measurements at a fixed time. I would have preferred to use a PC to help me record my results, as this would have reduced the human errors and recorded the results more accurately than I could have. But the costs of using a computer and setting it up was time consuming and would not have correlated with the time I was given to conduct this experiment. The strain energy and Youngs Modulus % errors were both above 10% and this is quite a high figure when trying to measure accurately. If I used a computer this would have reduced my errors and made my measurements accurate. If I were going to extend this testing into measuring hardness, viscosity or ductility then I would have re-done the experiment using a PC. At a more advanced level plastic deformation is caused by the motion of dislocations, which involves the breaking and reforming of bonds. This can be seen as a random procedure because the force applied would have to be done on the same material with the exact structure and the force applied in the exact place. As carrier bags are made in masses I doubt that the structures are exactly the same. Therefore it would be pointless for me to have measured beyond the elastic limit.

Tuesday, November 26, 2019

Great Gatsby4 essays

Great Gatsby4 essays Defined by a book of current literary terms, a climax is "the arrangement of a series of ideas or expressions in ascending order of importance or emphasis; the last term of the arrangement; a culmination." Written by F. Scott Fitzgerald during the roaring 20's, The Great Gatsby provides a look into the upper class circle of the East and West Villages of New York City. Known as East and West Egg in the novel, Fitzgerald, through the eyes of bachelor, portrays a cynical view of the high social society and the morality which it lacks. This scarcity of ethics ultimately causes the downfall of their hollow world in a clatter of broken hearts and mislead minds. The climax of The Great Gatsby takes place in a New York Hotel suite when, after many hints toward the reason for Gatsby's company, the true nature of his presence is revealed to Tom Buchanan. Ever since Jay Gatsby returned from World War I, which swept him away from his boyhood love Daisy, he has made every indirect effort to make contact and rekindle her love for him. Even with the knowledge that she is married and leads a separate life from his, Gatsby, without regrets, lives his life for her. When, at long last, he has the chance to interact with Daisy, he capitalizes on it immediately. With the assistance of Jordan Baker and his neighbor Nick Carraway (Daisy's second cousin), Gatsby arranges a meeting with Daisy. At this meeting the two hearts are reunited and again would be one, if not for the plate glass barrier of Daisy's marriage to Tom Buchanan which separates them. Originally held apart by a young boys' ineptitude to provide for a wealthy girl, Daisy is now held back by a seemingly insincere knot of matrimony. This keeps the all important bonds of love to be formed between the two former lovers. Tom, a wealthy man with family history, is enlightened to the existence of this perennial relationship in a slow weave of events which...

Friday, November 22, 2019

Civil Rights Movement Timeline From 1960 to 1964

Civil Rights Movement Timeline From 1960 to 1964 This civil rights movement timeline chronicles important dates during the struggles second chapter, the early 1960s. While the fight for racial equality began in the 1950s, the non-violent techniques the movement embraced began to pay off during the following decade. Civil rights activists and students across the South challenged segregation, and the relatively new technology of television allowed Americans to witness the often brutal response to these protests. President Lyndon B. Johnson  successfully pushed through the historic Civil Rights Act of 1964, and a number of other groundbreaking events unfolded  between 1960 and 1964, the span covered by this timeline. 1960 Civil Rights Sit-In at John A Brown Company. Oklahoma Historical Society / Getty Images On Feb. 1, four young African American men, students at North Carolina Agriculture and Technical College, go to a Woolworth in Greensboro, N.C., and sit down at a whites-only lunch counter. They order coffee. Despite being denied service, they sit silently and politely at the lunch counter until closing time. Their action marks the start of the Greensboro sit-ins, which sparks similar protests all over the South.On April 15, the Student Non-Violent Coordinating Committee holds its first meeting.On July 25, the downtown Greensboro Woolworth desegregates its lunch counter after six months of sit-ins.On Oct. 19, Martin Luther King Jr.  joins a student sit-in at a whites-only restaurant inside of an Atlanta department store, Richs. He is arrested along with 51 other protesters on the charge of trespassing. On probation for driving without a valid Georgia license (he had an Alabama license), a Dekalb County judge sentences King to four months in prison doing hard labor. Presidential con tender John F. Kennedy phones Kings wife, Coretta, to offer encouragement, while the candidates brother, Robert Kennedy, convinces the judge to release King on bail. This phone call convinces many African Americans to support the Democratic ticket. On Dec. 5, the Supreme Court hands down a 7-2 decision in the Boynton v. Virginia case, ruling that segregation on vehicles traveling between states is unlawful because it violates the Interstate Commerce Act. 1961 Policemen await to arrest Freedom Riders. Bettmann Archive / Getty Images On May 4, the Freedom Riders, composed of seven African American and six white activists, leave Washington, D.C., for the rigidly segregated Deep South. Organized by the Congress of Racial Equality (CORE), their goal is to test Boynton v. Virginia.On May 14, Freedom Riders, now traveling in two separate groups, are attacked outside Anniston, Ala. and in Birmingham, Ala. A mob throws a firebomb onto the bus in which the group near Anniston is riding. Members of the Ku Klux Klan attack the second group in Birmingham after making an arrangement with the local police to allow them 15 minutes alone with the bus.On May 15, the Birmingham group of Freedom Riders is prepared to continue their trip down south, but no bus will agree to take them. They fly to New Orleans instead.On May 17, a new group of young activists join two of the original Freedom Riders to complete the trip. They are placed under arrest in Montgomery, Ala.On May 29, President Kennedy announces that he has ordered the Inte rstate Commerce Commission to enact stricter regulations and fines for buses and facilities that refuse to integrate. Young white and black activists continue to make Freedom Rides. In November, civil rights activists participate in a series of protests, marches, and meetings in Albany, Ga., that come to be known as the Albany Movement.In December, King comes to Albany and joins the protesters, staying in Albany for another nine months. 1962 James Meredith Registering at the University of Mississippi. Bettmann Archive / Getty Images On Aug. 10, King announces that he is leaving Albany. The Albany Movement is considered a failure in terms of effecting change, but what King learns in Albany allows him to be successful in Birmingham.On Sept. 10, the Supreme Court rules that the University of Mississippi must admit African American student and veteran James Meredith.On Sept. 26, the governor of Mississippi, Ross Barnett, orders state troopers to prevent Meredith from entering Ole Misss campus.Between Sept. 30 and Oct. 1, riots erupt over Merediths enrollment at the University of Mississippi, or Ole Miss.On Oct. 1, Meredith becomes the first African American student at Ole Miss after President Kennedy orders U.S. marshals to Mississippi to ensure his safety. 1963 Bettmann Archive / Getty Images King, SNCC and the  Southern Christian Leadership Conference  (SCLC) organize a series of 1963 civil rights demonstrations and protests to challenge segregation in Birmingham.On April 12, Birmingham police arrest King for demonstrating without a city permit.On April 16, King writes his famous Letter from a Birmingham Jail in which he responds to eight white Alabama ministers who urged him to end the protests and be patient with the judicial process of overturning segregation.On June 11, President Kennedy delivers a speech on civil rights from the Oval Office, specifically explaining why he sent the National Guard to allow the admittance of two African American students into the University of Alabama.On June 12, Byron De La Beckwith assassinates  Medgar Evers, the first field secretary for the National Association for the Advancement of Colored People (NAACP) in Mississippi.On Aug. 18, James Meredith graduates from Ole Miss.On Aug. 28, the  March on Washington for Jobs and Fre edom  is held in D.C. Around 250,000 people participate, and King delivers his legendary  I Have a Dream speech. On Sept. 15, the Sixteenth Street Baptist Church in Birmingham is bombed. Four young girls are killed.On Nov. 22,  Kennedy is assassinated, but his successor, Lyndon B. Johnson, uses the nations anger to push through civil rights legislation in Kennedys memory. 1964 President Lyndon Johnson Signs Civil Rights Act. PhotoQuest / Getty Images On March 12,  Malcolm X  leaves the Nation of Islam. Among his reasons for the break is Elijah Muhammads ban on protesting for Nation of Islam adherents.Between June and August, SNCC organizes a voter registration drive in Mississippi known as Freedom Summer.On June 21,  three Freedom Summer workersMichael Schwerner, James Chaney, and Andrew Goodmandisappear.On Aug. 4, the bodies of Schwerner, Chaney, and Goodman are found in a dam. All three had been shot, and the African American activist, Chaney, had also been badly beaten.On June 24, Malcolm X  founds  the Organization of Afro-American Unity along with John Henrik Clarke. Its aim is to unite all Americans of African descent against discrimination.On July 2, Congress passes the  Civil Rights Act of 1964, which bans discrimination in employment and public places.In July and August, riots break out in Harlem and Rochester, N.Y.On Aug. 27, the Mississippi Freedom Democratic Party (MFDM), which formed to challenge the segr egated state Democratic Party, sends a delegation to the  National Democratic Convention in Atlantic City, N.J.  They ask to represent Mississippi at the convention.  Activist Fannie Lou Hamer, spoke publicly and her speech was broadcast nationally by media outlets.  Offered two nonvoting seats at the  convention, in turn, the MFDM delegates reject the proposal. Yet all was not lost. By the 1968 election, a clause was adopted requiring equal representation from all state delegations. On Dec. 10, the Nobel Foundation awards King the  Nobel Peace Prize. Updated by African-American History Expert, Femi Lewis.

Wednesday, November 20, 2019

Water in the California desert Research Paper Example | Topics and Well Written Essays - 1000 words

Water in the California desert - Research Paper Example As the climate continues to change the appearance of the planet,those who inhabit it, are faced with the various issues that come with such changes occurring in the first place. In times of considerable rain occurring,the concern becomes the potential flooding that would require specific plans in place,in order to aid those most affected. The same would also be said in instances were there would be a lack of water in the given environment that would also lead to problems that would need to be addressed in order to aid the general populous in the surrounding area, as well as any other regions that may be impacted. One such region to consider, in terms of discerning as to whether or not they would have a noticeable issue with water, would be the southern part of California.Different factors would be in place, in terms of assessing the situation in its entirety and determining whether or not the area of Southern California, would in fact have an issue with water availability. In terms o f describing the region of Southern California, "California's 25,000 square miles of desert can be divided into two basic zones; the Mojave, or high desert, and the Colorado, or low desert. Each of these areas contains unique fauna and flora, as well as other natural resources that make them an important part of California's present and future. California's deserts are home to two National Parks (Death Valley and Joshua Tree), a National Reserve (East Mojave), and California's largest state park, Anza- Borrego," ("California's", p.1). With the above mentioned importance that this region of California would have, it would remain essential to answer any problems that may arise for the area, which in this case, would be the issue of water shortage. Different organizations would be in place, with the essential purpose of gauging the water levels present within their locale. In the case of Southern California, according to testimony provided by the chairman of the board of directors for the Metropolitan Water District of Southern California, in his testimony before a Senate committee handling such an issue, the director would outline what he felt were the issues facing the region, in testimony that would go toward the assertion that, in terms of a potential water issue for the region of Southern California, they would in fact be facing such a problem. In terms of describing the group that Timothy F. Brick would represent, "Metropolitan Water District of Southern California is the nation's largest provider of imported water to an urban area. The population in its service area is more than 18 million, and it is projected to rise to 22 million by 2030. Metropolitan is comprised of 26 member public agencies that service an area spanning 5,200 square miles and six southern California counties," (Childs, 2007). As an organization that would represent a wide a rea and would service multiple counties within the region of Southern California, in terms of making the assertion that there would in fact be an issue with the availability of water in the area, they would be an organization that would know what they were talking about. In the period of time just before the Director would give his testimony, the area of Los Angeles alone, would have received an alarmingly low amount of rain, which in turn, would have translated into an issue for the overall water supply. From a political standpoint, the Governor for California would set forth with a plan to handle the continuing issue of water deficiency that areas within the state, such as California would continue to see. As those involved would allude to, there would be methods possible in the process toward remedying the issue and seeking the best possible outcome. In terms of the political legislation suggested from the state level, "The plan is comprised of four policy bills and an $11.14 billion bond. The package establishes a

Tuesday, November 19, 2019

Discussion 2 Week 10 Contract Termination Liability Risk Assignment

Discussion 2 Week 10 Contract Termination Liability Risk - Assignment Example ssionals on adequately addressing potential termination risks on their contracts, and on how potential termination costs would be funded in the event of a termination† (GAO, 2011, p. 11). The recommendations are consistent with the findings which allegedly cause potential termination practices. As emphasized, NASA does not observe consistency in application of detailed and specific instructions for the implementation of FAR clauses. As such, the contractors assume diverse interpretations of reported â€Å"risks and financial responsibilities related to potential termination liability, which may be due in part to NASA’s inconsistent practices† (GAO, 2011, p. 10). As such, the recommendation requiring NASA professionals to monitor potential termination costs would only be successful if and when the root cause of the dispute and inconsistency in practices is addressed. Thus, first and foremost, NASA should be able to design structured and consistent policies and prac tices concerning termination liability funding to avoid problems ensuing from contract termination in the future. One alternative to reinforce consistency in contract termination practices is to enforce review and monitoring of long term government projects and contracts within a definite time frame, say, every three years. Any need for changes, adjustments, and updates which are not within the original scope of the contract should be identified within that stage of progress. As such, as early as possible, when termination costs are not yet significant, the government and contracting parties should already set the stage for appropriate action (either termination or proceed with the contract) within a maximum ceiling (costs) stipulated. The changes and conditions should be subject to the regulations set in terminations for default and convenience (OConnor,

Saturday, November 16, 2019

Evaluation of Training Essay Example for Free

Evaluation of Training Essay The evaluation of training identifies the extent to which the program has succeeded in enhancing the knowledge or skill-set of the participants. Kilpatrick’s model of training evaluation identifies four levels of evaluation: trainee reaction, participant’s learning, behavioral change, and impact on business. The major tools of training evaluation include interviews, questionnaires and surveys, observations and secondary data, and pre and post assignments or tests. The emerging trend is empowered evaluation, or making participants responsible for the evaluation. Introduction: Objectives of Training Evaluation The broad objective of evaluating training is to measure the effectiveness of the program in relation to the enhancement of knowledge or skills and the application of such skills and knowledge at work by the participants. The secondary objective of evaluating training is to improve future editions of the program in terms of modules, facilities, and contextual factors. The evaluation of training also helps identify the factors that help and hinder effective training of individuals and provide a guide map for support the participant requires at work The successful evaluation of a training program depends on application of the correct objectives while designing the evaluation exercise and the correct feedback from the participants in relation to the inputs received from the trainer. Kilpatrick’s Model of Training Evaluation Donald L Kilpatrick of the University of Wisconsin proposed four levels of evaluation. The first level of Kilpatrick’s model is seeking trainee reaction, or the participant feelings regarding the training experience. The instruments used to capture such reaction include post-survey questionnaires or feedback forms and verbal reactions of the participants during the conclusion of the training program. Some of the common questions included in such surveys include whether the participants enjoyed the training, whether they considered the training relevant, whether they liked the venue, style, timings and the like, their opinion on the ease and comfort of the experience, and the like. The answers to such questions could be in either an open-ended format or a series of multiple-choice options. This level of evaluation is easy to obtain and analyze and takes place immediately after the training ends. It gives a broad and general indication regarding the success or failure of the training program. The second level of Kilpatrick’s evaluation model focuses on the participants learning, and measures the whether the desired skill and knowledge enhancements have taken place. The measures in this level indicate the extent of advancement or change in the intended direction or area. The common measurement instruments for this factor include pre and post training tests or assignments and interviews. The success of evaluation however depends on the establishment of a reliable and clear scoring measurement scale. The third level of Kilpatrick’s evaluation model focuses on measuring behavior change, or the extent of application of the acquired knowledge or the implementation of acquired skills on the job. The evaluation of this factor depends on any noticeable and measurable change in the activity and performance of the participants when they return to their job roles after the training, and on whether such changes are sustained or temporary. The evaluation also extends to measuring whether the participants could transfer their learning to others and whether they are aware of their change in behavior, knowledge, skill level. The common evaluation tools for such measures include ongoing observation and interview over time. The use of 360-degree feedback is a convenient tool to measure performance on a continuous basis. The measures required at this level are not easy to quantify and arbitrary snapshot assessments and subjective ratings often hamper successful evaluation at this level. The fourth level of evaluation in Kilpatrick’s model is measuring business results, or the effects of the training on the business or environment. The measures would typically be business or organizational key performance indices such as volumes, values, percentages, timescales, return on investment, staff turnover, quality ratings, achievement of standards and accreditations. Most of such measures would already be in place as part of the normal management reporting systems. Organizations traditionally focused on the first two levels of evaluation. In recent years, the third and fourth levels have also become common points of evaluation. The Process of Training Evaluations The process of conducting the training evaluation depends on the objective of evaluation, or the level of evaluation required. The instruments used to measure of participant’s reaction to the program and their acquisition of knowledge and skills need to be devised prior to the program and administered to the participants immediately after the program concludes. The evaluation of the behavioral change or the application of the acquired knowledge and skills to the job and measuring their impact on the business is complicated and a sustained effort. The various tools to evaluate such measures, such as interviews, questionnaires, 360-degree appraisals, feedback from supervisors, secondary data, observations and the like need to be structured and phased over a period of time, and the results compared with the previous data and the intended objectives of the training program. Conclusion The latest concept in training evaluation is empowered evaluation, wherein participants improve their programs themselves through self-evaluation and reflection. The responsibility for evaluation in this model rests with the participants and professional agency or entity conducting the training on a collective basis, and the process of evaluation necessitate cooperation, collaboration, and sharing of resources. References Goodstein, J. Goodstein, L. D. (1991). A Matrix for Evaluating Training in The 1991 Annual: Developing Human Resources (pg: 184). San Deigo: University Associates.

Thursday, November 14, 2019

Clara Barton :: essays research papers

Clara Barton was born on Christmas day, 1821 in Oxford Massachusetts. She was the youngest of her 4 siblings by at the least 10 years of age. Growing up in a middle class family, Clara was home schooled until the age of 15, then she became the teacher. As a child, in her spare time Clara enjoyed treating sick and injured pets and neighborhood animals. When she was 11 her brother David got really sick. So then she stood aside her brother for two years. She started to learn about medicine that way. She opened a free school in New Jersey for kids who have health problems. But because she wasn?t a man she couldn?t be head of the school. Clara was so unhappy that she quit teaching. Later she got a job as a clerk in the U.S. Patent Office. Then she quit her job as a clerk and became a volunteer for the soldiers in the Civil War. First Clara accomplished the task of starting a relief program for the injured soldiers. Next Clara was brought to attention of a medical supply shortage, and quickly organized a donation. As she arrived at the ?Cornfield? she wasted no time before acting as medical staff and distributing her supplies to surgeons. After the battle at Cedar Mountain, she appeared at a field hospital at night with a four-mule-team load of supplies. She saved hundreds of soldiers in the battlefield that day. That?s why she was known as "the Angel of the Battlefield.?In 1864 Clara was granted the position as superintendent of the Union Nurse. She had some medical problems though. Her problem was that she was suffering from greatly tireless work. She suffered because she had done to many things that tired her out. So her physician sent her on a vacation. While she was there she read a very famous book called ?A Memory of Solferino? by Henry Dunant, the founder of the Red Cross Movement. The Movement agreed for protection of the sick and wounded during the war.

Monday, November 11, 2019

Network security threats Essay

The purpose of this memo is to let you know the importance of network security. Here I will discuss the network security threats, law that affects network security and processes and procedures for disaster recovery, data backup, and data restoration along with future action plans. Network security threats can be defined as any method used to try to breach the security of a network or system (Tulloch 2003). The goal of network security is to sustain and defend three critical properties of information, which are confidentiality, integrity and availability. This threats originate from variety of sources such as External and internal. External threats are structured threats from malicious individuals or organizations and unstructured threats from inexperienced attackers such as script kiddies. Internal threats are threats from disgruntled employees or contractors. Various network security threats exist. Some of the threats are Firewall and System Probing, Network File Systems (NFS) Application Attacks, Vendor Default Password Attacks, Denial of service (DoS) attacks, Social Engineering Attacks, Electronic Mail Attacks, Spoofing, Sniffing, Fragmentation and Splicing Attacks, Easy-To-Guess Password Compromise, Destructive Computer Viruses, Prefix Scanning, Trojan Horses and Reconnaissance attacks. The top three security threats to a network are discussed in below paragraphs. Disgruntled Employees This is the most common network security threat. Disgruntled employees, who are the group most familiar with their employer’s computers and applications, including knowing what actions might cause the most damage can create both mischief and sabotage on a computer System. The disgruntled current employees actually cause more damage than former employees do. According to Parmar, the common examples of computer-related employee sabotage are entering data incorrectly, changing and deleting data, destroying data or programs with logic bombs, crashing systems, holding data hostage and destroying hardware or facilities. Denial of Service (DoS) Attacks According to Tulloch (2003), DoS is a type of attack that tries to prevent legitimate users from accessing network services. In this type of threats, the attacker tries to prevent access to a system or network by several possible means. Some of these are: Flooding the network with so much traffic that traffic from legitimate clients is overwhelmed; Flooding the network with so many requests for a network service that the host providing the service cannot receive similar requests from legitimate clients; and Disrupting communications between hosts and legitimate clients by various means, including alteration of system configuration information or even physical destruction of network servers and components. (Tulloch 2003) Malicious Code and Electronic Mail Attacks. According to Parmar, malicious code refers to viruses , worms , Trojan horses , logic bombs, and software (uninvited). Electronic e-mail attacks are emails that hackers send to compromise network systems and whenever companies accept this e-mail from the Internet that have exposed versions of the sendmail program are potential targets from this attack. NETWORK SECURITY LAWS As such, no network security laws exist for network security. However, some of the acts that are applicable for network security threats are discussed in below paragraphs. Privacy Act of 1974 The concept of information privacy has been one of the most critical issues. It takes into serious consideration. Imagine a world without information privacy. The lack of information privacy creates a breeding ground for technological sharing and distribution. In 1974, the Privacy Act of 1974, passed by the Unites States Congress, states that: No agency shall disclose any record, which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written consent of, the individual to whom the record pertains (â€Å"Privacy Act of 1974† 88 Stat. 1897). CFAA – Computer Fraud and Abuse Act. According to Robinson (2003), the current United States law of information security is the Computer Fraud and Abuse Act (18 U. S. C). It was originally enacted solely as a computer crime statute, but in its present form, it imposes both civil and criminal liability for a wide variety of acts that compromise the security of public and private sector computer systems. DMCA – The Digital Millennium Copyright Act The Digital Millennium Copyright Act (17 U. S. C), provides that â€Å"no person shall circumvent a technological measure that effectively controls access to a work protected under this title [the Copyright Law]†. (Robinson, 2003) There are other laws (acts), such as the Wiretap Act, the Stored Communications Act, and the Computer Security Act are also applicable on network security threats. PROCESS AND PROCEDURES FOR NETWORK SECURITY The three important techniques used by companies to protect their network are firewalls, encryption and VPN, which are discussed below: Firewalls Firewalls are used to control access between networks. It separate intranets and xtranets from the Internet so that only employees and authorized business partners can access. Firewalls are implemented by Packet filtering to block â€Å"illegal† traffic, which is defined by the security policy or by using a proxy server, which acts as an intermediary. Encryption To protect against sniffing, messages can be encrypted before being sent (over the Internet). In general, two classes of encryption methods Secret Key encryption (DES) and Public Key encryption (RSA, public and private key are needed) are used today. Public Key encryption is incorporated into all major Web browsers and is the basis for secure socket layer (SSL). Virtual Private Networks (VPN) VPN maintains data security as it is transmitted by using tunneling and encryption. Tunneling creates a temporary connection between a remote computer and the local network. Tunneling blocks access to anyone trying to intercept messages sent over that link. Encryption scrambles the message before it is sent and decodes it at the receiving end. Another important area for companies are (implementing) Security policy, Disaster Recovery and Business Continuity (plans), which are discussed in below paragraphs: Security policy Security policy is defined as rules, directives and practices that govern how asset, including sensitive information are managed protected and distributed within an organization. Every organization should define and document a security policy that defines the limits of acceptable behavior and how the organization will respond to violation of such behavior. Security policy defined should be concise, to the point, easy to understand and widely publicized in the organization. The security policy implemented should ensure compliance with all laws. The security policy should be reviewed periodically to respond to changes in technology or circumstances. There should be restrictions on playing of computer games on corporate computers and visiting of non-productive web sites using corporate network. In addition, employees should be monitored for prohibition against taking copies of certain corporate electronic document out of office, use of pirated software and use of corporate e-mail account for sending the personal e-mail. Proper Documentation for Disaster Recovery and Business Continuity There are various types of vulnerabilities associated with computer-based information systems. Now these days’ organizations are being more dependent upon their computer systems, therefore the survival of business depend very much on the security of these systems. Initially (few years back), physical disasters such as floods a hurricane, and fires were the most probable security risks. Nowadays, computer operations are also liable to loss or damage from hackers, computer viruses, industrial spies and similar causes which until recently were in the realms of science fiction. The terrorist attacks on September 11, 2001, showed that there is a big difference between disaster recovery and business continuity. In the past, disaster recovery meant getting computers and networks up and running after a hurricane, flood, fire, or other disaster. However, September 11 taught a broader issue getting the business up-and-running. According to McNurlin & Sprague (2006), Business continuity broadens the discussion to include: Safeguarding people during a disaster; Documenting business procedures so that not dependent upon a single employee; Giving employees the tools and space to handle personal issues first so that they can then concentrate on work; Alternate workspace for people and Backup IT sites not too close but not too far away; Up to date evacuation plans that everyone knows and has practiced; Backed up laptops and departmental servers; and Helping people cope with a disaster by having easily accessible phone lists, e-mail lists, instant-messenger lists so people can communicate with loved ones and colleagues. CONCLUSIONS The goal of network security is to sustain and defend three critical properties of information, which are confidentiality, integrity and availability. The most common threats to network security comes from disgruntled employees, DoS attacks and malicious code attacks. All these threats try to breach the security of a network or system. Various information security and privacy laws exist, which must be followed by companies while installing and managing their computer network. Various techniques such as firewalls, encryption and VPN are used for securing network. In addition, security polices and disaster recovery and business continuity plan are implemented for securing network. FUTURE ACTION Below are some methods for securing network from the top three security threats to a network. Disgruntled employees type of threats can be limited by invalidating passwords and deleting system accounts in a timely manner by network (system) administrator. According to Tulloch (2003), defenses against DoS attacks can be done by disabling unneeded network services to limit the attack surface of companies network ; enabling disk quotas for all accounts including those used by network services; implementing filtering on routers and patch operating systems to reduce exposure to SYN flooding ; base-lining normal network usage to help identify such attacks in order to quickly defeat them ; and regularly backing up system configuration information and ensuring strong password policies. To prevent malicious code attacks from occurring, regular check with vendors to ensure systems are running a correct version of sendmail or some more secure mail product are necessary. Network Security through Software and Hardware can be implemented by: †¢ Modular and cheaper workgroup firewalls. †¢ By having host based and network based Intrusion detection systems †¢ Active security by providing auto mated responses to agents. †¢ Centralized management †¢ Content filtering †¢ Acceptance of PKI †¢ By having token, smartcard or biometric based access solutions. Some basic protecting tips for computer (in network) that should be provided to all the staffs in the organization are: †¢ Always use Anti-virus Software †¢ Download security updates and patches regularly and update computer systems. †¢ Do not check or download emails and attachments from unknown sources: †¢ Back Up your data regularly. †¢ Use Firewall †¢ Do not share access to your computer hard drives in network Attachments. REFERENCES Tulloch, M.2003, ‘Microsoft Encyclopedia of Security’, Microsoft Press, Washington, United States of America. Parmar, S. K. & CST, N. Cowichan Duncan RCMP Det (cmpl), ‘An Introduction to Security Manual’ McNurlin, B. C & Sprague, R. H 2006, ‘Information Systems Management in Practice’, 7th ed. , Pearson Education, New Jersey United States Congress, Privacy Act of 1974. Public Law No. 93-579, 88 Stat. 1897 (Dec. 31, 1974) CERT Training and Education software Engineering Institute (2006). Information Security for Technical Staff, Student handbook, Camegie Mellon University, USA Robinson, S, 2003, ‘U. S. Information Security Law’, accessed on October 20, 2007 from .